THC – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 01 May 2014 21:23:51 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png THC – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Net Neutrality Doomed | Unfilter 95 https://original.jupiterbroadcasting.net/56317/net-neutrality-doomed-unfilter-95/ Wed, 30 Apr 2014 22:33:00 +0000 https://original.jupiterbroadcasting.net/?p=56317 The FCC wants to carve out a fast lane for those who can afford it, pro-Russian militants overtake more Ukraine Government buildings and more!

The post Net Neutrality Doomed | Unfilter 95 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The FCC wants to carve out a fast lane for those who can afford it, is this the end of Net Neutrality, or are we all over reacting? We’ll analyze the situation.

Pro-Russian militants overtake more Ukraine Government buildings, and the new government is calling uncle.

Plus Colorado re-thinks their edible Cannabis rules, but something smells fishy, our follow up, and much much more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is Crazy

Snowden hired an Espionage Act defense lawyer to work on a U.S. plea deal

Whistleblower Edward Snowden reportedly hired a lawyer in an attempt to cut a plea deal with the U.S. government.

Plato Cacheris, regarded as an expert in the Espionage Act—violation of which is the main charge brought against Snowden—has been working for Snowden since he leaked a host of National Security Agency documents last summer, according to the New York Times.

The End of Net Neutrality

F.C.C., in a Shift, Backs Fast Lanes for Web Traffic

The Federal Communications Commission said on Wednesday that it would propose new rules that allow companies like Disney, Google or Netflix to pay Internet service providers like Comcast and Verizon for special, faster lanes to send video and other content to their customers.

FCC’s new net neutrality proposal: What do we really know?

FCC Chairman Tom Wheeler’s proposal is scheduled to be released to the public on May 15, when the commission plans to vote on the first step in a long process to reinstate net neutrality rules shot down by an appeals court in January.

The first criticisms of Wheeler’s proposal came shortly after the Wall Street Journal broke a story Wednesday saying the FCC proposal would allow broadband providers to charge Web businesses for access to their fastest service.

tom wheeler fcc chm
tom wheeler fcc chm

FCC chairman Tom Wheeler.

The 1,300-word story was short on details, with only one or two paragraphs describing the proposal, and most of the rest of the story focused on reactions and on the history of the net neutrality fight.

Sen. Al Franken criticized as “misguided” a plan being considered by the FCC’s head to let companies pay for preferential access to ISPs, warning that it would “destroy” the concept of an open Internet.

In a letter sent to FCC Chairman Tom Wheeler on Tuesday, Franken said that the idea would constitute “an affront to Net neutrality and have no place in an online marketplace that values competition and openness.”

“Your proposal would grant Verizon, Comcast, and other ISPs the power to pick winners and losers on the Internet, which violates core Net neutrality principles that you have publicly supported in the past. Although you claim that this proposal is not a ”turnaround,“ it is difficult to understand how it does not flatly contradict your own Commission’s Open Internet Order.”

In a strongly-worded and occasionally defensive blog post published Tuesday, Wheeler declared that he is a “strong believer in the importance of an Open Internet,” and said that his priority is to quickly craft new net neutrality rules that would withstand legal challenges.

What will happen at the FCC meeting on May 15?

The FCC is scheduled to vote on a notice of proposed rulemaking, or NPRM, addressing the new net neutrality plan. In an NPRM, the commission releases a set of proposals and asks for public comment on them. It’s the first step in a long process for the FCC to pass new regulations.

Because of the controversy over the proposal, the FCC has already begun taking email comments at openinternet@fcc.gov.

After Comcast, Netflix signs traffic deal with Verizon

Netflix just confirmed that it will pay Verizon for direct access through the carrier’s network, allowing for improved streaming video for customers. According to a brief statement, “We have reached an interconnect arrangement with Verizon that we hope will improve performance for our joint customers over the coming months.” The announcement mirrors a similar peering deal inked earlier this year made by Netflix and Comcast, and likely won’t be the last of its kind.

For a content company such as Netflix, paying an ISP like Comcast for interconnection is not the same as paying for Internet transit. Transit networks like Level3, XO, Cogent and Tata perform two important services: (1) they carry traffic over long distances and (2) they provide access to every network on the global Internet. When Netflix connects directly to the Comcast network, Comcast is not providing either of the services typically provided by transit networks.

– Thanks for Supporting Unfilter –

*– Mark R

  • Thanks to our 378 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Ukraine

Ukrainian President Says Security Forces ‘Helpless’ Against Militias in East – NYTimes.com

As pro-Russian gunmen seized another city in eastern Ukraine on Wednesday, the country’s acting president said that the government’s police and security officials were “helpless” to control events in large swaths of the region, where at least a dozen cities are now in the hands of separatists.

With the admission by the country’s acting leader, Oleksandr V. Turchynov, that major chunks of the country had slipped from the government’s grasp, the long-simmering conflict in Ukraine seemed to enter a new and more dangerous phase.

Kerry: U.S. Taped Moscow’s Calls to Its Ukraine Spies

Recording “Obtained” by the Daily Beast

The United States has proof that the Russian government in Moscow is running a network of spies inside eastern Ukraine because the U.S. government has recordings of their conversations, Secretary of State John Kerry said in a closed-door meeting Friday.

“Intel is producing taped conversations of intelligence operatives taking their orders from Moscow and everybody can tell the difference in the accents, in the idioms, in the language. We know exactly who’s giving those orders, we know where they are coming from,” Kerry said at a private meeting of the Trilateral Commission in Washington. A recording of Kerry’s remarks was obtained by The Daily Beast.

Senate Republicans are pressing the Obama administration to do more to help Ukraine and hurt Russia and are introducing a new bill that would provide for weapons, sanctions, and more aid.

Russia’s foreign exchange reserves were drained of a record $63 billion in the first quarter of the year, Economic Development Minister Alexei Ulyukayev said Wednesday in an address to the lower house of the parliament.
If that pace continues, losses this year would surpass the $120 billion Russia lost in 2008 at the height of the global recession.

Last year, Russia’s economy grew 1.3 percent, its weakest rate in the past 13 years with the exception of 2009, when the country suffered in the global downturn. The growth slowed further this year as investors pulled money out of the county amid concerns over Russia’s policy in Ukraine.


Supreme Court Considers Limits On Warrantless Cellphone Searches

At Tuesday’s Supreme Court argument, Riley’s lawyer, Jeffrey Fisher, told the justices that the Founding Fathers never intended to allow such wide-ranging searches without a warrant. The warrantless search at the time of arrest, he noted, was to protect the officer’s safety and to prevent the destruction of evidence.

This morning, I attended the Supreme Court arguments in the cell phone search cases, United States v. Wurie and Riley v. California. Here are some initial impressions of the argument


Weed Wackers:

Colorado eyes regulating marijuana edibles serving size after two deaths

Two recent Colorado deaths have been associated with legal edible marijuana products, and state regulators may now step in to better regulate portion sizes.

A 19-year-old student visiting the state on spring break jumped to his death off of a hotel balcony in March after eating 65mg of THC in a pot cookie. In April, a 47-year-old man fatally shot his wife in the head while high from candy marijuana edibles.

Ten milligrams of THC is considered a serving size of the drug, but Colorado has no requirement that edibles be packaged in single servings, at least for now.

10mg of THC is considered roughly equivalent to the amount in a medium-sized joint.

In Washington state, where retail sales don’t begin until July, edible pot products will have the same 10mg serving size, with a maximum of 10 servings per package, said Brian Smith of the Washington State Liquor Control Board, which is regulating recreational pot sales.

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Net Neutrality Doomed | Unfilter 95 first appeared on Jupiter Broadcasting.

]]>
Phreaking 3G | TechSNAP 14 https://original.jupiterbroadcasting.net/10246/phreaking-3g-techsnap-14/ Thu, 14 Jul 2011 21:38:23 +0000 https://original.jupiterbroadcasting.net/?p=10246 We’ll cover a story that really drives home how serious cell phone hijacking has gotten, and what new technology just made it a lot easier for the bad guys.

The post Phreaking 3G | TechSNAP 14 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Coming up on This Week’s TechSNAP!

We’ll cover a story that really drives home how serious cell phone hijacking has gotten, and what new technology just made it a lot easier for the bad guys.

Plus find out why TrendJacking is more than a stupid buzz term, and we load up on a whole batch of audience questions!

All that and more, on this week’s TechSNAP!

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

[ad#shownotes]

Show Notes:

Thanks to the TechSNAP Redditors!

Vodaphone SureSignal appliance rooted by THC

  • Vodaphone sells a 3G Signal Boosting appliance for home users to boost mobile reception in their homes. The device sells for 160GBP ($260 USD)
  • The FemtoCell or SureSignal appliance connects to the VodaPhone network via your home internet connections, and relays mobile phone signals
  • The Hackers Choice (THC, developers of the well known hacking tool Hydra) managed to reserve engineer the device and brute force the root password. THC has been actively working on exploiting various devices of this nature since 2009
  • Once compromised, the device can be turned in to a full blown 3G/UMTC/WCDMA call interception device.
  • The FemtoCell uses the internet connection to retrieve the private key of the handset that is attempting to use the cell, in order to create an encrypted connection.
  • In it’s intended mode of operation, the FemtoCell can only be used by the person who purchased it
  • The FemtoCell has a limited range of about 50 meters (165 feet)
  • With a rooted device, an attacker can get the secret key of any Vodaphone Subscriber
  • With a users secret key, you can decrypt their phone calls (if they are within range), but also masquerade as their phone, and make calls at the victims expense.
  • This attack also grants you access to the victims voicemail
  • The root password on the Vodaphone device was ‘newsys’
  • Some question whether Vodaphone should be held liable for not protecting their customers
  • Quote from THC “Who is liable if the brakes on my car malfunction? The drive or the manufacture? Or the guys who tell us how insecure they are?”
    THC Wiki page on the Vodaphone device, includes Diagrams

Fake Facebook App promises invites to Google+ to steal your info

  • When you visit the unofficial page for Google+ on Facebook, you are invited to allow the 3rd party app to access your facebook account (common requirement to use any facebook app)
  • Specifically, this app requests access to post on your wall, allowing it to spam all of your friends, inviting them to join as well. It also requests access to all of your personal data
  • You are then requested to ‘Like’ the app, and then invite all of your friends (Again, this is common with many Facebook apps, especially games, where inviting your friends can offer in-game rewards)
  • Your friends then accept the invite, assuming it is legitimate because it came from you
  • Now this application has managed to spread wildly and has complete access to your facebook profile, allowing it to scrape all of your personal information, as well as use your account to promote further fake and malicious applications.
  • You need to watch what applications you are allowing access to your profile, and specifically which rights they are requesting. Does that game really need ‘access to your data at any time’, rather than only when you are using it? Do you trust it with access to post to your wall?
  • This trend has been dubbed TrendJacking

Feedback


Q: (Peter) While investigating different data centers to house our application, one of them mentioned that we should use physical servers to host our database, rather than hosting the database in virtualization like vmware. This this true?

A: There are a number of reasons that a physical server is better for a database. The first is pure I/O. In virtualization, there is always some level of overhead in accessing the physical storage medium, compared to doing it natively. There is also an overhead even with hardware virtualization for CPU cycles, Disk Access, Network Access, etc. In it generally considered best practise to keep your database on physical hardware. That doesn’t mean you can’t virtualize it, but if you are worried about performance, I wouldn’t.


Q: (nikkor_f64) In the recent ‘usage based billing’ legal battles in Canada, the smaller ISPs are proposing to use 95th Percentile Billing, what is that?
A: 95th Percentile billing is the way most carrier grade Internet connections have been billed for as long as I have been in the business. The concept is quite simple, rather then charging the subscriber for the amount of bandwidth that they use, such as pricing per gigabyte, the billing is based on peak usage. Typically, the rate of data up and down the link is measured every 5 minutes (routers count every bit as it goes though, but looking at that counter every 5 minutes, and subtracting the value from 5 minutes ago, you can determine the average speed for the last 5 minutes). Then, as the name suggests, you take the 95th percentile of those values. This is done by sorting the list of measurements, then deleting the top 5%, the highest measurement left, is the 95th percentile, and you pay for that much bandwidth. Some might argue, but that is more than I actually used, my average was far less than that. The key to why this system works, is that it charges the subscriber for the peak amount of bandwidth they used, save for a small grace. This allows the ISP to properly budget for the capacity they need to serve that customer. Normally, your contract will be something like: a 5 megabit/second commitment, with 100megabit burstable. This means you have a full 100/100 megabit connection, and you will pay for 5 megabits/second minimum at a fixed price. You will also be quoted a price for ‘overage’. If your 95th percentile is over 5 megabits, you pay the overage rate per megabit that you are over. You get a lower per megabit rate on your commitment level, but that is a minimum, you have to buy at least that much each month, even if you don’t use it, but the more you buy, the cheaper it is. So, this means that during peak periods, you can use the full 100 megabits, without having to pay extra, as long as your 95th percentile stays below 5 megabits. (5% of a month is about 36 hours, meaning you get the busiest 1 hour of each day, for free)


Q: (Justin) What would be the weaknesses of using GPG to encrypt my files before storing them in the cloud.
A: There are a few issues:
1. Key Security – You need to keep the keys safe, if they fall in to the wrong hands, then your data is no longer secure.
2. Key Management – You also have to have access to the key, where ever you are, in order to access your data. Unlike data that is protected with a simple passphrase, in order to access your data, you need the key. So if you are on your mobile, and you need access to your data, how do you get access to your key? If you store a copy of your key on the mobile, is it secure? Also, if your key is lost or destroyed, then there is no way to access your data, so you have to safely back it up.
3. Key Lifecycle – How often should you change your key? How many different keys should you use? If you use multiple keys, less data is compromised in the event that one of your keys is exposed, but it also complicates Key Security and Key Management.
4. Speed – Asymmetric encryption, such as GPG is far slower than symmetric encryption algorithms like AES. This is especially true with the newer Intel i7 processors having a specific AES instruction set that increases performance by about 8 times. This is way sometimes, you will see a system, where the data is encrypted with AES, and then the key for the AES is then encrypted with GPG. Giving you a hybrid, the strength of GPG with the speed of AES.
5. Incremental Changes –


Round-Up:

Bitcoin Blaster:

Download & Comment:

The post Phreaking 3G | TechSNAP 14 first appeared on Jupiter Broadcasting.

]]>