cache – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Sat, 22 Feb 2020 02:14:34 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png cache – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Hopeful for HAMR | TechSNAP 423 https://original.jupiterbroadcasting.net/139677/hopeful-for-hamr-techsnap-423/ Fri, 21 Feb 2020 18:10:00 +0000 https://original.jupiterbroadcasting.net/?p=139677 Show Notes: techsnap.systems/423

The post Hopeful for HAMR | TechSNAP 423 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/423

The post Hopeful for HAMR | TechSNAP 423 first appeared on Jupiter Broadcasting.

]]>
Neckbeard Entitlement Factor | LINUX Unplugged 28 https://original.jupiterbroadcasting.net/51842/neckbeard-entitlement-factor-lup-28/ Tue, 18 Feb 2014 18:01:13 +0000 https://original.jupiterbroadcasting.net/?p=51842 Michael Hall from Canonical joins us to discuss how the consumers of open source software can be the biggest hurdle to projects becoming sustainable.

The post Neckbeard Entitlement Factor | LINUX Unplugged 28 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Michael Hall from Canonical joins us to discuss his personal views on what he’s coined the new 80/20 rule for open source. Are the consumers of open source the biggest hurdle to projects becoming sustainable?

Plus Valve might looking at your DNS history, getting young users to try Linux, and your feedback!

Thanks to:

\"Ting\"


\"DigitalOcean\"

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

Show Notes:

FU

There are a number of kernel-level paid cheats that relate to this Reddit thread[1] . Cheat developers have a problem in getting cheaters to actually pay them for all the obvious reasons, so they start creating DRM and anti-cheat code for their cheats. These cheats phone home to a DRM server that confirms that a cheater has actually paid to use the cheat.

VAC checked for the presence of these cheats. If they were detected VAC then checked to see which cheat DRM server was being contacted. This second check was done by looking for a partial match to those (non-web) cheat DRM servers in the DNS cache. If found, then hashes of the matching DNS entries were sent to the VAC servers. The match was double checked on our servers and then that client was marked for a future ban. Less than a tenth of one percent of clients triggered the second check. 570 cheaters are being banned as a result.

Cheat versus trust is an ongoing cat-and-mouse game. New cheats are created all the time, detected, banned, and tweaked. This specific VAC test for this specific round of cheats was effective for 13 days, which is fairly typical. It is now no longer active as the cheat providers have worked around it by manipulating the DNS cache of their customers\’ client machines.

Michael Hall: A new 80/20 rule for open source Upstream Liaison

Put simply, this rule says that people will tend to appreciate it more when you give them 20% of something, and resent you if you give them 80%. It seems completely counter-intuitive, I know, but that\’s what I was seeing in all of those conversations. People by and large were saying that the reason Canonical and Mozilla were being judged so harshly was because they already did most of what those people wanted, which made them resented that they didn\’t do everything.

Mailsack:

The post Neckbeard Entitlement Factor | LINUX Unplugged 28 first appeared on Jupiter Broadcasting.

]]>
TrekSNAP | TechSNAP 134 https://original.jupiterbroadcasting.net/45602/treksnap-techsnap-134/ Thu, 31 Oct 2013 17:09:43 +0000 https://original.jupiterbroadcasting.net/?p=45602 That Adobe breach we told you about? It’s about 10x worse than originally reported, we’ll share the details.

The post TrekSNAP | TechSNAP 134 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

That Adobe breach we told you about? It’s about 10x worse than originally reported, we’ll share the details.

Plus PHP.net gets compromised, howto future proof your storage, and much much more!

On this week’s TechSNAP!

Thanks to:


\"GoDaddy\"


\"Ting\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Adobe breach worse than originally thought, number of impacted customers now atleast 38 million

  • Adobe is continuing its flurry of password resets, which now extend to more than 38 million customers
  • Adobe has also revised its original list of applications for which the source code was leaked to include the entire photoshop family of programs
  • “This past weekend, AnonNews.org posted a huge file called “users.tar.gz” that appears to include more than 150 million username and hashed password pairs taken from Adobe” – This number apparently includes inactive and test accounts, the 38 million number mentioned earlier are those considered ‘Active’
  • A company spokesperson said Adobe has no indication that there has been any unauthorized activity on any Adobe ID involved in the incident
  • As part of its resolution of the breach, Adobe is offering customers a years worth of free credit monitoring… from Experian (See last weeks story about how Experian was caught selling personal data to identity thieves)
  • Additional Coverage

PHP.net compromised, serves malware and is blocked by Google Safe Browsing

  • On 24 Oct 2013 06:15:39 +0000 Google started saying www.php.net was hosting malware. The Google Webmaster Tools were initially quite delayed in showing the reason why and when they did it looked a lot like a false positive because we had some minified/obfuscated javascript being dynamically injected into userprefs.js.
  • To summarise, the situation right now is that:
  • JavaScript malware was served to a small percentage of php.net users from the 22nd to the 24th of October 2013.
  • Neither the source tarball downloads nor the Git repository were modified or compromised.
  • Two php.net servers were compromised, and have been removed from service. All services have been migrated to new, secure servers.
  • SSL access to php.net Web sites is temporarily unavailable until a new SSL certificate is issued and installed on the servers that need it.
  • Over the next few days: php.net users will have their passwords reset. Note that users of PHP are unaffected by this: this is solely for people committing code to projects hosted on svn.php.net or git.php.net.
  • As part of this, the php.net systems team have audited every server operated by php.net, and have found that two servers were compromised: the server which hosted the www.php.net, static.php.net and git.php.net domains, and was previously suspected based on the JavaScript malware, and the server hosting bugs.php.net.
  • All affected services have been migrated off those servers. We have verified that our Git repository was not compromised, and it remains in read only mode as services are brought back up in full.
  • As it\’s possible that the attackers may have accessed the private key of the php.net SSL certificate, we have revoked it immediately.

Researchers at Vicarious software claim to be able to defeat 90% of Captchas

  • “Vicarious is developing machine learning software based on the computational principles of the human brain. Our first technology is a visual perception system that interprets the contents of photographs and videos in a manner similar to humans.“
  • The claim that using this technology, they can defeat 0% of common anti-bot technology used to defect websites from automated usage
  • While no paper or code has been shared, they provide a demonstration video that appears fairly compelling
  • If their claim is true, this could be a huge setback for the internet
  • Captchas are often used to prevent automated signups for services, to defend login systems from brute force attempts, and to moderate spam in online discussion and comment forums
  • CAPTCHA creator Luis von Ahn of Carnegie Mellon University says “This is the 50th time somebody claims this. I don\’t really get how they think this is news :)”
  • The writing from ScienceMag jumped on a skype call with the company and send them 4 sample captchas, a recaptcha and a paypal captcha were both solved, however another containing cyrillic characters was not (the company says they have not trained their system on non-latin characters yet), and one containing a checkerboard pattern was also not solved immediately.
  • If this research got into the wrong hands, it could be used to defeat protection systems across the internet, flooding websites with spam, evading brute force protection systems and otherwise wreaking havoc

Feedback:


Round Up:


The post TrekSNAP | TechSNAP 134 first appeared on Jupiter Broadcasting.

]]>
Cost of Encryption | TechSNAP 122 https://original.jupiterbroadcasting.net/41332/cost-of-encryption-techsnap-122/ Thu, 08 Aug 2013 11:53:41 +0000 https://original.jupiterbroadcasting.net/?p=41332 We’ll have a frank discussion about the encryption Arms race underway, the side channel attack against gpg research have found, headlines from Back Hat...

The post Cost of Encryption | TechSNAP 122 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We\’ll have a frank discussion about the encryption Arms race underway, the side channel attack against gpg research have found, headlines from Back Hat…

And then an epic batch of your questions, our answers!


— Show Notes —

Thanks to:

Use our code tech249 to score .COM for $2.49!

Get private registration FOR FREE with a .COM! code: free5

 

Visit dirwiz.com/unitysync use code tech for an extended trial and a year of maintenance.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Researchers have found a side-channel attack which could possibly be used to steal your gnupg keys

  • Researchers Yuval Yarom and Katrina Falkner from The University of Adelaide presented their paper at Blackhat
  • The Flush+Reload attack is a cache side-channel attack that can extract up to 98% of the private key
  • The attack is based on the L3 cache, so it works across all cores, unlike previous attacks where the attacker had to be on the same CPU core as the victim
  • This attack works across VMs, so an attacker in one VM could extract the GnuPG from another VM, even if it is executing on a different CPU
  • Research Paper

More Encryption Is Not the Solution

  • Poul-Henning Kamp (PHK) wrote an article for ACM Queue about how Encryption is not the answer to the spying problems
  • Inconvenient Facts about Privacy
  • Politics Trumps Cryptography – Nation-states have police forces with guns. Cryptographers and the IETF (Internet Engineering Task Force) do not.
  • Not Everybody Has a Right to Privacy – Prisoners are allowed private communication only with their designated lawyers
  • Encryption Will Be Broken, If Need Be – Microsoft refactors Skype to allow wiretapping
  • Politics, Not Encryption, Is the Answer
  • “There will also always be a role for encryption, for human-rights activists, diplomats, spies, and other professionals. But for Mr. and Mrs. Smith, the solution can only come from politics that respect a basic human right to privacy—an encryption arms race will not work”
  • PHK postulates that a government could approach a cloud service as say “on all HTTPS connections out of the country, the symmetric key cannot be random; it must come from a dictionary of 100 million random-looking keys that I provide” and then hide it in the Cookie header

Interview with Brendan Gregg


Feedback:

Correction Section

Echos from the Hall of Shame

Round Up:

The post Cost of Encryption | TechSNAP 122 first appeared on Jupiter Broadcasting.

]]>
What’s in Your Cache | TechSNAP 115 https://original.jupiterbroadcasting.net/39177/whats-in-your-cache-techsnap-115/ Thu, 20 Jun 2013 16:31:02 +0000 https://original.jupiterbroadcasting.net/?p=39177 New research reveals your browser cache contains a lot more than you might expect, and we’ve got the details on some security issues WordPress doesn’t have a fix for...

The post What’s in Your Cache | TechSNAP 115 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

New research reveals your browser cache contains a lot more than you might expect, and we’ve got the details on some security issues WordPress doesn’t have a fix for…

Plus: We’ll answer your questions, chat about rolling your own email server, and much much more!

On this week’s TechSNAP

Thanks to:

Use our code tech249 to score .COM for $2.49!

35% off your ENTIRE first order just use our code 35off3 until the end of the month!

 

Catch episode 144 find out how things stand after her week on Android

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension: