This is just first impressions. I have just had Sky Q installed.
First, yes, I am using Sky. Personally I don't think I have watched Sky for a long time, and then it was only to record and watch my own live TV appearances. Maybe before that I watched some series (well, recorded and watched later). However, my family like it. Sandra likes it. Lewis likes it. So we have it.
We used to have 7 Sky boxes in total, but some have broken over time (all of the original ones, I think), and some kids have moved out, and so on, and we were actually down to only 3, albeit all new 2TB Sky+ HD boxes. Annoying I have been paying for all 7 boxes, mainly because I did not really want to run the gauntlet of talking to Sky customer services. It comes to something when you would rather pay £40 a month more than call them! Sadly the on-line order form does not seem to have a "cease this extra room" else I would have ordered on-line.
Anyway, I saw Sky Q on the site, and there was an order button, and it will save me quite a lot. So I ordered, along with four of the Sky Q Mini boxes. They seem to have no ongoing cost, so why not.
The installation took many hours. You would expect the hard bit is fitting a new dish and running cables, but actually that was quick. I had a pole for the old dish, and existing cabling I could patch through bypassing the distribution amp. It uses two cables for wide band Horizontal and Vertical, so is different to old Sky boxes. What took so long was the set up, s/w upgrade, and so on. That literally took hours, and they got another guy in to help.
Even then, they did not actually set up as I asked, but managed to bodge it together.
So, first impressions...
WiFi
The first annoyance is that the whole system seems to rely on use of WiFi. It uses a WPS system to connect one box to the next. Each box appears to also work as an AP itself with a different SSID. You can even have one box daisy chained of another it seems. I now have 5 new SSIDs visible locally - that is a pain.
There is an option to "connect to your broadband router via wired network". I set that up, but it still seems to have the WiFi and all the SSIDs still. It looks a lot like this just sets up the "client" side to be wired, but the device still works as an AP to any other boxes if you need. I cannot see how to turn that off and just use the LAN.
Update: You can turn off the WiFi! Go in to home menu, scroll to "Settings" but do not select it, then 0, 0, 1, and select, and that is installer menu where wifi can be turned off (2.4GHz and 5GHz separately). It also has the power line stuff which is definitely switched off!
Limitations
Then we come to one of the key problems, which they seem to think will change in future. It seems you can only have two of the Sky Q Mini boxes operating at a time. The others just tell you there are too many in use and to put one in standby. This is very odd given that they say you can have up to 4 of them. If limited to two working, why is there a limit on how many on the network anyway?
Being lied to?
This is what is really annoying me now.
They stated clearly that whilst live TV can only be viewed on three boxes (did not say it was main box plus two minis, just "three boxes"), but they then said categorically that catch-up/recorded/on-demand can be watched on the other boxes.
That seems to be a lie - listen for yourself...
2016-07-28
2016-07-27
BW Reed & Son Ltd (Builders)
Some 10 months after my garage conversion was supposedly completed, at substantially more than the quoted price, I still do not have building control sign off.
There was a problem over the way the membranes in the walls was done, but the builder convinced building control of that, leaving an issue with "fresh air" requirement "which is a consideration of Part F of the Building Regulations with a view to protecting your long term health".
Basically, at this stage, we need an extractor fan installing to meet the building regulations.
Personally, for fresh air, I am happy to open the internal door to utility room which has a window, if I need it. I can't see how that is different to opening a window in the room. But it seems that is not good enough!
Paul did arrange several other contractors, quoted/paid separately, but arranged by Paul for electrical, windows, flooring, decorating, etc. But Paul is the main contractor I engaged to do this. My recollection is that he said he would ensure it meets building regulations - I would not have hired him otherwise.
The work was done on a building notice without formal plans, which is fine. And Paul said it would be fine. Though now he is blaming lack of plans for the fact there is the "fresh air" issue. As it happens I did a 3D model for him at all at the start (with no fan) so he knew what was planned.
The window contractor asked if I wanted opening windows or not. I said no (as I never open them normally) and he explained the window has a vent at the top anyway. He seemed more concerned over windows as a means of escape, but as the small room has two separate doors then that was not an issue.
At no point did anyone say we needed air circulation, but 10 months down the line after it is all done, apparently we do.
What is surprising is that Paul is passing the buck - claiming it is not his responsibility. He is blaming the electrician, but I suspect the electrician could blame the window contractor just as easily. Only someone co-ordinating the whole thing could really have sorted this, and that is Paul.
At the end of the day, the electrician was not "doing a garage conversion", and neither was the window contractor. It is Paul that was "doing a garage conversion". So I am surprised at Paul not taking responsibility as the prime contractor, and passing the buck, but that is the way it is.
So, I am paying yet more money for a fan to be installed so we finally get this signed off. No, I am unlikely to ever turn the fan on as it will be noisy. A box-ticking exercise for the council and a waste of money.
So, beware engaging a builder that claims to ensure the work meets building regulations.
There was a problem over the way the membranes in the walls was done, but the builder convinced building control of that, leaving an issue with "fresh air" requirement "which is a consideration of Part F of the Building Regulations with a view to protecting your long term health".
Basically, at this stage, we need an extractor fan installing to meet the building regulations.
Personally, for fresh air, I am happy to open the internal door to utility room which has a window, if I need it. I can't see how that is different to opening a window in the room. But it seems that is not good enough!
Paul did arrange several other contractors, quoted/paid separately, but arranged by Paul for electrical, windows, flooring, decorating, etc. But Paul is the main contractor I engaged to do this. My recollection is that he said he would ensure it meets building regulations - I would not have hired him otherwise.
The work was done on a building notice without formal plans, which is fine. And Paul said it would be fine. Though now he is blaming lack of plans for the fact there is the "fresh air" issue. As it happens I did a 3D model for him at all at the start (with no fan) so he knew what was planned.
The window contractor asked if I wanted opening windows or not. I said no (as I never open them normally) and he explained the window has a vent at the top anyway. He seemed more concerned over windows as a means of escape, but as the small room has two separate doors then that was not an issue.
At no point did anyone say we needed air circulation, but 10 months down the line after it is all done, apparently we do.
What is surprising is that Paul is passing the buck - claiming it is not his responsibility. He is blaming the electrician, but I suspect the electrician could blame the window contractor just as easily. Only someone co-ordinating the whole thing could really have sorted this, and that is Paul.
At the end of the day, the electrician was not "doing a garage conversion", and neither was the window contractor. It is Paul that was "doing a garage conversion". So I am surprised at Paul not taking responsibility as the prime contractor, and passing the buck, but that is the way it is.
So, I am paying yet more money for a fan to be installed so we finally get this signed off. No, I am unlikely to ever turn the fan on as it will be noisy. A box-ticking exercise for the council and a waste of money.
So, beware engaging a builder that claims to ensure the work meets building regulations.
Man cave - the final countdown
I am sure you all thought the story was over. It is not, yet!
One of the things the builder is responsible for is ensuring the work is up to the required building code. The council, who we paid to inspect the work, advised the builder during the process, and they have the job of finally inspecting and signing off the work. This is important if we ever want to sell the house in the future.
Things did not quite go to plan. The builder did not quite follow what he was told, and put the membranes in the walls in the wrong place, apparently. So the building inspector was not convinced it met requirements regarding condensation. It is important to avoid mould and the like in the future.
However, the builder was not convinced that what he had done was not sufficient and paid to have someone do "calculations" on dew points and stuff to prove his case.
This is just as well, as the alternative was that all three external walls would have had to be re-done, and then all the interior wood work and decorating re-done. Pretty much starting from scratch, and at the builders expense, but at my significant inconvenience.
So, the result, well, this is where things just drag on and on, and eventually we were told that there needs to be "mechanical extraction". I.e. a fan to cycle the air.
This strikes me as a problem for several reasons:-
One of the things the builder is responsible for is ensuring the work is up to the required building code. The council, who we paid to inspect the work, advised the builder during the process, and they have the job of finally inspecting and signing off the work. This is important if we ever want to sell the house in the future.
Things did not quite go to plan. The builder did not quite follow what he was told, and put the membranes in the walls in the wrong place, apparently. So the building inspector was not convinced it met requirements regarding condensation. It is important to avoid mould and the like in the future.
However, the builder was not convinced that what he had done was not sufficient and paid to have someone do "calculations" on dew points and stuff to prove his case.
This is just as well, as the alternative was that all three external walls would have had to be re-done, and then all the interior wood work and decorating re-done. Pretty much starting from scratch, and at the builders expense, but at my significant inconvenience.
So, the result, well, this is where things just drag on and on, and eventually we were told that there needs to be "mechanical extraction". I.e. a fan to cycle the air.
This strikes me as a problem for several reasons:-
- An extractor fan is typically quite noisy, so why would I, as the home owner and user of the room turn it on, ever? It does nothing immediately to help me. Unlike a toilet fan that can be linked to the lights, it would need to have a switch. If I don't turn it on, there was no point installing it.
- If the fan is cycling air from outside, it will defeat any heating or cooling I have in the room. The suggestion is 4 air changes per hour! I may as well be sat outside. And if I can make heating/cooling work with that it will cost a lot, as I'll be heating the street!
- I already have a proper split air conditioning unit which will surely do the job of reducing humidity
- The room has small vents above the windows anyway
So I explained these issues and we are now told the the requirement is for "mechanical extraction or AC unit".
Yay! We have the answer - I sent pictures of the AC unit (inside, and outside) and the hydro-thermometer showing the nice low humidity.
Then I have the strangest email :-
It appears the mechanical extract may not be required as your photo demonstrates your existing ac unit to be mounted externally. Should the unit provide a minimum of 4 air changes per hour from external air then this would rectify the ventilation requirement. Should it do so please can you provide evidence of this e.g. technical specification/manual that stipulates this.Sorry, but what? Since when does an AC unit cycle the air in the room with external air? That is not how they work and would not be at all efficient. What the hell is this guy on?
I have explained it again.
I suspect the builder is going to have to put in a fan, one that will never ever be used by anyone, just to get a box ticked.
P.S. I am told it is possible to have mechanical extraction with heat exchanger, but still, would I turn it on if noisy, and would the AC not do the job anyway?
P.P.S. They are finally talking to me (after months) and are now saying this is not just a condensation issue but one of air circulation for a healthy living environment - so the builder will have to put in a fan, with heat exchanger, anyway! Why they did not say that in the first place I do not know!
P.S. I am told it is possible to have mechanical extraction with heat exchanger, but still, would I turn it on if noisy, and would the AC not do the job anyway?
P.P.S. They are finally talking to me (after months) and are now saying this is not just a condensation issue but one of air circulation for a healthy living environment - so the builder will have to put in a fan, with heat exchanger, anyway! Why they did not say that in the first place I do not know!
2016-07-26
Blizzard working on IPv6
I am pleased to see an email from Blizzard on the IPv6 issue.
Hello Adrian, Thank you for contacting us earlier and I hope that you are doing well. As discussed previously, the issue you mentioned was under investigation and changes have been made which should address the Ipv6 connection issues you and other players were experiencing. Best regards, Mesmartiys Blizzard EntertainmentBut rather puzzled by the email. It seems my email address which has a local part of "battlenet" has been obfuscated to "BATTLEN**". Yes, the also changed case which could impact delivery. Obfuscating an email address is fine for display in text, but oddly they have actually used the obfuscated address to email me, i.e. BATTLEN**@mydomain with actual stars in the local part!
This only got to me because I run a wildcard on the domain.
That is special in the extreme!
Sadly these changes that "have been made" have not in fact helped. I still cannot play with IPv6 ticked on the game. Shame.
Update: They marked by ticket "resolved"! I have opened another, and found a forum post on the EU forum http://eu.battle.net/forums/en/wow/topic/17612333772?page=1#post-8
Update: They marked by ticket "resolved"! I have opened another, and found a forum post on the EU forum http://eu.battle.net/forums/en/wow/topic/17612333772?page=1#post-8
2016-07-24
Blizzard withdrawing support for IPv6?
SEE UPDATE AT END
It seems that once again Blizzard have their IPv6 connectivity for World of Warcraft not working properly. I opened a ticket and explained the issue in detail. The connectivity issue is entirely in their network. My guess is, as they seem to be using SLAAC addresses, they have simply failed to update addresses when they changed hardware and MAC. That is only a guess though.
The impact - I could not log in to play the game for several days. I assumed they had a fault or were busy and to be honest, given that I use IPv6 for almost everything I do (google, Facebook, all A&A web sites and internal systems) and have done for about 14 years, it did not even occur to me to check if turning off IPv6 would fix it for a while. These days I rarely play, but have been off ill for a few days and though I may have a game or two.
It seems the game is not falling back, trying IPv6 first, which is sensible, and failing totally without trying IPv4.
Now, anyone can make a mistake, and I am sure they can fix it easily, but it seems they are not interested in making it work with the current Internet Protocol. Basically, it seems to me from this response that Blizzard have withdrawn support for the current version of IP protocol, IPv6. It is simple, either you support it, in which case you take a fault report seriously, or you don't.
Heya Adrian,
Thanks for the ticket. I had a look over your history of issues with IPv6. We take a soft approach to support of this as many places haven't fully transitioned over. Normally IPv4 works perfectly and is what the majority of places use despite the other being the upcoming industry standard. Whilst we do appreciate your tests with regards to Tcpdumps and your suggestions about hardware upgrades on our server's end being the cause, since IPv6 is relatively new when it comes to large scale servers it's not something that's 100% works all the time as you're evidently aware yourself.
At this point we've expended our scope of support regarding it's use solely over IPv4 and would suggest that, if able, for the time being you connect using IPv4 whilst we're working on improving how our hardware works with this.
Just a few comments on this.
It seems that once again Blizzard have their IPv6 connectivity for World of Warcraft not working properly. I opened a ticket and explained the issue in detail. The connectivity issue is entirely in their network. My guess is, as they seem to be using SLAAC addresses, they have simply failed to update addresses when they changed hardware and MAC. That is only a guess though.
The impact - I could not log in to play the game for several days. I assumed they had a fault or were busy and to be honest, given that I use IPv6 for almost everything I do (google, Facebook, all A&A web sites and internal systems) and have done for about 14 years, it did not even occur to me to check if turning off IPv6 would fix it for a while. These days I rarely play, but have been off ill for a few days and though I may have a game or two.
It seems the game is not falling back, trying IPv6 first, which is sensible, and failing totally without trying IPv4.
Now, anyone can make a mistake, and I am sure they can fix it easily, but it seems they are not interested in making it work with the current Internet Protocol. Basically, it seems to me from this response that Blizzard have withdrawn support for the current version of IP protocol, IPv6. It is simple, either you support it, in which case you take a fault report seriously, or you don't.
Heya Adrian,
Thanks for the ticket. I had a look over your history of issues with IPv6. We take a soft approach to support of this as many places haven't fully transitioned over. Normally IPv4 works perfectly and is what the majority of places use despite the other being the upcoming industry standard. Whilst we do appreciate your tests with regards to Tcpdumps and your suggestions about hardware upgrades on our server's end being the cause, since IPv6 is relatively new when it comes to large scale servers it's not something that's 100% works all the time as you're evidently aware yourself.
At this point we've expended our scope of support regarding it's use solely over IPv4 and would suggest that, if able, for the time being you connect using IPv4 whilst we're working on improving how our hardware works with this.
Just a few comments on this.
- "Many areas have not fully transitioned over"? Well no, you don't "transition", i.e. use IPv6 instead of IPv4, for a very long time, but IPv6 does work along side IPv4 on many ISPs, and many services work on IPv6 (like google, and Facebook to name just two). Only when people are all taking IPv6 seriously can any sort of "transition" start.
- IPv6 does work 100%, well, as well as IPv4, when people actually make sure it works, like ensuring that the machines they have are on the right addresses and have connectivity. This is no different to the way IPv4 works. The only reason IPv6 might be not 100% is if some company stupidly decides to not make things work, or worse, decides to ignore support tickets raised when things are broken. Suggesting IPv6 is unreliable is not valid.
- Also IPv6 is not "relatively new", it is all grown up with RFC2460 being 18 years old now. A&A have been offering IPv6 since 2002. How many decades must IPv6 in place before Blizzard consider it is not "new"?
- As for improving how your hardware works - as far as I know it works - you have connectivity for IPv6 to your network (I get 4ms pings) - you have IPv6 in the game client and the servers work with it - you just need to fix whatever config that you broke a few days ago. Not hard!
Now, if they have "expended their support scope", that sounds a lot like "not going to fix it" and basically taking the massively backwards step of dropping support for the current version of IP, being IPv6.
That is a bold step Blizzard, not many companies would take such a backwards step. I think it is time for me to cancel my subscription, as I cannot really work with such a backward looking company. I wonder what our thousands of IPv6 connected customers will think.
P.S. Obviously if Blizzard have any official comment on this, I'll be happy to add that here, or they can simply comment below.
Update: After posting and adding it to their ticket I had a slightly more encouraging update:-
Hello Adrian,
Thanks for taking the time to get in touch with us and I'm sorry that I couldn't get back to you any sooner.
I was able to get in touch with our net engineers regarding the issue you brought up and it seems that are already working on the issue. Sadly, I do not have any ETA as when we will have a solution or any further information at this time.
Thank you for your understanding I hope that we have this resolved shortly.
P.S. Obviously if Blizzard have any official comment on this, I'll be happy to add that here, or they can simply comment below.
Update: After posting and adding it to their ticket I had a slightly more encouraging update:-
Hello Adrian,
Thanks for taking the time to get in touch with us and I'm sorry that I couldn't get back to you any sooner.
I was able to get in touch with our net engineers regarding the issue you brought up and it seems that are already working on the issue. Sadly, I do not have any ETA as when we will have a solution or any further information at this time.
Thank you for your understanding I hope that we have this resolved shortly.
2016-07-21
Out-geeked by the best
I had a fun meeting yesterday, and I won't say who with (unless he wants me to), but it was initially a business meeting related to the organisation for which he works, but went on rather a lot, ending in a meal in cafe rouge. I have met him before, but this time we managed to take a lot about old times and "stuff".
I actually found myself out-geeked for a change. Heck, he had a rare "portable" BBC micro (i.e. big box with power, CRT, BBC micro, 5 1/4" floppy disks, and fold out keyboard) in the boot of his car. Next to that the half restored teletype and fibreglass orc in the office were no match.
I tell a story of old days doing "purely research" in to the way some games managed protection on tapes or disks, and how the Elite game does various scrambling (XOR) of data it loads from tape/disk in various stages so that you cannot simply access or change the underlying machine code of the game. TBH I am not 100% sure the game was "elite" or not now. But what was fun is that if you are manually simulating the various stages, then part way through there is a pattern in memory that you can see with text "Does you mother know you do this?". I remember it well as it was after I had left uni and was temporarily staying at my parents, and she was behind me at the time! That text is not on the tape/disk and not in the final memory image but an intermediate stage that only a "hacker" would ever see. Before I got to tell that story, this person told of a similar story with another game and intermediate text "You are in a maze of twisty passages all alike" (a classic line from text based adventure games). I was out geeked on one of the most geeky anecdotes I have in my arsenal!
I'd say I "won" on the forcing the teletext chip in a BBC micro in to "reveal mode" by rapid random screen mode switching, that is, until I saw his "portable BBC micro" in his boot. And yes, I had BBC with 6502 and Z80 second processors and even teletext adapter but I never had one that talked GPIB, FFS, out geeked again!
At the end of the day it make me realise what a small world it is - there are probably literally a handful of people that have been there and done that in the same level of technical arena that I have had in my life. This person is close, but he did more radio ham than I ever did. I think I have done more coding than he has. But we are a rare breed and becoming rarer I think.
Hopefully one of those useful contacts in life for personal and business progressing in various ways. Some times it is who you know and not what you know, but knowing both helps even more.
I actually found myself out-geeked for a change. Heck, he had a rare "portable" BBC micro (i.e. big box with power, CRT, BBC micro, 5 1/4" floppy disks, and fold out keyboard) in the boot of his car. Next to that the half restored teletype and fibreglass orc in the office were no match.
I tell a story of old days doing "purely research" in to the way some games managed protection on tapes or disks, and how the Elite game does various scrambling (XOR) of data it loads from tape/disk in various stages so that you cannot simply access or change the underlying machine code of the game. TBH I am not 100% sure the game was "elite" or not now. But what was fun is that if you are manually simulating the various stages, then part way through there is a pattern in memory that you can see with text "Does you mother know you do this?". I remember it well as it was after I had left uni and was temporarily staying at my parents, and she was behind me at the time! That text is not on the tape/disk and not in the final memory image but an intermediate stage that only a "hacker" would ever see. Before I got to tell that story, this person told of a similar story with another game and intermediate text "You are in a maze of twisty passages all alike" (a classic line from text based adventure games). I was out geeked on one of the most geeky anecdotes I have in my arsenal!
I'd say I "won" on the forcing the teletext chip in a BBC micro in to "reveal mode" by rapid random screen mode switching, that is, until I saw his "portable BBC micro" in his boot. And yes, I had BBC with 6502 and Z80 second processors and even teletext adapter but I never had one that talked GPIB, FFS, out geeked again!
At the end of the day it make me realise what a small world it is - there are probably literally a handful of people that have been there and done that in the same level of technical arena that I have had in my life. This person is close, but he did more radio ham than I ever did. I think I have done more coding than he has. But we are a rare breed and becoming rarer I think.
Hopefully one of those useful contacts in life for personal and business progressing in various ways. Some times it is who you know and not what you know, but knowing both helps even more.
2016-07-17
Think of the children!
Now, please, don't get me wrong. It is crazy that anyone would be watching porn on a phone or device in a McDonalds or Starbucks. That is just daft and nonsense.
It is pretty much as crazy that someone would sneak a porn magazine in to such a venue and "read" it there.
Now, I am not saying there are not crazy people out there, sorry, but there are, and they could do either of those, or strip naked and run through the store, or whatever. Shit happens, but I really do not think this is an issue that needs any special technical measures like blocking porn on the wifi.
It is totally pointless.
But, what is the down side? There are many!
- Once you have technical measures to block some types of content it becomes easy to block other content, and this can be added with far lower levels of justification and almost no costs. How long before Starbucks blocks access to Costa's web site? What about blocking some political web sites?
- Once you try and block something it is quite hard to do it right and "catch 'em all". The WiFi cannot be assumed to be "safe" by parents letting kids use the wifi, but they may assume it is.
- Once you try and block something it is quite hard to do it right and not over block. We see a lot of over blocking were legitimate web sites are blocked by mistake. This makes the wifi less useful, inconvenient even, and is bad for PR. The blocked web sites have big issues knowing they have been blocked and getting the block removed as they have no contract with Starbucks.
- This does not stop someone accessing porn! Lots of people use VPNs on public wifi, and can then access what they like. So this is bad PR if someone is accessing porn on a device on the wifi in Starbucks after they claim to have blocked it.
- Obviously someone could take porn on paper or stored on a phone or device or use 3G or 4G, and access it without the wifi being involved. Again, bad PR.
As I say, who the hell would access porn in a Starbucks? Well, if you make publicity over this there are slightly more people that will! This is because you have now increased the pool from just the nutters to people that deliberately want to create bad PR for them. There are many of those, some cross over the way companies pay tax, etc. People that will create embarrassing scenarios, using the supposedly "safe" WiFi to do it, just to cause bad PR for Starbucks.
One could even be cunning, find a site not blocked (or create one using a proxy) and then use DNS injection on wifi to cause people's phones in a Starbucks to actually serve up porn sites when people try to access normal things like Facebook. Technically easy, and really really bad PR!
One could even be cunning, find a site not blocked (or create one using a proxy) and then use DNS injection on wifi to cause people's phones in a Starbucks to actually serve up porn sites when people try to access normal things like Facebook. Technically easy, and really really bad PR!
And all of this flies in the face of net neutrality and may not even be legal in such places under EU or US laws.
When will people learn, communications systems are neutral (or should be), and they are not there to filter or police what people communicate. We understood this for the postal system for hundreds of years - even having laws to prohibit interference. Most people understand it with telephone - not filtering what people say on the phone. Why do people think it is any more sensible, useful or reasonable to think of filtering communications over IP?
2016-07-15
The new elephant in the room - meta data collection. We need your help!
The Investigatory Powers Bill has many issues, and one of these is the collection of meta data known as "Internet Connection Records", or ICRs.
Up until now the main focus on security has been on the content of communications, and we now have very powerful processors (even in our phones) and we are able to ensure that the content of our communications is secure, end to end, encrypted.
But there is a new threat, the collection of meta data. By collecting ICRs from everyone, and creating a national database that can be searched and collated we create the very definition of a nanny state or bigbrothersister, and the all seeing eye of police state as depicted in "1984".
The problem is that (a) meta data is actually very revealing of our lives, what we do, and who we associated with, and (b) the law sees it as less significant. This second point is important as it means that new laws can collect data from everyone, not just suspects in a crime, and can allow use of that data by a lot of people without a warrant. It is only seen as serious and needing of a warrant when you want to look in detail at the communications via some sort of "intercept", the very things that will not work with the modern "encrypt everything" culture. Of course that won't work with criminals.
The UK government want to make a national system of searchable ICRs, and that means getting data from every ISP. But that is hard. There are literally thousands of ISPs, small and large, and they each would need notices to retain data. But it is worse - each ISP needs to consider the collection, storage, and access to this data, and how that will comply with the Investigatory Powers law and Data Protection law. The ISP may have to have positively vetted staff, and secure data storage systems, and all sorts. This is far from cheap or proportionate for a small ISP with only a few hundred or even a few thousand customer lines. Current policy is government pays for this too, so even harder.
Even with this security, the data is vast and the risk for it being compromised is very real. It is a far greater threat than the terrorists we try to thwart by such measures (but then so are paper cuts, well, nearly).
The only sane approach the UK government can take, if they really are hell bent on this new police state, is to engage with the back-haul carriers, like BT Wholesale, Talk Talk Business, Virgin, and maybe a couple of others. By doing this they can get almost everyone covered, even A&A customers! And all done in secret.
So what can be done?
Well, for a start, it is important to make it clear that we are not talking about helping "terrorists", "pedophiles", or "criminals" here. They can all take measures themselves, using Tor, and so on, to protect their data very easily. Also, they are often already known and already under more detailed surveillance. What we are talking about here is the police state surveillance on every single innocent person in the country for no legitimate reason. A true police state.
An important step is for everyone to ensure they use encryption as much as possible, to protect that content, but using encryption to protect meta data is harder. Tor is a start, but that is a complicated network that really should be used for those that really need it. So how can end users feel any safer over meta data collection?
One obvious answer is use of standards based encrypted PPP links. They exist, they work, and some small ISPs do this. Well done to them. The challenge is scaling up to larger ISPs. Running proper crypto for thousands of lines and gigabits of data is quite simply not easy, yet.
This is a short term issue in a way - I am sure in a few years the hardware will be up to the job, but not quite yet, in our experience.
So what can we do - well we can obfuscate the meta data!
Basically, the PPP traffic may look like normal IP data, but actually the IP addresses, maybe the TCP and UDP ports, and perhaps a bit in DNS queries, will be "scrambled" a bit. It does not have to be processor intensive or too complex. Just something that cannot easily be automated on a large scale.
Scrambling the data is not hard, the trick is to make some sort of initial negotiation to make it hard to descramble without some work. We are thinking some Diffie Hellman exchange at the LCP level maybe, and simple XOR of meta data. Maybe change occasionally during the connection. Ideally some properly negotiated obfuscation and publishing an RFC, or specification of this, so linux pppd can do it as well.
The result is that L2TP DPI based PPP capture will not easily collect meta data. Indeed, it will actually capture screwed up meta data and create bogus ICRs.
So what would happen - well, the government will have to consider talking to each and every one of those small ISPs, and pay the price for doing it - not financially viable, surely. If nothing else, the ICRs they collect to start with will be less than useless.
So we want to make an RFC - how can we get some help?
Please comment on here, let me know if you can help, DM me on twitter. Let's make a standard, or at least a specification, and I will code it in the FireBricks at the LNS end to work with A&A customers as well as a few other ISPs using the same kit.
We do not need a police state in the UK, or any country that follows, and we can help stop it, or at least thwart it.
Up until now the main focus on security has been on the content of communications, and we now have very powerful processors (even in our phones) and we are able to ensure that the content of our communications is secure, end to end, encrypted.
But there is a new threat, the collection of meta data. By collecting ICRs from everyone, and creating a national database that can be searched and collated we create the very definition of a nanny state or big
The problem is that (a) meta data is actually very revealing of our lives, what we do, and who we associated with, and (b) the law sees it as less significant. This second point is important as it means that new laws can collect data from everyone, not just suspects in a crime, and can allow use of that data by a lot of people without a warrant. It is only seen as serious and needing of a warrant when you want to look in detail at the communications via some sort of "intercept", the very things that will not work with the modern "encrypt everything" culture. Of course that won't work with criminals.
The UK government want to make a national system of searchable ICRs, and that means getting data from every ISP. But that is hard. There are literally thousands of ISPs, small and large, and they each would need notices to retain data. But it is worse - each ISP needs to consider the collection, storage, and access to this data, and how that will comply with the Investigatory Powers law and Data Protection law. The ISP may have to have positively vetted staff, and secure data storage systems, and all sorts. This is far from cheap or proportionate for a small ISP with only a few hundred or even a few thousand customer lines. Current policy is government pays for this too, so even harder.
Even with this security, the data is vast and the risk for it being compromised is very real. It is a far greater threat than the terrorists we try to thwart by such measures (but then so are paper cuts, well, nearly).
The only sane approach the UK government can take, if they really are hell bent on this new police state, is to engage with the back-haul carriers, like BT Wholesale, Talk Talk Business, Virgin, and maybe a couple of others. By doing this they can get almost everyone covered, even A&A customers! And all done in secret.
So what can be done?
Well, for a start, it is important to make it clear that we are not talking about helping "terrorists", "pedophiles", or "criminals" here. They can all take measures themselves, using Tor, and so on, to protect their data very easily. Also, they are often already known and already under more detailed surveillance. What we are talking about here is the police state surveillance on every single innocent person in the country for no legitimate reason. A true police state.
An important step is for everyone to ensure they use encryption as much as possible, to protect that content, but using encryption to protect meta data is harder. Tor is a start, but that is a complicated network that really should be used for those that really need it. So how can end users feel any safer over meta data collection?
One obvious answer is use of standards based encrypted PPP links. They exist, they work, and some small ISPs do this. Well done to them. The challenge is scaling up to larger ISPs. Running proper crypto for thousands of lines and gigabits of data is quite simply not easy, yet.
This is a short term issue in a way - I am sure in a few years the hardware will be up to the job, but not quite yet, in our experience.
So what can we do - well we can obfuscate the meta data!
Basically, the PPP traffic may look like normal IP data, but actually the IP addresses, maybe the TCP and UDP ports, and perhaps a bit in DNS queries, will be "scrambled" a bit. It does not have to be processor intensive or too complex. Just something that cannot easily be automated on a large scale.
Scrambling the data is not hard, the trick is to make some sort of initial negotiation to make it hard to descramble without some work. We are thinking some Diffie Hellman exchange at the LCP level maybe, and simple XOR of meta data. Maybe change occasionally during the connection. Ideally some properly negotiated obfuscation and publishing an RFC, or specification of this, so linux pppd can do it as well.
The result is that L2TP DPI based PPP capture will not easily collect meta data. Indeed, it will actually capture screwed up meta data and create bogus ICRs.
So what would happen - well, the government will have to consider talking to each and every one of those small ISPs, and pay the price for doing it - not financially viable, surely. If nothing else, the ICRs they collect to start with will be less than useless.
So we want to make an RFC - how can we get some help?
Please comment on here, let me know if you can help, DM me on twitter. Let's make a standard, or at least a specification, and I will code it in the FireBricks at the LNS end to work with A&A customers as well as a few other ISPs using the same kit.
We do not need a police state in the UK, or any country that follows, and we can help stop it, or at least thwart it.
2016-07-14
Will anyone buy a UK crypto solution ever again?
The Investigatory Powers Bill is progressing through the Lords, and facing some stupid issues still.
There was a long debate on the matter last night, and Earl Howe seems to miss the point.
Assuming that technical capability orders will be allowed that provide for a capability to remove protection from communications, it basically means that UK companies can be (secretly) banned from making encryption systems that are actually secure (where nobody but the parties communicating can ever see the communication).
So let's ask...
Would you buy this dodgy crypto product?
Would UK government , e.g. The Home Office, buy encryption solutions from a company in a country where they know that country's government can secretly force the supplier to have included some sort of "back door"? (whatever you call it, a means for third party access to the communications)
I'd actually like to see that question asked in the Lords ^^^
I think the answer would be no, and the same would be true for anyone wanting to buy some encryption solution...
Indeed, I have to wonder if the UK government would buy encryption solutions from UK providers after this, as they know that UK providers are basically not allowed to make a solution that is truly secure any more. The UK will have to buy crypto solutions from some other country!!!
On whom do you serve a technical capability order for open source code?
This is a biggie. The idea is to stop UK companies making secure solutions. Well, the idea is to stop anyone, even not in the UK, but there is no jurisdiction to do that. But what if the supplier is not just "not in the UK", but "not an entity" at all.
Open source comes from a collection of people contributing to source code that can be seen. Even if you tried to order one contributor to dumb down the solution, that could not be done in secret, and their change can be seen and removed by the "community".
Why do we need this?
The government want no safe place for a terrorist to communicate. That means there is no safe place for anyone to communicate as any system will not know if the user is a terrorist or not. That is what they want, and have clearly stated that.
But this law will simply mean UK providers cannot provide a safe place, for anyone, to communicate. It does not mean there are no safe places.
There are many ways to communicate secretly, including apps and solutions from non UK providers, open source solutions. Heck! Even pen, paper and dice.
So a person that wants to communicate secretly can do so with very little effort.
The people affected by this are the users that just want the convenience of using a product or service securely. Such products and services will not be allowed to exist, at least from UK suppliers. So those users suffer, as does the whole UK crypto industry.
The criminals do not suffer at all!
There was a long debate on the matter last night, and Earl Howe seems to miss the point.
Assuming that technical capability orders will be allowed that provide for a capability to remove protection from communications, it basically means that UK companies can be (secretly) banned from making encryption systems that are actually secure (where nobody but the parties communicating can ever see the communication).
So let's ask...
Would you buy this dodgy crypto product?
Would UK government , e.g. The Home Office, buy encryption solutions from a company in a country where they know that country's government can secretly force the supplier to have included some sort of "back door"? (whatever you call it, a means for third party access to the communications)
I'd actually like to see that question asked in the Lords ^^^
I think the answer would be no, and the same would be true for anyone wanting to buy some encryption solution...
Indeed, I have to wonder if the UK government would buy encryption solutions from UK providers after this, as they know that UK providers are basically not allowed to make a solution that is truly secure any more. The UK will have to buy crypto solutions from some other country!!!
On whom do you serve a technical capability order for open source code?
This is a biggie. The idea is to stop UK companies making secure solutions. Well, the idea is to stop anyone, even not in the UK, but there is no jurisdiction to do that. But what if the supplier is not just "not in the UK", but "not an entity" at all.
Open source comes from a collection of people contributing to source code that can be seen. Even if you tried to order one contributor to dumb down the solution, that could not be done in secret, and their change can be seen and removed by the "community".
Why do we need this?
The government want no safe place for a terrorist to communicate. That means there is no safe place for anyone to communicate as any system will not know if the user is a terrorist or not. That is what they want, and have clearly stated that.
But this law will simply mean UK providers cannot provide a safe place, for anyone, to communicate. It does not mean there are no safe places.
There are many ways to communicate secretly, including apps and solutions from non UK providers, open source solutions. Heck! Even pen, paper and dice.
So a person that wants to communicate secretly can do so with very little effort.
The people affected by this are the users that just want the convenience of using a product or service securely. Such products and services will not be allowed to exist, at least from UK suppliers. So those users suffer, as does the whole UK crypto industry.
The criminals do not suffer at all!
2016-07-13
Everyone loves Lenny!
Those that have read my blog will know how I feel about junk callers. I managed to make some really good long monologues to tie up callers. But I have to admit that "Lenny" takes the biscuit here and is better than I ever was.
Lenny is an automated system that can be used with asterisk and it just waits for gaps and plays some pre-recorded audio in various sequences. It is pretty impressive.
Now, to catch some of these we had to add a DTMF '5' to the start, but once that was done, we managed to get a person to chat with Lenny for nearly 5 minutes.
That is 5 minutes that some scumbag junk caller was paying someone to be on the phone with no prospect of actually getting any money. The more people that do this, the less the whole despicable business will be worth running.
The only thing is Lenny could be a bit quicker to answer, but I am sure that will improve.
Here's one we caught earlier (mp3).
I may post some more if I get some good ones.
P.S. we got a recruitment company too, LOL (mp3), and the classic Indian call centre call (mp3) and (mp3) and (mp3). And have you been in a car accident (mp3).
What is interesting is the number of "junk calls" that are now from "normal" calling numbers, so as to fool people in to answering. Also surprising how many from POP telecom!
Lenny is an automated system that can be used with asterisk and it just waits for gaps and plays some pre-recorded audio in various sequences. It is pretty impressive.
Now, to catch some of these we had to add a DTMF '5' to the start, but once that was done, we managed to get a person to chat with Lenny for nearly 5 minutes.
That is 5 minutes that some scumbag junk caller was paying someone to be on the phone with no prospect of actually getting any money. The more people that do this, the less the whole despicable business will be worth running.
The only thing is Lenny could be a bit quicker to answer, but I am sure that will improve.
Here's one we caught earlier (mp3).
I may post some more if I get some good ones.
P.S. we got a recruitment company too, LOL (mp3), and the classic Indian call centre call (mp3) and (mp3) and (mp3). And have you been in a car accident (mp3).
What is interesting is the number of "junk calls" that are now from "normal" calling numbers, so as to fool people in to answering. Also surprising how many from POP telecom!
2016-07-11
Junk calls, TPS and DPA
If you want to avoid marketing calls, the "right" way to do it is to register the number with the Telephone Preference Service (TPS). They have a web site where you can check the number and register. Simple enough...
There are, however, a few problems. I am looking at this as the new number I recently obtained (my old home phone number from 20 years ago) got another junk call. I checked, and it is no in the TPS.
Now, this should be simple, but it is not.
The TPS web site does not just want the number, which is all they actually require to maintain the register, they also want:-
There are, however, a few problems. I am looking at this as the new number I recently obtained (my old home phone number from 20 years ago) got another junk call. I checked, and it is no in the TPS.
Now, this should be simple, but it is not.
The TPS web site does not just want the number, which is all they actually require to maintain the register, they also want:-
- Name
- Full postal address
- Email address
- Agreement to their privacy and cookie policy
Well, half way through the web site filling in a form, it is a tad late to ask for agreement to the cookie policy, but what if I do not wish to agree? I cannot register.
As for the privacy policy - it looks rather iffy to me. Again, what if I don't agree?
First part of the privacy policy that seemed odd was "You should be aware that if you subsequently give any personal information to another company, the uses to the Telephone Preference Service privacy policy will no longer apply." I am not trying to be thick here, but they seem to say that if I give any personal information (at all?) to another company (any company?), then their privacy policy no longer applies. Well, of course I have given some personal information to some other companies! My employer for a start, and, well, loads of companies. Does that really stop the TPS privacy policy applying. Maybe I am misreading it. Seems a pointless policy if it stops applying so easily.
The other issue is they can give my personal information to other parties. They do say the uses are limited to "suppression purposes or to incorporate onto suppression software". So if the software wants email and postal addresses, it can be incorporated in to that software. That is one valid use of the data. The suppression software does not have the restriction on use (note the "or" in that statement). The TPS can also use for "research and statistical analysis".
It seems to me a great way for my phone number and postal address and email address to leak, and be given to the unscrupulous companies involved in direct marketing. That could mean I am actually giving my data to the very people I do not want calling me. Saying "unscrupulous" may seem harsh, and is my opinion, but is an opinion based on the fact we even need laws on this matter in the first place, that I get junk calls to TPS listed numbers all the time, and that the ICO have fined companies, so I feel it is not an unfounded assertion, at least for some of them.
I have now contacted OFCOM to add the number, and advised that they are not to store email or postal addresses or disclose that to third parties. If they want to validate my request they can call the number! We'll see what they say.
Interestingly, OFCOM themselves were promoting (on twitter) a text based TPS listing saying "Calling all mobile users...text ‘TPS’ & your email address to 85095 to reduce #nuisancecalls http://ofcom.in/295yXjW" so again asking people to provide email address when not needed to maintain the register.
I believe one of the Data Protection principles is you don't collect data you don't need. As my requests on twitter went unanswered, I have asked OFCOM to tell us more (FoI request). We'll see what they say.
2016-07-03
Operations Manual - bloody stupid
I am working through our ops manual for drone piloting, gradually, and it really is sucking the life out of me. Then I did some practice flying - which is knackering - how I can it be that sitting on the floor twiddling my thumbs can be so much hard work? I did loads of ATTI (Attitude mode rather than GPS mode) flying around in squares as practice - something I'll need to master for the practical test.
But, back to the ops manual.
It is stupid, sorry CAA, but this makes no sense.
We are expected to write our own ops manual!
Why? Well, some aspects will be company specific - organisational structure, nominated staff, etc. Fair enough.
But a large chunk of it will be the same for every one-man operation, or the same for every small operation of a few staff. Some parts will be the same for everyone.
There are big chunks of it, like the emergency procedures, which surely must have well established best practice, and should be the same for everyone, or at least everyone with the same class of aircraft.
So why do I have to guess what risks there are and define what I think are the best emergency procedures, as someone that has, but definition, done no commercial flying yet?
Yes, the course had lots of information, but making me write the ops manual rather than just using a standard manual and making a few tweaks, is crazy.
One comment is that writing it, I have to think about it a lot, and that is good - but from what I can see it is the company that writes the ops manual and requests the PFAW (Permission for Aerial Works), and there seems to be no need for any of the pilots to have written it or have been involved in writing it. It could be written by our lawyer if we wanted to. So that argument falls flat on its face right there.
I would far rather have a standard small business operations manual, review and make a few changes, than have to write all this from scratch.
Oddly enough, our lawyer did say that he has much the same in setting up a law firm - they have to write their own manual as well - it must be a bit like having to construct your own light sabre?
Is it really a rule that we have to write our own (CAP722 seems to suggest so)?
Is that really in the best interests of safety?
P.S. First draft now done, 5th Jun. Once reviewed, we can book practical tests.
But, back to the ops manual.
It is stupid, sorry CAA, but this makes no sense.
We are expected to write our own ops manual!
Why? Well, some aspects will be company specific - organisational structure, nominated staff, etc. Fair enough.
But a large chunk of it will be the same for every one-man operation, or the same for every small operation of a few staff. Some parts will be the same for everyone.
There are big chunks of it, like the emergency procedures, which surely must have well established best practice, and should be the same for everyone, or at least everyone with the same class of aircraft.
So why do I have to guess what risks there are and define what I think are the best emergency procedures, as someone that has, but definition, done no commercial flying yet?
Yes, the course had lots of information, but making me write the ops manual rather than just using a standard manual and making a few tweaks, is crazy.
One comment is that writing it, I have to think about it a lot, and that is good - but from what I can see it is the company that writes the ops manual and requests the PFAW (Permission for Aerial Works), and there seems to be no need for any of the pilots to have written it or have been involved in writing it. It could be written by our lawyer if we wanted to. So that argument falls flat on its face right there.
I would far rather have a standard small business operations manual, review and make a few changes, than have to write all this from scratch.
Oddly enough, our lawyer did say that he has much the same in setting up a law firm - they have to write their own manual as well - it must be a bit like having to construct your own light sabre?
Is it really a rule that we have to write our own (CAP722 seems to suggest so)?
Is that really in the best interests of safety?
P.S. First draft now done, 5th Jun. Once reviewed, we can book practical tests.
2016-07-01
Paper planes
From what I can tell, one of the crazy things in this world is that a paper aeroplane, flown outside, is covered by the Air Navigation Order and regulated by the Civil Aviation Authority.
What makes this especially crazy is that you can now buy a drone that is smaller than a paper aeroplane!
This drone has no camera, so is pretty much OK to fly around outside, but my grandson is getting one for his birthday which is only a fraction larger and has a camera! That means it is subject to section 167 of the Air Navigation Order and will actually be ILLEGAL for him to fly outside his home (being a congested area). It too is smaller than a paper aeroplane!
What a mad world in which we live - not just in terms of amazing technology, but amazing laws...
What makes this especially crazy is that you can now buy a drone that is smaller than a paper aeroplane!
This drone has no camera, so is pretty much OK to fly around outside, but my grandson is getting one for his birthday which is only a fraction larger and has a camera! That means it is subject to section 167 of the Air Navigation Order and will actually be ILLEGAL for him to fly outside his home (being a congested area). It too is smaller than a paper aeroplane!
What a mad world in which we live - not just in terms of amazing technology, but amazing laws...
Battery Safety
One of the key aspects of the recent drone course I completed was battery safety, and this is for good reason.
Even though we take batteries, and in particular Lithium Polymer batteries, for granted is that we use them every day in mobile phones, cameras, toys, electric tools, my toothbrush, even cars. They "just work" and seem very safe. All of these are safely inside a device or in some proper hard case to use with some dedicated (or built in) charger which includes software and hardware to manage the battery and make sure it stays safe.
However, in the model and radio control hobbyist world, people often use much more "raw" LiPo batteries, which are simply wrapped in a foil or soft plastic. They are charged with simpler circuits and need a lot more care and attention.
In practice these devices carry a lot of energy, and that makes them dangerous. These "raw" batteries are much more so as it is very easy to charge or discharge them incorrectly and very easy to piece the wrapping or damage them. When damaged they can catch fire, and release that energy. The fire is hard to put out, but usually not long lasting. It can very easily cause secondary fires.
The battery safety aspect of the course covered several areas, and had some nice scary videos of LiPo fires. I did however find some of the points made a tad odd, and I checked the instructions that come with the DJI batteries, and they are interesting. The Phantom 3 batteries have instructions covering things we had on the course, like store with 30% to 50% charge. Though the Phantom 4 batteries have instructions saying 40-65% charge for storage.
On the course they also said these batteries self discharge, and will discharge to an unusable state where the battery cannot be charged. The instructions (Phantom 4) say they discharge to 65% automatically over 3 days and then will hibernate, and can be charged after they have hibernated to get them back.
Comparing the two battery instructions shows that they have improved the batteries a lot from Phantom 3 to Phantom 4, and that may be why the details on the course are somewhat confusing and perhaps simply out of date. Ultimately the course should say READ AND FOLLOW THE INSTRUCTIONS. And especially do not assume the instructions are always the same.
That said, the Phantom 4 instructions do have a troubling couple of points. They say, sensibly, "Make sure the batteries are fully charged before each flight", but also "Never transport a damaged battery or a battery with power level higher than 50%". Err, and if you are going to a field with no power, how do you manage - you have to transport fully charged batteries.
Another odd one for such an intelligent battery system is "DO NOT charge battery immediately after ight, because the battery temperature may be too high". Sensible, as I bet people do that all the time, except why the hell does the intelligent battery system not know it is too hot and simply not start charging until temperature is OK, that way you can "put on charge" right away.
There are good tips on ensuring battery contacts are taped, and better still, batteries are carried in fire-proof LiPo bags or ammo containers.
One thing to always remember with any battery, even in your phone, is that you must not charge or use if the battery is damaged. That is how fires start, and is very dangerous. A damaged battery is unsafe. When you are flying a small aircraft like the Phantom 4, you have to be especially careful if you do have a crash as that can easily cause damage to the battery - making it unsafe, or even starting a fire immediately.
So, take battery safety seriously!
Even though we take batteries, and in particular Lithium Polymer batteries, for granted is that we use them every day in mobile phones, cameras, toys, electric tools, my toothbrush, even cars. They "just work" and seem very safe. All of these are safely inside a device or in some proper hard case to use with some dedicated (or built in) charger which includes software and hardware to manage the battery and make sure it stays safe.
However, in the model and radio control hobbyist world, people often use much more "raw" LiPo batteries, which are simply wrapped in a foil or soft plastic. They are charged with simpler circuits and need a lot more care and attention.
In practice these devices carry a lot of energy, and that makes them dangerous. These "raw" batteries are much more so as it is very easy to charge or discharge them incorrectly and very easy to piece the wrapping or damage them. When damaged they can catch fire, and release that energy. The fire is hard to put out, but usually not long lasting. It can very easily cause secondary fires.
The battery safety aspect of the course covered several areas, and had some nice scary videos of LiPo fires. I did however find some of the points made a tad odd, and I checked the instructions that come with the DJI batteries, and they are interesting. The Phantom 3 batteries have instructions covering things we had on the course, like store with 30% to 50% charge. Though the Phantom 4 batteries have instructions saying 40-65% charge for storage.
On the course they also said these batteries self discharge, and will discharge to an unusable state where the battery cannot be charged. The instructions (Phantom 4) say they discharge to 65% automatically over 3 days and then will hibernate, and can be charged after they have hibernated to get them back.
Comparing the two battery instructions shows that they have improved the batteries a lot from Phantom 3 to Phantom 4, and that may be why the details on the course are somewhat confusing and perhaps simply out of date. Ultimately the course should say READ AND FOLLOW THE INSTRUCTIONS. And especially do not assume the instructions are always the same.
That said, the Phantom 4 instructions do have a troubling couple of points. They say, sensibly, "Make sure the batteries are fully charged before each flight", but also "Never transport a damaged battery or a battery with power level higher than 50%". Err, and if you are going to a field with no power, how do you manage - you have to transport fully charged batteries.
Another odd one for such an intelligent battery system is "DO NOT charge battery immediately after ight, because the battery temperature may be too high". Sensible, as I bet people do that all the time, except why the hell does the intelligent battery system not know it is too hot and simply not start charging until temperature is OK, that way you can "put on charge" right away.
There are good tips on ensuring battery contacts are taped, and better still, batteries are carried in fire-proof LiPo bags or ammo containers.
One thing to always remember with any battery, even in your phone, is that you must not charge or use if the battery is damaged. That is how fires start, and is very dangerous. A damaged battery is unsafe. When you are flying a small aircraft like the Phantom 4, you have to be especially careful if you do have a crash as that can easily cause damage to the battery - making it unsafe, or even starting a fire immediately.
So, take battery safety seriously!
Subscribe to:
Posts (Atom)
FB9000
I know techies follow this, so I thought it was worth posting and explaining... The FB9000 is the latest FireBrick. It is the "ISP...
-
Broadband services are a wonderful innovation of our time, using multiple frequency bands (hence the name) to carry signals over wires (us...
-
For many years I used a small stand-alone air-conditioning unit in my study (the box room in the house) and I even had a hole in the wall fo...
-
It seems there is something of a standard test string for anti virus ( wikipedia has more on this). The idea is that systems that look fo...