signed – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 22 Feb 2016 02:46:12 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png signed – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Signed by Sony | TechSNAP 192 https://original.jupiterbroadcasting.net/73732/signed-by-sony-techsnap-192/ Thu, 11 Dec 2014 18:48:06 +0000 https://original.jupiterbroadcasting.net/?p=73732 If we could rebuild the Internet from scratch, what would we change? It’s more than just a thought experiment. We’ll share the details about real world research being done today! Plus we dig through the Sony hack, answer a ton of great question & a rocking roundup! Thanks to: Get Paid to Write for DigitalOcean […]

The post Signed by Sony | TechSNAP 192 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

If we could rebuild the Internet from scratch, what would we change? It’s more than just a thought experiment. We’ll share the details about real world research being done today!

Plus we dig through the Sony hack, answer a ton of great question & a rocking roundup!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Reinventing Computers And The Internet From Scratch, For The Sake Of Security

  • DARPA funded research is looking at how we might design the Internet if we had to do it over again
  • Many decisions that were made 30 and 40 years ago when UNIX and TCP/IP were designed, may be done differently today
  • The overall project has a number of sub-projects:
    • CRASH – Clean-Slate Design of Resilient, Adaptive, Secure Hosts
    • MRC – Mission-Oriented Resilient Clouds
    • CTSRD – Clean Slate Trustworthy Secure Research and Development (Custard)
  • BERI: Bluespec Extensible RISC Implementation: a open-source hardware-software research and teaching platform: a 64-bit RISC processor implemented in the high-level Bluespec hardware description language (HDL), along with compiler, operating system, and applications
  • CHERI: capability hardware enhanced RISC instructions: hardware-accelerated in-process memory protection and sandboxing model based on a hybrid capability model
  • TESLA: temporally enforced security logic assertions: compiler-generated runtime instrumentation continuously validating temporal security properties
  • SOAAP: security-oriented analysis of application programs: automated program analysis and transformation techniques to help software authors utilize Capsicum and CHERI features
  • The goal is to design newer secure hosts and networks, without having to maintain backwards compatibility with legacy systems, the biggest problem with changing anything on the Internet
  • This is why there are still things like SSLv3 (instead of just TLS 1.2+), why we have not switched to IPv6, and why spam is still such a large problem
  • I for one would definitely like to replaced SMTP, but no one has yet devised a plan for a system that the world could transition to without breaking legacy email while we wait for the rest of the world to upgrade
  • “Corporations are elevating security experts to senior roles and increasing their budgets. At Facebook, the former mantra “move fast and break things” has been replaced. It is now “move slowly and fix things.””
  • For performance reasons, when hardware and programming languages were designed 30 and 40 years ago, it was decided that security would be left up to the programmer
  • The CHERI project aim to change this, by implementing ‘Capabilities’, a sandboxing and security mechanism into the hardware, allowing the hardware rather than the software to enforce protections, preventing unauthorized access or modification of various regions of memory by malicious or compromised applications.
  • CHERI, and the software side of the project, Capsicum, are based on FreeBSD, but are also being ported to Linux, where Google plans to make extensive use of it in its Chrome and Chromium browsers.
  • Additional Coverage

Sony Internal Network Hacked


Feedback:


Round Up:


The post Signed by Sony | TechSNAP 192 first appeared on Jupiter Broadcasting.

]]>
Nest Root Attack | Tech Talk Today 14 https://original.jupiterbroadcasting.net/60602/nest-root-attack-tech-talk-today-14/ Tue, 24 Jun 2014 09:19:18 +0000 https://original.jupiterbroadcasting.net/?p=60602 Google announces their own domain name management service, the Internet of things has arrived, and it’s already been hacked. We’ll chat about the Nest thermostats rooting, Google buying Dropcam and more. Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed | OGG Feed | […]

The post Nest Root Attack | Tech Talk Today 14 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Google announces their own domain name management service, the Internet of things has arrived, and it’s already been hacked. We’ll chat about the Nest thermostats rooting, Google buying Dropcam and more.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a Tech Talk Today supporter on Patreon:

Foo

Show Notes:

— Headlines —

Google Begins Testing Domain Registrations

When Google Domains launches to the public, you’ll be able to buy and sell domains through the service. Unlike some other domain registration offerings, Google won’t charge you extra to register your domain privately. You’ll be able to create up to 100 email addresses on the domain and as many as 100 customized sub-domains. Google Domains will also use the company’s own DNS servers, so visitors should get a snappy response time when they hit up your site.

GTV Hacker » Google Nest: Exploiting DFU For Root

Today, popular Google TV hacking site GTV Hacker, announces it has hacked the device to enable the booting of unsigned code. If you own a Nest, hackers could have a backdoor into your home.

By leveraging the device’s DFU mode to boot unsigned code at the boot-loader level.

The attack on the Nest thermostat is simple, we use the device’s recovery mode to run our own modified boot-loader (stage one and two). We then use our loaded boot-loaders to initiate a Linux kernel that is used to modify the file system on the Nest. We then add a SSH server running as root as well as functionality to create a reverse SSH tunnel to a specified host using the Nest’s virtual drive.

They found this “feature” back in November 2013, and mentioned it publicly on December 5th, 2013 (see this tweet). Initially, we planned on releasing our findings at a conference this summer (along with new root methods for the Chromecast and Roku), but our talk was declined. Their loss!

They will, however, be speaking this year at DEF CON 22! Our talk, entitled Hack All The Things: 20 Devices in 45 Minutes, will feature unreleased exploits for 20 devices being released in a 45 minute period. If you are in Las Vegas this August, make sure to stop in!

If you are a Nest user, I probably wouldn’t panic yet. It seems the hacker would need physical access to the device, which limits the risk. However, a devious person could exploit it while in your home and then control it remotely later. Hopefully Google can release an update to make the thermostat more secure and block the exploit.

Nest Labs Joins Race to Define Platform for the Internet of Things

Last Friday, Nest moved to broaden its reach in the home, buying a fast-growing maker of Internet-connected video cameras, DropCam, for $555 million. And on Tuesday, Nest is expected to announce a software strategy backed by manufacturing partners and a venture fund from Google Ventures and Kleiner Perkins Caufield & Byers.

Whirlpool and Nest, Mr. Dibkey said, have worked together for more than year to develop a few applications. One allows a Whirlpool clothes dryer and a Nest thermostat to work together to conserve energy and save money. The thermostat detects a local utility’s peak load times, when electricity is most expensive. It sends a signal to the dryer to run on a cooler, slower drying cycle at those times.

In a Jawbone application, the company’s activity-monitoring wristband detects when a person gets up on a winter morning. It then sends a message to the Nest thermostat, telling it to heat up the house

Nest’s Internet of Things strategy will be backed by the Thoughtful Things Fund, a venture capital fund created by Google Ventures and Kleiner Perkins.

Google I/O 2014

How to Watch Google I/O 2014 Keynote Livestream

Google I/O 2014 runs from June 25 to 26. If you are interested in watching the Google I/O 2014 keynote as a livestream, you have a couple of options.

The post Nest Root Attack | Tech Talk Today 14 first appeared on Jupiter Broadcasting.

]]>
Time Signatures | BSD Now 23 https://original.jupiterbroadcasting.net/51177/time-signatures-bsd-now-23/ Thu, 06 Feb 2014 22:08:15 +0000 https://original.jupiterbroadcasting.net/?p=51177 We'll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we've got a tutorial on how to run your own NTP server.

The post Time Signatures | BSD Now 23 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We\’ll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we\’ve got a tutorial on how to run your own NTP server. News, your feedback and even… the winner of our tutorial contest! It\’s a big show, so stay tuned to BSD Now – the place to B.. SD.

Thanks to:


\"iXsystems\"

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

FreeBSD foundation\’s 2013 fundraising results

  • The FreeBSD foundation finally counted all the money they made in 2013
  • $768,562 from 1659 donors
  • Nice little blog post from the team with a giant beastie picture
  • \”We have already started our 2014 fundraising efforts. As of the end of January we are just under $40,000. Our goal is to raise $1,000,000. We are currently finalizing our 2014 budget. We plan to publish both our 2013 financial report and our 2014 budget soon.\”
  • A special thanks to all the BSD Now listeners that contributed, the foundation was really glad that we sent some people their way (and they mentioned us on Facebook)

OpenSSH 6.5 released

  • We mentioned the CFT last week, and it\’s finally here!
  • New key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein\’s Curve25519 (now the default when both clients support it)
  • Ed25519 public keys are now available for host keys and user keys, considered more secure than DSA and ECDSA
  • Funny side effect: if you ONLY enable ed25519 host keys, all the compromised Linux boxes can\’t even attempt to login
  • New bcrypt private key type, 500,000,000 times harder to brute force
  • Chacha20-poly1305 transport cipher that builds an encrypted and authenticated stream in one
  • Portable version already in FreeBSD -CURRENT, and ports
  • Lots more bugfixes and features, see the full release note or our interview with Damien
  • Work has already started on 6.6, which can be used without OpenSSL!

Crazed Ferrets in a Berkeley Shower

  • In 2000, MWL wrote an essay for linux.com about why he uses the BSD license: \”It’s actually stood up fairly well to the test of time, but it’s fourteen years old now.\”
  • This is basically an updated version about why he uses the BSD license, in response to recent idiocy from Richard Stallman
  • Very nice post that gives some history about Berkeley, the basics of the BSD-style licenses and their contrast to the GNU GPL
  • Check out the full post if you\’re one of those people that gets into license arguments
  • The takeaway is \”BSD is about making the world a better place. For everyone.\”

OpenBSD on BeagleBone Black

  • Beaglebone Blacks are cheap little ARM devices similar to a Raspberry Pi
  • A blog post about installing OpenBSD on a BBB from.. our guest for today!
  • He describes it as \”everything I wish I knew before installing the newly renamed armv7 port on a BeagleBone Black\”
  • It goes through the whole process, details different storage options and some workarounds
  • Could be a really fun weekend project if you\’re interested in small or embedded devices

This episode was brought to you by

\"iXsystems


Interview – Ted Unangst – tedu@openbsd.org / @tedunangst

OpenBSD\’s signify infrastructure


Tutorial

Running an NTP server


News Roundup

Getting started with FreeBSD

  • A new video and blog series about starting out with FreeBSD
  • The author has been a fan since the 90s and has installed it on every server he\’s worked with
  • He mentioned some of the advantages of BSD over Linux and how to approach explaining them to new users
  • The first video is the installation, then he goes on to packages and other topics – 4 videos so far

More OpenBSD hackathon reports

  • As a followup to last week, this time Kenneth Westerback writes about his NZ hackathon experience
  • He arrived with two goals: disklabel fixes for drives with 4k sectors and some dhclient work
  • This summary goes into detail about all the stuff he got done there

X11 in a jail

  • We\’ve gotten at least one feedback email about running X in a jail Well.. with this commit, looks like now you can!
  • A new tunable option will let jails access /dev/kmem and similar device nodes
  • Along with a change to DRM, this allows full X11 in a jail
  • Be sure to check out our jail tutorial and jailed VNC tutorial for ideas
  • Ongoing Discussion

PCBSD weekly digest


Feedback/Questions

  • Justin writes in: https://slexy.org/view/s21VnbKZsH
  • Daniel writes in: https://slexy.org/view/s2nD7RF6bo
  • Martin writes in: https://slexy.org/view/s2jwRrj7UV
  • Alex writes in: https://slexy.org/view/s201koMD2c
    + unofficial FreeBSD RPI Images
  • James writes in: https://slexy.org/view/s2AntZmtRU
  • John writes in: https://slexy.org/view/s20bGjMsIQ

  • All the tutorials are posted in their entirety at bsdnow.tv
  • The ssh tutorial has been updated with some new 6.5 stuff
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • Watch live Wednesdays at 2:00PM Eastern (19:00 UTC)
  • Reminder: if you\’re on FreeBSD 8.3 for some reason, upgrade soon – it\’s reaching EOL
  • Reminder: if you\’re using pkgng, be sure to update to 1.2.6 for a security issue
  • The winner of the tutorial contest is… Dusko! We didn\’t get as many submissions as we wanted, but his Nagios monitoring tutorial was extremely well-done. It\’ll be featured in a future episode. Congrats! Send us a picture when it arrives.
  • Allan got his pillow in the mail as well, it\’s super awesome

The post Time Signatures | BSD Now 23 first appeared on Jupiter Broadcasting.

]]>
Eclipsing Binaries | BSD Now 18 https://original.jupiterbroadcasting.net/48817/eclipsing-binaries-bsd-now-18/ Tue, 31 Dec 2013 21:36:57 +0000 https://original.jupiterbroadcasting.net/?p=48817 We have an interview with Baptiste Daroussin about the future of FreeBSD binary packages. Following that, a cool script to do binary upgrades on OpenBSD.

The post Eclipsing Binaries | BSD Now 18 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Put away the Christmas trees and update your ports trees! We\’re back with the first show of 2014, and we\’ve got some catching up to do. This time on the show, we have an interview with Baptiste Daroussin about the future of FreeBSD binary packages. Following that, we\’ll be highlighting a cool script to do binary upgrades on OpenBSD. Lots of holiday news and listener feedback, on BSD Now – the place to B.. SD.

Thanks to:


\"iXsystems\"

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

Faces of FreeBSD continues

  • Our first one details Shteryana Shopova, the local organizer for EuroBSDCon 2014 in Sophia
  • Gives some information about how she got into BSD
  • \”I installed FreeBSD on my laptop, alongside the Windows and Slackware Linux I was running on it at the time. Several months later I realized that apart from FreeBSD, I hadn\’t booted the other two operating systems in months. So I wiped them out.\”
  • She wrote bsnmpd and extended it with the help of a grant from the FreeBSD Foundation
  • We\’ve also got one for Kevin Martin
  • Started off with a pinball website, ended up learning about FreeBSD from an ISP and starting his own hosting company
  • \”FreeBSD has been an asset to our operations, and while we have branched out a bit, we still primarily use FreeBSD and promote it whenever possible. FreeBSD is a terrific technology with a terrific community.\”

OpenPF?

  • A blog post over at the Dragonfly digest
  • What if we had some cross platform development of OpenBSD\’s firewall?
  • Similar to portable OpenSSH or OpenZFS, there could be a centrally-developed version with compatibility glue
  • Right now FreeBSD 9\’s pf is old, FreeBSD 10\’s pf is old (but has the best performance of any implementation due to custom patches), NetBSD\’s pf is old (but they\’re working on a fork) and Dragonfly\’s pf is old
  • Further complicated by the fact that PF itself doesn’t have a version number, since it was designed to just be ‘the pf that came with OpenBSD 5.4’
  • Not likely to happen any time soon, but it\’s good food for thought

Year of BSD on the server

  • A good blog post about switching servers from Linux to BSD
  • 2014 is going to be the year of a lot of switching, due to FreeBSD 10\’s amazing new features
  • This author was particularly taken with pkgng and the more coherent layout of BSD systems
  • Similarly, there was also a recent reddit thread, \”Why did you choose BSD over Linux?\”
  • Both are excellent reads for Linux users that are thinking about making the switch, send \’em to your friends

Getting to know your portmgr

  • This time in the series they interview Bryan Drewery, a fairly new addition to the team
  • He started maintaining portupgrade and portmaster, and eventually ended up on the ports management team
  • Believe it or not, his wife actually had a lot to do with him getting into FreeBSD full-time
  • Lots of fun trivia and background about him
  • Speaking of portmgr, our interview for today is…

This episode was brought to you by

\"iXsystems


Interview – Baptiste Daroussin – bapt@freebsd.org

The future of FreeBSD\’s binary packages, ports\’ features, various topics


Tutorial

Binary upgrades in OpenBSD

  • Using a third party script, binary upgrades in OpenBSD are easy
  • It automates a lot of the manual work and saves time – great for large deployments

News Roundup

pfSense december hang out

  • Interview/presentation from pfSense developer Chris Buechler with an accompanying blog post
  • \”This is the first in what will be a monthly recurring series. Each month, we’ll have a how to tutorial on a specific topic or area of the system, and updates on development and other happenings with the project. We have several topics in mind, but also welcome community suggestions on topics\”
  • Speaking of pfSense, they recently opened an online store
  • We\’re planning on having a pfSense episode next month!

BSDMag December issue is out

  • The free monthly BSD magazine gets a new release for December
  • Topics include CARP on FreeBSD, more BSD programming, \”unix basics for security professionals,\” some kernel introductions, using OpenBSD as a transparent proxy with relayd, GhostBSD overview and some stuff about SSH

OpenBSD gets tmpfs

  • In addition to the recently-added FUSE support, OpenBSD now has tmpfs
  • To get more testing, it was enabled by default in -current
  • Should make its way into 5.5 if everything goes according to plan
  • Enables lots of new possibilities, like our ccache and tmpfs guide

PCBSD weekly digests

  • Catching up with all the work going on in PCBSD land..
  • 10.0-RC2 is now available
  • The big pkgng 1.2 problems seem to have been worked out

Feedback/Questions

  • Remy writes in: https://slexy.org/view/s2UrUzlnf6
  • Jason writes in: https://slexy.org/view/s2iqnywwKX
  • Rob writes in: https://slexy.org/view/s2IUcPySbh
  • John writes in: https://slexy.org/view/s21aYlbXz2
  • Stuart writes in: https://slexy.org/view/s21vrYSqU8

  • All the tutorials are posted in their entirety at bsdnow.tv
  • The jail tutorial and disk encryption tutorial have gotten some improvements and updates
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • Watch live Wednesdays at 2:00PM Eastern (19:00 UTC)
  • Happy new year everybody!

The post Eclipsing Binaries | BSD Now 18 first appeared on Jupiter Broadcasting.

]]>
Don’t Copy That Floppy | TechSNAP 79 https://original.jupiterbroadcasting.net/25876/dont-copy-that-floppy-techsnap-79/ Thu, 11 Oct 2012 16:04:46 +0000 https://original.jupiterbroadcasting.net/?p=25876 How a Russian Spy ring used floppies to pass sensitive information, how Backblaze made it through the great hard drive shortage. Plus GPG explained!

The post Don't Copy That Floppy | TechSNAP 79 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

How a Russian Spy ring used floppies to pass sensitive information, how Backblaze made it through the great hard drive shortage, and why the US congress is saying no to Chinese Telco manufactures.

Plus a big batch of your questions, and our answers.

All that and much more, on this week’s TechSNAP!

Thanks to:

Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

BONOUS ROUND PROMO:

Get your .COMs just $5.99 per year up to 3 domains! Additional .COMs just $7.99 per year!
CODE: 599tech

Expires 10/31/12

SPECIAL OFFER! Save 20% off your order!
Code: go20off5

Pick your code and save:
techsnap7: $7.49 .com
techsnap10: 10% off
techsnap11: $1.99 hosting for the first 3 months
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

  • Jupiter Broadcasting Affiliate Extensions for Chrome and Firefox
  • How Backblaze dealt with the hard drive shortage

    • During the hard drive shortage that started a year ago, Backblaze found itself in a rather tight spot, in order to continue offering unlimited storage for $5/month, they needed more drives
    • The price of a 3TB internal drive shot up from $129 to $349 overnight
    • However external drives, were prices around $169, at least $100 cheaper than their internal counterparts (mostly because HP, Dell and Apple had bought up most of the supply of internal drives)
    • BackBlaze fills about 50TB worth of drives per day, so they need a continuous supply of new drives
    • Between November 2011 and February 2012, Backblaze farmed 5.5 Petabytes worth of hard drives from retailers, mostly consisting of external drives that needed to be removed from their enclosures
    • The external drives incurred other costs, shucking the drives out of the enclosures, and recycling the leftover shells afterwards
    • Many stores had ‘limit 2 per customer’ (I remember this well with my own drive buying), and BackBlaze employees employed many devious tactics to try to squeeze more out of each store, including pretending to be a grandmother buying drives for each of her grandchildren for Christmas
    • Backblaze employees were banned from a number of CostCo and BestBuy stores, or asked to leave empty handed
    • On Christmas Eve, the CEO of BackBlaze stopped at a friend’s house to pick up 80x 3TB drives his friend had acquired from an online site that forgot to limit the quantity he could order. It had taken the FedEx driver more than 30 minutes to unload all of the drives into the apartment. While loading them into his car, the BackBlaze CEO reflected that the drives he was loading into his car, were worth more than the car
    • Backblaze still buys external drives when the price is right, ~$30 cheaper than internal drives, to cover the additional cost of preparing the drives
    • The ‘shucked’ drives can usually not be returned for warranty replacement
    • Additional Coverage
    • Additional Coverage
    • The backblaze storage pod 2.0

    Russian spy ring relied on notepad and floppy disks

    • Sub-Lt. Jeffrey Delisle pled guilty today on charges of breach of trust and two counts of communicating safeguarded information to a foreign entity
    • The maximum sentence for ‘communicating safeguarded information to a foreign entity’ is life in prison
    • Delisle was an Analyst at HMCS Trinity, an intelligence facility that tracks vessels entering and exiting Canadian waters via satellites, drones and underwater devices, it is located at the naval base in Halifax, Nova Scotia
    • He would search for and copy sensitive materials from a secure computer at the base
    • Copy/pasting the data into notepad, it would then save it to a floppy disk
    • The floppy was then moved to a regular non-secure computer, where the data was transferred to a USB drive
    • After taking the USB home, he would access a webmail account, and draft an email, but never send it
    • His Russian handlers had the username and password to the email account, and would access it, and retrieve the stolen intelligence
    • The emails were never sent, lessening the chance that they might be intercepted
    • Delisle walked into the Russian Embassy in Ottawa in 2007 and asked to speak to someone from the GRU (Russian Military Intelligence), offering to sell the secrets he had access to
    • He was paid $3000/month in prepaid credit cards
    • the RCMP (Royal Canadian Mounted Police, Equivalent to the FBI in Canada) started investigating him after CBSA (Canada Border Services Acency) Officers alerted the Military when Delisle returned from a short trip to Brazil with a large amount of cash
    • Additional CBC Coverage

    SEC hands out first ever fine for ‘failure to protect customer data’

    • In the spring of 2005, network traffic at the Florida officers of GunnAllen Financial had slowed to a crawl
    • The company had outsourced its entire IT department to The Revere Group
    • GunnAllen’s acting CIO, a partner at Revere Group, asked the manager of the IT team to investigate
    • A senior network engineer had disabled the WatchGuard firewalls and routed all of the broker-dealer’s IP traffic–including trades and VoIP calls–through his home cable modem
    • As a result, none of the company’s trades, emails, or phone calls were being archived, in violation of Securities and Exchange Commission regulation
    • However, this did not appear in the final report from the SEC about the settlement with GunnAllen Financial, which was actually about other breaches of security and policy
    • Some of the data that was routed through the engineering some connection include: bank routing information, account balances, account numbers, social security numbers, customers’ home addresses and driver’s license numbers
    • “He’d purposefully break things, then come in in the morning and be the hero, I ended up key-logging all the servers, and I logged him logging in from home at 2:30 in the morning, logging on to BlackBerry servers and breaking them."
    • Although required by the SEC to keep copies of all emails for 7 years, “There was a point in time for probably two months where no one’s email was logged. I brought it up in a meeting once and was told to shut up [by the acting CIO]”
    • In 2008 FINRA (Financial Industry Regulatory Authority) fined GunnAllen $750,000 for a “trade allocation scheme” conducted by former head trader, in which profitable stock trades were allocated to his wife’s personal account instead of to the accounts of firm customers
    • Employees at The Revere Group were afraid to report issues because other employees had been fired

    Bug in facebook mobile app could expose your phone number

    • A feature of the facebook mobile app allows you to compare your mobile contacts list against facebook, and find any people you have in your phone, but not on facebook
    • A researcher exploited this feature by adding random phone numbers to his phone’s contact list and was able to determine many users’ mobile phone numbers, despite their privacy settings
    • Facebook originally denied that this was an issue when he reported it to them, they claimed that rate limiting and privacy settings prevented the exploit
    • The researcher posted proof , in the form of 100s of phone numbers (random digits blocked out to protect the innocent) with the corresponding person’s name
    • Facebook has since tightened up the rate limiting
    • TheNextWeb has an article on how to protect your phone number on facebook

    TechSNAP viewer discovers IE flaw

    • IE8 and IE9 in compatibility mode will sometimes mistakenly render plain text content as HTML
    • This means that the ‘raw’ view of a pastebin of some javascript source code, could cause the browser to execute it, rather than display it
    • A proof of concept is providers for you to test your browser

    US congressional report says Huawei and ZTE are a security threat

    • A draft of a report by the House Intelligence Committee said Huawei and another Chinese telecom, ZTE, “cannot be trusted” to be free of influence from Beijing and could be used to undermine US security
    • The report recommends that the chinese hardware manufacturers should be barred from US contracts and acquisitions, due to the security implications of chinese controlled devices in sensitive US installations
    • US set to reject UN ITU proposals for changes to Global Telecom systems, citing danger of increased foreign espionage
    • The US fears nations like China and Russia will gain too much control and impose tracking and monitoring, and assert control over content and user information
    • US says that ITU regulations are “not an appropriate or useful venue to address cybersecurity,”

    Feedback

    • More Info on digi-pass
    • Could provide some insight to GPG Keys?
      • Packages are signed by the GPG key of the person or group who created them
      • Your package manager maintains a list of the GPG keys you trust (the default is usually to trust official packages from your distro)
      • If you use 3rd party packages, you will get a warning
      • You must decide if you trust the 3rd party that signed the package, not to include an exploit in the package
      • If you trust the 3rd party, you can add their key to your allow list, and you will not receive the warning
      • It is unsafe to ignore the warning if you do not trust the source of the packages, especially if you are trying to install an official package
    • Switching to Publicly Signed SSL?
      • Wildcard SSL certificates cover *.domain.com (something.domain.com, otherthing.domain.com)
      • This does not include *.something.domain.com
      • Covers future sub domains that you might create
      • There are also ‘UCC’ (Unified Communications Certificates) certificates, that allow you to enumerate many domains to be covered by a single certificate. Adding or removing a domain to the certificate requires it to be reissued
      • UCC certificates are expensive, but are popular for Exchange servers that must cover multiple domains
    • Securing Cookies
    • Darwin writes in with a note that in addition to limiting the length of your password, ‘Microsoft Account’ also prevents you using some special characters, including ‘space’

    Round-Up

    The post Don't Copy That Floppy | TechSNAP 79 first appeared on Jupiter Broadcasting.

    ]]> The Dream is a Lie | CR 08 https://original.jupiterbroadcasting.net/22441/the-dream-is-a-lie-cr-08/ Mon, 30 Jul 2012 11:24:28 +0000 https://original.jupiterbroadcasting.net/?p=22441 Many of us have at some point dreamed of uploading an app or a web-service and becoming fabulously wealthy. For the most part we are all sadly mistaken.

    The post The Dream is a Lie | CR 08 first appeared on Jupiter Broadcasting.

    ]]>

    post thumbnail

    Many of us have at some point dreamed of uploading an app or launching a web-service and becoming fabulously wealthy. For the most part we are all sadly mistaken.

    This episode is all about dashing dreams and facing the biting wind of reality.

    And your feedback!

    Direct Download:

    MP3 Audio | OGG Audio | Video | Torrent | YouTube

    RSS Feeds:

    MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

    Show Notes:

    Feedback

    • Emmet rights in again, sharing a solution to his issue.
    • Charles schools me a bit on the nitty gritty differences between LLVM and GCC. He also points out that C was at one point called “Portable Assembler”, so HAH!
    • Nicholas sends me a message in C!
    • James asks if I am using the Intel River Trail API at all and asks if we have a CR subreddit.
    • Atcl shares a great resource and some thoughts on the value of knowing assembler
    • Brandon would like some information on services like oDesk, eLance, and vWorker as a source for work.
    • Thomas and a number of others have joined me in trying Pomodoro coding and overall they seem to like it.

    Technical Dependencies

    Distribution Dependencies: What Is a Store When It Wants to Be More?

    Human Dependencies or the Rockstar Syndrome

    • About that bus….
    • Fire any and all “Rockstars”

    Vote in our Poll:

    Mike’s Plug

    Tool of the Week

    Book of the Week

    The post The Dream is a Lie | CR 08 first appeared on Jupiter Broadcasting.

    ]]>