iCloud – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 14 Apr 2022 13:00:53 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png iCloud – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Easy for Schmidt to Say | Coder Radio 461 https://original.jupiterbroadcasting.net/148197/easy-for-schmidt-to-say-coder-radio-461/ Wed, 13 Apr 2022 05:30:00 +0000 https://original.jupiterbroadcasting.net/?p=148197 Show Notes: coder.show/461

The post Easy for Schmidt to Say | Coder Radio 461 first appeared on Jupiter Broadcasting.

]]>

Show Notes: coder.show/461

The post Easy for Schmidt to Say | Coder Radio 461 first appeared on Jupiter Broadcasting.

]]>
Linux Action News 220 https://original.jupiterbroadcasting.net/147027/linux-action-news-220/ Sun, 19 Dec 2021 19:00:00 +0000 https://original.jupiterbroadcasting.net/?p=147027 Show Notes: linuxactionnews.com/220

The post Linux Action News 220 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/220

The post Linux Action News 220 first appeared on Jupiter Broadcasting.

]]>
Apple’s Rotten Scanning | Self-Hosted 51 https://original.jupiterbroadcasting.net/145857/apples-rotten-scanning-self-hosted-51/ Fri, 13 Aug 2021 05:00:00 +0000 https://original.jupiterbroadcasting.net/?p=145857 Show Notes: selfhosted.show/51

The post Apple's Rotten Scanning | Self-Hosted 51 first appeared on Jupiter Broadcasting.

]]>

Show Notes: selfhosted.show/51

The post Apple's Rotten Scanning | Self-Hosted 51 first appeared on Jupiter Broadcasting.

]]>
Linux Action News 184 https://original.jupiterbroadcasting.net/144722/linux-action-news-184/ Sun, 11 Apr 2021 17:15:00 +0000 https://original.jupiterbroadcasting.net/?p=144722 Show Notes: linuxactionnews.com/184

The post Linux Action News 184 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/184

The post Linux Action News 184 first appeared on Jupiter Broadcasting.

]]>
A Future Without Servers | TechSNAP 358 https://original.jupiterbroadcasting.net/122862/a-future-without-servers-techsnap-358/ Thu, 01 Mar 2018 10:07:07 +0000 https://original.jupiterbroadcasting.net/?p=122862 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Revamp of ‘Pwned Passwords’ Boosts Privacy and Size of Database In V2 of Pwned Passwords, launched last week, Hunt updated his password data set from 320 million passwords to 501 million new passwords, […]

The post A Future Without Servers | TechSNAP 358 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Revamp of ‘Pwned Passwords’ Boosts Privacy and Size of Database

In V2 of Pwned Passwords, launched last week, Hunt updated his password data set from 320 million passwords to 501 million new passwords, pulled from almost 3,000 breaches over the past year.

First, 1Password hashes your password using SHA-1. But sending that full SHA-1 hash to the server would provide too much information and could allow someone to reconstruct your original password. Instead, Troy’s new service only requires the first five characters of the 40-character hash.

tl;dr – a collection of nearly 3k alleged data breaches has appeared with a bunch of data already proven legitimate from previous incidents, but also tens of millions of addresses that haven’t been seen in HIBP before. Those 80M records are now searchable

Apple’s China data migration includes iCloud keys, making data requests easier for authorities

Now, according to Apple, for the first time the company will store the keys for Chinese iCloud accounts in China itself. That means Chinese authorities will no longer have to use the U.S. courts to seek information on iCloud users and can instead use their own legal system to ask Apple to hand over iCloud data for Chinese users, legal experts said.

Researchers Propose Improved Private Web Browsing System

In a paper (PDF) describing Veil, Frank Wang – MIT Computer Science and Artificial Intelligence Laboratory (CSAIL), Nickolai Zeldovich – MIT CSAIL, and James Mickens – Harvard, explain that the system is meant to prevent information leaks “through the file system, the browser cache, the DNS cache, and on-disk reflections of RAM such as the swap file.”

Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2017

A record-breaking number of 20,832 vulnerabilities have been discovered in 2017 but only 12,932 of these received an official CVE identifier last year, a Risk Based Security (RBS) report reveals.


What is Serverless Architecture? What are its criticisms and drawbacks?

Serverless architectures refer to applications that significantly depend on third-party services (knows as Backend as a Service or “BaaS”) or on custom code that’s run in ephemeral containers (Function as a Service or “FaaS”), the best known vendor host of which currently is AWS Lambda.

The big promise:

  • NO SERVER MANAGEMENT

There is no need to provision or maintain any servers. There is no software or runtime to install, maintain, or administer.
FLEXIBLE SCALING

Your application can be scaled automatically or by adjusting its capacity through toggling the units of consumption (e.g. throughput, memory) rather than units of individual servers.

  • HIGH AVAILABILITY

Serverless applications have built-in availability and fault tolerance. You don’t need to architect for these capabilities since the services running the application provide them by default.

  • NO IDLE CAPACITY

You don’t have to pay for idle capacity. There is no need to pre- or over-provision capacity for things like compute and storage. For example, there is no charge when your code is not running.

Develop, test and deploy in a single environment, to any cloud provider. You don’t have to provision infrastructure or worry about scale. Serverless teams cut time to market in half.

  • Maybe the ultimate layer of abstraction.
  • Your not paying for un-utilized hardware/server time
  • The vendor, like Amazon, is patching/maintaining the server base for you. Removing the developer from the process.
  • Traditional server management roles may start to transition to service management, configuration, and manage all the abstractions AWS gives you. IE the admins role goes from one wrangeling the operating system, to wrangling layers of abstraction and independent services.

The big constraint:

  • No local disk, you send data in, and data comes out.
  • Not ideal for ongoing workloads.

The big secure:

Open Source FaaS:

Serverless Functions Made Simple for Docker and Kubernetes

Feedback

The post A Future Without Servers | TechSNAP 358 first appeared on Jupiter Broadcasting.

]]>
Fat Bottom APIs | CR 206 https://original.jupiterbroadcasting.net/99906/fat-bottom-apis-cr-206/ Mon, 23 May 2016 15:23:45 +0000 https://original.jupiterbroadcasting.net/?p=99906 We dig through the relevant bits of Google I/O, the possible anti-web move Instant Apps represent, no Kotlin & big improvements we’re excited about. Plus Mike’s take on Android Studio 2.2 & Chris’ take on what we’re all calling “services”. Thanks to: Get Paid to Write for DigitalOcean Direct Download: MP3 Audio | OGG Audio […]

The post Fat Bottom APIs | CR 206 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We dig through the relevant bits of Google I/O, the possible anti-web move Instant Apps represent, no Kotlin & big improvements we’re excited about.

Plus Mike’s take on Android Studio 2.2 & Chris’ take on what we’re all calling “services”.

Thanks to:


Linux Academy


DigitalOcean

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Become a supporter on Patreon:

Patreon

— Show Notes: —

Hoopla

Google IO

  • No Kotlin 🙁
  • Machine Learning is Upon Us!
  • Google’s Antiweb move: Instant Apps
  • xkcd: Installing
  • Android Studio 2.2 Improvements
    • APK Analyser gives a better understanding of app size down to individual assets
      • Constraint Layout & New Layout designer
      • View Xcode iOS Layout-like
      • Backward compatible to API Level 9 / 2.3
    • Layout Inspector allows easier visualization of UI layers during debug time
    • Espresso Test Recorder
      • Record UI tests by taking actions over your UI
    • Improved Jack Tools allows some Java 8 features
  • Android Apps on Chromebooks
  • JIT & Vulkan – performances advances or catch up with iOS

Book Recommendation

The post Fat Bottom APIs | CR 206 first appeared on Jupiter Broadcasting.

]]>
Privacy is a Myth | CR 118 https://original.jupiterbroadcasting.net/66337/privacy-is-a-myth-cr-118/ Mon, 08 Sep 2014 14:11:28 +0000 https://original.jupiterbroadcasting.net/?p=66337 The debate over whose responsibility it is to protect your cloud data heats up, we discuss how to get your confidence back & some Vala feedback. Plus the recent Markdown drama, the systemd hater club & much more! Thanks to: Direct Download: MP3 Audio | OGG Audio | Video | Torrent | YouTube RSS Feeds: […]

The post Privacy is a Myth | CR 118 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The debate over whose responsibility it is to protect your cloud data heats up, we discuss how to get your confidence back & some Vala feedback.

Plus the recent Markdown drama, the systemd hater club & much more!

Thanks to:


Linux Academy


DigitalOcean

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Become a supporter on Patreon:

Foo

— Show Notes: —

Feedback / Follow Up:

Dev Hoopla:

Ultimately, the schism over systemd could lead to a separation of desktop and server distros, or Linux server admins moving to FreeBSD

Systemd has turned into the Godzilla of Linux controversies. Everywhere you look it’s stomping through blogs, rampaging through online discussion threads, and causing white-hot flames that resemble Godzilla’s own breath of death. TechNewsWorld has a roundup of the systemd hostilities in case you missed any of it and want to savor some of the drama.

Maybe it’s time Linux is split in two. I suggested this possibility last week when discussing systemd (or that FreeBSD could see higher server adoption), but it’s more than systemd coming into play here. It’s from the bootloader all the way up. The more we see Linux distributions trying to offer chimera-like operating systems that can be a server or a desktop at a whim, the more we tend to see the dilution of both. You can run stock Debian Jessie on your laptop or on a 64-way server. Does it not make sense to concentrate all efforts on one or the other?

Standard Markdown aka Common Markdown aka CommonMark

The post Privacy is a Myth | CR 118 first appeared on Jupiter Broadcasting.

]]>
Facebook Lobotomy | Tech Talk Today 53 https://original.jupiterbroadcasting.net/66032/facebook-lobotomy-tech-talk-today-53/ Fri, 05 Sep 2014 09:21:58 +0000 https://original.jupiterbroadcasting.net/?p=66032 Apple outlines the immediate improvements to iCloud security they’ll be making but the core issues are still rotting. Facebook is killing your cell & why we can’t wait to buy our NSA Nanny Cam! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed | […]

The post Facebook Lobotomy | Tech Talk Today 53 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Apple outlines the immediate improvements to iCloud security they’ll be making but the core issues are still rotting. Facebook is killing your cell & why we can’t wait to buy our NSA Nanny Cam!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Tim Cook: Apple to Add Security Alerts for iCloud Users, Broaden Two-Factor Authentication – Mac Rumors

Apple will add security alerts for iCloud users, broaden two-factor authentication and make a more aggressive effort to alert users about protecting their accounts, Apple CEO Tim Cook told the Wall Street Journal in his first interview since the recent hacking incident involving celebrities’ iCloud accounts.

To make such leaks less likely, Mr. Cook said Apple will alert users via email and push notifications when someone tries to change an account password, restore iCloud data to a new device, or when a device logs into an account for the first time. Until now, users got an email when someone tried to change a password or log in for the first time from an unknown Apple device; there were no notifications for or restoring iCloud data.

Cook said the new notifications will begin in two weeks and will allow users to take action on potential hacking immediately, allowing them to either change the password to retake the account or alerting Apple’s security team. Cook echoed Apple’s previous press release on the hackings, stressing that the best prevention for future incidents are more human than technological.

Exclusive aerial footage of Apple’s mysterious white box next to ‘iPhone 6’ event site

The large white structure is being erected next to the Flint Center for the Performing Arts in Cupertino, Calif.

The included photos and video were captured by a DJI Phantom 2 Vision+ drone, offering a unique perspective on the mystery building.

Apple hasn’t used the Cupertino Flint Center venue for introducing new products since the late 1990s. The space is notable in Apple’s history for serving as the first public introduction of the Macintosh in 1984.

[DARPA Develops Implants that Treat Diseases and Depression Without Medication

](https://www.extremetech.com/extreme/188908-darpas-tiny-implants-will-hook-directly-into-your-nervous-system-treat-diseases-and-depression-without-medication)

DARPA, on the back of the US government’s BRAIN program, has begun the development of tiny electronic implants that interface directly with your nervous system and can directly control and regulate many different diseases and chronic conditions, such as arthritis, PTSD, inflammatory bowel diseases (Crohn’s disease), and depression. The program, called ElectRx (pronounced ‘electrics’), ultimately aims to replace medication with “closed-loop” neural implants, which constantly assess the state of your health, and then provide the necessary nerve stimulation to keep your various organs and biological systems functioning properly.

The ElectRx program will focus on a fairly new area of medical therapies called neuromodulation. As the name implies, neuromodulation is all about modulating your nervous system, to improve or fix an underlying problem. Notable examples of neuromodulation are cochlear implants, which restore hearing by directly modulating your brain’s auditory nerve system, and deep brain stimulation (DBS), which appears to be capable of curing/regulating various conditions (depression, Parkinson’s) by overriding erroneous neural spikes with regulated, healthy stimulation.

Facebook’s autoplay video feature is destroying cell phone bills – Sep. 3, 2014

Smartphone users could be at risk of maxing out their data plans if they don’t change this default setting in the Facebook app, which otherwise will automatically start streaming videos in the News Feed window.

The issue was flagged by consumer finance site MoneySavingExpert.com, which said it had “seen many complaints from people who have been stung with data bills after exceeding their monthly allowance and who believe it to be because of Facebook autoplaying videos.”

A Smart Nanny Cam With Facial Recognition and Air Pollution Sensors

It’s a nanny cam with upgraded intelligence: Not only can it send images to your phone via an app, it can also serve as a autonomous sentry, alerting you to strange activity in the house thanks to facial recognition and air-quality sensors.

It supplies users with a live, high-definition video feed of their house. The white-and-wood device—it almost looks like a little candle for your mantel—has a 135-degree viewing angle on the room it’s in, night vision, and two-way audio.


Likewise, for audio, Withings has programmed the device to discern between, say, a baby crying and a motorcycle engine. Whenever something is a awry, users get a push notification on their phone. If the user chooses to view the notification later, it gets saved in a timeline. (How far back the timeline goes will be based on a pay-for-space subscription model.)

These clever systems for detecting abnormalities also work with the Home’s air quality sensors. These pick up on volatile organic compounds, or harmful gases often released by cleaning products or building materials. When the Home alerts users about harmful chemicals, it also points out the likely culprit.

This allows you to isolate a problem area of the house.

Borderlands 2 Also Looks Like It’s Coming To Linux, UPDATE: Confirmed | GamingOnLinux

Michael Blair, Aspyr Media: Yes! BL2 Linux is absolutely real! We’ve been working hard on it for months and will talk about a release date as soon as possible.

The post Facebook Lobotomy | Tech Talk Today 53 first appeared on Jupiter Broadcasting.

]]>
Home Depot Credit Repo | TechSNAP 178 https://original.jupiterbroadcasting.net/65977/home-depot-credit-repo-techsnap-178/ Thu, 04 Sep 2014 18:57:14 +0000 https://original.jupiterbroadcasting.net/?p=65977 Home Depot is breached, and the scale could be much larger than the recent Target hack & we discuss the explosion of fake cell towers in the US, and whats behind it. Then the tools used in the recent celebrity photo leak & the steps that need to be taken. Plus a great batch of […]

The post Home Depot Credit Repo | TechSNAP 178 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Home Depot is breached, and the scale could be much larger than the recent Target hack & we discuss the explosion of fake cell towers in the US, and whats behind it. Then the tools used in the recent celebrity photo leak & the steps that need to be taken.

Plus a great batch of your questions, our answers & much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Krebs: Banks report breach at Home Depot. Update: Almost all home depot stores hit

  • Sources from multiple banks have reported to Brian Krebs that the common retailer in a series of stolen credit cards appears to be Home Depot
  • Home Depots Spokesperson Paula Drake says: “I can confirm we are looking into some unusual activity and we are working with our banking partners and law enforcement to investigate,” Drake said, reading from a prepared statement. “Protecting our customers’ information is something we take extremely seriously, and we are aggressively gathering facts at this point while working to protect customers. If we confirm that a breach has occurred, we will make sure customers are notified immediately. Right now, for security reasons, it would be inappropriate for us to speculate further – but we will provide further information as soon as possible.”
  • “Several banks contacted by this reporter said they believe this breach may extend back to late April or early May 2014. If that is accurate — and if even a majority of Home Depot stores were compromised — this breach could be many times larger than Target, which had 40 million credit and debit cards stolen over a three-week period”
  • “The breach appears to extend across all 2,200 Home Depot stores in the United States. Home Depot also operates some 287 stores outside the U.S. including in Canada, Guam, Mexico, and Puerto Rico”
  • Zip-code analysis shows 99.4% overlap between stolen cards and home depot store locations
  • This is important, as the fraud detection system at many banks is based on proximity
  • If a card is used far away from where the card holder normally shops, that can trigger the card being frozen by the bank
  • By knowing the zip code of the store the cards were stolen from, the criminal who buys the stolen card information to make counterfeit cards with, can use cards that are from the same region they intent to attack, increasing their chance of successfully buying gift cards or high value items that they can later turn into cash
  • The credit card numbers are for sale on the same site that sold the Target, Sally Beauty, and P.F. Chang’s cards
  • “How does this affect you, dear reader? It’s important for Americans to remember that you have zero fraud liability on your credit card. If the card is compromised in a data breach and fraud occurs, any fraudulent charges will be reversed. BUT, not all fraudulent charges may be detected by the bank that issued your card, so it’s important to monitor your account for any unauthorized transactions and report those bogus charges immediately.”
  • Some retailers, including Urban Outfitters, say they do not plan to notify customers, vendors or the authorities if their systems are compromised

Fake cell towers found operating in the US

  • Seventeen mysterious cellphone towers have been found in America which look (to your phone) like ordinary towers, and can only be identified by a heavily customized handset built for Android security – but have a much more malicious purpose. Source: Popular Science
  • Mobile Handsets are supposed to warn the user when the tower does not support encryption, as all legitimate towers do support encryption, and the most likely cause of a tower not supporting encryption, is that it is a rogue tower, trying to trick your phone into not encrypting calls and data, so they can be eavesdropped upon
  • The rogue towers were discovered by users of the CryptoPhone 500, a Samsung SIII running a modified Android that reports suspicious activity, like towers without encryption, or data communications over the baseband chip without corresponding activity from the OS (suggesting the tower might be trying to install spyware on your phone)
  • “One of our customers took a road trip from Florida to North Carolina and he found eight different interceptors on that trip. We even found one near the South Point Casino in Las Vegas.”
  • “What we find suspicious is that a lot of these interceptors are right on top of U.S. military bases.” says Goldsmith. “Whose interceptor is it? Who are they, that’s listening to calls around military bases? The point is: we don’t really know whose they are.”
  • Documents released last week by the City of Oakland reveal that it is one of a handful of American jurisdictions attempting to upgrade an existing cellular surveillance system, commonly known as a stingray.
  • The Oakland Police Department, the nearby Fremont Police Department, and the Alameda County District Attorney jointly applied for a grant from the Department of Homeland Security to “obtain a state-of-the-art cell phone tracking system,” the records show.
  • Stingray is a trademark of its manufacturer, publicly traded defense contractor Harris Corporation, but “stingray” has also come to be used as a generic term for similar devices.
  • According to Harris’ annual report, which was filed with the Securities and Exchange Commission last week, the company profited over $534 million in its latest fiscal year, the most since 2011.
  • Relatively little is known about how stingrays are precisely used by law enforcement agencies nationwide, although documents have surfaced showing how they have been purchased and used in some limited instances.
  • Last year, Ars reported on leaked documents showing the existence of a body-worn stingray. In 2010, Kristin Paget famously demonstrated a homemade device built for just $1,500.
  • According to the newly released documents, the entire upgrade will cost $460,000—including $205,000 in total Homeland Security grant money, and $50,000 from the Oakland Police Department (OPD). Neither the OPD nor the mayor’s office immediately responded to requests for comment.
  • One of the primary ways that stingrays operate is by taking advantage of a design feature in any phone available today. When 3G or 4G networks are unavailable, the handset will drop down to the older 2G network. While normally that works as a nice last-resort backup to provide service, 2G networks are notoriously insecure.
  • Handsets operating on 2G will readily accept communication from another device purporting to be a valid cell tower, like a stingray. So the stingray takes advantage of this feature by jamming the 3G and 4G signals, forcing the phone to use a 2G signal.
  • Cities scramble to upgrade “stingray” tracking as end of 2G network looms

The Nude Celebrity Photo Leak Was Made Possible By Law Enforcement Software That Anyone Can Get

  • Elcomsoft Phone Password Breaker requires the iCloud username and password, but once you have it you can impersonate the phone of the valid user, and have access to all of their iCloud information, not just photos
  • “If a hacker can obtain a user’s iCloud username and password, he or she can log in to the victim’s iCloud.com account to steal photos. But if attackers instead impersonate the user’s device with Elcomsoft’s tool, the desktop application allows them to download the entire iPhone or iPad backup as a single folder, says Jonathan Zdziarski, a forensics consult and security researcher. That gives the intruders access to far more data, he says, including videos, application data, contacts, and text messages.”
  • “It’s important to keep in mind that EPPB doesn’t work because of some formal agreement between Apple and Elcomsoft, but because Elcomsoft reverse-engineered the protocol that Apple uses for communicating between iCloud and iOS devices. This has been done before —Wired specifically refers to two other computer forensic firms called Oxygen and Cellebrite that have done the same thing — but EPPB seems to be a hacker’s weapon of choice. As long as it is so readily accessible, it’s sure to remain that way”
  • All of this still requires the attacker to know the celebrities username and password
  • This is where iBrute came in
  • A simple tool that takes advantage of the fact that when Apple built the ‘Find My iPhone’ service, they failed to implement login rate limiting
  • An attacker can sit and brute force the passwords at high speed, with no limitations
  • The API should block an IP address after too many failed attempts. This has now been fixed
  • Another way to deal with this type of attack is to lockout an account after too many failed attempts, to ensure a distributed botnet cannot do something like try just 3 passwords each from 1000s of different IP addresses
  • When it becomes obvious that an account is under attack, locking it so that no one can gain access to it until the true owner of the account can be verified and steps can be taken to ensure the security of the account (change the username?)
  • The issue with this approach is that Apple Support has proven to be a weak link in regards to security in the past. See TechSNAP Episode 70 .
  • Obviously, the iPhone to iCloud protocol should not depend of obscurity to provide security either. We have seen a number of different attacks against the iPhone based on reverse engineering the “secret” Apple protocols
  • Security is often a trade-off against ease-of-use, and Apple keeps coming down on the wrong side of the scale

Feedback:


Round Up:


The post Home Depot Credit Repo | TechSNAP 178 first appeared on Jupiter Broadcasting.

]]>
Fools Aren’t Protected | CR 117 https://original.jupiterbroadcasting.net/65787/fools-arent-protected-cr-117/ Tue, 02 Sep 2014 15:03:36 +0000 https://original.jupiterbroadcasting.net/?p=65787 We take live calls, and discuss why .Net rules a Linux Admins life, learning OOP. Then, in light of the recent celebrity photo hacks, do developers have a moral obligation to protect the uninformed public? Thanks to: Direct Download: MP3 Audio | OGG Audio | Video | Torrent | YouTube RSS Feeds: MP3 Feed | […]

The post Fools Aren't Protected | CR 117 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We take live calls, and discuss why .Net rules a Linux Admins life, learning OOP. Then, in light of the recent celebrity photo hacks, do developers have a moral obligation to protect the uninformed public?

Thanks to:


Linux Academy


DigitalOcean

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Become a supporter on Patreon:

Foo

— Show Notes: —

Feedback / Follow Up:

Dev Hoopla:

The post Fools Aren't Protected | CR 117 first appeared on Jupiter Broadcasting.

]]>
Blazing 7 | CR 67 https://original.jupiterbroadcasting.net/43192/blazing-7-cr-67/ Mon, 16 Sep 2013 12:33:49 +0000 https://original.jupiterbroadcasting.net/?p=43192 iOS 7 is landing we discuss what’s in store for developers, and the real reason to put a 64bit CPU in a cell phone.

The post Blazing 7 | CR 67 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

iOS 7 is landing and Mike and Chris discuss what’s in store for developers, and the real reason to put a 64bit CPU in a cell phone.

Plus the core of what’s wrong with Microsoft, practicing security from the start, your emails and more!

Thanks to:


\"GoDaddy\"


\"Ting\"

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Feedback

  • Klemens writes in asking why isn\’t basic internet security taught in schools? and has some concerns about Mozilla Persona.
  • Coder Radio Subreddit — Enterprise Java / Fizzbuzz: https://www.reddit.com/r/CoderRadio/comments/1mc9ma/fizzbuzz_enterprise_edition/
  • Coder Radio Subreddit user Caryhartline’s post: https://www.reddit.com/r/CoderRadio/comments/1mg6wh/a_rant_about_the_tech_media/
  • General feedback where’s all the moviel

Dev World Hoopla

\”The first thing devs need to do is focus on updating for iOS 7 and its design changes,\” he says. \”The second stage is 64-bit using Xcode 5, and to read all the developer documents.\”

And even if an app won\’t see a seismic shift in performance by moving to 64-bit, it\’s not a bad idea to start considering a move. Lahartinger says that its relatively easy for developers to get started and \”take advantage of some of the 5S 64-bit features right away,\” noting that this \”will mostly help their apps perform even better.\”

\”iOS 7 is a different user experience, and it is a significant difference,\” he said. \”If developers just compile for iOS 7, there are going to be noticeable flaws.\”

Join us for the first annual Samsung Developers Conference to connect with industry visionaries, Samsung executives and technical leaders, and fellow developers. Get an exclusive first look at the latest tools, SDKs, and emerging platforms for Samsung devices to create what\’s next.

Now, according to a new report from The New York Times, it turns out Nokia engineers did develop Lumia phones that ran Google\’s Android operating system. The report, which cites people familiar with the matter, says that Android was running on Nokia smartphones internally \”well before\” discussions that led to Microsoft\’s purchase of the company\’s handset division, which suggests that such efforts may have taken place in 2012 or early 2013. Additionally, it\’s said that while Microsoft knew about the project — and confirmed its existence to the _Times _—it \”wasn\’t a part of Microsoft\’s discussions\” prior to the acquisition.

Follow the show

The post Blazing 7 | CR 67 first appeared on Jupiter Broadcasting.

]]>
Time to Git ZFS | TechSNAP 103 https://original.jupiterbroadcasting.net/34346/time-to-git-zfs-techsnap-103/ Thu, 28 Mar 2013 16:38:51 +0000 https://original.jupiterbroadcasting.net/?p=34346 How the KDE project avoided a git disaster, the root problem with Java, and the researcher who found many S3 buckets exposed to the public.

The post Time to Git ZFS | TechSNAP 103 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Is your bucket exposed to the public? A security researcher has recently discovered many S3 buckets are publicly available, we’ll share the details.

Plus how the KDE project avoided a git disaster, the root problem with Java, a big batch of your questions, and much much more!

Thanks to:

Use our code hostdeal4 to score economy hosting for $1 a month, for one year.

35% off your ENTIRE order just use our code go35off4 until the end of the month!

 

Visit techsnap.ting.com to save $25 off your device or service credits.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Gawker Reporter gets entire online presense hacked

  • Gawker Reporter and formed Wired editor Mat Honan had his entire digital life destroyed in a matter of minutes last week
  • A hacker going by the pseudonym Phobia, originally targeted Mat’s twitter account because of its 3 character username
  • The @mat twitter account linked to Mat’s personal website, which listed his gmail address
  • The attacker then started the password recovery process to reset the password of the gmail account
  • Since the gmail account had not been configured for two-factor authentication, the reset option was to send a new password to the alternate account configured in gmail
  • The address of this account is obscured and displayed so you know which email to go check, but when the alternate address for mhonan@gmail.com is displayed as m*****n@me.com it is pretty easy to guess the email address
  • Now, in order to reset the password of the AppleID, the attackers would normally need the answers to the account’s “Secret Questions”, however, there is a fallback method, when these cannot be provided by the customer
  • Apple only requires that you provide the billing address and last for digits of the credit card on file for the account
  • The billing address is fairly easy to come by (phone book, domain whois, people search, blog posts, etc), but the last four digits of the credit card number are less so
  • Since the hacker knew the victims email address, the next target of the attack was Amazon.com
  • The attacker had an associate call Amazon and claim to be the victim, wanting to add a new credit card to the account. This process only requires knowing the account holders name, billing address, and the new credit card (Adding a new credit card to your account does not seem like a high security operation, and it would seem to make sense for companies to make this process as easy as possible)
  • The trick is, you then call Amazon back, and now you are able to provide the account holders name, billing address, and current credit card number. With this information to verify your identity, you are able to change the email address on the account, to one that you control
  • Now that you control the Amazon account, you simply login, and look at the other cards on file, you don’t get to see the entire credit card number, but the first and last 4 digits are displayed, so that customers can identify which card is which
  • With that information in hand, it now time to call AppleCare, and reset the password on the AppleID, gaining you access to the iCloud account and @me.com email address of your victim
  • Next you can reset the password of the gmail account, and then once you control that, reset the password of the twitter account
  • Now, if you want to prevent your victim from interfering with your actions, you need to disable their ability to fight back. This is where iCloud’s ‘Find My’ service comes into play
  • The attacker used the service to initiate a remote wipe of the victim’s iPhone, iPad and MacBook, as part of this process, the devices are also locked with a PIN code, which only the attacker has
  • The next step was to delete the gmail account, so it couldn’t be used to regain control of the twitter account. Normally you are able to undelete a gmail account, however it requires external verification, in this case via a text message to the cell phone tied to the gmail account, which the victim had not yet regained control of
  • All of this points out that the serious weak link in most all security systems, are the people, and the ways around the security systems we put in place, for when people forget their passwords
  • As we have seen in other cases like this, with some basic personal information that is pretty easy to acquire, and attacker could have transferred the phone service from the victim’s cell phone to another device in order to intercept verification text messages from services such as gmail or the victim’s online banking
  • Mat Honan admits that a number of the security problems that made this attack possible were his own fault, not having recent backups of his devices, not using two-factor authentication for gmail and other services and having only a 7 character password for his AppleID (although this didn’t factor into this attack as originally believed, it is still a security failure)
  • Wired did its own tests using the methodology that the attacker claimed to have used, and was able to completely compromise two other Wired employees
  • Apple and Amazon have both since stopped doing password resets over the phone

Secret Questions Don’t Work

  • The problem with Secret Questions is that in order for a question to be general enough that it will apply to most people and static enough that the answer won’t change by time you need to use the questions to recover your password, the answers end up being very generic and can usually be found with a bit of research
  • You also have to consider who may be attacking your secret questions, if the question is “What was the name of your first Teacher”, what if the attacker is someone you went to school with?
  • Another problem is how strictly the answers are verified, a common security question when calling your credit card company is your mother’s maiden name. In a great deal of cases, if you just mumble something this will be accepted and you will be able to make changes to the account
  • A good security question must maximize these four criteria:
  • Definitive: there should only be one correct answer which does not change over time.
  • Applicable: the question should be possible to answer for as large a portion of users as possible (ideally, universal).
  • Memorable: the user should have little difficulty remembering it
  • Safe: it should be difficult to guess or find through research
  • Feedback: Send in your ideas for good secret questions, and we’ll critique some of the suggestions next week
  • Bruce Schneier on Secret Questions

Feedback:

Round-Up:

The post Not So Secret Answers | TechSNAP 70 first appeared on Jupiter Broadcasting.

]]> WWDC Fallout | CR 02 https://original.jupiterbroadcasting.net/20693/wwdc-fallout-cr-02/ Mon, 18 Jun 2012 11:42:11 +0000 https://original.jupiterbroadcasting.net/?p=20693 Michael and Chris cover the items from WWDC that they think developers will be impacted by, discuss Facebook pressure, and reflect on hardware updates.

The post WWDC Fallout | CR 02 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Michael and Chris cover the items from WWDC that they think developers will be impacted by, discuss the Facebook pressure, and reflect on hardware updates announced.

Plus your love for HTML5, the beginnings of a Jupiter Broadcasting app, what programming languages / platforms are best for a beginner to learn for the purpose of getting a job.

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Show Notes:

Audible Pick:

Feedback

  • Brett would like to know what programming languages / platforms are best for a beginner to learn for the purpose of getting a job.
  • Should we do code samples? E-mail your thoughts.
  • The people demand HTML5!

iOS 6 / Mountain Lion

Hardware Changes

Tool of the Week

The post WWDC Fallout | CR 02 first appeared on Jupiter Broadcasting.

]]>