Skip to main content

Home/ Future of the Web/ Group items tagged hollywood FACT

Rss Feed Group items tagged

3More

Hollywood Withdraws Funding for UK Anti-Piracy Group FACT - TorrentFreak - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! Quit Witch Hunts funding and invest in new Media poolicies...
  •  
    " Andy on May 24, 2016 C: 33 Breaking The UK's Federation Against Copyright Theft has received a major blow after the Motion Picture Association advised the anti-piracy group it will not renew its membership. The termination of the 30-year long relationship means that FACT will lose 50% of its budget and the backing of the six major Hollywood movie studios."
  •  
    " Andy on May 24, 2016 C: 33 Breaking The UK's Federation Against Copyright Theft has received a major blow after the Motion Picture Association advised the anti-piracy group it will not renew its membership. The termination of the 30-year long relationship means that FACT will lose 50% of its budget and the backing of the six major Hollywood movie studios."
1More

Anti-Piracy Group FACT Expands Reach Beyond Hollywood - TorrentFreak [# ! Note] - 0 views

  •  
    Andy on November 10, 2016 C: 9 News The Federation Against Copyright Theft says that it will branch out into new areas of IP enforcement. For decades the anti-piracy group has relied on Hollywood for much of its business but with that work now being carried out by the MPA and others, FACT will offer services to companies outside the audio-visual sector.
1More

Piracy: Hollywood's Losing a Few Pounds, Who Cares? - TorrentFreak - 0 views

  •  
    " Andy on August 27, 2015 C: 72 Breaking Following news this week that a man is facing a custodial sentence after potentially defrauding the movie industry out of £120m, FACT Director General Kieron Sharp has been confronted with an uncomfortable truth. According to listeners contacting the BBC, the public has little sympathy with Hollywood."
2More

Blender: An Introduction for Final Cut Pro Users | FOSS Force - 0 views

  •  
    "Phil Shapiro Have you often considered quitting your day job to begin an exciting career as a filmmaker? You don't need the resources of a Hollywood studio anymore. In fact, you can do it all with free and open source software."
  •  
    "Phil Shapiro Have you often considered quitting your day job to begin an exciting career as a filmmaker? You don't need the resources of a Hollywood studio anymore. In fact, you can do it all with free and open source software."
8More

Why the Sony hack is unlikely to be the work of North Korea. | Marc's Security Ramblings - 0 views

  • Everyone seems to be eager to pin the blame for the Sony hack on North Korea. However, I think it’s unlikely. Here’s why:1. The broken English looks deliberately bad and doesn’t exhibit any of the classic comprehension mistakes you actually expect to see in “Konglish”. i.e it reads to me like an English speaker pretending to be bad at writing English. 2. The fact that the code was written on a PC with Korean locale & language actually makes it less likely to be North Korea. Not least because they don’t speak traditional “Korean” in North Korea, they speak their own dialect and traditional Korean is forbidden. This is one of the key things that has made communication with North Korean refugees difficult. I would find the presence of Chinese far more plausible.
  • 3. It’s clear from the hard-coded paths and passwords in the malware that whoever wrote it had extensive knowledge of Sony’s internal architecture and access to key passwords. While it’s plausible that an attacker could have built up this knowledge over time and then used it to make the malware, Occam’s razor suggests the simpler explanation of an insider. It also fits with the pure revenge tact that this started out as. 4. Whoever did this is in it for revenge. The info and access they had could have easily been used to cash out, yet, instead, they are making every effort to burn Sony down. Just think what they could have done with passwords to all of Sony’s financial accounts? With the competitive intelligence in their business documents? From simple theft, to the sale of intellectual property, or even extortion – the attackers had many ways to become rich. Yet, instead, they chose to dump the data, rendering it useless. Likewise, I find it hard to believe that a “Nation State” which lives by propaganda would be so willing to just throw away such an unprecedented level of access to the beating heart of Hollywood itself.
  • 5. The attackers only latched onto “The Interview” after the media did – the film was never mentioned by GOP right at the start of their campaign. It was only after a few people started speculating in the media that this and the communication from DPRK “might be linked” that suddenly it became linked. I think the attackers both saw this as an opportunity for “lulz” and as a way to misdirect everyone into thinking it was a nation state. After all, if everyone believes it’s a nation state, then the criminal investigation will likely die.
  • ...4 more annotations...
  • 6. Whoever is doing this is VERY net and social media savvy. That, and the sophistication of the operation, do not match with the profile of DPRK up until now. Grugq did an excellent analysis of this aspect his findings are here – http://0paste.com/6875#md 7. Finally, blaming North Korea is the easy way out for a number of folks, including the security vendors and Sony management who are under the microscope for this. Let’s face it – most of today’s so-called “cutting edge” security defenses are either so specific, or so brittle, that they really don’t offer much meaningful protection against a sophisticated attacker or group of attackers.
  • 8. It probably also suits a number of political agendas to have something that justifies sabre-rattling at North Korea, which is why I’m not that surprised to see politicians starting to point their fingers at the DPRK also. 9. It’s clear from the leaked data that Sony has a culture which doesn’t take security very seriously. From plaintext password files, to using “password” as the password in business critical certificates, through to just the shear volume of aging unclassified yet highly sensitive data left out in the open. This isn’t a simple slip-up or a “weak link in the chain” – this is a serious organization-wide failure to implement anything like a reasonable security architecture.
  • The reality is, as things stand, Sony has little choice but to burn everything down and start again. Every password, every key, every certificate is tainted now and that’s a terrifying place for an organization to find itself. This hack should be used as the definitive lesson in why security matters and just how bad things can get if you don’t take it seriously. 10. Who do I think is behind this? My money is on a disgruntled (possibly ex) employee of Sony.
  • EDIT: This appears (at least in part) to be substantiated by a conversation the Verge had with one of the alleged hackers – http://www.theverge.com/2014/11/25/7281097/sony-pictures-hackers-say-they-want-equality-worked-with-staff-to-break-in Finally for an EXCELLENT blow by blow analysis of the breach and the events that followed, read the following post by my friends from Risk Based Security – https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-2014-sony-hack EDIT: Also make sure you read my good friend Krypt3ia’s post on the hack – http://krypt3ia.wordpress.com/2014/12/18/sony-hack-winners-and-losers/
  •  
    Seems that the FBI overlooked a few clues before it told Obama to go ahead and declare war against North Korea. 
1 - 5 of 5
Showing 20 items per page