smartphone – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Fri, 13 Dec 2019 05:24:59 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png smartphone – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 5G Fundamentals | TechSNAP 418 https://original.jupiterbroadcasting.net/137782/5g-fundamentals-techsnap-418/ Fri, 13 Dec 2019 00:15:00 +0000 https://original.jupiterbroadcasting.net/?p=137782 Show Notes: techsnap.systems/418

The post 5G Fundamentals | TechSNAP 418 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/418

The post 5G Fundamentals | TechSNAP 418 first appeared on Jupiter Broadcasting.

]]>
Sliding Politics | User Error 72 https://original.jupiterbroadcasting.net/133422/sliding-politics-user-error-72/ Fri, 16 Aug 2019 00:15:09 +0000 https://original.jupiterbroadcasting.net/?p=133422 Show Notes: error.show/72

The post Sliding Politics | User Error 72 first appeared on Jupiter Broadcasting.

]]>

Show Notes: error.show/72

The post Sliding Politics | User Error 72 first appeared on Jupiter Broadcasting.

]]>
Don’t Panic & P your S | TechSNAP 310 https://original.jupiterbroadcasting.net/107531/dont-panic-p-your-s-techsnap-310/ Tue, 14 Mar 2017 21:23:24 +0000 https://original.jupiterbroadcasting.net/?p=107531 RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Malware found preinstalled on 38 Android phones used by 2 companies Malicious apps were surreptitiously added somewhere along the supply chain. Check Point didn’t disclose […]

The post Don’t Panic & P your S | TechSNAP 310 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Malware found preinstalled on 38 Android phones used by 2 companies

  • Malicious apps were surreptitiously added somewhere along the supply chain.

  • Check Point didn’t disclose the names of the companies that owned the infected phones. One of the affected parties was a “large telecommunications company” and the other was a “multinational technology company.”

  • It’s interesting how this came on out March 10 and the WikiLeaks notice about compromised cellphones came out a few days earlier. Coincidence?

“Vault 7” by WikiLeaks

  • A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

  • Among the more notable disclosures which, if confirmed, “would rock the technology world”, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

  • NOTE: From what I’ve read, this compromise involves first compromising the phone in question and as such is not an attack on the apps themselves.

  • Kreb’s coverage

  • Krebs says: “The documents for the most part don’t appear to include the computer code needed to exploit previously unknown flaws in these products, although WikiLeaks says those exploits may show up in a future dump. This collection is probably best thought of as an internal corporate wiki used by multiple CIA researchers who methodically found and documented weaknesses in a variety of popular commercial and consumer electronics.”

  • Krebs also says: “Some of the exploits discussed in these leaked CIA documents appear to reference full-on, remote access vulnerabilities. However, a great many of the documents I’ve looked at seem to refer to attack concepts or half-finished exploits that may be limited by very specific requirements — such as physical access to the targeted device.”

  • See also Espionage vs. Surveillance

  • Best advice: patch your shit, secure physical access, it is not as bad as WikiLeaks is making it out to be.


Feedback


Round Up:

+Silent Data Corruption Is Real


The post Don’t Panic & P your S | TechSNAP 310 first appeared on Jupiter Broadcasting.

]]>
Faux Use Protection Program | TTT 223 https://original.jupiterbroadcasting.net/90586/faux-use-protection-program-ttt-223/ Fri, 20 Nov 2015 11:31:41 +0000 https://original.jupiterbroadcasting.net/?p=90586 We look at the hard numbers of the biggest sector in the tech industry, have a skeptical discussion around YouTube coming to the aide content creators & debate Google+’s new UI design. Then we fail to make even the most obvious Kickstarter sound compelling & wrap it all up with a little technical disaster vamping. […]

The post Faux Use Protection Program | TTT 223 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We look at the hard numbers of the biggest sector in the tech industry, have a skeptical discussion around YouTube coming to the aide content creators & debate Google+’s new UI design.

Then we fail to make even the most obvious Kickstarter sound compelling & wrap it all up with a little technical disaster vamping.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

— Episode Links —

The post Faux Use Protection Program | TTT 223 first appeared on Jupiter Broadcasting.

]]>
Magical 2Gbit Internet | Tech Talk Today 152 https://original.jupiterbroadcasting.net/79807/magical-2gbit-internet-tech-talk-today-152/ Thu, 02 Apr 2015 09:50:39 +0000 https://original.jupiterbroadcasting.net/?p=79807 Like a magic pony with one more trick, Comcast announces it will magically turn on 2Gbps Internet Service to some areas that recently had Google Fiber installed. Does Comcast’s sudden ability to deliver this service perfectly demonstrate how real competition is all thats needed to save the net? Plus TrueCrypt’s audit wraps up, Ford is […]

The post Magical 2Gbit Internet | Tech Talk Today 152 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Like a magic pony with one more trick, Comcast announces it will magically turn on 2Gbps Internet Service to some areas that recently had Google Fiber installed. Does Comcast’s sudden ability to deliver this service perfectly demonstrate how real competition is all thats needed to save the net?

Plus TrueCrypt’s audit wraps up, Ford is chasing a dream & more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

Comcast leapfrogs Google Fiber with new 2Gbps internet service | The Verge

One way to answer critics and competitors alike is to simply do better, and for once Comcast is doing exactly that. The US cable giant is today announcing a new 2Gbps broadband service, which it will start rolling out in Atlanta from next month. There’s no price yet, but Comcast says it will be symmetrical — meaning you’ll upload just as quickly as you can download — and it won’t be limited “just to certain neighborhoods.”

Ford Is Chasing Tesla And Uber Into The Future – BuzzFeed News

Ford CEO Mark Fields says the legacy car manufacturer is trying to think like a startup.

U.S. Smartphone Use in 2015 | Pew Research Center’s Internet & American Life Project

10% of Americans own a smartphone but do not have broadband at home, and 15% own a smartphone but say that they have a limited number of options for going online other than their cell phone. Those with relatively low income and educational attainment levels, younger adults, and non-whites are especially likely to be “smartphone-dependent.”

A Few Thoughts on Cryptographic Engineering: Truecrypt report

The TL;DR is that based on this audit, Truecrypt appears to be a relatively well-designed piece of crypto software. The NCC audit found no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances.

Microsoft will adopt open document standards following government battle | ITProPortal.com

Microsoft has confirmed it will start supporting the Open Documents Format (ODF) in the next update to Office 365, following a lengthy battle against the UK government.

Jupiter Broadcasting Meetup

Jupiter Broadcasting is interested in semi-frequent listener meetups, events in your area, and more. We’ll use this group to organize events.

The post Magical 2Gbit Internet | Tech Talk Today 152 first appeared on Jupiter Broadcasting.

]]>
Asteroid Belt Water | SciByte 117 https://original.jupiterbroadcasting.net/50632/asteroid-belt-water-scibyte-117/ Wed, 29 Jan 2014 20:59:19 +0000 https://original.jupiterbroadcasting.net/?p=50632 We take a look at water vapor on a Dwarf Planet, driverless taxis, evening smartphone use, sensors in football helmets, spacecraft updates, and more!

The post Asteroid Belt Water | SciByte 117 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We take a look at water vapor on a Dwarf Planet, driverless taxis, evening smartphone use, sensors in football helmets, spacecraft updates, Curiosity news, and as always take a peek back into history and up in the sky this week.

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes

Show Notes:

Water on a Dwarf Planet in the Asteroid Belt

  • Scientists have made the first definitive detection of water vapor on the largest and roundest object in the asteroid belt, Ceres.
  • Plumes of water vapor are thought to shoot up periodically from Ceres when portions of its icy surface warm slightly
  • A Viewer Also Pointed Out This Story
  • Michael Thalleen ‏@ThalleenM
  • Ceres
  • Ceres was known as the largest asteroid in our solar system
  • When it first was spotted in 1801, astronomers thought it was a planet orbiting between Mars and Jupiter
  • The materials making up Ceres likely date from the first few million years of our solar system\’s existence and accumulated before the planets formed.
  • The International Astronomical Union is the governing organization responsible for naming planetary objects reclassified it as a dwarf planet, a solar system body bigger than an asteroid and smaller than a planet.
  • They reclassified Ceres as a dwarf planet because of its large size. It is roughly 590 miles (950 kilometers) in diameter
  • Until now, ice had been theorized to exist on Ceres but had not been detected conclusively
  • NASA\’s Dawn Mission
  • Is on its way to Ceres now after spending more than a year orbiting the large asteroid Vesta is scheduled to arrive at Ceres in the spring of 2015, where it will take the closest look ever at its surface.
  • There it will map the geology and chemistry of the surface in high resolution
  • Intermediate Water Vapor
  • Scientists used far-infrared vision to see, finally, a clear spectral signature of the water vapor, but they did not see water vapor every time it looked
  • They were able to see the water vapor four different times, on one occasion there was no signature
  • What scientists now think is happening is when Ceres swings through the part of its orbit that is closer to the sun, a portion of its icy surface becomes warm enough to cause water vapor to escape in plumes
  • When Ceres is in the colder part of its orbit, no water escapes
  • The strength of the signal also varied over hours, weeks and months, with water vapor plumes rotating in and out of Herschel\’s views as the object spun on its axis
  • This enabled the scientists to localize the source of water to two darker spots on the surface of Ceres
  • Previously seen by NASA\’s Hubble Space Telescope and ground-based telescopes, the dark spots might be more likely to outgas because dark material warms faster than light material.
  • Dwarf Planets, Asteroids and Comets
  • \”This is the first time water vapor has been unequivocally detected on Ceres or any other object in the asteroid belt and provides proof that Ceres has an icy surface and an atmosphere,\” | Michael Küppers of ESA in Spain
  • Scientists now believe Ceres contains rock in its interior with a thick mantle of ice that, if melted, would amount to more freshwater than is present on all of Earth
  • \”The lines are becoming more and more blurred between comets and asteroids\” | Seungwon Lee of JPL
  • \”We knew before about main belt asteroids that show comet-like activity, but this is the first detection of water vapor in an asteroid-like object.\” | Paul von Allmen, JPL
  • Further Reading / In the News
  • Telescope spies water plumes on dwarf planet Ceres | Phys.org
  • Herschel Discovers Water Vapor Spewing from Ceres | UniverseToday.com

— NEWS BYTE —

Driverless Taxis

  • Driverless taxis will be carrying passengers during demonstration projects in five European cities as of February 2014
  • EU-funded CityMobil2 project, is one of a number of research initiatives that are testing out specially designed self-driving road vehicles as the technology required to navigate them becomes cheaper and more reliable
  • Visual Odometry
  • Cybercars have traditionally sensed the world through expensive gyroscopes, microwaves and laser beams
  • Currently, cheap cameras and fast image-recognition algorithms has led to a new technique known as visual odometry
  • Visual odometry uses images to look at the terrain before and after a small drive step
  • By tracking specific features they can tell how far they have moved, the position and orientation of the vehicle.
  • Sound Familiar? Curiosity Rover is using the same technology for some of it\’s automated driving
  • SciByte 103 | Martian Methane & Deep Impact | September 24, 2013
  • V-Charge Project
  • Car manufacturers are already making automated piloting features of their own – radar-based cruise control, anti-braking systems (ABS) and lane-control assistance
  • Cables and hydraulic pressure valves which previously linked the controls of the vehicle to its working parts are gradually being replaced with electronic circuits
  • The V-Charge Project is a consortium of companies and universities which is working on fully automated low-speed driving in cities using only cameras and other low-cost sensors mounted on standard cars
  • The consortium is working to produce detailed maps and a perception system that allows a vehicle to recognize its location and identify nearby pedestrians and vehicles, all using only stereoscopic or fisheye cameras.
  • The team has taken this a step further, pioneering a guidance system that works economically by using a single camera.
  • How Soon is Soon?
  • While companies such as Google see autonomous cars in a couple of decades the people with the CityMobil2 project think that they could be hitting the road sooner than that
  • The team believes that, in addition to teaching cars to respond autonomously to traffic conditions, traffic should be adapted to automated cars
  • In their current state of development, cybercars can already drive safely in pedestrian areas and designated lanes
  • The first CityMobil project shuttled passengers across the car park of London Heathrow airport in a fleet of driverless pods
  • CityMobil2, now brings specially designed automated vehicles to designated roads inside the city centre
  • Future Plans
  • The project plans to procure two sets of automated vehicles which will tour five cities in a series of demonstration projects each lasting six to eight months
  • Investors are at present deterred by their high initial investment and perceived risks.
  • CityMobil2 is bringing together experts from ministries in each member state to agree on technical requirements by the time the project concludes in 2016 that could feed into a future European directive on the issue
  • Further Reading / In the News
  • Driverless Taxis in European Cities from 2014 | ScienceWorldRepoer.com

— TWO-BYTE NEWS —

Nighttime Smartphone Use

  • In a pair of studies surveying a broad spectrum of U.S. workers found that people who monitored their smart phones for business purposes after 9 p.m. were more tired and were less engaged the following day on the job.
  • Productivity and Sleep
  • More than half of U.S. adults own a smartphone and many consider the devices to be among the most important tools ever invented when it comes to increasing productivity of knowledge-based work
  • The National Sleep Foundation says only 40 percent of Americans get enough sleep on most nights a commonly cited reason is smartphone usage for work.
  • The Studies
  • The first study, the researchers had 82 upper-level managers complete multiple surveys every day for two weeks.
  • The second study surveyed 161 employees daily in a variety of occupations — from nursing to manufacturing and from accounting to dentistry
  • They showed that nighttime smartphone usage for business purposes cut into sleep and sapped workers\’ energy the next day in the office
  • The second study also compared smartphone usage to other electronic devices and found that smartphones had a larger negative effect than watching television and using laptop and tablet computers
  • In addition to keeping people mentally engaged at night, smartphones emit \”blue light\”
  • Blue light is the most disruptive of all colors of light and is known to hinder melatonin, a chemical in the body that promotes sleep
  • Nighttime use of smartphones appears to have both psychological and physiological effects on people\’s ability to sleep and on sleep\’s essential recovery functions
  • Johnson, MSU assistant professor of management
  • \”There may be times in which putting off work until the next day would have disastrous consequences and using your smartphone is well worth the negative effects on less important tasks the next day,\”
  • \”But on many other nights, more sleep may be your best bet.\”
  • Further Reading / In the News
  • Nighttime smartphone use zaps workers\’ energy | ScienceDaily.com

Football Helmet Safety Tech

  • The CDC estimates that between the 1.6 million and 3.8 million Americans suffer sports-related concussions every year, these concussions occur after what seems like a pretty mild blow to the head
  • In football, the risk of concussion has been a hot-button issue
  • Sensors
  • Sensors within helmets can catch what human eyes often miss, alerting people on the sidelines that a player may need to be taken out of play and screened for a concussion
  • Jake Merrell, a graduate student in mechanical engineering at Brigham Young University created a smart foam that works within football helmets to measure how hard a player just got hit
  • Motion sensors transmit data wirelessly to a tablet or computer when the foam in the helmet is compressed by the player\’s head, measuring the force and acceleration of the impact.
  • What\’s Out Now
  • The helmet manufacturer Riddell debuted a similar concussion-alert product this year, called the InSite Impact Response System which is being used by some high school teams in the 2013 season.
  • Sensors inside the player\’s helmet lining measure the severity of a head impact and send an alert to the sidelines if a player has sustained a potentially concussion-inducing hit
  • Although this system only works in Riddell\’s Revolution Speed helmet so far.
  • What\’s Next
  • \”A coach will know within seconds exactly how hard their player just got hit\” | Jake Merrell, a graduate student in mechanical engineering at Brigham Young University
  • He plans to submit his project to the Head Health Challenge sponsored by GE and the NFL
  • Further Reading / In the News
  • Smart Foam In Football Helmets Measures Impact Of Each Hit | Popular Science

— SPACECRAFT UPDATE—

Chinese Lander, Chang’e 3, Panorama

  • Color of the Lunar Soil
  • The lander beamed back a series of new photos taken with its panoramic camera. stitched together, they give us a more detailed and colorful look of the rover’s surroundings in northern Mare Imbrium
  • Color images of the moon’s surface by the Apollo astronauts along with their verbal descriptions indicate a uniform gray color punctuated in rare spots by patches of more colorful soils
  • Apollo visited six different moonscapes – all essentially gray
  • One thing that stands out is the brown color of the lunar surface soil or regolith, it\’s possible that it is simply that the color balance in the Chinese images might be off. Or did Chang’e 3 just happen to land on browner soils
  • Multimedia
  • The six wheeled Yutu rover, which means ‘Jade Rabbit’, has “experienced a mechanical control abnormality” in a new report by China’s official government newspaper, The People’s Daily
  • ‘Jade Rabbit’ was traversing southwards from the landing site as the incident occurred just days ago – about six weeks into its planned 3 month moon roving expedition
  • Very few details have emerged or been released by the Chinese government about Yutu’s condition or fate
  • The abnormality occurred due to the “complicated lunar surface environment,” said the State Administration of Science, Technology and Industry for National Defence
  • Based on unofficial accounts, it appears that one of the solar panels did not fold back properly over Yutu’s mast after it was lowered to the required horizontal position into a warmed box to shield and protect it from the extremely frigid lunar night time temperatures
  • This could potentially spell doom for the mast mounted instruments and electronic systems, including the color and navigation cameras and the high gain antenna, if true
  • The event took place just prior to the beginning of the 2nd lunar night and ‘dormancy’ for both ‘Jade Rabbit’ and the Chang’e-3 each Lunar night also lasts approximately 14 Earth days
  • There is no communication possible during sleep mode, no one will know until the resumption of daylight some two weeks from now – around Feb. 8 to 9.
  • Further Reading / In the News
  • Yutu rover Suffers Significant Setback at Start of 2nd Lunar Night | UniverseToday.com+ Chang\’e 3 Lander Beams Back New Lunar Panorama Photos | UniverseToday.com

— CURIOSITY UPDATE —

  • Comet C/2013 A1 Siding Spring
  • On Oct. 19, 2014 comet C/2013 A1 Siding Spring will buzz Mars about 10 times closer than any identified comet has ever flown past Earth
  • Spacecraft at Mars might get a good look at the nucleus of comet Siding Spring as it heads toward the closest approach, roughly 86,000 miles (138,000 kilometers) from the planet
  • Dust particles that the comet nucleus sheds this spring could threaten orbiting spacecraft at Mars in October
  • The level of risk won\’t be known for months, but NASA is already evaluating possible precautionary measures as it prepares for studying the comet
  • Observations of comet Siding Spring are planned using resources on Earth, orbiting Earth, on Mars and orbiting Mars, and some are already underway
  • Infrared imaging reveals a comet that is active and dusty, even though still nearly three-fourths as far from the sun as Jupiter is
  • Comet Viewing Experience
  • Researchers using spacecraft at Mars gained experience at trying to observe comet ISON approached Mars
  • That flyby distance was about 80 times farther than Siding Spring\’s will be
  • The High Resolution Imaging Science Experiment (HiRISE) camera on NASA\’s Mars Reconnaissance Orbiter could provide imagery with resolution of dozens of pixels across the diameter of the nucleus, when HiRISE observed comet ISON, the nucleus was less than one pixel across
  • Cameras on the Mars rovers Curiosity and Opportunity might watch for meteors in the sky that would be an indication of the abundance of particles in the comet\’s tail, though the geometry of the flyby would put most of the meteors in daytime sky instead of dark sky
  • The degree to which Siding Spring brightens this spring will be an indicator of how much hazard it will present to spacecraft at Mars
  • The path the nucleus will take is now known fairly well. The important unknowns are how much dust will come off the nucleus, when it will come off, and the geometry of the resulting coma and tail of the comet.
  • Spacecraft Safety
  • Orbiters are designed with the risk of space-dust collisions in mind
  • Over a five-year span for a Mars orbiter, NASA figures on a few percent chance of significant damage to a spacecraft from the background level of impacts from such particles, called meteoroids
  • If managers choose to position orbiters behind Mars during the peak risk, the further in advance any orbit-adjustment maneuvers can be made, the less fuel will be consumed
  • Multimedia
  • Image Galleries at JPL and Curiosity Mulimedia
  • Social Media
  • Curiosity Rover @MarsCuriosity
  • Further Reading / In the News
  • Mars Science Laboratory: NASA Preparing for 2014 Comet Watch at Mars | Mars.NASA.gov

SCIENCE CALENDAR

Looking back

  • February 1, 1811 : 203 years ago : Bell Rock Lighthouse Lit : The Bell Rock Lighthouse was lit for the first time. Using 24 lanterns, it began flashing its warning light, 11 miles out off the east coast of Scotland atop a white stone tower rising over 30m (100ft) high. It was built by Robert Stevenson on a treacherous sandstone reef, which, except at low tides, lies submerged just beneath the waves. Since then, no repair has been necessary to its stonework. It is the oldest sea-washed lighthouse in existence. It was Stevenson\’s finest achievement, regarded by many as the finest lighthouse ever built, the most outstanding engineering achievement of the 19th century. In the centuries before, the dangerous Bell Rock had claimed thousands of lives, as vessels were wrecked on its razor-sharp serrated rocks. Bell Rock Lighthouse | Wikipedia

Looking up this week

The post Asteroid Belt Water | SciByte 117 first appeared on Jupiter Broadcasting.

]]>
Killer Chrome | CR 41 https://original.jupiterbroadcasting.net/33826/killer-chrome-cr-41/ Mon, 18 Mar 2013 11:03:34 +0000 https://original.jupiterbroadcasting.net/?p=33826 Google shuffles the head of Android to a new role, folding Android under the Chrome division. We speculate on the possible transition from Android to ChromeOS.

The post Killer Chrome | CR 41 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Google shuffles the head of Android to a new role, folding Android under the Chrome division. We take live calls and speculate on the long-term possible transition from Android to ChromeOS, how it would impact developers and how the transition could be accomplished.

Plus rumor has it Windows Phone 8 will lose support in July 2014, and the dark cloud of uncertainty around the struggling platform this creates.

Then the hard choice when developing for desktop Linux, the Samsung problem, and much more!

Thanks to:

Use our code coder295 to get a .COM for $2.95.

 

Visit coderradio.ting.com to save $25 off your device or service credits.

 

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

— Show Notes —

Feedback

  • We take your live calls
  • No show notes (Google Drive was down during our show) so emails back next week!

Dev Hoopla

My guess is that the conversion will start slow. Perhaps Google will start to push Chrome apps for the Android version of Chrome. Maybe in a year, when those rumored Google stores start to show, we’ll see a Chrome for Mobile “developer phone.” Regardless of the conversion starts, my bet is that within the next five years Google will start publically pushing Chrome as its next generation operating system.

Google is fixing its eyes on its favoured partner, Samsung. The Android OS made the South Korean tech giant become the dominant smartphone maker in the world with nearly 215 million smartphones in 2012 or 40 per cent of the global market.

Data released by UK\’s Juniper Research shows that although Samsung has retaken the smartphone sales lead from Apple, with 42.2 million sold against 35.1 million, Apple is easily leading in terms of revenue from mobile sales. It estimates that Apple\’s mobile revenues were $29.3 billion, when including the iPad. By comparison, Samsung\’s revenue from all mobile devices including feature phones came in at $17 billion.

They\’re actually generating more than 100 percent of the industry\’s earnings — 106 percent, to be precise — according to a report from Canaccord Genuity.

That may seem impossible, but it\’s largely because rivals — like Research In Motion, Nokia, and Motorola — posted operating losses during the September quarter, the firm said.

Pick of the week:

[asa]B000UXZQ42[/asa]

Follow the show

The post Killer Chrome | CR 41 first appeared on Jupiter Broadcasting.

]]>
Ultimate File Server | TechSNAP 25 https://original.jupiterbroadcasting.net/12458/ultimate-file-server-techsnap-25/ Thu, 29 Sep 2011 18:35:26 +0000 https://original.jupiterbroadcasting.net/?p=12458 We share our insights are setting up the ultimate network file server, plus have you ever been curious how hackers pull off massive security breaches?

The post Ultimate File Server | TechSNAP 25 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Coming up on this week’s on TechSNAP…

Have you ever been curious how hackers pull off massive security breaches? This week we’ve got the details on a breach that exposed private data of 35 millions customers.

Plus MySQL.com spreads custom malware tailored just for your system, and the details are amazing!

On top of all that, we’ll share our insights are setting up the ultimate network file server!

Direct Download Links:

HD Video | Large Video | Mobile Video | WebM | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

[ad#shownotes]

Show Notes:

South Korea’s SK Telecom hacked, detailed forensics released

  • Between July 18th and 25th, SK Telecom’s systems were compromised, and all of their customer records (35 million customers) were compromised. The records included a wealth of information, including username, password, national ID number, name, address, mobile phone number and email address.
  • The attack was classified as an Advanced Persistent Threat, the attackers compromised 60 computers at SK Telecom in total, biding their time until they could compromise the database. Data was exchanged between the compromised computers at SK Telecom, and a server at a Taiwanese publishing company that had been compromised by the attackers at an earlier date.
  • The attack was very sophisticated, specifically targeted, and also seems to indicate a degree of knowledge about the the target. The well organized attackers managed to compromise the software updates server of another company (ESTsoft) who’s software (ALTools) was used by SK Telecom, then piggyback a trojan in to the secure systems that way. Only computers from SK Telecom received the malicious update.
  • The attackers send the compromised data through a number of way points before receiving it, masking the trail and the identities of the attackers. A similar pattern was seen with the RSA APT attack, the attackers uploaded the stolen data to a compromised web server, and once they had removed the data from there, destroyed the server and broke the trail back to them selves.
  • Proper code signing, or GPG signing could have prevented this
  • Original BBC Article about the attack

Mac OS X Lion may expose your hashed password

  • The Directory Services command allows users to search for data about other users on the machine. This is the intended function.
  • The problem is that the search results for the current user also include sensitive information, such as the users’ password hash. You are authorized to view this information, because you are the current user.
  • However, any application running as that user, could also gain that information, and send it back to an attacker.
  • Using the hash, an attacker could perform an offline brute force attack against the password. These attacks have gotten more common and less time consuming with the advent of better parallel computing, cloud computing and high performance GPGPUs.
  • My bitcoin mining rig could easily be converting to a password hash cracking rig, especially now that the current value of bitcoin is sagging. If there were a big enough market for cracking hashed passwords, there are now a huge number of highly specialized machines devoted to bitcoin that could be easily switched over.
  • The tool can also allow the current user to overwrite their own password hash with a new one, without the need to provide the current plain text password. This means that rather than spend time cracking the password, the attacker could just change the current users password, and then take over the account that way.
  • These attacks would require some kind of exploit that allowed the attack to perform the required actions, however we have seen a number of flash, java and general browsers exploits that could allow this.
  • The current recommended work around is to chmod the dscl command such that it can only be used by root
  • Additional Article

MySQL.com compromised, visitors subject to drive by infection

  • The MySQL.com front page was compromised and had malicious code injected in to it.
  • The code (usually an iframe) caused a java exploit to be executed against the visitor. The exploit required no interaction or confirmation from the user. This type of attack is know as a ‘drive by infection’, because the user does not have to take any action to become infected.
  • Two different trojans were detected being sent to users, Troj/WndRed-C and Troj/Agent-TNV
  • Because of the nature of the iframe attack, and the redirect chain the attackers could have easily varied the payload, or selected different payloads based on the platform the user was visiting the site on.
  • There are reports of Russian hackers offering to sell admin access to mysql.com for $3000
  • Detailed Analysis with malicious source code, video of the infection process
  • Article about previous compromise
  • When the previous compromise was reported, it was also reported that MySQL.com was subject to a XSS (Cross Site Scripting) attack, where content from another site could be injected in to the MySQL site, subverting the browsers usual ‘Same Origin’ policy. This vulnerability, if not repaired, could have been the source of this latest attack.

Feedback:

Continuing our Home Server Segment – This week we are covering file servers.
Some possible solutions:

  • Roll Your Own (UNIX)
  • Linux or FreeBSD Based
  • Install Samba for SMB Server (allow windows and other OS machines to see your shared files)
  • Setup FTP (unencrypted unless you do FTPS (ftp over ssl), high speed, doesn’t play well with NAT, not recommended)
  • Configure SSH (provides SCP and SFTP) (encrypted, slightly higher cpu usage, recommended for Internet access)
  • Install rsync (originally designed to keep mirrors of source code and websites up to date, allows you to transfer only the differences between files, rather than the entire file) (although it is recommended you do rsync over SSH not via the native protocol)
  • Configure NFS (default UNIX file sharing system)
  • Build your own iSCSI targets (allows you to mount a remote disk as if it were local, popular in virtualization as it removes a layer of abstraction. required for virtual machines that can be transferred from one host to another.
  • Roll Your Own (Windows)
  • Windows provides built in support for SMB
  • Install Filezilla Server for FTP/FTPs (Alternative: CyberDuck)
  • There are some NFS alternatives for windows, but not are not free
  • There is an rsync client for windows, or you could use cygwin, same goes for SSH. Similar tools like robocopy and synctoy
  • FreeNAS
  • FreeBSD Based. Provides: SMB, NFS, FTP, SFTP/SCP, iSCSI (and more)
  • Supports ZFS
  • Chris’ Previous Coverage of FreeNAS:
  • FreeNAS, IN DEPTH
  • FreeNAS Vs. HP MediaSmart WHS
  • FreeNAS vs Drobo

Round Up:

Bitcoin Blaster:

The post Ultimate File Server | TechSNAP 25 first appeared on Jupiter Broadcasting.

]]>