Latest 100 Gigabit Attack Is One of Internet's Largest

Found on eWEEK on Tuesday, 01 October 2013
Browse Internet

Unbeknownst to many people in the world, late last week one of the largest attacks in the history of the Internet was taking place—a massive nine-hour barrage that leveled an unrelenting 100 Gigabits of traffic at its peak.

"The most outstanding thing about this attack is that it did not use any amplification, which means that they had 100 Gigabits of available bandwidth on their own," Gaffan said. "The attack lasted nine hours, and that type of bandwidth is not cheap or readily available."

While Incapsula was able to repel this most recent attack, Gaffan cautions that the attack could have been much bigger and there have been some key takeaways from the experience.

It makes you always wonder how much of a benefit one might get from shutting down a single website for a limited amount of time.

BitTorrent experiments with secure chat

Found on CNet News on Monday, 30 September 2013
Browse Software

Eventually, the service is expected to work with other instant-messaging accounts and be interoperable with SIP standards, but for now it requires a BitTorrent account.

Averill was unable to provide details on how the service logs your chats, so it's not clear at this time whether message logs are stored locally, or even available as an option.

When asked about what BitTorrent's response would be to potential requests from government agencies like the National Security Agency for a BitTorrent Chat back door, he said, "We're not familiar with specifics of NSA programs, so it's not something we can really comment on."

They are a little late to the game. Not to mention that squirming around instead of replying with a clear yes or no is not very reassuring. There are already secure chats, such as Torchat, OTR or Bitmessage. The latter doesn't even have any metadata at all so nobody knows who is the recipient of a message. How good BitTorrent Chat is needs to be seen when they release a public version. An open source release even, because when it comes to security and privacy, closed source is not an option. Especially not when the developers won't comment clearly about NSA backdoors.

Five expired foods you can still eat

Found on BBC News on Sunday, 29 September 2013
Browse Various

In the US alone, 40% of food is thrown out, partly because of confusing date labels, telling consumers to "use by", "sell by" and "enjoy by" a certain time.

Some of the dates are not about safety but taste, says Dana Gunders, a food scientist from the Natural Resources Defence Council (NRDC), which has issued a report saying much of the food labelled bad is actually perfectly edible.

People should learn to rely on their senses again instead of some random date that's printed onto the packaging. Random date indeed, because even bottled water has one. Look at your food, smell on it, taste it; that will tell you if it's still ok to eat.

N.S.A. Gathers Data on Social Connections of U.S. Citizens

Found on New York Times on Saturday, 28 September 2013
Browse Various

Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials.

Almost everything about the agency’s operations is hidden, and the decision to revise the limits concerning Americans was made in secret, without review by the nation’s intelligence court or any public debate.

That's why the NSA needs to be taken apart by an independent commission; and all results need to be made public for everybody to read.

12 True Tales of Creepy NSA Cyberstalking

Found on Wired on Friday, 27 September 2013
Browse Various

The NSA has released some details of 12 incidents in which analysts used their access to America’s high-tech surveillance infrastructure to spy on girlfriends, boyfriends, and random people they met in social settings.

One such analyst working on foreign soil started surveillance on nine phone numbers belonging to women over five years, from 1998 to 2003. He “listened to collected phone conversations,” according to a letter from the NSA’s Inspector General to Senator Charles Grassley released today.

So much for the claims of the NSA that the monitoring power was never abused.

Sudan drops off the internet

Found on The Inquirer on Thursday, 26 September 2013
Browse Censorship

The north african country of Sudan was almost completely cut off from the internet on Wednesday, as its government might have severed connections in the midst of rioting in the country and the nation's capital of Khartoum.

"From a technical standpoint, the fact that it involved multiple distinct internet service providers at the same time is consistent with a centrally coordinated action. However, it is impossible to tell solely from connectivity data whether this was government directed or a catastrophic technical failure."

If the government is behind this incident, then it's at least more obvious than the chinese government.

UK border authorities 'are intimidating human rights workers'

Found on The Guardian on Wednesday, 25 September 2013
Browse Censorship

Baraa Shiban, a respected human rights activist who works in Yemen as a project co-ordinator for the London-based legal charity Reprieve and was travelling to London to speak at an event, said he was held for an hour on Monday night and questioned about his work and political views.

He was detained under schedule 7 to the Terrorism Act, the same legislation used last month at Heathrow to detain David Miranda, the partner of Glenn Greenwald, the Guardian journalist who has written about mass internet surveillance by the US National Security Agency and Britain's GCHQ.

Looks like a certain government is a bit afraid of human rights.

Oracle plugs OpenStack into its cloud

Found on The Register on Tuesday, 24 September 2013
Browse Software

Oracle has adopted the open source OpenStack cloud technology for its upcoming public cloud service, but though the company has made many tweaks and advancements to the technology, it does not appear to have yet contributed code back to the community.

Though Oracle has written its own additions to OpenStack, the company does not appear to have contributed any of that code back to the wider community. In fact, Oracle as a corporate entity has made zero commits to the mammoth codebase over all of its release, according to data put together by OpenStack commit watchers Stackalytics.

Oracle has been leading the list of the worst company leeches for quite some time now and tries to turn each and everything into a cash cow without giving anything back. That's why OpenOffice was replaced by LibreOffice and MySQL will be replaced by MariaDB.

It's time to let GM insects fly free

Found on New Scientist on Monday, 23 September 2013
Browse Science

Opponents of genetic modification are up in arms again, this time over the proposed release of GM flies in Spain. The insects are designed to wipe out olive flies, a major pest.

Each potential release has to be considered on its own merits and risks, of course. But the previous trials provide confidence that the basic techniques are sound. These projects can easily be halted and their effects reversed.

In the past humans also thought that it would be a clever idea to release animals from other parts of the world in environments where they never existed before to fight a small problem. Decades later it turned out to be a very bad decision that did way more harm than good.

Chaos Computer Club breaks Apple TouchID

Found on Chaos Compuer Club on Sunday, 22 September 2013
Browse Technology

A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID. This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

First, the fingerprint of the enroled user is photographed with 2400 dpi resolution. The resulting image is then cleaned up, inverted and laser printed with 1200 dpi onto transparent sheet with a thick toner setting. Finally, pink latex milk or white woodglue is smeared into the pattern created by the toner onto the transparent sheet. After it cures, the thin latex sheet is lifted from the sheet, breathed on to make it a tiny bit moist and then placed onto the sensor to unlock the phone.

Maybe the introduction of fingerprinting isn't so much about securing your data, but for tracking. Something like next-generation cookies; just with the difference that you can't delete those.