Hacker Newsnew | past | comments | ask | show | jobs | submit | fi358's commentslogin

Strange as I have never heard that you would have to show your ID when buying a prepaid sim card in Finland. And I have also bought them several times and I think that I have sometimes bought them with cash.


I have also noticed that for some reason hot showers and also shoulder and head massage help seem to help a lot, but only about as long as I am in the shower or have the massage. And also putting Vicks VapoRub on scalp seems to help a lot, but it is quite messy. However, a triptan medication I have started to use recently, seems to help even more.


I found a video that has lot of information about the cable severing ship:

Tanker Eagle S Seized by Finland for Severing Cables Between Finland & Estonia | Is it a Spy Ship? https://www.youtube.com/watch?v=Gy27qiKVCSI


I think it had helicopter pad, a harbor for relatively large ships etc. I think Russia had planned to use it as a place to land troops or "green men" during war as spying could happen without helicopter pad etc.


First two sabotages were done by Chinese ships (which may have had russians on the board). This one was registered to Cook Islands.


It seems that Putin thinks Russia is able to take Belarusia by coercion:

Putin’s plan for a new Russian Empire includes both Ukraine and Belarus https://www.atlanticcouncil.org/blogs/ukrainealert/putins-pl...


Belarus is already pretty much a Russian puppet state.


I don't think it was incompetent attempts to attach something to the lines. It severed 4 data data cables and electricity cable called Estlink 2. If it hadn't been stopped, it would have severed also Estlink 1 within half and hour later perhaps also Balticconnector gas pipe.

About year ago Balticconnector gas pipe was already damaged by a Chinese ship, which had been dragging the anchor for long time in a very suspicious manner:

https://en.wikipedia.org/wiki/Balticconnector

And again in August several data cables were severed by a Chinese ship. According to one analysis, that time they may have dragged the anchor for 400 kilometers:

https://www.youtube.com/watch?v=fB-vEp3wr-0

BTW, Russia seems to have for years spend time finding out the routes of sea cables and perhaps also spied them or prepared some kind of sabotage:

The global internet is powered by vast undersea cables. But they're vulnerable. https://edition.cnn.com/2019/07/25/asia/internet-undersea-ca...

Ukraine war: The Russian ships accused of North Sea sabotage https://www.bbc.com/news/world-europe-65309687

Once is happenstance. Twice is coincidence. Three times is enemy action...


> Russia seems to have for years spend time finding out the routes of sea cables and perhaps also spied them or prepared some kind of sabotage:

The cable positions are public info, they don't need to spend time finding out where they are.


Is the exact positions public info or is it just crude positions? BTW, if the exact cable positions is public info, where is it available?


What do you consider 'exact'? Approximate positions are drawn on nautical charts, so that ships don't accidentally go and try to anchor in the vicinity. Plenty accurate enough for a ship to 'accidentally' drop an anchor and drag it along the seabed for miles.


I suspect the exact position is not known. The drop the cables over the side and currents make then drift on the way down.


As far as I know, they still need classical encryption methods (with something like shared secret key or public key for authentication) to detect active man in the middle attacks where the attacker prevents the parties connecting to each other and then pretending to both parties to be the other party by creating his own "messages" as if they came from the other party. Or at least to have some kind of additional trusted physical medium where it is impossible to prevent the parties communicating directly, capturing their "messages" and then sending your own modified "messages" instead -- perhaps based on some kind of timing etc.

And if you still have to rely to classical encryption methods to make sure you know the identity of the other party (to prevent active man in the middle attack), why not just use classical encryption methods for everything else as well, instead of using quantum key distribution?


You don't need "classical encryption" for quantum key distribution. With QKD you can provably detect if a MITM attack happened. With classical methods you can never be 100% sure, although how much of that matters in practice is another question.


> You don't need "classical encryption" for quantum key distribution. With QKD you can provably detect if a MITM attack happened.

This is incorrect. QKD can detect passive mitm only. It cannot detect an active mitm.

Which is the main reason its overhyped, since as cool as QKD is, you still need active mitm prevention, so you have to rely on classical crypto anyways.


In the Greek wiretapping case, which has been linked to the US Embassy, there was a suspicious suicide:

https://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2...


If it was assasination, who did it as it happened so soon afterwards? I would assume that it took long time for Iran to find out the Stuxnet.


Obvious cause could be his "employers" getting rid of a toxic asset.


Indeed. If it was an assassination, it was from a "friendly" agency covering their tracks to avoid him spilling the beans.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: