COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED X-Frame-Options: SAMEORIGIN

COMPUTERS/INTERNET/SECURITY

May 18 12:49

Breaking — Colonial Pipeline suffers ‘network outage’…

Colonial Pipeline, the nation’s biggest fuel system that has been working to restart since being hacked two weeks ago, is experiencing network issues that leave customers unable to access their fuel shipments.

The system that allows customers to reserve space on the line, make changes to their batches or receive updates on fuel traveling through the system has been inaccessible as of Tuesday morning, according to shippers, asking not to be identified because the information isn’t public. The pipeline appears to still be operating despite the communication outage, the shippers said.

In a subsequent notice to shippers, Colonial said “it is currently experiencing network issues impacting customers’ ability to enter and update nominations,” and that it is working to restore service. Shippers on the pipeline use a third party communication system known as Transport 4 to access Colonial’s network daily to ensure timely receipts and shipments of various grades of fuel.

May 18 00:53

DuckDuckGo, Firefox & GitHub say ‘no Flocing way’ to Google’s privacy updates

Google’s proposed method for tracking and targeting consumers without third-party cookies is being met with a growing chorus of dissent. Within the past month, a who’s who of tech players – including DuckDuckGo, GitHub and Mozilla Firefox – have vowed to block Google’s Floc API. Here’s what it means for marketers who are searching for answers.

DuckDuckGo has long been a staple of the paranoid and the privacy-obsessed. The search engine enables users to surpass the personalized search results filter employed by most major search engines. So the fact that DuckDuckGo added a tool to its Chrome extension designed to block Google’s latest update – which is meant to enable targeted advertising – may not come as a surprise. Brave, another privacy-centric browser, was also quick out of the gate to thwart Google’s changes last month.

May 17 13:27

Almost Every Wi-Fi Device Affected by Flaw Dating Back to 1997; “…any vulnerabilities that affect virtually all devices are important.”

By B.N. Frank

There have been countless horrifying news stories about hackers breaking into baby monitors, security cameras, and systems, “Smart” home assistants, smartphones, and more.

Privacy and security experts continue to warn about vulnerabilities with ALL wireless-connected devices and technologyincluding 5G and Internet of Things (IoT).

Safer and more secure internet access can be achieved with a hard-wired internet connection. Those who choose to use Wi-Fi anyway are putting their privacy, safety, and health at risk as well as their families’. A university researcher recently made public a flaw that’s existed since 1997...

May 17 11:31

Cloudflare says it’s time to end CAPTCHA ‘madness’, launches new security key-based replacement

loudflare, which you may know as a provider of DNS services or the company telling you why the website you clicked on won’t load, wants to replace the “madness” of CAPTCHAs across the web with an entirely new system.

CAPTCHAs are those tests you have to take, often when trying to log into a service, that ask you to click images of things like busses or crosswalks or bicycles to prove that you’re a human. (CAPTCHA, if you didn’t know, stands for “Completely Automated Public Turing test to tell Computers and Humans Apart.”) The problem is, they add a lot of friction to using the web and can sometimes be difficult to solve — I’m sure I’m not the only person who has frustratingly failed a CAPTCHA because I didn’t see that corner of a crosswalk in one image.

CRYPTOGRAPHIC ATTESTATION OF PERSONHOOD

May 17 11:30

The bizarre story of the inventor of ransomware

Eddy Willems was working for an insurance company in Belgium back in December 1989 when he popped the floppy disc into his computer.

The disc was one of 20,000 sent in the mail to attendees of the World Health Organization's AIDS conference in Stockholm, and Willems' boss had asked him to check what was on it.

Willems was expecting to see medical research when the disc's contents loaded. Instead he became a victim of the first act of ransomware — more than 30 years before the ransomware attack on the US Colonial Pipeline ignited a gas shortage in parts of the US last week.

A few days after inserting the disc, Willems' computer locked and a message appeared demanding that he send $189 in an envelope to a PO Box in Panama. "I didn't pay the ransom or lose any data because I figured out how to reverse the situation," he told CNN Business.

He was one of the lucky ones: Some people lost their life's work.

May 17 10:58

Gas Shortages and Simulations

By Matt

It makes perfect sense that those in both the public and private sectors spend time training for a crisis; it is better to be prepared than unprepared. But what happens when the ones doing the preparing also have the most to gain from the disaster?...

May 16 12:21

Chicago Cops Use Asset Forfeiture Funds to Buy Drones “Off the Books”

By Mike Maharrey

Asset forfeiture funds help build the ever-growing national surveillance state.

Civil asset forfeiture is a pernicious policy in its own right. It is nothing more than legalized, institutionalized, government-sanctioned theft. Forfeiture laws flip due process on its head and create perverse “policing for profit” incentives.

On top of that, we have long suspected that police departments use forfeiture money to secretly purchase surveillance technology. Recent Chicago Police Department emails obtained from a trove of hacked documents prove this happens, revealing that cops used asset forfeiture money to buy drones off the books with no oversight or accountability...

May 16 10:14

Apple's tiny new gadget turns nightmare, -hacker breaks reveals it can be used to Spy on us

Keep losing your keys? There’s an Apple device for that: the new AirTags, which can be attached to things you frequently lose so you can find them easily.

“AirTag is a supereasy way to keep track of your stuff,” Apple’s website reads.

“Attach one to your keys, slip another in your backpack. And just like that, they’re on your radar in the Find My app, where you can also track down your Apple devices and keep up with friends and family.”

According to Apple’s website, the $30 tag “sends out a secure Bluetooth signal that can be detected by nearby devices in the Find My network. These devices send the location of your AirTag to iCloud — then you can go to the Find My app and see it on a map. The whole process is anonymous and encrypted to protect your privacy. And it?s efficient, so there?s no need to worry about battery life or data usage.”

Unfortunately, that’s not quite the only thing the AirTag can do, as Vice’s Motherboard noted in a Thursday story.

May 16 10:00

"I Upended My Life For Apple": Newly-Hired Engineer Livid After Woke Witch-Hunt Gets Him Fired

A former Facebook project manager, author, and journalist who uprooted his life in Washington to take a job with Apple is livid, after a woke mob of employees circulated a petition demanding his ouster over controversial statements from a book he wrote five years ago.

The petition took aim at Cuban-American Antonio García Martínez over his book, Chaos Monkeys (dedicated to "all my enemies") - an autobiography which traces his journey from Wall Street to Silicon Valley. Martínez has described the book as "total Hunter S. Thompson/Gonzo mode."

According to woke Apple employees, it's both racist and sexist. And of course, when it comes to Silicon Valley, divergent opinions need not apply. Except, he did apply, and was hired - despite Apple being "well aware" of his writing, according to a pissed-off Martinez.

May 16 06:14

Factbox: DarkSide hackers in focus after Toshiba attack

A unit of Japan's Toshiba Corp (6502.T) said on Friday it had been hacked in Europe by the DarkSide ransomware group widely believed to have been behind a crippling fuel pipeline attack in the United States this week. read more

WHO ARE DARKSIDE?

Experts who have tracked DarkSide said it emerged in the middle of last year and appears to be composed of veteran cybercriminals who are focused on squeezing as much money as they can from targets.

"They're very new but they're very organized," Lior Div, the chief executive of Boston-based security firm Cybereason, said this week when asked about the Colonial Pipeline attack.

"It looks like someone who's been there, done that."

May 16 06:11

Hacker attack shuts down IT system of Ireland’s health services, badly affecting one of Europe’s busiest maternity hospitals

Ireland’s health service has temporarily shut down all of its IT systems due to a “significant ransomware attack,” and one of Europe’s busiest maternity hospitals is badly affected as most appointments have been canceled.

The Health Service Executive (HSE) took to Twitter on Friday to announce a “significant ransomware attack” on its IT systems. The HSE says it has taken the precaution of shutting down all of its IT systems in order to protect them and to be able to fully assess the situation.

May 15 05:45

Israel is deliberately obliterating media buildings in Gaza to cover up the war crimes that will follow

The destruction of two important Gaza buildings housing 20 media outlets was both shocking and predictable. History shows that if the media aren’t around to document Israel’s war crimes, it’s a lot easier for it to commit them.
On Tuesday, Israel bombed the 10-storey Al-Jawhara Tower, causing it to collapse. Before doing so, it had ‘benevolently’ warned that the airstrikes were coming. The following day, it bombed the 14-storey Al-Shorouk Tower, also giving warning it was going to do so.

Most reports have the buildings as evacuated before being levelled. But without these media offices, reporting on Israel’s other war crimes will be left largely to what little media remain and citizen journalists.

May 15 03:46

Intel Uses Machine Learning To Make GTA’s Graphics Look Scarily Photorealistic

GTA 5’s graphics are decent and it looks good considering how old the game is, but we would never ever call it realistic-looking, but that might not be a bad thing. That being said, if you’ve ever wondered what a game like GTA could look like had it been developed with photorealistic graphics in mind, then you’re in luck.
This is because thanks to researchers at Intel Labs, they have decided to try and apply machine learning techniques to rendered footage from a console game, like GTA, and make it photorealistic. The end results can be seen in the video above, and we can tell you that it looks pretty damn real.

May 14 19:01

Victory! California City Drops Lawsuit Accusing Journalists of Violating Computer Crime Law

By Aaron Mackey

The City of Fullerton, California has abandoned a lawsuit against two bloggers and a local website. The suit dangerously sought to expand California’s computer crime law in a way that threatened investigative reporting and everyday internet use.

The city’s lawsuit against the bloggers and the website Friends For Fullerton’s Future alleged, in part, that the bloggers violated the California Comprehensive Computer Data Access and Fraud Act because they improperly accessed non-public government records on the city’s file-sharing service that it used to disclose public records. But the settlement agreement between the city and bloggers shows those allegations lacked merit and badly misrepresented the city’s online security practices. It also vindicates the bloggers, who the city targeted for doing basic journalism...

May 14 18:52

FDA Warns Cell Phones and Smart Watches Can Affect Medical Implants, Pacemakers, and Defibrillators

By B.N. Frank

There have been expert warnings about medical implants being vulnerable to cyberattacks and hacking. There have also been warnings (including by Apple) that people with pacemakers and other medical implants should NOT hold or charge Apple iPhones too close to their bodies.

The Food and Drug Administration (FDA) has now issued a warning that cell phones as well as smart watches are capable of messing with medical devices...

May 14 14:52

Hacked police data reveal Boogaloo Boy ‘target’ list on eve of Biden inauguration

A document from Washington, D.C.’s Metropolitan Police Department leaked by cybercriminals details the FBI’s concerns over two extremist groups in the wake of the Jan. 6 riot at the Capito

The Babuk ransomware gang on Thursday released a large cache of files it had stolen after attempts to extort the department for $4 million fell through.

As reported by the Daily Dot on Tuesday, alleged screenshots of the group’s negotiations with police showed the department offering $100,000 in an effort to keep Babuk from releasing their files.

In their Thursday post on the dark web, the group, which released 250GB of data in total, criticized police for refusing to agree to their terms.

One folder from the cache of documents details a Jan. 18 briefing at the FBI Command Post that centered on concerns over the Boogaloo Boys, an anti-government militia group.

May 14 12:46

Use this free tool to find all the pictures of you lurking on the web

This just in: You don’t own your face. Sure, technically, no one can copyright your face. But you can’t stop shady companies from selling your features for identification purposes.

As creepy as it sounds, companies can make millions of bucks by throwing you into their enormous facial recognition databases. Just look at Clearview AI, which can identify people based on a single selfie. Now worth $109 million, the company works with government agencies as well as businesses.

Tap or click here to find out how this app can find your address with just a photo of your face. When it comes to Clearview AI, there’s one silver lining: It’s not public, which means you don’t have to worry about every Tom, Dick or Harry stalking you throughout the internet. Unfortunately, another tool has hit the scene, and it’s 100% free.

May 14 12:22

DarkSide Ransomware Gang Quits After Servers, Bitcoin Stash Seized

The DarkSide ransomware affiliate program responsible for the six-day outage at Colonial Pipeline this week that led to fuel shortages and price spikes across the country is running for the hills. The crime gang announced it was closing up shop after its servers were seized and someone drained the cryptocurrency from an account the group uses to pay affiliates.

“Servers were seized (country not named), money of advertisers and founders was transferred to an unknown account,” reads a message from a cybercrime forum reposted to the Russian OSINT Telegram channel.

May 14 11:18

DarkSide, Hacking Group Linked to Colonial Pipeline Attack, Says It Is Closing

The criminal group linked to a cyberattack that disrupted gasoline delivery across parts of the southeastern U.S. this week has told hacking associates that it is shutting down, according to security research firms.

A website operated by ransomware group DarkSide, which U.S. officials have said is believed to originate in Eastern Europe, has been down since Thursday.

DarkSide has told associates it has lost access to the infrastructure it uses to run its operation and would be shutting down, citing pressure from law enforcement and from the U.S., according to security firms FireEye and Intel 471. DarkSide didn’t respond to requests for comment earlier in the week made through its web site before it was shut down.

May 14 10:07

Cybersecurity tycoon Kaspersky claims CIA hackers could actually be behind US Colonial Pipeline attack blamed on Russian group

A cyberattack that crippled fuel supplies on the East Coast of the US and sent gas prices soaring could have been an inside job conducted by American spooks, rather than foreign hackers, a prominent Russian IT expert has claimed.

After a massive systems failure caused the Colonial Pipeline to shut down, Natalya Kaspersky, the founder and former CEO of security software firm Kaspersky Lab, as well as one of Russia’s wealthiest women, made the explosive suggestions in an interview with RIA Novosti on Friday. She alleges that the US’ top foreign intelligence agency, the CIA, has a crack team of digital warriors who are able to masquerade as overseas hacking groups.

May 14 09:37

Hackers Used Fake GPU Overclocking Software to Push Malware

Computer hardware maker MSI is warning gamers not to visit a website that's impersonating the brand and its graphics card overclocking software, Afterburner, to push malware.

On Thursday, MSI published a press release warning of "a malicious software being disguised as the official MSI Afterburner."

"The malicious software is being unlawfully hosted on a suspicious website impersonating as MSI’s official website with the domain name https://afterburner-msi[.]space," the company wrote. "MSI has no relation with this website or the aforementioned domain."

May 14 09:36

Apple is working on crazy new iPhone tech that displays 3D images without special glasses

In light of the above, it may not come as a surprise that Apple has been exploring new display technology capable of offering up an AR-inspired experience without the need for a headset or specialized glasses.

In a recently granted patent titled Split-Screen Driving of Electronic Device Displays, which was initially spotted by AppleInsider, we learn that Apple has been looking at displays capable of showing users a 3D image without the need for any type of accessory.

It certainly sounds like magic and, in turn, even Apple concedes that pulling this type of technology without specialized lenses is fraught with technical hurdles.

“It can be difficult to provide this type of content on a multi-function device such as a smartphone or a tablet,” the patent reads in part, “without generating visible artifacts such as motion blur, luminance offsets, or other effects which can be unpleasant or even dizzying to a viewer.”

May 14 08:21

Flashback: Prepping for a cyber pandemic: Cyber Polygon 2021 to stage supply chain attack simulation

The World Economic Forum (WEF) will stage another cyber attack exercise as it continues to prep for a potential cyber pandemic that founder Klaus Schwab says will be worse than the current global crisis.

May 14 08:20

Ireland's healthcare system is paralysed, with hospital appointments cancelled as hackers carry out possibly the biggest ever cyber crime against the state and officials await ransom demand

The attack comes just one week after a fuel network in the US had to shut down its systems until a $5million ransom was reportedly paid.

The Irish attack was blamed on international criminals and was said to be targeting healthcare records, but officials said patient safety was not at risk.

'We have taken the precaution of shutting down all our IT systems in order to protect them from this attack and to allow us (to) fully assess the situation with our own security partners,' the Health Service Executive (HSE) said.

May 13 12:14

The Dystopian Future in Which Almost No One Owns a Car

Op-Ed by Zachary Yost

By this point readers are more than familiar with the previously unthinkable infringements on our traditional rights and liberties due to “health and safety” lockdowns that the state has inflicted upon us over the last year. While thankfully more and more restrictions are being lifted, it is important not to forget the period of veritable universal house arrest that was enacted in many states, in which even the freedom to go for a drive was denied to us. It unfortunately seems inevitable that we will face such scenarios again when a convenient excuse comes along, though I fear that the next time will be even worse thanks to the advent of self-driving cars...

May 13 10:02

Colonial Pipeline paid hackers nearly $5 million in ransom, sources say

Colonial Pipeline Co. paid nearly $5 million to Eastern European hackers on Friday, contradicting reports earlier this week that the company had no intention of paying an extortion fee to help restore the country’s largest fuel pipeline, according to two people familiar with the transaction.

The company paid the hefty ransom in untraceable cryptocurrency within hours after the attack, underscoring the immense pressure faced by the Georgia-based operator to get gasoline and jet fuel flowing again to major cities along the East Coast, those people said. A third person familiar with the situation said U.S. government officials are aware that Colonial made the payment.

Once they received the payment, the hackers provided the operator with a decrypting tool to restore its disabled computer network. The tool was so slow that the company continued using its own backups to help restore the system, one of the people familiar with the company’s efforts said.

May 13 06:35

Southern States Out Of Fuel-Thousands Stuck

Gas stations across the East Coast are beginning to run out of fuel as one of the biggest petroleum pipelines fights to recover from a cyberattack.

The operator of the country’s largest fuel pipeline, Colonial Pipeline, fell victim to a cybersecurity attack on Friday that involved ransomware, forcing it to temporarily shut down all pipeline operations and raising concern that the outage could lead to spot shortages of gas, diesel and jet fuel.

May 13 06:15

WOW! Same FBI that Pushed Trump-Russia Hoax for 3 YEARS then Exaggerated Russia 2020 Election Threat — NOW Blames Russia for Pipeline Hack

‘The Russians did it’ is still alive and well at the FBI and DOJ.

The corrupt and dishonest FBI began illegally spying on Candidate Trump in early 2016 and then spied on his administration.

They based it all on a lie that Trump was colluding with Vlad Putin to steal the US election.

They knew this was a lie.

This went on for years.

There was NEVER ONE SINGLE lead by the FBI telling the truth to the press that the Russia hoax was all a lie.

The corrupt and dishonest Chris Wray FBI then suggested that Russia was behind crackhead Hunter Biden’s leaked emails from his laptop that he left at a computer store in a blackout.

May 13 03:22

The highly anticipated quantum internet breakthrough is finally here. Is this the end of 5G?

We’ve all heard about 5G, the 5th generation mobile. According to wireless industry group GSMA, 5G is expected to be at least 10 times faster than the fastest 4G networks, with peak data rates of up to 10 gigabytes per second. But what about if it is possible to transmit data faster than the speed of light? Welcome to the world of a quantum internet.

About a year ago, we wrote about the US Department of Energy’s (DoE) new project aimed at laying a new foundation for quantum internet in the US after 60 years of the U.S. Defense Advanced Research Projects Agency (DARPA) in 1973. You can read about it here.

However, this quantum technology startup QphoX and Delft University spinout may probably be ahead of the DOE and the vision for quantum internet is now closer to becoming a reality. QphoX is working to commercialize a quantum modem that can link quantum machines into superfast networks. QphoX is the first company to take quantum transduction beyond university labs.

May 12 12:51

'Do whatever you want': Software to manipulate totals found on voting machines, lawyer says

A lawyer fighting an election-fraud case in Antrim County, Michigan, has revealed that the voting machines there contained a software program that could have been used to manipulate vote totals.

In fact, lawyer Matthew DePerno said in a podcast interview that with the MySQL program installed on the machines, and them all being linked, someone with access could "do whatever you want."

DePerno, just a day earlier confirmed in a court hearing that there were 1,061 "phantom votes" in the county during the 2020 presidential election, because while a recount of ballots tallied 15,962, the Michigan secretary of state's database showed only 14,901 votes were cast.

His latest concerns were raised during an interview with JD Rucker at the NOQ Report.

May 12 11:21

All Wi-Fi devices impacted by new FragAttacks vulnerabilities

Newly discovered Wi-Fi security vulnerabilities collectively known as FragAttacks (fragmentation and aggregation attacks) are impacting all Wi-Fi devices (including computers, smartphones, and smart devices) going back as far as 1997.

Three of these bugs are Wi-Fi 802.11 standard design flaws in the frame aggregation and frame fragmentation functionalities affecting most devices, while others are programing mistakes in Wi-Fi products.

"Experiments indicate that every Wi-Fi product is affected by at least one vulnerability and that most products are affected by several vulnerabilities," security researcher Mathy Vanhoef (New York University Abu Dhabi), who discovered the FragAttacks bugs, said.

May 12 11:13

Billions of devices vulnerable to Wi-Fi 'FragAttacks' — what to do

Up to a dozen serious security flaws affect almost all Wi-Fi-enabled devices, including PCs, Mac, iPhones, Android phones, most routers and smart-home devices, says a Belgian security researcher. You'll want to update Windows straight away; most other devices will have to wait for patches.

Mathy Vanhoef, who in 2017 co-discovered the widespread KRACK flaws in Wi-Fi, groups these 12 new flaws under the name "FragAttacks." He's put an impressive amount of documentation online to explain the flaws, including a dedicated FragAttacks website, an academic research paper, a presentation slideshow, two YouTube videos and a software tool to detect vulnerable devices.

Simply put, the FragAttacks, some of which date back to the first version of Wi-Fi in 1997, let nearby devices "within radio range" attack your Wi-Fi network to steal information and send devices to bad places online.

May 12 10:35

Did The NSA Create Bitcoin?

Op-Ed by Insight History

The mysterious origins of Bitcoin have led to endless theories pertaining to who Satoshi Nakamoto actually is. One prominent theory, which is sometimes circulated in the liberty movement, is that Bitcoin is nothing more than a trojan horse of the establishment, designed to move people away from cash and gold, and towards digital currencies.

The basis for this argument tends to lean heavily on a paper written by three employees of the National Security Agency (NSA) Office of Information Security Research and Technology, Cryptology Division, in June 1996. The paper was titled: How to Make a Mint: The Cryptography of Anonymous Electronic Cash...

May 12 08:20

China sentences bank computer hackers to death

China has sentenced two computer hackers to death to deter the growth of computer crime.

The sentence was imposed on the brothers Hao Jinlong and Hao Jingwen, who hacked their way into a state-owned bank and transferred money into secret accounts. One of the brothers was a bank accountant.

The judge in Zhenjian, Jiangsu province, said that hacking was a new form of crime and should not be treated lightly, according to a report in the Legal Daily.

The total sum they obtained was 260,000 Renminbi (£21,500). Although a large sum by Chinese standards, the sentence is unusually severe.

China has shown increasing concern about loopholes in its computer systems, which are being exploited both by political dissidents and for financial fraud.

Webmaster's Commentary: 

Sounds reasonable!

May 12 08:00

WhatsApp Explains What Will Happen if You Reject Its New Privacy Policy

It's been all over the news recently. WhatsApp is making a controversial change to its privacy policy, and many people aren't happy about it. However, WhatsApp has now explained what will happen to your account if you don't accept the new privacy policy.

How WhatsApp Will Limit Accounts That Don't Accept Its New Privacy Policy

WhatsApp recently updated its FAQ page with an entry regarding what will happen to users who don't accept the new privacy policy. After a period of several weeks from the acceptance date, May 15, users will see the notification to accept the new privacy policy become persistent.

Once the notification becomes persistent, users will lose access to their chat list on the app. Essentially this means you'll lose most of the app's functionality. You will only be able to accept voice and video calls, call back, and reply to messages from the notifications. This means you won't be able to start conversations or make calls.

May 12 07:36

Head of US 'SWAT Team of Nerds' Steps Down After Mysterious IP Address Decision

The head of the Defence Digital Service (dubbed "SWAT Team of Nerds" by its own members) has succeeded in expanding the scope of his department's operations beyond simply solving IT problems for the Pentagon. However, this required him to cut through a tangle of red tape put in place by the department's bureaucracy.

The chief of the Pentagon's Defence Digital Service (DDS), Brett Goldstein, said in an interview with Politico that he will be stepping down in July 2021 after two years in the post.

Goldstein's term expires this year, but it is not unheard-of for the DDS chief's contract to be extended. However, for reasons unknown, Goldstein's contract has not been prolonged despite his achievements in the post. His replacement has also not been announced so far, but his deputy, Katie Olson, who focused on counter-drone operations and assembling the Department of Defence's collection of pathology specimens, will serve as acting chief.

May 12 07:27

Huawei’s ability to eavesdrop on Dutch mobile users is a wake-up call for the telecoms industry

Chinese technology provider Huawei was recently accused of being able to monitor all calls made using Dutch mobile operator KPN. The revelations are from a secret 2010 report made by consultancy firm Capgemini, which KPN commissioned to evaluate the risks of working with Huawei infrastructure.

While the full report on the issue has not been made public, journalists reporting on the story have outlined specific concerns that Huawei personnel in the Netherlands and China had access to security-essential parts of KPN’s network – including the call data of millions of Dutch citizens – and that a lack of records meant KPN couldn’t establish how often this happened.

Both KPN and Huawei have denied any impropriety, though in the years since the 2010 report, Huawei has increasingly found itself labelled a high-risk vendor for telecoms companies to work with, including by the UK’s National Cyber Security Centre.

May 12 07:19

The American Cyber Stasi Will Suppress All Digital Dissent In Biden's Dystopia

CNN's recent report that the US' security services are considering contracting the services of so-called “researchers” as a legal workaround for spying on average Americans confirms that Biden's dystopian hellhole is rapidly moving in the direction of establishing a “Cyber Stasi” for suppressing all digital dissent against the Democrats as they continuing consolidating their de facto one-party rule of the country.

May 12 06:34

How AI Will Soon Change Special Operations

When Gen. Richard D. Clarke was leading special operations forces in Afghanistan years ago, he spent 90 percent of his time thinking about moving and shooting — “the raid, the mission, the kill-capture mission, the destruction of enemy forces,” Clarke said last week at the annual SOFIC conference. But when he returned to Afghanistan last year as the commander of U.S. Special Operations Command, he found that U.S. leaders were focusing most of their mental energy on information.

Commanders now spend about 60 percent of their time mulling what the Taliban and the Afghan population are thinking, and how U.S. actions might influence that, Clarke said. “As we look at the info space and in our fight for competition...working in the information space can have the greatest impact in the coming years.”

May 12 06:31

Multiple states declare emergency, 1,000+ pumps run out of gas, as White House insists there’s NO ‘shortage’ & blames ‘hoarders’

Motorists and even airlines struggled to find fuel across the southeastern US due to the Colonial Pipeline cyberattack, but the Biden administration denied there was a “shortage” and blamed “hoarders” for the “supply crunch.”

Virginia and Florida declared a state of emergency on Tuesday, following North Carolina’s declaration the day before, as the disruption in pipeline operations led to over 1,000 gas stations across a dozen states running out of fuel, according to S&P’s Oil Price Information Service.

May 12 06:21

Florida, Virginia, Georgia and North Carolina declare states of emergency over gas shortages after Colonial Pipeline hack as 1,000 fuel stations run dry in Southeast as people panic buy

The governors of Florida, Virginia and Georgia all declared states of emergency Tuesday in a bid to protect fuel supplies, with some gas pumps already dry in Atlanta and other cities, as the impact from the Colonial Pipeline ransomware attack continues to ripple across the country - hitting the Southeast especially hard.

Panic buyers streamed into gas stations across the Southeast as the key pipeline that supplies the area was threatened by the attack.

More than 1,000 gas stations in the Southeast are now running out of fuel, according to S&P's Oil Price Information Service.

May 12 05:54

Prepping for a cyber pandemic: Cyber Polygon 2021 to stage supply chain attack simulation

The World Economic Forum (WEF) will stage another cyber attack exercise as it continues to prep for a potential cyber pandemic that founder Klaus Schwab says will be worse than the current global crisis.

The SolarWinds hack served as a wake-up call to the supply chain attack vulnerabilities still present in public and private organizations, and it served as a warning that the next breach could be exponentially worse in spreading through any device connected to the internet.

Following up on last year’s Cyber Polygon cyber attack exercise and event aimed at preventing a digital pandemic, the WEF has announced that the 2021 edition will be taking place on July 9.

“A cyber attack with COVID-like characteristics would spread faster and farther than any biological virus” — World Economic Forum

May 12 05:48

Ransomware gang says D.C. police won’t pay $4 million demand, begins leaking files

A group of cybercriminals have begun leaking what it claims to be internal law enforcement files after Washington, D.C.’s Metropolitan Police Department was targeted with ransomware last month.

In a post on the dark web Tuesday, the Babuk ransomware gang alleged that negotiations had “reached a dead end” after declining a payment offer made by police.

May 11 19:08

U.S. Legislators Concerned about China’s Efforts to Genetically Engineer “Super Soldiers”

By B.N. Frank

Americans have had various concerns about the Chinese government for decades. Earlier this week, Full Measure aired a segment that reveals more disturbing details about all of that and more. Of course, it’s not just the Chinese government that Americans have to worry about – this research is being explored in the West as well. Will we see a super soldier arms race? Just what the world needs…

May 11 12:47

Can you hack an AirTag? Absolutely, and this guy shows how

German hacker pulls apart AirTag, gets it to do bad things

Apple's new AirTags have been hacked — but not in any way that you need to worry about.

German hardware hacker Thomas Roth, aka GhidraNinja, posted on Twitter Saturday (May 8) that he had managed to extract, alter and reload an AirTag's firmware

When he put the AirTag in "Lost Mode" and pointed his iPhone at it, the phone's browser was sent to Roth's own website instead of Apple's Find My website.

Later, Roth changed it so that the hacked AirTag Rickrolled him:

What are the dangers of this AirTag hack?
There aren't many.

A criminal could possibly distribute "lost" AirTags that would send the iPhone browsers of random people who come across it to malicious websites, as SlashGear pointed out.

May 11 12:40

5 Reasons Why I’m Not On WhatsApp (and Why You Should Also Consider A Return To SMS)

I’ll admit it. Being off WhatsApp isn’t easy in 2021. I can imagine many readers are wondering how it’s even possible – especially given the fact that so many have experienced the entirity of their human interaction being mediated through a pane of handheld glass since the start of this decade. But for those of you who are curious as to whether it’s possible to live a fully functioning life off WhatsApp – I can assure you it is indeed – and there are some important reasons why it even might be a good idea.
What follows is my list of 5 principled reasons why it’s best to say ‘what’s up?’ anywhere but on WhatsApp:

1. Closed Protocol

My pet hate isn’t something that’s specific to WhatApp, and in many ways is the key contributor to it’s success – but the number 1 problem with so many apps is that they are protocols disguised as platforms.

May 11 09:21

Millions Of Public Transit “Touch ‘N Go” Smartphone Users Can Be Tracked By Law Enforcement

By MassPrivateI

As more and more people use their smartphones to pay for everyday items, public transit agencies are encouraging millions of Americans to use their phones as their primary means of paying their fares.

In New York City and elsewhere, police can use ‘touch ‘n go’ or ‘touchless fares’ to track millions of public transit users’ movements.

New York’s Metropolitan Transit Authority’s OMNY Executive Director Al Putre said that as of December 2020 there have been over 34 million taps...

May 11 08:21

Colonial Says Pipeline Segments Being "Brought Back Online", Goal Is For Service To Be "Substantially Restored" By End Of Week

With fears growing that the Colonial shutdown could last for much longer than initially expected, with some analysts warning that a 5-day shutdown could lead to sharply higher prices, and the Biden admin activating a state of emergency to make sure that critical gasoline supplies continue to flow up the eastern seaboard, moments ago Colonial Pipeline issued an update on its attempts to restore operations, saying that "segments of our pipeline are being brought back online in a stepwise fashion" and that the goal now is to "substantially" restore operational service by the end of the week.

Just out from the company:

Monday, May 10, 12:25 p.m.

May 11 07:50

Colonial Pipeline says one fuel line operating under manual control after cyber attack

Colonial Pipeline said its Line 4 fuel line, which runs from Greensboro, North Carolina, to Woodbine, Maryland, has been restarted and is operating under manual control for a limited time after a cyber attack shut the pipeline system Friday.

Line 4 will be operating for a limited period of time while existing inventory is available, the company said in a notice to shippers.

Colonial’s main gasoline and distillate lines continue to be offline after a ransomware cyberattack shut down the pipeline system, which carries nearly half the fuel consumed along the U.S. East Coast.

May 11 07:05

Newt Gingrich: Pipeline cyber attackers should be 'subject to death penalty'

May 11 06:53

RISC-V is trying to launch an open-hardware revolution

May 11 06:52

Gas Stations Run Dry as Pipeline Races to Recover From Hacking

Gas stations along the U.S. East Coast are beginning to run out of fuel as North America’s biggest petroleum pipeline races to recover from a paralyzing cyberattack that has kept it shut for days.

From Virginia to Florida and Alabama, stations are reporting that they’ve sold out of gasoline as supplies in the region dwindle and panic buying sets in. An estimated 7% of gas stations in Virginia were out of fuel as of late Monday, according to GasBuddy analyst Patrick DeHaan.

The White House said in a statement it is monitoring the situation and directing government agencies to help alleviate any shortages. Colonial Pipeline Co. said it’s manually operating a segment of the pipeline running from North Carolina to Maryland and expects to substantially restore all service by the weekend.

May 11 06:25

THE AMERICAN CYBER STASI WILL SUPPRESS ALL DIGITAL DISSENT IN BIDEN’S DYSTOPIA

The dystopian hellhole that I predicted would become a fait accompli following Biden’s confirmation as President by the Electoral College is quickly becoming a reality after CNN’s recent report that the US security services are considering contracting the services of so-called “researchers” as a legal workaround for spying on average Americans. CNN’s recent report that the US’ security services are considering contracting the services of so-called “researchers” as a legal workaround for spying on average Americans confirms that Biden’s dystopian hellhole is rapidly moving in the direction of establishing a “Cyber Stasi” for suppressing all digital dissent against the Democrats as they continuing consolidating their de facto one-party rule of the country.

According to the outlet, these ostensibly independent contractors would be charged with infiltrating the social media circles of white supremacists and other supposedly terrorist-inclined domestic forces within the country.

May 11 06:11

Biden says no evidence Russian government was involved in pipeline hack

Biden said that Putin still bears "some responsibility" to respond since DarkSide, a cybercrime gang the FBI says is responsible for the attack on a U.S. gasoline line.

May 11 06:08

FBI confirms cyberattack on US pipeline carried out by DarkSide

The cyberextortion attempt that has forced the shutdown of a vital United States pipeline was carried out by a criminal gang known as DarkSide, the Federal Bureau of Investigation (FBI) confirmed on Monday.

“The FBI confirms that the Darkside ransomware is responsible for the compromise of the Colonial Pipeline networks,” said a statement issued by the bureau. “We continue to work with the company and our government partners on the investigation.”

May 10 19:12

FDA: “Operation Quack Hack”: Medical Mafia vs. Medical Health Freedom Fighters

By Maryam Henein

“The past was erased, the erasure was forgotten, the lie became truth.” 1984, George Orwell

IRONY ALERT! “No form of human misery can be allowed to go unexploited, and the coronavirus pandemic is no exception.” WebMD

Under the guise of safety (read: control) and fueled by a narrative that COVID-19 is a pandemic devastating the world, the U.S. government has issued a veritable witch hunt against online health professionals and natural ancient remedies like silver, vitamin C, magnesium, and mineral salts (MMS).

Headed by the Food and Drug Administration (FDA), Operation Quack Hack is cyberstalking and softly terrorizing hundreds of doctors and health professionals who actually care about bolstering people’s health. And yes, “Operation Quack Hack” is the actual name the FDA has given this operation...

May 10 12:19

AAA on pipeline attack: gas price hikes, fuel shortages possible for these states

The national average for gas prices jumped 6 cents on the week to $2.96 and is poised to rise even higher in some areas due to Friday's cyberattack against Colonial Pipeline Co., according to the American Automobile Association.

Colonial Pipeline operates a 5,500-mile system taking fuel from the refineries of the Gulf Coast to the New York metro area.

The pipeline transports more than 100 million gallons a day, or roughly 45% of fuel consumed on the East Coast, according to the company's website. It delivers gasoline, diesel, jet fuel and heating oil and serves U.S. military facilities.

May 10 12:08

F.B.I. confirms group behind the hack of a top U.S. pipeline.

The F.B.I. on Monday confirmed that DarkSide, a hacking group, was responsible for the ransomware attack that closed a U.S. pipeline that provides the East Coast with nearly half of its gasoline and jet fuel.

The confirmation of the hack, which prompted emergency White House meetings over the weekend, comes as the Biden administration in the coming days is expected to announce an executive order to strengthen America’s cyberdefense infrastructure.

President Biden said on Monday that the government has mitigated any impact the pipeline hack might have on the U.S. fuel supply. He added that his administration has efforts underway to “disrupt and prosecute ransomware criminals.”

May 10 10:46

USDOT Declares Emergency Over Colonial Pipeline Shutdown - Waives Trucker Hours of Service Rules

The United States Department of Transportation, (DOT) and the Federal Motor Carrier Safety Administration have declared an emergency over the shut down of the Colonial Pipeline and waived trucker hours-of-service rules to transport fuel in 17 states.

May 10 10:45

DHS launches warning system to find domestic terrorism threats on public social media

The Department of Homeland Security has begun implementing a strategy to gather and analyze intelligence about security threats from public social media posts, DHS officials said.

The goal is to build a warning system to detect the sort of posts that appeared to predict an attack on the U.S. Capitol on Jan. 6 but were missed or ignored by law enforcement and intelligence agencies, the officials said.

The focus is not on the identity of the posters but rather on gleaning insights about potential security threats based on emerging narratives and grievances. So far, DHS is using human beings, not computer algorithms, to make sense of the data, the officials said.

"We're not looking at who are the individual posters," said a senior official involved in the effort. "We are looking at what narratives are resonating and spreading across platforms. From there you may be able to determine what are the potential targets you need to protect."

May 10 09:49

IS THE SHINE STARTING TO COME OFF BILL GATES’S HALO?

The billionaire’s role in perpetuating vaccine apartheid in the name of protecting intellectual property rights has begun to draw criticism.

May 10 08:13

Colonial Pipeline hack 'painful' for US: Gas analyst

May 10 07:42

Turn Over Routers Or Face Subpoenas, Arizona Lawmakers Tell Maricopa County

Legislators in Arizona and officials in the state’s largest county clashed anew this week over election audit subpoenas, with county officials refusing to hand over routers and claiming they do not have passwords to access administrative control functions of election machines.

Arizona’s Senate told Maricopa County on Friday that it would issue subpoenas for live testimony from the county’s Board of Supervisors unless it received the materials that are being withheld. “We’ve been asked to relay that the Senate views the County’s explanations on the router and passwords issues as inadequate and potentially incorrect,” a lawyer for the Senate said in an email to county officials.

The Arizona Senate subpoenaed a slew of election materials, such as ballots, following the 2020 election. Lawmakers also issued subpoenas for election machines, passwords, and other technology.

May 10 06:42

Maricopa County Elections Witness Testifies that Dominion Ran Entire Election – County Officials and Observers NEVER HAD Access or Passwords! (Video)

Back on November 30, 2020, Maricopa County elections witness Jan Bryant testified before the Arizona legislature.

Jan has a strong project management background. She could not believe what she witnessed during the 2020 election in Maricopa County, Arizona.

Jan said back on November 30, 2020, that Maricopa County officials DID NOT RUN THE ELECTION! Dominion employees John and Bruce did.

Jan’s testimony might explain why Maricopa County officials do not have Admin passwords or access to the Dominion voting machines.

May 10 06:05

US Declares State Of Emergency To Keep Gasoline Flowing After Colonial Fails To Restart Hacked Pipeline

Update 9:00pm ET: The US government declared a state of emergency late on Sunday, lifting limits on the transport of fuels by road in a bid to keep gas supply lines open as fears of shortages spiked after the continued shutdown of the Colonial Pipeline.

“This Declaration addresses the emergency conditions creating a need for immediate transportation of gasoline, diesel, jet fuel, and other refined petroleum products and provides necessary relief,” the Department of Transportation said. White House Press Sec Jen Psaki added that "as the Administration works to mitigate potential disruptions to supply as a result of the Colonial Pipeline incident, @USDOT is taking action today to allow flexibility for truckers in 17 states."

May 10 05:51

Clocks Ticking On Colonial Pipeline Restart: "After 72 Hours... It Gets Really Tough"

While cyber-attacks have disrupted the operations of other energy assets in the U.S. in recent years. this weekend's theft of Colonial’s data, coupled with the detonation of ransomware on the company’s computers, is by far the largest and most impactful.

As we detailed earlier, the hackers who caused Colonial Pipeline to shut down the biggest U.S. gasoline pipeline on Friday began their blitz against the company a day earlier, stealing a large amount of data before locking computers with ransomware and demanding payment, according to people familiar with the matter.

Bloomberg reports that the intruders are part of a cybercrime gang called DarkSide, took nearly 100 gigabytes of data out of the Alpharetta, Georgia-based company’s network in just two hours on Thursday, two people involved in Colonial’s investigation said.

May 10 05:29

Fears of gas price surge after 'DarkSide' cyber attack shuts Colonial Pipeline between Texas and NJ that carries 45% of East Coast fuel: Experts call it 'most significant assault on infrastructure to date in the US'

The largest gasoline pipeline in the country was shut down on Friday after a sophisticated ransomware attack, which experts are calling the most dramatic cyberattack on U.S. soil to date.

In a Saturday statement, Colonial Pipeline said that it 'proactively took certain systems offline to contain the threat, which has temporarily halted all pipeline operations, and affected some of our IT systems.'

The hackers are likely a professional cybercriminal group, and a group dubbed 'DarkSide' was among the potential suspects, two U.S. government officials told Reuters.

May 08 18:07

Emails Entered into Lawsuit Reveal Apple Management Decided NOT to Notify 128 Million iPhone Users of Hack

By B.N. Frank

Since 2019, Apple has known that its AirDrop feature has been leaking user information. Thanks to a lawsuit, millions of iPhone users are now learning their devices have also been compromised...

May 08 08:47

Your old phone number is a hacker's dream — what you need to know

If you've ever changed your mobile phone number, especially in the past few years, then you may have created a huge security and privacy risk for yourself.

That's because your old phone number creates a gateway for hackers, crooks and stalkers to take over your Google, Facebook, Amazon or Yahoo accounts, break into your online bank accounts and even stalk or blackmail you, Princeton researchers detailed in a new academic paper and related website.

This happens because many websites let you log in with a phone number instead of a user name, then let you reset the password by sending a text to the phone number.

In other cases, banks or other financial services send two-factor-authentication (2FA) codes to the mobile number, letting crooks who've obtained your email address and password from data breaches get into the account.

May 08 07:02

A Simple Experiment Demonstrates How Every Electronic Form of Communication Is Monitored and Weaponized by AI Against Americans

The sooner that most Americans stop denying reality, they will soon realize that we all are being tagged in order that most of us will be bagged. This story is provides examples of how this is the most true statement that you will read today. This article contains proof that all of are like cattle that are put on the scales which will eventually decide whether we live or die and on what day and in what order.

I always try to give credit where credit is due. Therefore, the credit goes to Bob Griswold of Readymaderesources.com In an early morning lengthy conversation with Bob, he told me to type ANY 3 numbers, along with the words, “NEW Cases” into my computer’s search engine. Please note, I chose the search engine that is most friendly to patriots, which is duck-duck-go.

May 07 09:47

Windows Defender bug fills Windows 10 boot drive with thousands of files

A Windows Defender bug creates thousands of small files that waste gigabytes of storage space on Windows 10 hard drives.

The bug started with Windows Defender antivirus engine 1.1.18100.5 and will cause the C:\ProgramData\Microsoft\Windows Defender\Scans\History\Store folder to be filled up with thousands of files with names that appear to be MD5 hashes.

May 07 09:46

Qualcomm vulnerability impacts nearly 40% of all mobile phones

A high severity security vulnerability found in Qualcomm's Mobile Station Modem (MSM) chips (including the latest 5G-capable versions) could enable attackers to access mobile phone users' text messages, call history, and listen in on their conversations.

Qualcomm MSM is a series of 2G, 3G, 4G, and 5G capable system on chips (SoCs) used in roughly 40% of mobile phones by multiple vendors, including Samsung, Google, LG, OnePlus, and Xiaomi.

"If exploited, the vulnerability would have allowed an attacker to use Android OS itself as an entry point to inject malicious and invisible code into phones," according to Check Point researchers who found the vulnerability tracked as CVE-2020-11292.

The security flaw could also enable attackers to unlock the subscriber identification module (SIM) used by mobile devices to store network authentication info and contact information securely.

May 07 09:43

Microsoft Edge crashes when watching full screen YouTube videos

A Microsoft Edge bug is causing the browser to become unresponsive and crash while watching YouTube videos or reading comments.

BleepingComputer has confirmed the bug on our machines, and it only takes a few seconds to trigger after a video starts.

In our tests, Microsoft Edge would become unresponsive when watching a video, and a circular loading graphic would appear. Eventually, the circular loading graphic will freeze, and the browser crashes, as shown below.

According to TechDows, who first reported on this issue, the crashes began after users upgraded to Microsoft Edge 90. In our tests, we are using Microsoft Edge 90.0.818.56.

May 07 08:05

Police Agencies Use Cars as Backdoors to Break Into Phones

Law enforcement has been struggling for years to find a way to unlock mobile devices used by suspects believed to be involved in criminal activities, with several officials, including FBI representatives, repeatedly calling for tech giants to step in and help break into password-protected devices.
The most famous case is the iPhone of the San Bernardino attacker, with the FBI publicly requesting Apple to unlock the device and help the investigators get past the passcode screen.

Apple refused to do so on national security claims, explaining that building such a backdoor would eventually compromise all of its devices, as the company said it would have been only a matter of time until such a solution landed in the wrong hands.

Since then, the police have been looking into all kinds of ways to access private data, and according to a report from The Intercept, the Customs and Border Protection officers have discovered one easy method to do the whole thing.

May 07 08:02

Google To Suddenly Flip The Security Switch On Millions Of Gmail Accounts

While the annual World Password Day event is quickly forgotten (it was May 6 if you missed it), it had one memorable moment courtesy of a seemingly unassuming Google blog post. Mark Risher, Google’s director of product management, identity and user security, wrote about password management. However, he also revealed a move that will suddenly make millions of Gmail accounts way more secur

This is where Google has stepped up to the plate this year and announced that it would “start automatically enrolling users in 2SV” or two-step verification which, in the cause of simplicity, can be thought of as the same thing as 2FA here. Although some of the 1.5 billion Gmail users will already have enabled 2FA, Google will make it the default for millions more.

May 07 06:50

Apple just issued this urgent warning to iPhone users and you need to read it

When Apple typically issues mid-cycle iOS updates, I don’t always update my iPhone immediately. Especially if the new update doesn’t address any serious security issues or have any compelling new features, I’ve never been in a rush to update my phone if things are already running smoothly. The recent release of iOS 14.5.1, however, is an exception and an update you’ll probably want to download as soon as possible.

Apple first released iOS 14.5 just about a week ago with a host of new features, including the company’s new App Tracking Transparency framework, new Siri voices, a multitude of new emojis, support for AirTags, and more. Just a few days later, Apple rolled out an iOS 14.5.1 update that it said addressed a bug associated with its App Tracking Transparency feature. An Apple support document, however, reveals that the new iOS update also addresses two serious security issues.

May 07 06:03

FACT CHECK: Bitcoin Mining is BAD For The Climate!?

May 07 05:57

Biggest ISPs paid for 8.5 million fake FCC comments opposing net neutrality

The largest Internet providers in the US funded a campaign that generated "8.5 million fake comments" to the Federal Communications Commission as part of the ISPs' fight against net neutrality rules during the Trump administration, according to a report issued today by New York State Attorney General Letitia James.

Nearly 18 million out of 22 million comments were fabricated, including both pro- and anti-net neutrality submissions, the report said. One 19-year-old submitted 7.7 million pro-net neutrality comments under fake, randomly generated names. But the astroturfing effort funded by the broadband industry stood out because it used real people's names without their consent, with third-party firms hired by the industry faking consent records, the report said.

Webmaster's Commentary: 

Cheaters apparently DO prosper! (Just ask Joe Biden.)

May 07 04:58

THIS BIDEN PROPOSAL COULD MAKE THE US A “DIGITAL DICTATORSHIP”

SOURCE: WHITNEY WEBB, UNLIMITED HANGOUT
A “new” proposal by the Biden administration to create a health-focused federal agency modeled after DARPA is not what it appears to be. Promoted as a way to “end cancer,” this resuscitated “health DARPA” conceals a dangerous agenda.

Last Wednesday, President Biden was widely praised in mainstream and health-care–focused media for his call to create a “new biomedical research agency” modeled after the US military’s “high-risk, high-reward” Defense Advanced Research Projects Agency, or DARPA. As touted by the president, the agency would seek to develop “innovative” and “breakthrough” treatments for cancer, Alzheimer’s disease, and diabetes, with a call to “end cancer as we know it.”

Webmaster's Commentary: 

HOLY CRUD, SERIOUSLY?!?!?

May 07 04:55

FORIEGN INTELLIGENCE SURVEILLANCE COURT RUBBER STAMPS MASS SURVEILLANCE UNDER SECTION 702 - AGAIN

SOURCE: ELECTRONIC FRONTIER FOUNDATION

As someone once said, “the Founders did not fight a revolution to gain the right to government agency protocols.” Well it was not just someone, it was Chief Justice John Roberts. He flatly rejected the government’s claim that agency protocols could solve the Fourth Amendment violations created by police searches of our communications stored in the cloud and accessible through our phones.

Webmaster's Commentary: 

I am a Christian Pacifist Activist, who consistently asks her government to resolve all issues through pragmatic, reasoned negotiations which take a long-term and moral approach to both foreign and domestic policies, and never advocates violence; how in the name of heaven, does that make the "the enemy" in the eyes of the Deep State? And yet, I know, in my heart of hearts, that is how this country's "shadow government" sees me.

And folks, I will be honest; as someone who cares about the future of this country, and the futures of all the kids around us, both of family and friends, that hurts.

May 07 03:57

Slap On The Wrist: Honeywell Fined For Sharing F-35, Other Secrets To China

Via South Front,

On May 5th, the US State Department announced that it had reached a $13 million settlement with defense contractor Honeywell.

The settlement is over allegations it exported technical drawings of parts for the F-35 fighters and other weapons platforms to China, Taiwan, Canada and Ireland, according to the Bureau of Political-Military Affairs’ charging document.

“Honeywell voluntarily disclosed to the Department the alleged violations that are resolved under this settlement. Honeywell also acknowledged the serious nature of the alleged violations, cooperated with the Department’s review, and instituted a number of compliance program improvements during the course of the Department’s review. For these reasons, the Department has determined that it is not appropriate to administratively debar Honeywell at this time.”

Webmaster's Commentary: 

Forgive me, but given the magnitude of this breach, why is no one going to jail over this?!?

Is it because of the "contributions" , overt and covert, that Honywell has made, over the years, to both sides of the aisle?!?

This is absolutely mind-blowing, that no one of their executive staff, has been made to take responsibility for this!!

May 06 13:43

RSA Is Dead — We Just Haven’t Accepted It Yet

One of the biggest features of the internet is that it’s constantly evolving at an unbelievable pace. You can’t keep track of time in decades, or even years sometimes, when it comes to the web. The friendly AOL voice that used to greet us with, “You’ve got mail,” now feels like an ancient relic. Nobody has seen Jeeves in years.

So why is the internet still overleveraging a cryptosystem that is coming up on 45 years old?

In the mid-1970s, as computer scientists and mathematicians rushed to find a viable public key cryptosystem, two emerged: Diffie-Hellman and RSA. The internet equivalents of the Beatles and the Stones. While Diffie-Hellman bowed out like the Beatles and has now found new life in a new generation of elliptic curve approaches that were inspired by it, RSA is like the Stones, still touring well past its prime and begging the question, “Should we still let them be going out there?”

May 06 13:40

Roko's Basilisk : The Thought Experiment That Could Enslave The Human Race

(Note to the reader: This article discusses a philosophical inquiry that many people find deeply, emotionally disturbing. Truly, and in all sincerity: If you're susceptible to existential dread, stop reading.)

Much has been said in recent years of the purported dangers and lethalities of artificial intelligence (AI). Technologists such as Elon Musk have said that AI is "far more dangerous than nukes," as CNBC says, and that a lack of regulations mediating the relationship between man and machine is "insane." The difference, he cites, is between case-specific AI — algorithms that control, say, what ads are pushed your way on Facebook — and AI with an open-ended utility function, which basically teach and write themselves. Era-defining physicist Stephen Hawking said the same before he passed away, as Vox recounts, as have AI researchers at Berkeley and Oxford.

May 06 13:33

IBM Creates World’s First 2nm CPU Using Nanosheets

IBM has claimed a world-first for its own labs, with “2nm” silicon now in production. All nanometer references in foundry press releases are essentially made-up numbers when used in this fashion. There is no single, defining feature in the chip that matches 2nm and is used for tracking progress in this fashion. Node names are defined by each foundry individually. This is how Intel can define a 10nm node with approximately the same transistor density as TSMC’s 7nm. This gap in numbers can create the illusion that one company is more advanced than the other purely based on a marketing metri

May 06 09:25

This old programming language is suddenly hot again. But its future is still far from certain

Fortran is the oldest commercial programming language, designed at IBM in the 1950s. And even though, for years, programmers have been predicting its demise, 64 years later it's still kicking, with users including top scientists from NASA and the Department of Energy using it on the world's most powerful supercomputers.

It even recently – and very unexpectedly – popped up again in a ranking of the most popular programming languages, albeit in 20th place. This resurgence has been explained by the huge need for scientific number crunching; something that Fortran is very good at.

May 06 06:35

Data leak makes Peloton’s Horrible, No-Good, Really Bad Day even worse

Peloton is having a rough day. First, the company recalled two treadmill models following the death of a 6-year-old child who was pulled under one of the devices. Now comes word Peloton exposed sensitive user data, even after the company knew about the leak. No wonder the company’s stock price closed down 15 percent on Wednesday.

Peloton provides a line of network-connected stationary bikes and treadmills. The company also offers an online service that allows users to join classes, work with trainers, or do workouts with other users. In October, Peloton told investors it had a community of 3 million members. Members can set accounts to be public so friends can view details such as classes attended and workout stats, or users can choose for profiles to be private.

May 06 06:34

Researchers Create Free-Floating Animated Holograms That Bring Us One Step Closer to Star Trek's Holodecks

Back in 2018, researchers from Brigham Young University demonstrated a device called an Optical Trap Display that used lasers to create free-floating holographic images that don’t need a display. That same team is now demonstrating a new technique that allows those holographic images to be animated: goodbye TVs, hello holodecks.

Most 3D holograms require a special screen to be displayed, and even then the 3D effect is limited to a small field of view. Images genuinely look like they exist in 3D space, but step to the side and suddenly you see nothing at all. The approach taken by the researchers at Brigham Young University is radically different. Screens are replaced by lasers: an invisible one that manipulates a tiny opaque particle floating in the air, and a visible one that illuminates the particle with different colors as it travels through a pre-defined path, creating what appears to a floating image to a human observer.

May 06 06:33

Scammers Score $2 Million from the WallStreetBets Crowd With Fictional Crypto Launch

A cryptocurrency scam recently pilfered at least $2 million from WallStreetBets enthusiasts, convincing them that they were buying into a new crypto coin connected to the popular memestock, according to a report from Bloomberg News.

For weeks, moderators of the notorious Reddit forum have warned users to avoid fraudulent scams based around the good WSB name. A post, tethered to the top of the group’s page, asks community members to be wary of offers related to WSB products:

ANY INVESTMEMT [sic] WITH THE WSB NAME IS UNRELATED TO WSB...

People keep posting a press release about an “official” WallStreetBets distributed app. (Aka, a crypto pyramid scheme)

Nothing could be further from the truth. We are strongly anti-monetization. This scam has nothing to do with us.

May 06 06:24

I tracked my kid with Apple's Airtags to test its privacy features

I clipped a keychain with one of Apple's tiny new Bluetooth trackers, AirTags, onto my son's book bag and waved goodbye to him on the school bus. I watched on my iPhone's Find My app as the bus stopped at a light a few blocks down from our street.

But then the tiny "key" icon on the app stopped moving. The item was "last detected" seven minutes ago at a busy intersection less than a mile away. Traffic, maybe? Five more minutes passed with no update. Is there an issue with the app? After another 10 minutes, my heart started to race; still nothing.
Finally, the tracker was detected four miles away in front of his school. Relieved, I decided more information in this case was worse; I'd go back to just tracking my keys. Apple later told me the delay was due to the tracker needing to communicate with Bluetooth on other iOS devices in the Find My network along the bus route before the AirTag's location could be updated to iCloud and the app.

May 06 05:59

Beware: This dangerous new malware can steal your passwords and your cryptocurrency

Phishing attacks have spawned a slew of new malware threats in recent days, according to researchers who’ve identified a serious threat actor behind three new connected malware families — which have been labeled as Doubledrag, Doubledrop, and Doubleback — and another unrelated threat called Panda Stealer, which is a variant of a cryptocurrency stealer and is mostly being spread via global email spam.

Here’s a rundown on these new malware discoveries, including what researchers have found and the implications herein: Let’s start with a report from FireEye’s Mandiant cybersecurity team, which revealed malware strains that have never been seen before, with “professionally coded sophistication,” and that came in two waves of phishing attacks globally. These attacks hit some 50 organizations at the end of 2020, with the first wave reported on December 2 and the second wave coming between December 11 and December 18.

May 06 05:52

Glitterbomb Trap Catches Phone Scammer (who gets arrested)

May 06 05:52

New Bill Would Ban Bitcoin Mining Across New York State for Three Years

A new bill that hit the New York state senate on Monday is aiming to put a multi-year pause on crypto mining operations across the state until authorities can fully suss out what that mining is doing to the climate and local environment. Bill 6486 is being spearheaded by state Sen. Kevin Parker, who had previously sponsored other bills to help the state meet its climate goals.

Bitcoin mining has come under increasing scrutiny for the staggering carbon footprint tied to electricity use to keep operations running 24/7. An analysis by Digiconomist puts the global mining footprint at around 53 megatons of carbon dioxide annually, equivalent to all of Sweden’s emissions. Upstate New York has recently become a hotbed of mining activity, and there could be more mines in the works.

May 06 05:48

AirTag review: They work great—maybe a little too great

Apple's AirTag is not a revolutionary new product. Rather, it's a significant refinement of an idea that, up until now, has been fairly niche. It works very, very well, but it works so well it seems to undermine Apple's attempts to focus its products on privacy and security.

We spent several days testing AirTags in different situations, and we found that they work stunningly well—at least in a dense urban environment with iPhones all around.

I can't imagine recommending any of the preceding attempts at this concept over AirTags if you have an iPhone. (Sadly, Android users are quite literally left to their own devices—in more ways than usual, as you'll see later in this review.)

AirTags are easy to use, well designed, and relatively affordable. If you're in the market for something like this, they're easy to recommend. But we're a little more worried about what these AirTags mean for the people who don't buy one. Stick around and we'll explain.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA