The Y2038 Problem

The Y2038 problem is similar to the Y2K problem. We’re exactly in between both about now. Both are 18 years away, in either direction. While Y2K is over and was obvious to everyone, Y2038 is not.

The issue here relates to a representation of date and time in Unix systems, and is therefore sometimes referred to as Unix Y2K. The root is the convention to store date and time information as 32bit unsigned integer in such systems. This means, possible values are limited. Time-differences in seconds, starting from 01.Jan 1970 cannot span beyond 03:14:07 UTC on 19 January 2038.

The Y2038 Problem

The Y2038 problem will make all calculations beyond this date impossible, until migrated to another representation. At the time being, this seems far away. However, the problem casts its shadows already. Industries, in particular financial markets, often rely on long term forecasts.

Governance issued treasury bonds come with with the longest maturity. Often twenty years, sometimes thirty years. Calculations for complex, long running financing models easily try to estimate returns 20 years and beyond into the future. This is already beyond the problematic date that Y2038 brings. The code to run these calculations is typically complex and stable. Sometimes, it is as old as from 1970. Back then, this date-representation Unix engineers introduced this approach. 32bit covered a long period. John Femellia has a thread, over at Twitter, telling a story about the upcoming issues today.

Amazon CloudFront Edge Locations

Amazon CloudFront launches new Edge Locations
AWS Logo

Amazon CloudFront Edge Locations: AWS’ Amazon CloudFront launches 5 new CloudFront Edge Locations. These are located in Bulgaria, Greece, Hungary, Kenya, and Romania.

AWS CloudFront is a Content Delivery Network and helps webpages to distribute their content globally. To achieve this, CDN’s leverage managed reverse proxy servers. The goal is to bring content closer to the consumer. And through keeping bulky media distributed, it prevents congesting internet connections.

These added deployments will help AWS customers and their consumers experience significantly improved page load times. AWS has constantly expanded CloudFront’s Network footprint since its launch in 2008. With this recent update, CloudFront now has 216 points of presence in 84 cities across 42 countries. 

Source: aws blog.

Arduino launches IoT platform

Arduino launches IoT platform: With the Portenta H7 Arduino announces a Platform targeted at small and medium businesses. It comes with all the connectivity necessary to enable devices classified as Internet of Things: WiFi, BLE, with physical connectivity to USB and SD-Cards, plus the well known Camera or UART connectivity. TechRadar also mentions LTE. Here is the article from TechCrunch:

Arduino launches IoT Platform
Adruino for IoT

Arduino, the open-source hardware platform, today announced the launch of a new low-code platform and modular hardware system for IoT development. The idea here is to give small and medium businesses the tools to develop IoT solutions without having to invest in specialized engineering resources. The new hardware, dubbed the Arduino Portenta H7, features everything […]

Source: Arduino launches a new modular platform for IoT development | TechCrunch

Day 4

Impressions from #36C3 – Day 4

Impressions from Day 3 – #36c3

Impressions from Day 3 – #36c3

Von Menschen radikalisiert: Über Rassismus im Internet
Michael Kreil: Von Menschen radikalisiert: Über Rassismus im Internet

Day 3 at the #36c3 for me begins 11.30am with Von Menschen radikalisiert: Über Rassismus im Internet by Michael Kreil. Michael starts telling his audience he lured them into a trap: the talk ain’t be dealing with internet at all, but focus on racism alone.

Provable Insecurity
Provable Insecurity

12:50 dreiwert and Claus Diem share ideas about Provable Insecurity and Cryptographic hash functions and the problems modelling them for the real world. Claus is a mathematician and cryptographer, who, among others, worked on designing and analyzing a novel attack on elliptic curve cryptography.

16.10: FinFisher, See You in Court! mit Ulf Buermeyer & Thorsten Schröder

18.50: Boeing 737MAX: Automated Crashes

20.00 Der netzpolitische Jahresrückblick mit Markus Beckedahl

21.50 Hirne Hacken mit Linus Neumann.

#36C3 – Impressions from Day 2

Lectures at 36C3

#36C3 – Impressions from Day 2: Eine Auswahl von Vorträgen und Workshops die den 2. Tag des Congress für mich prägten.

Der Pfad von 4G zu 5G
Der Pfad von 4G zu 5G

Der Pfad von 4G zu 5G

In Saal Ada erzählen Peter Schmidt und Heurekus schon um 11:30 über dem Weg von 4G zu 5G und den notwendigen Wandel im Core Netz. Im wesentlichen erklären die beiden dabei Unterschiede der beiden Protokolle an der sogenannten Luftschnittstelle, inkl. der Vor- bzw. Nachteile.

12:50 An ultrashort history of ultrafast imaging
Caroline vom DESY erklärt wie man Bilder von sehr schnellen Ereignissen aufnimmt und nicht nur das, sondern auch von sehr kleinen Strukturen.

14:10 Das nützlich-unbedenklich Spektrum
Fefe teilt seine Gedanken zu Softwarequalität und Legacy Code, in dem er Software zwischen Nützlich und Unbedenklich einteilt. Auf dem Gedankengang dahin erörtert er mehrere Dimensionen, die man für eine Bewertung heranziehen kann.

16:10 The ecosystem is moving
Moxie Marlinspike, Gründer von Signal, dessen Crypto-Protokoll sogar in WhatsApp Einsatz findet, über Messenger: distributed and decentralized technologies from the perspective of a product that many would like to see decentralize.
In his talk, Moxie Marlinspike, makes an argument against decentralizing. He argues with four (4) individual talking points and invalidates all four of them throughout the talk:

  • Privacy
  • Censorship Resistance
  • Availability
  • Control

Unsurprisingly, the crown in the room disagreed.

Die Zukunft grenzüberschreitenden Datenzugriffs und politischer Verfolgung
Die Zukunft grenzüberschreitenden Datenzugriffs und politischer Verfolgung

17:10 Die Zukunft grenzüberschreitenden Datenzugriffs und politischer Verfolgung
Elisabeth Niekrenz politische Referentin der netzpolitischen Organisation Digitale Gesellschaft e.V., über eine in Brüssel gegenwärtig verhandelte Verordnung, die Zugriffe auf Benutzerdaten Grenzüberschreitend regeln soll.

36c3, aus dem Netz

#36C3 – Impressions from Day 2, on the Internet:

From the blog: CCC analysiert Münchner Staatstrojaner FinSpy

Decoding the cultures of hacking: räumt mit Klischees über die Szene auf.

Day 1 at the 36C3 in Leipzig

Day 1 – 36C3

After having traveled for a few hours, we missed the opening ceremony but still had a few good first impressions. Here are a few notes from what I managed to see so far at Day 1 at the 36C3 in Leipzig:

Large Hadron Collider - Infrastructure
Large Hadron Collider – Infrastructure Talk at 36C3

16:10 The Large Hadron Collider Infrastructure Talk
Sev and Thasti give an insight into how the Large Hedron Collider at CERN works. LHC is a particle collider that measures about 27km in diameter and requires – if I got the two speakers right – 450kV of current off the French electricity grid. The particle beam produces enough energy to melt 1000kg of copper, when turned on.

David Graeber: From Managerial Feudalism to the Revolt of the Caring Classes
From Managerial Feudalism to the Revolt of the Caring Classes

17:30 From Managerial Feudalism to the Revolt of the Caring Classes: David Graeber, author of Debt: The First 5000 Years and Bullshit Jobs is talking about how the caring classes, e.g. health and education, are becoming increasingly less appreciated and how administration is on the rise.
Link to Lecture.

21:00 What the world can learn form Hong Kong.
Katharin Tai talks about backgrounds of the Hong Kong protests and explains the 5 demands of protestors. The clarity helps the movement keep their momentum and stand against government. She also gives insights into strategies to cope with police and organisation of the protests, that are ongoing for months now. So is “Be water”, a phrase apparently inspired by Bruce Lee, a tactic to organise flash mob type protests. Plenty of these ideas are reflected in Hong Kong Protest Art, that Katharin Tai also covered in her talk.

Stimmen aus dem Netz

2020: The year of ARM?

Rumors, that Apple would switch to ARM for their computers have been floating around for a while. MacWorld just recently reaffirmed these with Annual ARM predictions.

Another important product that was announced at this years Re:Invent, AWS has ARM servers in their cloud portfolio. The Graviton2 is a custom-built 64bit processor available for EC2 workloads.

A clear signal ARM becomes ready for primetime.

AWS CloudFront Monitoring Update

AWS CloudFront Monitoring Update: AWS released an early & small Christmas Gift to their CloudFront Customers. CloudFront now supports eight more metrics to monitor content distribution. These include:

Cache Hit Rate via HTTP POST and PUT requests, via the percentage of all cacheable requests for which CloudFront served the content from its cache, including errors not considered cacheable requests.

Origin Latency as a quota and the total time spent for requests that are served from the origin, not the CloudFront cache. Origin Latency allows to monitor the performance of your origin server.

Error Rate by status code as a percentage of requests for which the response’s HTTP status code is in the 4/5xx range, in particular 401, 403, 404, 502, 503, and 504.

AWS CloudFront Monitoring Update via AWS Blog.

Understanding Internet Disruptions

David Belson, former Akamai Internet Analyst, now working for Internet Society, explained “Internet Shutdowns” in his latest blog post.

Internet Disruptions
Understanding Internet Disruptions

In March 2019, in a move described in one news report as a “government-imposed Internet shutdown,” the president of Sri Lanka temporarily blocked Facebook, WhatsApp, Instagram, Viber, and other services. In this case, limited access to a class of applications was inaccurately painted as a full-scale Internet shutdown. Unfortunately, this isn’t unusual. Media coverage and […]

Source: From Content Blocking to National Shutdowns: Understanding Internet Disruptions | Internet Society