corruption – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 24 Mar 2022 01:03:36 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png corruption – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Linux Action News 233 https://original.jupiterbroadcasting.net/148007/linux-action-news-233/ Wed, 23 Mar 2022 17:30:00 +0000 https://original.jupiterbroadcasting.net/?p=148007 Show Notes: linuxactionnews.com/233

The post Linux Action News 233 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/233

The post Linux Action News 233 first appeared on Jupiter Broadcasting.

]]>
Donna’s Closet | Unfilter 258 https://original.jupiterbroadcasting.net/119756/donnas-closet-unfilter-258/ Wed, 08 Nov 2017 20:00:30 +0000 https://original.jupiterbroadcasting.net/?p=119756 RSS Feeds: Video Feed | MP3 Feed | HD Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links: Donna Brazile: Hillary’s Campaign Bigs Were ‘Condescending and Dismissive’ | Mediaite Donna Brazile wasn’t even allowed to swear in front of Clinton’s people | New York Post WATCH: Podesta Group Linked to […]

The post Donna's Closet | Unfilter 258 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | HD Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links:

The post Donna's Closet | Unfilter 258 first appeared on Jupiter Broadcasting.

]]>
Assange’s October Dud | Unfilter 207 https://original.jupiterbroadcasting.net/103601/assanges-october-dud-unfilter-207/ Tue, 04 Oct 2016 21:35:20 +0000 https://original.jupiterbroadcasting.net/?p=103601 RSS Feeds: Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links: NBC Donated $5.6 Million To Dems | The Daily Caller WikiLeaks CONFIRMS Hillary Sold Weapons to ISIS… Then Drops Another BOMBSHELL! – Daily Politics Russia says […]

The post Assange's October Dud | Unfilter 207 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links:

The post Assange's October Dud | Unfilter 207 first appeared on Jupiter Broadcasting.

]]>
New York Pressure Cooker | Unfilter 205 https://original.jupiterbroadcasting.net/103286/new-york-pressure-cooker-unfilter-205/ Tue, 20 Sep 2016 22:46:24 +0000 https://original.jupiterbroadcasting.net/?p=103286 RSS Feeds: Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links: VIDEO: Hot mic catches Hillary trying to hide more coughing – The American MirrorThe American Mirror Researcher Bypasses iPhone Passcode Using the Technique the FBI Said […]

The post New York Pressure Cooker | Unfilter 205 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links:

The post New York Pressure Cooker | Unfilter 205 first appeared on Jupiter Broadcasting.

]]>
Billions for Baghdad | Unfilter 165 https://original.jupiterbroadcasting.net/90041/billions-for-baghdad-unfilter-165/ Wed, 04 Nov 2015 20:34:02 +0000 https://original.jupiterbroadcasting.net/?p=90041 It’s revealed that the US government is sending billions of dollars to Iraq’s central bank, which is winding up in the hands of ISIS. We cover the latest on this story. Then we follow the money on some major defense spending & bust the week’s bogus news. Why the rest of the 2016 presidential run […]

The post Billions for Baghdad | Unfilter 165 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

It’s revealed that the US government is sending billions of dollars to Iraq’s central bank, which is winding up in the hands of ISIS. We cover the latest on this story. Then we follow the money on some major defense spending & bust the week’s bogus news.

Why the rest of the 2016 presidential run will be filled with softball questions.

And you won’t believe how bad the TSA failed their latest security test, a frank discussion on media biases & we wrap it all up with a high note.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Episode Links —

The post Billions for Baghdad | Unfilter 165 first appeared on Jupiter Broadcasting.

]]>
EXTenuating Circumstances | TechSNAP 215 https://original.jupiterbroadcasting.net/82517/extenuating-circumstances-techsnap-215/ Thu, 21 May 2015 15:30:16 +0000 https://original.jupiterbroadcasting.net/?p=82517 Researches have uncovered a weakness in almost all Internet encryption. We’ll explain what LogJam is, how to protect yourself & what the cause is. Plus Linux gets bit by a filesystem corruption bug, passport id thieves, a great batch of questions & much, much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: […]

The post EXTenuating Circumstances | TechSNAP 215 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Researches have uncovered a weakness in almost all Internet encryption. We’ll explain what LogJam is, how to protect yourself & what the cause is.

Plus Linux gets bit by a filesystem corruption bug, passport id thieves, a great batch of questions & much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

LogJam: How Diffie-Hellman Fails in Practice

  • Researches have uncovered several weaknesses in how the Diffie-Hellman key exchange has been deployed.
  • Diffie-Hellman key exchange is a popular cryptographic algorithm that allows Internet protocols to agree on a shared key and negotiate a secure connection. It is fundamental to many protocols including HTTPS, SSH, IPsec, SMTPS, and protocols that rely on TLS.
  • The vulnerability affects an estimated 8.4 percent of the top one million websites and a slightly bigger percentage of mail servers populating the IPv4 address space, the researchers said.
  • The weakness is the result of export restrictions the US government mandated in the 1990s on US developers who wanted their software to be used abroad.
  • The regime was established by the Clinton administration so the FBI and other agencies could break the encryption used by foreign entities.
  • Attackers with the ability to monitor the connection between an end user and a Diffie-Hellman-enabled server that supports the export cipher can inject a special payload into the traffic that downgrades encrypted connections to use extremely weak 512-bit key material.
  • Using precomputed data prepared ahead of time, the attackers can then deduce the encryption key negotiated between the two parties.
  • Ironically, Diffie-Hellman is supposed to provide an additional layer of protection because it allows the two connected parties to constantly refresh the cryptographic key securing Web or e-mail sessions.
  • The so-called perfect forward secrecy that Diffie-Hellman makes possible significantly increases the work of eavesdropping because attackers must obtain the key anew each time it changes, as opposed to only once with other encryption schemes, such as those based on RSA keys.
  • Logjam is significant because it shows that ephemeral Diffie-Hellman—or DHE—can be fatal to TLS when the export-grade ciphers are supported. Logjam is reminiscent of the FREAK attack that also allowed attackers to downgrade HTTPS connections to 512-bit cryptography.
  • If you have a web or mail server, you should disable support for export cipher suites and generate a unique 2048-bit Diffie-Hellman group. We have published a Guide to Deploying Diffie-Hellman for TLS with step-by-step instructions. If you use SSH, you should upgrade both your server and client installations to the most recent version of OpenSSH, which prefers Elliptic-Curve Diffie-Hellman Key Exchange.
  • Make sure you have the most recent version of your browser installed, and check for updates frequently. Google Chrome (including Android Browser), Mozilla Firefox, Microsoft Internet Explorer, and Apple Safari are all deploying fixes for the Logjam attack.
  • Make sure any TLS libraries you use are up-to-date and that you reject Diffie-Hellman Groups smaller than 1024-bit.
  • PDF Report: Imperfect Forward Secrecy:
    How Diffie-Hellman Fails in Practice
  • Additional Coverage: ArsTechnica
  • Logjam Attack Proof of Concept Demonstrations
  • How 1990s Encryption Backdoors Put Today’s Internet In Jeopardy
  • You can disable all short DH key lengths in Firefox’s about:config

US Passport Agency contractor stole applicants’ data to steal their identities

  • Three women from Houston, Texas, stand accused of engaging in an identity theft scheme in which one of them, a contract employee of the Department of State Passport Agency, was in charge of stealing personally identifiable information of persons applying for a passport.
  • The information was then used to create counterfeit identification documents, which the other two women would use to successfully impersonate the affected individuals in order to fraudulently obtain commercial lines of credit and to purchase iPhones, iPads and other goods online.
  • This scheme went on for over five years.
  • No direct details on how the contractors captured the data in question. But we can make a reasonable guess based on recent IT security policy changes.
  • According to The Washington Post, the US Passport Agency has decided last month to ban both federal employees and private contractors from bringing devices equipped with a camera into the offices where they review and process requests for passports.
  • Apparently, this decision was influenced by the Houston incident, indicating that McClendon likely took pictures of private information on passports.
  • Jim Gogolinski, Senior Threats Researcher at Trend Micro, wrote a helpful overview of the malicious insider problem, and offered some advice on how to prevent and mitigate the insider threat:
  • Jim’s basic premises is, the insider threat can be broken down into three issues: why do people within become threats, what damage can they do, and how these can be prevented.
  • Insider threats 101: The threat within

New Linux kernel corrupting file systems

  • It appears that the current Linux 4.0.x kernel is plagued by an EXT4 file-system corruption issue. If there’s any positive note out of the situation, it seems to mostly affect EXT4 Linux RAID users.
  • There have been several reports of people affected by an ext4 data corruption bug in Linux 4.0.2.
  • All EXT4 RAID0 users on the Linux 4.0.x kernel or current Linux 4.1 Git code are advised to downgrade until the next 4.1 release candidate or 4.0.x stable release otherwise you stand good chances of hosing your file-system.
  • It also looks like if dropping the discard mount option you will also avoid being hit by this serious issue. This isn’t a problem for Linux users on distributions like RHEL, Ubuntu, and other fixed-release distributions that don’t tend to update major versions of their kernel post-release.
  • The issue was caused by an MD commit late into the Linux 4.0 kernel cycle, a.k.a. a commit that was “md/raid0: fix bug with chunksize not a power of 2..”
  • The commit was by SUSE’s Neil Brown.
  • Eric Work has devised a small fix to address the corruption problem, but for now it’s only present within the MD Git tree.
  • kernel/git/torvalds/linux.git – Linux kernel source tree
  • #785672 – Critical ext4 data corruption bug – Debian Bug report logs

Feedback:


Round-Up:


The post EXTenuating Circumstances | TechSNAP 215 first appeared on Jupiter Broadcasting.

]]>
Corrupt Accomplices | Tech Talk Today 174 https://original.jupiterbroadcasting.net/82477/corrupt-accomplices-tech-talk-today-174/ Thu, 21 May 2015 09:53:39 +0000 https://original.jupiterbroadcasting.net/?p=82477 Spy agencies target mobile phones, app stores to implant spyware & the extent of the effort is shocking. Linux 4.0 has a EXT4 corruption bug, YouTube brings the fight to Twitch & Netflix has some big updates. Then we have a Kickstarter of the week to help you men lucid dream, the penis way. Direct […]

The post Corrupt Accomplices | Tech Talk Today 174 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Spy agencies target mobile phones, app stores to implant spyware & the extent of the effort is shocking. Linux 4.0 has a EXT4 corruption bug, YouTube brings the fight to Twitch & Netflix has some big updates.

Then we have a Kickstarter of the week to help you men lucid dream, the penis way.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

Spy agencies target mobile phones, app stores to implant spyware

Electronic intelligence agencies began targeting UC Browser — a massively popular app in China and India with growing use in North America — in late 2011 after discovering it leaked revealing details about its half-billion users.

Their goal, in tapping into UC Browser and also looking for larger app store vulnerabilities, was to collect data on suspected terrorists and other intelligence targets — and, in some cases, implant spyware on targeted smartphones.

The 2012 document shows that the surveillance agencies exploited the weaknesses in certain mobile apps in pursuit of their national security interests, but it appears they didn’t alert the companies or the public to these weaknesses. That potentially put millions of users in danger of their data being accessed by other governments’ agencies, hackers or criminals.

NSA Planned to Hijack Google App Store to Hack Smartphones – The Intercept

Linux 4.0 Has a File-System Corruption Problem, RAID Users Warned

For the past few days kernel developers and Linux users have been investigating an EXT4 file-system corruption issue affecting the latest stable kernel series (Linux 4.0) and the current development code (Linux 4.1). It turns out that Linux users running the EXT4 file-system on a RAID0 configuration can easily destroy their file-system with this newest “stable” kernel. The cause and fix have materialized but it hasn’t yet worked its way out into the mainline kernel, thus users should be warned before quickly upgrading to the new kernel on systems with EXT4 and RAID0.

  • Apparently this was fixed in the 4.0.3 Kernel. The current release is 4.0.4.

YouTube eyes Twitch user base, adds 60 FPS live streams with HTML5 playback | Ars Technica

The HTML5 player will not only save users from the CPU and batter__y-eating Flash player, but will also enable variable speed playback, allowing users to “skip backward in a stream while it’s live and watch at 1.5x or 2x speed to catch back up.”

Netflix To Roll Out A New, More Immersive Web Interface Starting In June | TechCrunch

Netflix confirms today that it will roll out a new user interface on the web to all users worldwide beginning next month. A number of Netflix customers are already seeing the updated look-and-feel, however, according to various reports. The interface, which was previously demonstrated at CES and Mobile World Congress, brings the design of Netflix’s website more in line with what users today see on mobile phones, tablets, on gaming consoles and on other streaming media players, like Roku.

NPT Lucid Dreamer by NPT Lucid Dreamer — Kickstarter

Men, trigger lucid dreams using nocturnal penile tumescence (NPT). By far the simplest & most reliable method possible.

The post Corrupt Accomplices | Tech Talk Today 174 first appeared on Jupiter Broadcasting.

]]>
Nuke Penetration Testing | Unfilter 139 https://original.jupiterbroadcasting.net/79772/nuke-penetration-testing-unfilter-139/ Wed, 01 Apr 2015 21:33:42 +0000 https://original.jupiterbroadcasting.net/?p=79772 Up against the clock six world powers are attempting to secure a historic deal with Iran. Whats this deal exactly about & what is at stake? Is there really a last minute big issue holding everything up? We’ll break it all down. Plus Obama’s executive action against cyber attacks & we dig deep into the […]

The post Nuke Penetration Testing | Unfilter 139 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Up against the clock six world powers are attempting to secure a historic deal with Iran. Whats this deal exactly about & what is at stake? Is there really a last minute big issue holding everything up? We’ll break it all down.

Plus Obama’s executive action against cyber attacks & we dig deep into the government corruption file this week.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

Executive Order — “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities” | The White House

U.S. Creates First Sanctions Program Against Cybercriminals : The Two-Way : NPR

The U.S. wants to slap sanctions on cybercriminals. President Obama issued an executive order Wednesday creating the nation’s first sanctions program to combat “malicious” cyberattacks and cyberspying.

President Obama said cyberthreats pose one of “the most serious economic and national security challenge” to the U.S., and that the executive order offers a “targeted tool” for countering that threat.

Obama’s Diplomatic Gamble On Iran Adding Instability In Middle East

Even before he became president, Barack Obama was imagining the possibilities of a diplomatic breakthrough with Iran. His willingness to reverse decades of official U.S. hostility was one of the things that set Obama apart on the campaign trail.

Obama’s Diplomatic Gamble On Iran Adding Instability In Middle East

Even before he became president, Barack Obama was imagining the possibilities of a diplomatic breakthrough with Iran. His willingness to reverse decades of official U.S. hostility was one of the things that set Obama apart on the campaign trail.

The post Nuke Penetration Testing | Unfilter 139 first appeared on Jupiter Broadcasting.

]]>
FTP Treasure Trove | TechSNAP 105 https://original.jupiterbroadcasting.net/35241/ftp-treasure-trove-techsnap-105/ Thu, 11 Apr 2013 16:58:17 +0000 https://original.jupiterbroadcasting.net/?p=35241 A treasure trove of data was found on an open FTP site, leaving AMI BIOS users open to attack.

The post FTP Treasure Trove | TechSNAP 105 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A treasure trove of data was found on an open FTP site, leaving AMI BIOS users open to attack.

Plus a look at PunkSPIDER, a batch of your questions, and so much more!

On this week’s of TechSNAP.

Thanks to:

Use our code hostdeal4 to score economy hosting for $1 a month, for one year.

35% off your ENTIRE order just use our code go35off4 until the end of the month!

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension: