28 comments posted · 4 followers · following 0

6 years ago @ Malay Mail - Ali Rustam spells out ... · 0 replies · +8 points

Rather than give unsubstantial statement, better do whitepaper on the whole entrepreneurship ecosystem, looks problems and how to fix it (especially in innovation economy).

6 years ago @ Malay Mail - Flood warning balloon ... · 0 replies · +1 points

What about sound (siren) and light signal?

6 years ago @ Malay Mail - Nutrition expert calls... · 0 replies · +1 points

How about soda consumption? Need to pay extra attention on how sugar affect Malaysian public health - studies on sugar tax also should be disclosure to public.

6 years ago @ Malay Mail - Perak MB says state ai... · 0 replies · +1 points

Perak should have a master plan to transit their economy from natural resource base to knowledge economy. On further note, detailed environmental impact assessment (DEIA) should be done before any mining operation start. DEIA need to include plant for rehabilitation focusing on green infrastructure (water retention pond and etc). This will help Perak to mitigate stormwater during flood and capture stormwater and reuse it.

8 years ago @ Malay Mail - Conserve water now to ... · 0 replies · +1 points

So much Malaysia can learn from people from Rajasthan, India. Rajasthan received only 16 inches of rainfall annually compare to Malaysia 98 inches per annum.

8 years ago @ The Malaysian Insider - 4 DAP leaders say phon... · 0 replies · +2 points

do you know what the meaning of secure call & messaging means?

9 years ago @ Astro Awani BM Site - Tiada apa yang boleh l... · 0 replies · +1 points

First you need to understand the threat model, then make assessment. If you haven't read the ProPublica/NYT or Guardian stories, you probably should. The TL;DR is that the NSA has been doing some very bad things. At a combined cost of $250 million per year, they include:

- Tampering with national standards (NIST is specifically mentioned) to promote weak, or otherwise vulnerable cryptography.
- Influencing standards committees to weaken protocols.
- Working with hardware and software vendors to weaken encryption and random number generators.
- Attacking the encryption used by 'the next generation of 4G phones'.
- Obtaining cleartext access to 'a major internet peer-to-peer voice and text communications system' (Skype?)
- Identifying and cracking vulnerable keys.
- Establishing a Human Intelligence division to infiltrate the global telecommunications industry.
And worst of all (to me): somehow decrypting SSL connections.

For saying nothing is a bit under statement / no brainier because current science & technology exist to counter this type of threat model. The threat evolve so do counter threat, Malaysia government NOT thinking critical enough frankly.

5 little advice by to remain secure by surveillance "'Trust the math. Encryption is your friend. That's how you can remain secure even in the face of the NSA":

1) Hide in the network. Implement hidden services. Use TOR to anonymize yourself. Yes, the NSA targets TOR users, but it's work for them. The less obvious you are, the safer you are.

2) Encrypt your communications. Use TLS. Use IPsec. Again, while it's true that the NSA targets encrypted connections – and it may have explicit exploits against these protocols – you're much better protected than if you communicate in the clear. Implement https with perfect forward secrecy (

3) Assume that while your computer can be compromised, it would take work and risk on the part of the NSA – so it probably isn't. If you have something really important, use an air gap. Since I started working with the Snowden documents, I bought a new computer that has never been connected to the internet. If I want to transfer a file, I encrypt the file on the secure computer and walk it over to my internet computer, using a USB stick. To decrypt something, I reverse the process. This might not be bulletproof, but it's pretty good.

4) Be suspicious of commercial encryption software, especially from large vendors. My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well. It's prudent to assume that foreign products also have foreign-installed backdoors. Closed-source software is easier for the NSA to backdoor than open-source software. Systems relying on master secrets are vulnerable to the NSA, through either legal or more clandestine means.

5) Try to use public-domain encryption that has to be compatible with other implementations. For example, it's harder for the NSA to backdoor TLS than BitLocker, because any vendor's TLS has to be compatible with every other vendor's TLS, while BitLocker only has to be compatible with itself, giving the NSA a lot more freedom to make changes. And because BitLocker is proprietary, it's far less likely those changes will be discovered. Prefer symmetric cryptography over public-key cryptography. Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.


9 years ago @ The Malaysian Insider - Stung by criticisms, P... · 0 replies · +58 points

ooiittt..... sleeping on the job again???!

9 years ago @ The Malaysian Insider - Malaysians brace for a... · 3 replies · +47 points

Air batu naik harga.

"Sementara itu Pengurus SP Edible Ice Alex Law berkata, ais dalam pek kecil dinaikkan kepada RM3 berbanding harga sebelumnya antara RM1.50 ke RM2.

“Manakala harga ais dalam pek besar dinaikkan kepada RM4 berbanding harga lama RM2.50 ke RM3 setiap pek,” katanya"


( ཀ͝ ∧ ཀ͝ )!

9 years ago @ The Malaysian Insider - Is Singapore Western I... · 0 replies · +2 points

surveillance done right!