March 01, 2012

Life Movements

March 1st, 2012 - Refinanced the house yesterday - Got a very good deal from an awesome lender. If you're ever in the need for a good lender, talk to Mike Lyons @ Embrace Home Loans. He hooked me up with 3 loans over the past year as we bought and refinanced property. He's a good worker, and is always there to answer questions - and he'll go out of his way to find answers when he doesn't know them. I emailed him at 11:30 one evening, and he answered within a minute. Other times, he'd reply "I'm at dinner, but I'll get back to you later this evening.." - hardest working man in the home mortgage industry. Seriously - no jokes here.

Shaved off the beard last night for spring. Baby face me has a double chin again - time to hit the exer-bikes and the Zumba routines on the Wii.

Turned the water on at the house and the back deck water attachment at the house came loose. I had to turn the spigot off again. We crawled under the back deck and got spider webs all over ourselves trying to figure out what happened. Looks like it's attached to an extension of the water line in a rubber hose attachment, and the connection came loose - maybe expansion/contraction from the winter. I'll have to climb under there with my gardening clothes this weekend.

I've got to cut out 2 6'x6' areas for the garden this weekend - it's going to be a lot of digging, but the neighbor has a roto-tiller he said I could use to get it started. We planted seedlings for lettuce and cabbage and they're already sprouting like mad 5 days later. The race is ON!


February 05, 2012

Might and Magic - The Encrypted Files

Back in 1986/1987, I owned a Commodore 64 computer.  I love to play the video games of the day, especially the dungeons/adventure based games of the era.  One of these games was Might and Magic.  The game came in 4 disks, which you loaded in depending on where you were in the world.  The game was loaded from Disk 1, and once the game got going, you might switch to another disk when asked.  As you might imagine, that meant there was a relatively large amount of content for the day.  

After playing the game for a while I bored of following the game - as it was a very long adventure and became sort of repetitive.  However, I wanted to see later aspects of the game, and get the feeling of power that larger and better weapons and armor might give me over the challenges within the game.  It was at this point that the aspect of the game changed for me.  No longer was it a role-playing game based in the middle ages; now it was a computer-based game - me against the original programmers.  I wanted to edit my character files on the disk to see if I could change the items in my inventory to something a bit more favorable.

I started up a disk editor.  On the Commodore 64, diskettes were broken into track and sector, and the file system was serial in nature.  Starting at track 18 (from what I recall) and sector 00, the first two bytes of the track and sector pointed to the next track and sector in the sequence.  Starting up and looking at this first track, everything seemed normal, and I began analyzing the disk contents.  When I followed the link to the next sector, however, I got a bit of a surprise.  There was a word that had begun on the last few bytes of the sector I had just left, but the word did not continue on in this sector.

I started looking around the disk for plain text content, and I couldn't find any except on that first sector!  The whole disk was encrypted!  I checked the other three disks and they too were encrypted. Well, this was a new challenge for me - I'd never seen a program that encrypted the disk contents as a method of protection.  I had wanted to edit my game characters, but I wasn't goingg to be able to do that if I couldn't read the contents in the first place. Luckily for me, I had done many cryptograms when I was younger, so I was familiar with both the Caesar shift cipher as well as replacement alphabets.  

I made the assumption that the computer would have to use some type of formula to easily translate the disk contents, and I had some known plaintext to work with due to the string content that bled from one sector to the next.  One of my character names had ended mid-word at the first sector, so I made the assumption that it must continue into the second sector. Having some math background and being obsessed with the new challenge, I quickly got to work, figuring out what the shift would need to be for my name to continue uninterrupted.  I came up with a value fairly quickly, and went about testing it on the new sector's contents.  

Plaintext quickly became apparent throughout the sector's encrypted bytes!  I had done it - I'd figured out the proper byte shift with just one incomplete word of known plaintext.  Pleased with myself, I continued on to the third sector....but alas, it wasn't going to be so simple.  The shift value was no longer presenting me with any known text.   While most of the file contents were gobbledy-gook, on sector 2 of the file, I had at least been able to make out some plain words (names of my party characters).  Lucky for me, I had another plaintext that had only partially translated at the end of sector 2, so I figured out the shift value that would get me the plaintext continuation into sector 3.  It worked!

So, now I had two different shift values for two different sectors.  I continued on to the fourth sector and accomplished the same, but I ran out of luck when it came to the fifth (IIRC).  No more known plain text bordered the two sectors.  I'd either have to guess at 255 values for shift and try them all, or come up with another way.  At this point, I figured that the shift values had to follow some kind of pattern for the computer to be able to figure out what the next shift value would be.  

I got out some more graph paper.  It occured to me that the value would have to have some constraints, to be able to have values between 1 and 255 - and I had just finished a trigonometry class, so the sin() wave was looking like a good bet to me.  I plotted the 3 shift values I had, and plotted 0 for the first track and sector.  I used the sector value itself for the x variable and set about plotting a formula that would give me the known values. I tested the formula on subsequent sectors and sat up for hours working on it.

Into the next day (after little sleep) I had cracked at least part of the puzzle.  I don't recall what happened that led me to use more than sin() waves.  I do know that in the end, there were three parts to the formula, and that the equation used track, sector and disk number to determine the shift offset.  I had decrypted the disk and determined the encryption algorithm, based on sin(), tan() and a constant based on one of those values.  

I modified a disk editor program to decrypt the disk as it edited it, and re-encrypt when writing the modified values back to the disk.  I manually edit my character's inventory to have item numbers that I did not already possess, and started up the game.  Success!!!!

I never played Might and Magic again after that weekend.  The game had become boring - especially compared to the game I had just played - battling not the trolls and wizards of lore, but battling the developers who relied upon in-house encryption to protect their secrets.  I will never forget that weekend and the dozens of pieces of graph paper that littered my floor amongst the empty bags of chips and soda cans.

January 30, 2012

Weekend Messing Around with CityVille/FaceBook

Load-Divs bookmarklet 1 - javascript: {divs=document.getElementsByClassName("UIActionLinks_bottom"); i =-1; punder=0; }
Open Next Div - bookmarklet 2 - javascript: {i=i+1;if(divs(i).parentElement.children(1).children(1).text == "CityVille") {button_me=divs(i).getElementsByTagName("button")(0); if(button_me.name == "like") {button_me.click(); elem_me=divs(i).getElementsByTagName("a"); if(punder) punder.close(); punder=window.open(elem_me(0),'myscript','width=400,height=500',left='-400'); punder.blur();} }}


The left=-400 doesn't work like I wanted it to - it can be left out...it's a fragment of 'try this' that is left over from playing.

January 24, 2012

Natural Rights vs Granted Rights

In Colorado, a woman being charged with fraud has been compelled by a judge to decrypt her hard drive. The woman, in arguing against this action claimed that the Fifth Amendment protected her from self-incrimination. The judge found against the woman, stating that since she had already admitted to the existence of the electronic documents, she could be forced to produce them.



As expected, I believe that there's some room for improvement on both sides of this case. I believe the judge is incorrect in his judgement that a person can be compelled to produce any evidence, even though I understand why he could come to this conclusion based on current case law (which I believe to be flawed). I also believe the defendant is wrong on several counts. One obvious count being that she has even openly discussed the case at all [she admitted to the existence of the documents!].



The Bill of Rights are not meant to be a list of rights that are given by men to men. The Declaration of Independence and the Bill of Rights are linked by a core concept - a concept that we are 'endowed by [our] creator with certain unalienable rights'. The Bill of Rights embody into law that those natural rights, which we possess by our very existence, shall not be infringed by government.



In declaring independence from England, the United States of America stated that they had the right to abolish government which deprived them of these natural rights and form a new government to protect them from that deprivation. We would do well to remember this during the execution of our own government over ourselves, as we protect individual rights, we protect the rights of ourselves.



Take the First Amendment (as this lady should have). It states that we have freedom of speech (and as been held up many times - freedom of something also can mean freedom FROM something - thus the right to remain silent). This is not a right that was handed from the government to the individual. It is an ability, a natural extension of the person-hood, that the government may not take away. A person can not or should not be compelled to speak. I personally would go so far as to say that the government has no right to compel a person to act in any way, shape or form - which leads to a discussion about the right to sit-in on public by-ways.



This ability to remain silent is a very simple right to utilize - just shut your mouth. The government has certain guidelines whereby they can hold you against your will for the purpose of investigation and non-interference, but they have guidelines - and you can sit in a holding cell while they rummage through your belongings. This is definitely the tactic to take in any criminal investigation. Note that the fifth amendment also applies here, in that the government may not deprive you of 'liberty' without due process of law.



The right against self-incrimination was and is an extension of the right of freedom of speech. Reading through history, it seems to me that the point was to ensure the spoilage of evidence obtained through coercive measures.



In this particular case, where the government knows that there is evidence against the defendant, and they are attempting to 'force' her to produce access to that evidence, I think they're mistaken in what they claim can be done. To compel her to produce the necessary information, they would have to lock her up forever. At some point in that time, she will likely forcefully or absentmindedly forget the information she's been asked to produce, and there would be no route to obtain the information. She could claim immediately that she no longer remembers what the key to the information is. Depending upon password complexity and the amount of time between when she's used it last, it may even be a believable claim. How can locking someone up forever to compel them to provide detailed evidence be proper due process?



The government should utilize the woman's previous statements as evidence of the documents. A jury should be directed what assumptions they should make regarding the fact that she does not wish to produce them -- allowing negative connotations toward what they think the documents might contain. There is already case law that allows for these assumptions.



To go further than this? I think we've begun a slippery slope..

January 20, 2012

 Al:

  Why do you think IP isn't already protected?  Why is MORE federal legislation needed to protect what Copyright law already protects (and for far TOO LONG - but that's a different argument).  I don't understand what it is that makes 'the Internet' such an evil, dastardly place that it requires its own legislation to prevent what our countless other laws are already in place to prevent.

  Criminalizing civil matters only costs our government more money, money that we don't have any way.  Would you rather the police be chasing down a Chinese DVD pirate or chasing down street criminals in Detroit and Chicago?  Spending federal dollars on making sure someone doesn't listen to an Al Jolsen record on his iPod or spending federal dollars on making sure corporate criminals on Wall Street aren't pocketing all of my 401k money?

  I'd suggest you spend your efforts more wisely - while I'm not in Minnesota, and I can't vote for you - you may just lose the audience that cheers you on every time you rip Comcast a new one for lying.

Peace out

Rich Gautier

On Fri, Jan 20, 2012 at 7:34 PM, Al Franken <no-reply@alfranken.com> wrote:
Al Franken - U.S. Senator, Minnesota
Dear Rich,
As you may know, Senate Majority Leader Harry Reid has decided not to bring the PROTECT IP Act (the Senate’s version of SOPA) up for a vote next week. And since I’ve heard from many of you about this issue, I wanted to take a moment to share why I support copyright protection legislation – as well as why I believe holding off on this bill is the right thing to do.
As someone who has worked hard to protect net neutrality, I understand as well as anyone the importance of keeping the Internet free from undue corporate influence. There are millions of Americans who rely on a free and open Internet to learn, communicate with friends and family, and do business.
At the same time, there are millions of Americans whose livelihoods rely on strong protections for intellectual property: middle-class workers – most of them union workers – in all 50 states, thousands of them here in Minnesota, working in a variety of industries from film production to publishing to software development.
If we don’t protect our intellectual property, international criminals – as well as legitimate businesses like payment processors and ad networks – will continue to profit dishonestly from the work these Americans are doing every day. And that puts these millions of jobs at serious risk.
That’s reason enough to act. But these criminals are also putting Minnesota families in danger by flooding our nation with counterfeit products – not just bootleg movies and software, but phony medications and knockoff equipment for first responders.
We cannot simply shrug off the threat of online piracy. We cannot do nothing.
I have supported the approach Judiciary Committee Chairman Patrick Leahy has taken in crafting legislation to respond to the threat of online piracy – and I appreciate his leadership on this important issue.
But I’ve also been listening carefully to the debate – and to the many Minnesotans who have told me via email, Facebook, Twitter, and good old fashioned phone calls that they are worried about what this bill would mean for the future of the Internet.
Frankly, there is a lot of misinformation floating around out there: If this bill really did some of the things people have heard it would do (like shutting down YouTube), I would never have supported it.
But that doesn’t mean we shouldn’t take seriously the concerns people have shared. And if holding off on this legislation gives us an opportunity to take a step back and try to bring everybody back to the table, I think it’s the right thing to do. This is a difficult issue, and also an important one. It’s worth getting this right.
I strongly believe that we need to protect intellectual property – and protect the free and open Internet. I think most people, even those who have expressed concern about this particular bill, agree. And it’s my hope that we can now build a stronger consensus around how to accomplish these two important goals.
Thanks for reading. And for those of you who have written to me about this issue (even if it was an angry letter), thanks for being honest with me. I’ll always return the favor.

Al

January 14, 2012

Getting Sick of 'Cloud Computing' term

I [or rather, my PC] was part of the Distributed.Net 'cloud' that first cracked a DES key in under 24 hours* via brute-force.  That effort involved computing power from PC desktops to a large specialized computing platform built just to contribute to the effort.  Computers have come a long way since then, and with it, the term 'cloud computing' has evolved.  Being in technology for 25 years, you see buzzwords come and go, and along the way, they can have a tendency to change their meaning, or get usurped by well-meaning (or profit-minded) marketeers.  Unfortunately, 'cloud computing' is just one of these buzzwords with an original meaning that had so much more importance than how the word is used today.

The original references to 'cloud computing' had a lot more to do with looking at the Internet [or Intranet] as a single unified entity, where the available resources of the entire network could be shared and made available for specific use, not reliant upon the existence of a single computer, router, or data center.  Like the distributed.net client, large, previously unsolvable problems, could be addressed and solved by the available resources in the cloud.  Like P2P technologies such as FreeNet, documents could be kept online in distributed caches that were always available and structured so that node failure would not affect availability except in extreme cases.  Idle CPU, GPU power would be used to evaluate expressions endlessly to delve into the mysteries of mankind, like the Folding@Home project or the Optimal Golomb Ruler project.  Network connectivity could even be shared to provide multiple endpoints for load-testing, or geo-distributed network analysis.

Even the spammers get it -or rather, maybe they're the first and only ones to get it.  Worm software today installs dispersed clients on vulnerable machines that are used to attack computers in Distributed Denial of Service (DDoS) attacks, send out SPAM email from every corner of the globe and extend the network for hackers and thieves.  They use idle time on computers, provide multiple caches for malware to be distributed throughout the network, and use network dispersity to reach every corner of the globe.  Criminals and their malware have already moved into the real cloud.

Meanwhile, in corporate and consumer industry circles, when someone discusses the 'cloud', they mean something different.  They mean a service - what used to be called an Application Hosting Service (AHS).  This isn't what cloud computing was meant to be - a third-party data center (or multiples thereof).  All of the big boys have a cloud service, Microsoft, Apple, Google.  There's even second-tier cloud service providers, such as SugarSync and DropBox, whose cloud offerings rely on the cloud offerings of others [DropBox relies upon S3 - the Amazon storage cloud offering].

As an idealist and a technologist, I am depressed, but not surprised, that the term 'cloud computing' has lost its way - probably because true cloud computing relies upon a concept of shared resources that our capitalist economy doesn't incentivize.  There's no simple way to transfer bits of money to each and every entity that provides resources in the cloud. [Well, there's BitCoin - but cloud-money may be too late to the horizon and you can't spend it at WalMart yet...]

Well, that's my rant of the day.  As usual, no solution - just randombling.

* [publicly, at least]

September 28, 2011

Basic Human Decency

Most mornings, on my way into the office, I stop at a McDonald's a few steps from the metro stop in Chinatown for a McCafe Mocha Frappe'. It's cheaper than Starbucks, and as long as I tell them to blend it a little extra, it's a fine drink. The machine doesn't blend the ice well enough on the timed setting it has for the blend cycle, so if you get one, I recommend you ask for them to blend it a little extra. This morning, as I was grabbing a straw, I noticed a customer behind me in a wheelchair (one of those automated ones that look halfway between a scooter and a wheelchair - with a motor in the back like you see in stores such as Walmart, but without the shopping cart attached to the front.) A graying middle-aged man with a beard sat in the chair, a bit overweight and with a dour expression on his face; he had placed his order just after mine. As I was extracting the straw from its paper sheath, I overheard the server apologize to him for some slight, "I'm sorry, sir." With a testy voice and a loud huff, the asshole in the wheelchair exclaimed "I'm sorry - those words mean nothing!"

A rage ignited in my heart in that instance. How dare this bastard ruin the day of that minimum wage employee! For the simple error of either forgetting to include a condiment, or perhaps the dastardly mistake of not placing the customer's order close enough on the counter for him to reach it, the spirit and soul of the server was to be crushed by harsh and blackened poisonous cynicism! What cruel and callous commentary spewed forth from the dark heart of someone who was perhaps having a black life and a bad morning, etching its venomous attitude on a potential carrier of such a bad temperament. The rider drove off into the morning, and no one, not even I, rooted by the temporary paralysis of shocking revelation, stopped him to counsel him in common courtesy or given him a lesson in basic human decency.

By the time I exited the establishment, the foul-mouthed fiend had ridden off perhaps two tenths of a mile in the direction opposite from my own destination, and I chose not to pursue. However, I know that I, and others present for his display of discontent, will have been affected today by his disgusting display of dissension. I can only hope that it did not infect the server so that it could perpetuate throughout the day and bring down the spirits of others he may run into.

August 14, 2011

Returned from vacation

We've just gotten back from Orlando, where we spent a week.  We visited Epcot, Magic Kingdom, Universal Studios and Islands of Adventure.  We also saw The Blue Man Group and went to Wonderworks in Orlando.  We have a timeshare, so we traded for the resort, and it was pretty nice with a king-sized bed and a jacuzzi (which my feet welcomed after walking through parks all day).  While it was hot and rainy two of the days, there was no great downpour that prevented us from doing anything specifically.  Umbrellas were probably the wisest thing we packed, both for the sun and the rain.  I don't know why we always end up in Florida in the summer - probably because of the prices.

Some advice for anyone going to the area.  Avoid the ticket booths on the side of the road.  Even those that say they have official tickets.  A) You're lucky if they have any tickets and B) They won't tell you the caveats until they've already run your credit card.  A quick rebate and a wasted hour and a half and we just went to the parks.  All told, I may have saved $50, but I would have had to rework my schedule and deal with people I'd rather not.  And who knows if the tickets would even have gotten me in the gates.  Anyhow, lesson learned - My time is worth more than a 15% discount.

Took some pictures - once the house painters are out, I'll be able to download and catalog them.  For right now, I'm stuck at a library computer for Internet access (or my iPad).  Vacation was good and got me to relax quite a bit, but now that I'm back, things are as frazzled as ever.  House painters have moved all of my furniture to the middle of the rooms to paint, and we've disconnected everything in the house.  My dog is stressed out with all of the activity, but at least we're back to soothe his nerves.

August 03, 2011

House Wanted

We're currently in the market for a house in the Northern Virginia area, and we've been looking for quite a while. We have some criteria that, at first blush, might not seem so difficult to meet, but, when taken in aggregate, seem to be impossible. The majority of homes in the area are Colonial in style, with 4 bedrooms, formal living and dining rooms and little room between the home and the neighbor. All of these things are negatives that we have to work against as we look at houses.

As you drive up to the house, you should see a stone or bright-colored brick front home, with a 2 car garage that you enter to the side of the home. The driveway should continue on in a circle around in front of the home. A courtyard driveway to the front of the house (side loaded) is also desirable.

When you walk in, there should be a foyer with a presentable staircase (winding would be best) and upstairs wood railing to look down onto the foyer. A large chandelier should hang in the arched window above the front door.

The hallway to the kitchen and family room should be wide and open. The home should never feel claustrophobic.

We would like a home that has a huge master bedroom with a sitting area between the hallway and the bedroom. A large walk-in closet should also be present, with room enough for a sitting bench or dresser table in the middle of the closet. The bathroom needs to have a large enough shower for a grown man to be able to towel off in (dual-opposing-shower heads preferred).

There should be a library/study off of the family room, with room for a minimum of a desk and 5 bookcases, with room to walk around.

Update: We've found the home - this was a draft rant that I never published..and my thoughts here are incomplete.  The rant was to continue on to discuss the lack of need for formal living and dining areas and how the flow of life has changed from the 1800s to today and how modern architecture seems unable to keep up with our changing lifestyles.  Of course, now that the passion has worn off - less important to rant on about it all.

Internet Access as a Commodity

There are a couple of points of disagreements between consumers and Internet Service Providers, and some of these issues are easily resolved, while others become contentious due to their interrelation to the other issues.  The big three are:

1. Bandwidth metering - lack of available consumer tools to measure bandwidth used (even while bandwidth is being measured by the ISP, this information is not available to the end-user.)  Metering is an important aspect for any utility.  Just look at water, electric and natural gas which are also piped in to our homes.  Connectivity should be treated as a commodity, just as these physical commodities are metered, so should our digital service.

2. Bandwidth caps - As the world has moved from point-to-point communications paths to packet-switched communications, the congestion caused by overselling of downstream connectivity causes a battle between the consumer and the service provider.  This is similar to infrastructure engineering in other industries, such as water and electrical companies, where the available resources are not there to provide 100% service to all customers at the same time.  If every person in New York City decided to flush their toilets at exactly the same time, the load on the city's water and sewage infrastructures could cause some serious issues.  The same problem exists in the digital world.  The pipes that come into our homes today are capable of incredible speeds, but the expectation of usage of that digital pipe is a fraction of its capacity during normal usage.  The up-channel piping also isn't big enough to carry the load.

However, there is an important difference when it comes to Internet service.  In a physical commodity space, the physical infrastructure will break if it overflows.  Pipes can burst, mountings can come undone, electrical conduits can heat up or blow up and gas pressure can cause serious damage to the system.  On the Internet, the excess traffic can merely be dumped on the floor.  That's something you just can't do with raw sewage, but in a digital world, the network traffic will disappear.  In fact, the Internet infrastructure is DESIGNED with this flexibility in mind.  From the routers (and QOS settings in the packets) to the protocols themselves (TCP retries when traffic gets lost, ICMP messages, and so on), the Internet is designed for overflow and failure.  The service providers have the capability and should have the know how to be able to control bandwidth in such a way that everyone gets their fair share of it, even when the overflow is occurring.

Example: Clients A and B both have a 10Mb/s pipe and ISP has a 15Mb/s uplink.  Client A uses his connection all of the time, while Client B only uses it on occasion.  The ISP has the capability to begin marking Client A's traffic once he has reached some set limit of traffic, perhaps 100GB for the month.  Now, Client A and Client B both attempt to transfer a movie at the end of the month.  Because Client A's traffic is marked, when the uplink needs to determine whose traffic has a priority, Client B's traffic has a better chance of getting through.  The pipe still services both Clients, but Client A finds more of his traffic being dumped on the ground due to his usage for the month having marked him as a hog.  At full capacity, Client A is still going to receive 5Mb/s service.  The speed downgrade will only be as long as Client B is using his full pipe.

In summary, bandwidth caps are a tool, and should not be absolutes for customers.  ISPs don't have to pay extra for each bit they transmit to the central routers.  They pay for certain uplink speeds, whether they fill their pipes or not.  The tools exist to ensure that each client gets a fair shot at that bandwidth, and with competition, the free market should ensure that they don't undersubscribe too greatly.  Bandwidth caps to consumers should be expressed as the point where their service may be downgraded as necessary.  Users should be taught to understand the limitations of the Internet and uplink oversubscription and this is a good tool for that education.  Coupled with bandwidth metering, they can monitor the level of service they receive and understand why it gracefully downgrades with overuse.

3. Net Neutrality - Inexorably linked to issue #2 is the result of engineering choices when it comes to managing the  oversale of network bandwidth.  The ISPs have, in the past, decided that because the consumers who are most likely to use the most resources are using them for nefarious purposes that they can control oversold bandwidth by cutting out anything they think is nefarious.  Unfortunately, this captures the innocent in their nets.  As an example, P2P mechanisms are used by pirates to transfer and share files on the Internet.  Those same protocols are in use by game companies to distribute patches to their millions of users. It is near impossible for the ISPs to constantly be aware of which P2P connections are being used for lawful vs. unlawful purpose.  In attempts to control the unlawful behavior, it is too easy for them to cut off harmless transmissions and degrade the very service they are trying to enhance.

Making decisions on what traffic to pass and what traffic not to pass gets the ISP into the liability game.  Should they put a restriction on traffic you're using to drive a heart monitor, for example, when it looks like you're hacking into a medical center, would be a potentially disastrous action.  ISP's should be able to avoid liability altogether by ignoring the flavor of the traffic that they provide.  Each and every packet delivered from and to their customers should be treated equally, provided the user is behaving in agreement with their Terms of Service.

There is one exception to this filtering that I believe to be important.  IP Protocols have a source and destination address.  I believe there to be both a need and a responsibility to the community that source addresses be verified as coming from a subscribed connection (i.e. If I am an IP provider, I should be checking to ensure that the source address of IP traffic coming from your connection is actually advertising as being sourced by the address I have assigned to you).  I would love to hear argument or commentary that argues against this, but IMHO ingress filtering is a long overdue and necessary component to keeping the Internet safe from the 'bad guys'.