Fiji Bitter
I love Fiji Bitter
Looks like Charlie doesn't need his binoculars anymore, he can just look back over his shoulders.
By golly, what a race!
By golly, what a race!
Could someone save me hours of reading and inform me why Biotherm is leaking so many miles per day to the other three in the last 3 or so days...? I assume there is a problem....?
A line from Witty and the Scally's that got him in some troubleCould someone save me hours of reading...
Not just the reading, it's the hours of trying to decipher the Franglais that is the problem.
Anyway, someone said Paul M. was using Biotderma anti-itch cream. He should use Sudocrem of course, applied by the nurse they all have on board.
Maybe the sails..... but they were within 30 miles of the pack so can't be the East position back in the doldrums.... that was GuyotThey have killed two sails and were the furthest east through the doldrums. They won earlier but then the west won out.
Niall mentioned briefly in one of the videos, two days ago I think, that Biotherm had a problem with the foil casing. I don’t know if our how much they slowed down because of it, haven’t heard more about it.A line from Witty and the Scally's that got him in some trouble
Maybe the sails..... but they were within 30 miles of the pack so can't be the East position back in the doldrums.... that was Guyot
This actually isn't quite true, as both IOS and Android (and other main OSses) use and support encrypted secure DNS and have for quite some time. The domain name will remain hidden.This actually isn't quite true, you can tell if someone is posting to WhatsApp, or to YouTube, very easily, the domain names you visit are not encrypted over a standard connection, this is very easy to track (and why you should use a VPN on any untrusted network [which is basically every network], free networks often track this usage information to sell on).
Inmarsat has no such advanced filtering, so it would need to be built on top. Firewalls on boat, which could be bypassed as inmarsat equipment is pretty standard.So what you do when you control the connection (the Immarsat connections) is block VPNs, block any url except the race tracker, grib downloads (which I believe are provided by the race office again, no external ones allowed) and permitted social media,
Only way is to trust the teams, no other option. But very hard to police.now if you don't trust the teams
Full disclosure; I routed with these settings below in the screenshots. For the next routing I'm thinking of powering-up that windscale factor to 105% or 110%. As advised in the Expedition book by Will Oxley. In order to better account for mast height as winds are forecasted @ 10 meters.Herman - what initializing info are you using on your runs. PRB has a longer elapsed time but shows finishing in front of Malizia. Are there slightly different timestamps on the positions?
If they fit the kinda arbitrary rules of the WSSRC then new record, but about 15 nm short of the charal run after the RdR542.5nm in 24hrs for 11th, so new official record?
Think this hasn't been shared yet: Will talking about why they were back at the start of leg 2 and the damage on the trailing edge of the foil. He also explains how they try to keep it in 1 piece.
indeed. he filled in for Boris on the Shirley robertson pre race podcast and comes across as an incredible package for the boat. Look forward to seeing him kick on for his own IMOCA campaign (which is his plan).With Melitizia now at or near the lead, Will's calm analysis was spot on. He seems like a very smart, even tempered guy who has been performing many of the key repairs to the foil, removing the fishing net that was wrapped around the foil, and the go-to person for the OBR.
This actually isn't quite true, as both IOS and Android (and other main OSses) use and support encrypted secure DNS and have for quite some time. The domain name will remain hidden.
As most cloud backed apps use multiple regions, CDNs and POPs, the service involved cannot be determined from IP address either, not really.
So no, its not easy nor really possible anymore.
If a well configured SSL-VPN is used, its even less possible, as all traffic goes through one hidden pipe which is very hard to tell anything about from outside. There are more exotic options in hiding your traffic and/or making it look like something else.
Inmarsat has no such advanced filtering, so it would need to be built on top. Firewalls on boat, which could be bypassed as inmarsat equipment is pretty standard.
And filtering todays advanced encrypted protocols is way hard even on the hard.
And if someone wanted, Tor would get through most firewalls with some clever tweaks. Heck, it was (partly) developed to get around nation state class actors.
Only way is to trust the teams, no other option. But very hard to police.
This requires you won't allow any traffic directly outside, everything has to go via man-in-the-middle proxy.This pressumes that the basic permission is to allow rather than deny, and thus trying to disguise "bad" traffic as routine, however on a properly locked down system where there is an allow list to only your services with certain routes to certain hosts this doesn't work, as there is no ssl-vpn or encryped DNS available, just a white list of ips, yours (or your proxy).
Yes, but then all the equipment involved has to be supplied, and that requires huge resources. I believe now most everything involved is supplied by the team itself.You seal the hardware in a box, penalty for breaking the seal, this is how other such "easy to bypass" checks are done, such as in the Vendee when they had to keep grab bags in certain places. (My liferaft and batteries are sealed in this fashion in the Mini class).
You have to lock down everything and transmit everything via a scanning proxy, then yes.Doesn't matter if you're only allowed to access certain services at certain routes.
Tors beauty is you can transport on and disquised as almost anything else, network traffic wise.Tor was designed to get around filters on a generally open internet, disguising your traffic; and exists in part because it was easy to simply block vpns etc, so again wouldn't work if you can't get to any other endpoint.
Yeah, saw that, too. Impressive !542.5nm in 24hrs for 11th, so new official record?
Spot on, sorry I indeed had the wrong boatA line from Witty and the Scally's that got him in some trouble
Maybe the sails..... but they were within 30 miles of the pack so can't be the East position back in the doldrums.... that was Guyot
How would you limit the DNS for example? Most public DNS servers support secure DNS, 1.1.1.1 being the most popular one.
This requires you won't allow any traffic directly outside, everything has to go via man-in-the-middle proxy.
This is simply not an option for say Whatsapp, which is visibly used for example.