Monday, November 3, 2014

SC2 Thoughts: Power of Queens x Nydus!




Life (Z) vs Stats (P)

Comments with Spoilers below:

3

2

1

This was a well planned & executed counter to Stats play.

Few points I want to emphasize:

Life used a burrowed Zergling to provide vision for Nydus, this provides more tactical surprise, as well as being safer since what isn't seen can't be killed or pushed back.

Burrow is started at 10:15 at same time Life is getting a Zergling into Stats main for a complete scout.

The Zergling that provides vision for the Nydus is sent at ~13:13 game time link to that momment

Note:  In addition to that Ling, there are 2 others to either side of it, for total of 3 Lings, all burrowed, providing vision on the left side of Protoss half of the map.

Also, more importantly for that Nydus attack, the 2 additional burrow Lings provide vision in case Protoss tries to flank or surround the Nydus force.

At nearly the same time as the Lings on the left are being burrowed, Life sends a group of Zerglings around right side of map for both Scouting and attempt at another run by into Natural/Main (typical Life Ling Tactics).

Near end of the game, Stats does send a Probe or two to drop a Pylon near Life's 4th Base (Bottom Right) while the Nydus attack is in progress.

But realizes there is no way he can put enough pressure on there to win a base race and GG's moments after that Pylon finishes.

Lee Hutchinson fed up with AT&T unlock policies

Personal frustration with AT&T from staff member of Ars Technica, Lee Hutchinson arstechnica.com/staff/2014/11/atts-outdated-unlock-policies-cost-it-a-loyal-customer-me/

Doesn't surprise me, AT&T was first carrier I used many years ago, won't ever use them again.

There are things Verizon & T Mobile do that frustrate me, but they at least have some things they do well than balance the negatives much better than AT&T IMO.

Devil's Advocate:  I can think of a single reason for AT&T to do this, though one would still have contract, enforcing that on someone who has unlocked device and isn't happy with AT&T is more expensive than using leverage of not unlocking phone.

That could be significant for AT&T's cash flow if many others share my opinion that AT&T is the worst carrier in USA after they become a customer.

Game of the Month: Bunny vs Life




Bunny (T) vs Life (Z)
Game 3 in Bo3

No comments, at least for now, because don't want any spoilers.

I also liked Game 2  of this series, though it wasn't as awesome as Game 3.

Tuesday, October 28, 2014

Nerd News: Dell Alienware external Graphics option

I've been interested in external GPU (eGPU) for some time, for all my posts on that click eGPU Label,since laptops are far more practical when you have to travel, but I don't care for 8+ lbs (4+ kilo) gaming laptops.

Heavy laptops like that aren't much more portable than some desktops, I helped a Nerd buddy drag his desktop around to many events when I was in high school.

So real interested in news from Dell Alienware about their "Graphics Amplifier", an external GPU bay designed to pair with their new 13" laptop.

Links to the eGPU:

Link to 13" Alienware laptop info:


Monday, October 27, 2014

Starcraft 2 Thoughts: Roach Baneling vs Terran




Symbol (Z) vs Flash (T)

Very nice Zerg play!

A few significant choices Symbol made worth pointing out IMO:
  • In his first attack, he made a point to focus down 4 Supply Depots (3 at third base, & 1 at wall in Natural), this supply blocked Terran for a bit.
  • He also destroyed the 2 Ebays that were part of the front wall.
  • He immediately withdrew after accomplishing these limited objectives (ie he didn't overextend).


I've blogged before about how strong Roach & Banelings with Air Support can be, see this TLO vs Satini game http://cliffsesportcorner.blogspot.com/2012/02/tlo-vs-satini.html, though I tend to favor Corrupters over the Mutas used here.

I prefer Corrupters because I feel they are more cost efficient vs Terran than Mutas.

Six (6) Corrupters will 2 shot Medivacs, so 6 to 12 Corrupters in early game, and in mid or late game Broodlords can be much more useful than Mutas.

Midgame I would use them more for harassment on certain maps that have dead air space behind bases.

You can fly 1 or 2 Corrupters behind a Terran base, and then upgrade them to Broodlord.

If you do that to 2 bases at same time, and have a Nydus network, you can drop Nydus in weak or undefended base with Broodlings providing vision & cover for Nydus.

Just click on the Starcraft 2 Thoughts Label for more posts like this, more Labels can be found at bottom left of every post and in Label cloud at left side of Blog.


IEM 2014 San Jose: Catz vs Creature




Interesting series
Catz (Z) vs Creature (P)


Monday, October 6, 2014

Nerd News: "Silk Road Lawyers Poke Holes in FBI’s Story"

Brian Krebs has an interesting article up,  http://krebsonsecurity.com/2014/10/silk-road-lawyers-poke-holes-in-fbis-story/, about the trial of alleged leader of Silk Road.

Short version, government's explanation for how they found the hidden servers appears to be BS.

This seems like they are hiding real way & means that they discovered the information.

Which, though IANAL, isn't legal as I understand it, in US Trials, there is a step called "Discovery" see http://www.americanbar.org/groups/public_education/resources/law_related_education_network/how_courts_work/discovery.html & http://en.wikipedia.org/wiki/Civil_discovery_under_United_States_federal_law.

So unlike TV or Movie Courtroom drama, there isn't surprise evidence introduced in the middle of the trial.

There are several reasons why information isn't supposed to be hidden during Discovery.

Discovery reduces wasting time, Judges generally have more cases than they can get to in any given time period, so as a practical matter, parties are encouraged to settle before Court date.

It also reduces some types of false testimony & evidence, or at least makes it easier to illuminate that it is occurring.


Friday, September 19, 2014

Security & Hacking: Apple iOS 8 & Data Extraction

People have been citing a statement on this page http://www.apple.com/privacy/government-information-requests/ as proof that with iOS 8 Apple can't extract data from devices secured with a passcode.

I don't think most people are reading Apple's statement with a critical enough mindset, here is last part of what Apple actually wrote about data extraction:

"So it's not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8."

The key part is "extraction of this data from devices in their [government] possession running iOS 8." Note my bolded emphasis.

What Apple is really saying, I think, is just like iOS 7 Apple needs devices in their possession to extract data, they can't do it remotely and didn't provide government agencies with the tools to do so either.

Here is a snippet from Apple's page Legal Process Guidelines U.S. Law EnforcementImportant Note, the original link "https://www.apple.com/legal/more-resources/law-enforcement/" to this information at Apple gets redirected to "https://www.apple.com/privacy/government-information-requests/" now, so if you don't have a copy of original page you will need to find cached version to verify:
 " I. Extracting Data from Passcode Locked iOS Devices
 Upon receipt of a valid search warrant, Apple can extract certain categories of active data from passcode locked iOS devices. Specifically, the user generated active files on an iOS device that are contained in Apple’s native apps and for which the data is not encrypted using the passcode (“user generated active files”), can be extracted and provided to law enforcement on external media. Apple can perform this data extraction process on iOS devices running iOS 4 or more recent versions of iOS. Please note the only categories of user generated active files that can be provided to law enforcement, pursuant to a valid search warrant, are: SMS, photos, videos, contacts, audio recording, and call history. Apple cannot provide: email, calendar entries, or any third-party App data." 

And from the FAQ section of that page:
"Can Apple provide me with the passcode of an iOS device that is currently locked?
No, Apple does not have access to a user’s passcode but may be able to extract some data from a locked device with a valid search warrant as described in the Guidelines."
So what it seems like to me, is that iOS 8 offers at best same protection as earlier versions, Apple can still extract data from from devices in their possession, though they worked hard to write a factually accurate statement that was misleading.

I also haven't noticed any comments about data from the coprocessor that tracks movement and other data on iPhone 5S and newer, even when phone is sleeping.


Additional Links of Interests:

Thursday, September 11, 2014