account – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 17 Oct 2016 23:08:44 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png account – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Everybody’s Keyboard Fighting | CR 227 https://original.jupiterbroadcasting.net/103956/everybodys-keyboard-fighting-cr-227/ Mon, 17 Oct 2016 15:08:44 +0000 https://original.jupiterbroadcasting.net/?p=103956 RSS Feeds: MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video Become a supporter on Patreon: — Show Notes: — Coder Radio – Teespring Product Review Das Keyboard 4 Soft Tactile Mechanical Keyboards – Discover – Massdrop Hoopla Apple: Dash developer had two accounts, 25 apps, and […]

The post Everybody's Keyboard Fighting | CR 227 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Become a supporter on Patreon:

Patreon

— Show Notes: —

Product Review

Hoopla

Dash V Apple What Does it Mean?

  • The facts
  • Apple’s Case
  • The scary part
  • Can’t we all just grow up a smidge?
  • Wider consequences?

How It Feels to Learn Javascript in 2016

The post Everybody's Keyboard Fighting | CR 227 first appeared on Jupiter Broadcasting.

]]>
Google’s Creepiness Controls | Tech Talk Today 177 https://original.jupiterbroadcasting.net/83122/googles-creepiness-controls-tech-talk-today-177/ Tue, 02 Jun 2015 10:26:18 +0000 https://original.jupiterbroadcasting.net/?p=83122 Thunderbolt 3 promise to unify the connector and usher in peace and tranquility. But when will we see it ship? Microsoft has prices & ship dates for Windows 10, Apple has a major Mac Flaw & Google wants to kinda give you better privacy controls. Direct Download: MP3 Audio | OGG Audio | Video | […]

The post Google's Creepiness Controls | Tech Talk Today 177 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Thunderbolt 3 promise to unify the connector and usher in peace and tranquility. But when will we see it ship? Microsoft has prices & ship dates for Windows 10, Apple has a major Mac Flaw & Google wants to kinda give you better privacy controls.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

The post Google's Creepiness Controls | Tech Talk Today 177 first appeared on Jupiter Broadcasting.

]]>
The Cloud Exposed | Tech Talk Today 51 https://original.jupiterbroadcasting.net/65722/the-cloud-exposed-tech-talk-today-51/ Tue, 02 Sep 2014 09:22:01 +0000 https://original.jupiterbroadcasting.net/?p=65722 We start with the leaked celebrity photos, cloud storage’s critical flaw, Anand Shimpi leaving AnandTech for Apple, China giving MS 20 days & much more! Plus the big test of Microsoft’s commitment to user privacy. Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed […]

The post The Cloud Exposed | Tech Talk Today 51 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We start with the leaked celebrity photos, cloud storage’s critical flaw, Anand Shimpi leaving AnandTech for Apple, China giving MS 20 days & much more!

Plus the big test of Microsoft’s commitment to user privacy.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Naked celebrity hack: security experts focus on iCloud backup theory | The Guardian

Over the weekend, hundreds of nude photos of celebrities were leaked on 4chan before spreading to multiple Internet sites, with one of the involved hackers pointing towards iCloud as the source of the material.


One theory gaining ground is that many of the pictures had been accumulated by one hacker over a period of time – and were then “popped” by another hacker who somehow broke into a machine belonging to the first. Lending weight to that was that one of the earliest photos found in a cache released online dated to December 2011, while the most recent was from 14 August.

Some have also pointed to the presence of a Dropbox tutorial file in one hacked account as suggesting that the third-party cloud storage service was a source of some pictures.

Apple said Monday it was “actively investigating” the violation of several of its iCloud accounts, in which revealing photos and videos of prominent Hollywood actresses were taken and posted all over the Web.

FBI investigating alleged iCloud celebrity hack as Reddit ‘suspect’ declares innocence

[The FBI is] aware of the allegations concerning computer intrusions and the unlawful release of material involving high profile individuals, and is addressing the matter. Any further comment would be inappropriate at this time.

Reddit sleuths, meantime, accused Southern Digital Media sysadmin Brian F Hamade of being the man who leaked the photos. This was based on the same drive names appearing on a screenshot posted by the leaker and ones on an old Reddit post by Hamade.

XhcPl6g

Hamade has this morning denied the claims in an interview with Buzzfeed, claiming that he did post the screenshot but that it was Photoshopped.

AnandTech Publisher Anand Shimpi Headed to Apple | Re/code

Anand Lal Shimpi, the editor and publisher of the well-regarded AnandTech site, is going to work at Apple.

An Apple rep confirmed that the company was hiring Shimpi, but wouldn’t provide any other details.

Last night, via a post on the site he founded in 1997, Shimpi said he was “officially retiring from the tech publishing world,” but didn’t say what he was doing next. “I won’t stay idle forever. There are a bunch of challenges out there :)”, he wrote.

AnandTech will continue publishing, and would be run by new editor in chief Ryan Smith.

China gives Microsoft 20 days to provide explanation in anti-trust probe | Reuters

A Chinese anti-trust regulator said on Monday it has given Microsoft Corp (MSFT.O) 20 days to reply to queries on the compatibility of its Windows operating system and Office software suite amid a probe into the world’s largest software company.

The State Administration for Industry and Commerce (SAIC) questioned Microsoft Vice President David Chen and gave the company a deadline to make an explanation, the agency said in a short statement on its website.

According to a state media report on Monday, Microsoft’s use of verification codes also spurred complaints from Chinese companies. Their use “may have violated China’s anti-monopoly law”, the official Xinhua news agency said on Monday.


Microsoft refuses to comply after judge revives overseas data search warrant | ZDNet

A US judge has lifted a stay on a ruling, forcing Microsoft to hand over data it stores overseas. But the software giant said it will not comply, pending an appeal.


The government says that the order is not appealable at this stage, and Preska agrees. The Friday order says that the contempt order would be subject to appellate review. This disagreement over the path to appeal is, says the order, “the subject of hot dispute.”

Support Aaron Seigo creating videos about free software

The post The Cloud Exposed | Tech Talk Today 51 first appeared on Jupiter Broadcasting.

]]>
Restores are Everything | TechSNAP 168 https://original.jupiterbroadcasting.net/60922/restores-are-everything-techsnap-168/ Thu, 26 Jun 2014 14:45:11 +0000 https://original.jupiterbroadcasting.net/?p=60922 A company known for backup shuts down after their AWS account gets hacked, the Hedge fund thats under attack, how far you can get with a little cab data… Your questions, our answers, and much, much more! Thanks to: Direct Download: HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | […]

The post Restores are Everything | TechSNAP 168 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A company known for backup shuts down after their AWS account gets hacked, the Hedge fund thats under attack, how far you can get with a little cab data…

Your questions, our answers, and much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Company shuts down after their AWS account compromised, all customer data deleted

  • Code Spaces, a source code hosting and backup service has ceased doing business
  • On June 17th the company came under a DDoS attack, which is apparently business as normal for them
  • Later, they found messages in their Amazon Web Services portal, urging them to contact a hotmail address
  • When contacted, the attacker demanded a large ransom
  • When Code Spaces attempted to change their passwords in the AWS control panel, additional administrator accounts added by the attacker were used to delete all EC2 virtual machines, S3 stores and EBS volumes in the account before all accessed could be revoked
  • The most embarrassing part of the situation is the text on the original Code Spaces website:
    “Backing up data is one thing, but it is meaningless without a recovery plan, not only that [but also] a recovery plan—and one that is well-practiced and proven to work time and time again,” “Code Spaces has a full recovery plan that has been proven to work and is, in fact, practiced.”
  • It is not clear what the Code Spaces backup strategy was, but it seemed to involve the same Amazon account
  • In general, the idea with an “offsite” backup is to separate it from a failure of the primary. If you keep the backups for your database beside the database server and your office burns down, what good are the backups
  • What if Amazon suffered a catastrophic data loss? or what if your account is compromised?
  • The backups should have at least been in a different Amazon account that was very strictly controlled, or better yet, stored in some other service
  • It is still unclear how the account was compromised, but it seems likely that Code Spaces was not making use of the Amazon’s Multi-Factor Authentication service, which offers either a mobile phone app, or two different types of hardware authenticators (key fob and credit-card style)

Poorly anonymized NYC Taxi data, de-anonymized

  • Under an Open Data initiative, the New York City Taxi & Limousine Commission released the anonymized GPS logs of all taxi trips in 2013 (173 million trips)
  • Chris Whong got a hold of this data and did some interesting stuff with it
  • When he was done with it, he posted the data for everyone
  • Developer Vijay Pandurangan took a look at the data and noticed that the medallion and hack numbers appeared to simply be MD5 hashes
  • In particular, the driver with ID# CFCD208495D565EF66E7DFF9F98764DA appeared to have an impossibly large number of trips
  • Turns out, that is the MD5 hash of “0”, cases where the data was unavailable
  • Realizing that the data was only anonymized using MD5, and knowing the structure of a drivers license # (5-7 characters, with specific characters being numbers or letters), he was able to brute force all 24 million combinations in only 2 minutes using a single CPU
  • Once this was done, he had the original un-anonymized data
  • Using other websites, it is possible to link the medallion and hack numbers to the owners names
  • Original Post
  • Additional Coverage – Ars Technica
  • To prevent this, there are a number of approaches, the fastest but weakest is a ‘secret key’. Instead of md5(hack#) just do md5(SUPERLONGSECRETKEYhack#), as long as the attacker doesn’t know the secret key, and it is long enough to make guessing it impractical, the data would remain anonymized
  • Another option is to use the md5 hash of the encrypted form of the value. However this eventually just relies on a secret key as well. However, if the data never needs to be anonymized, a very strong key can be used, and that key can then be destroyed, making decryption impossible.

Hackers attack hedge fund for monetary gain

  • BAE systems, a British defense contractor that also specializes in cyber security, was called in to investigate after computers at a hedge fund were hacked
  • The attackers somehow infiltrated the HFT (High Frequency Trading) system, and injected delays of several hundred microseconds into the order entry system
  • This causes the Hedge Fund to miss out on profits it could have made on the trades
  • It is suspected, that the attackers capitalized on this to make those profits themselves
  • “Hedge funds “really have inadequate cybersecurity as a whole” and the attacks threaten to undermine the systems used globally for high-speed trading, said Tom Kellerman, chief cyber security officer for Trend Micro Inc. ”

Feedback:


Round Up:


The post Restores are Everything | TechSNAP 168 first appeared on Jupiter Broadcasting.

]]>
Mozilla Persona | CR 63 https://original.jupiterbroadcasting.net/41812/mozilla-persona-cr-63/ Mon, 19 Aug 2013 12:32:30 +0000 https://original.jupiterbroadcasting.net/?p=41812 We chat with Dan at the Mozilla about his work on the Persona project, and how Mozilla offers developers a neutral platform for effective authentication. Plus our thoughts on what’s troubling the Ubuntu Edge project, a batch of your questions, and much more! Thanks to: GoDaddy.com Use our code coder249 to get a .COM for $2.49.   […]

The post Mozilla Persona | CR 63 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We chat with Dan at the Mozilla about his work on the Persona project, and how Mozilla offers developers a neutral platform for effective authentication.

Plus our thoughts on what’s troubling the Ubuntu Edge project, a batch of your questions, and much more!

Thanks to:

Use our code coder249 to get a .COM for $2.49.

 

Visit dirwiz.com/unitysync use code coder for an extended trial and a year of maintenance.

 

Visit coderradio.ting.com to save $25 off your device or service credits.

 

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Feedback

Persona

At Mozilla, we believe that your online life is your business. With that in mind, we created Persona to make it easier to sign in to websites.

Persona allows you to sign in to sites using any of your existing email addresses; and if you use Yahoo! or Gmail for email, you will be able to sign in without having to create a new password.

Connect with Mozilla Persona, the safest & easiest way to sign in.

  • Home – Mozilla Webmaker
    > We\’re a global community that creates the web by making, teaching and remixing. Check out this week\’s most inspiring Makes and sign up to create your own.

Follow the show

The post Mozilla Persona | CR 63 first appeared on Jupiter Broadcasting.

]]>
Chat with Heretic | STOked 117 https://original.jupiterbroadcasting.net/18521/chat-with-heretic-stoked-117/ Mon, 02 Apr 2012 19:56:32 +0000 https://original.jupiterbroadcasting.net/?p=18521 We chat with Geoff "Heretic" Tuffli, the creator of Star Trek Online’s Duty Officer System. He shares insights into how the system works, future ideas, and more

The post Chat with Heretic | STOked 117 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We chat with Geoff “Heretic” Tuffli, the creator of Star Trek Online’s Duty Officer System. Heretic shares insights into how the system works, future ideas, and a few surprises. Plus we get some hints about Fleet Starbases!

Mav covers the tips you need to know if your STO account is ever hacked, and what steps you can take to get the best response from support. Plus we dig into the Field Generator Console controversy!

Direct Download Links

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

[ad#shownotes]

Support the Show:

   

Show Notes:

Intro:

Triollogy of DOFF episodes.

  • STO relaunched in the EU – link
  • STO Calendar Updated for April – link
  • 1-7. Klingon Awareness Week (Community)
  • 5. New Klingon Mission
  • 5. First Contact Day
  • 5-9. First Contact Event
  • 13. Friday the 13th Event
  • 18. Foundry Challenge #2 Voting (Forums)
  • New Loot container graphics on Tribble – link

News:  

  • Leaked Romulan Ship – D’eridex Defender. Sneak peek at new content?  link
  • First Contact Day Celebration details – “Celebrate First Contact Day with the crew of the Enterprise-F at Utopia Planitia (2nd Pic) ! Pick up a replica of the Phoenix!”
  • Field Generator & Vent Theta Radiation consoles nerfed heavily – link (Comm Feed Tease)
  • IDIC Tribble – profession based buffs & a bonus to having a team containing at least one of each profession – link (Small Graphics Glitch Discovered)

Jupiter Broadcasting Hooded Sweatshirt

Community Feedback:

  • Account Security – My Hacking/Restoration Experience
  • Field Generator & Vent Theta Radiation consoles nerfed heavily?

The post Chat with Heretic | STOked 117 first appeared on Jupiter Broadcasting.

]]>