Skip to main content

Home/ Future of the Web/ Group items tagged learn

Rss Feed Group items tagged

Paul Merrell

FBI's secret method of unlocking iPhone may never reach Apple | Reuters - 0 views

  • The FBI may be allowed to withhold information about how it broke into an iPhone belonging to a gunman in the December San Bernardino shootings, despite a U.S. government policy of disclosing technology security flaws discovered by federal agencies. Under the U.S. vulnerabilities equities process, the government is supposed to err in favor of disclosing security issues so companies can devise fixes to protect data. The policy has exceptions for law enforcement, and there are no hard rules about when and how it must be applied.Apple Inc has said it would like the government to share how it cracked the iPhone security protections. But the Federal Bureau of Investigation, which has been frustrated by its inability to access data on encrypted phones belonging to criminal suspects, might prefer to keep secret the technique it used to gain access to gunman Syed Farook's phone. The referee is likely to be a White House group formed during the Obama administration to review computer security flaws discovered by federal agencies and decide whether they should be disclosed.
  • Stewart Baker, former general counsel of the NSA and now a lawyer with Steptoe & Johnson, said the review process could be complicated if the cracking method is considered proprietary by the third party that assisted the FBI.Several security researchers have pointed to the Israel-based mobile forensics firm Cellebrite as the likely third party that helped the FBI. That company has repeatedly declined comment.
  •  
    The article is wide of the mark, based on analysis of Executive Branch policy rather than the governing law such as the Freedom of Information Act. And I still find it somewhat ludicrous that a third party with knowledge of the defect could succeed in convincing a court that knowledge of a defect in a company's product is trade-secret proprietary information. "Your honor, my client has discovered a way to break into Mr. Tim Cook's house without a key to his house. That is a valuable trade secret that this Court must keep Mr. Cook from learning." Pow! The Computer Fraud and Abuse Act makes it a crime to access a computer that can connect to the Internet by exploiting a software bug. 
Alexandra IcecreamApps

How to Convert PDF to Word Online - Icecream Tech Digest - 0 views

  •  
    Learn how to convert PDF to Word online in just three easy steps
Gonzalo San Gil, PhD.

blag linux and gnu by le brixton linux action group - 0 views

  •  
    [blag - News blag 140000 (Spartakus) is out now! There are Live CDs for x86 and x86_64 boxes. Live CD ISOs are there: ftp://blag.fsf.org/140000/en/iso/ More coming soon! blag - Important There is a blag group on facebook. It is not an official one since blag isn't on facebook and support FSF campaign "You won't find us on facebook". But blag is on identi.ca blag - le brixton linux action group works to overthrow corporate control of information and technology through community action and spreading Free Software. blag - blag linux and gnu blag is an operating system. blag has a suite of graphics, internet, audio, video, office, and peer to peer file sharing applications. you can replace a windoz installation with blag. if you would like to install and run blag, download and burn it to cd. blag - Icecat This release of BLAG has GNU IceCat as the default browser. You may learn more there: GNUzilla and IceCat blag - Sylpheed Sylpheed is now Blag mail client by default. More: Sylpheed]
Gonzalo San Gil, PhD.

Ownership Chart: The Big Six | Free Press - 2 views

  •  
    [Ownership Chart: The Big Six The U.S. media landscape is dominated by massive corporations that, through a history of mergers and acquisitions, have concentrated their control over what we see, hear and read. In many cases, these giant companies are vertically integrated, controlling everything from initial production to final distribution. In the interactive charts below we reveal who owns what. Click here to learn more about our campaign to stop big media and to support local ownership, diverse voices, and truly competitive media markets that serve the public interest. Select a chart: The Big Six Cable TV Print Telecom Radio ...]
Gonzalo San Gil, PhD.

WSIS Forum 2012 - 0 views

  •  
    [ITU, UNESCO, UNCTAD and UNDP welcome all WSIS Stakeholders to the WSIS Forum 2012 website. WSIS Forum 2012 will be held from 14th to 18th May 2012 and will provide structured opportunities to network, learn and to participate in multi-stakeholder discussions and consultations on WSIS implementation. This event builds upon the tradition of annual WSIS May meetings, and its new format is the result of open consultations with all WSIS Stakeholders. The 2012 WSIS Forum will be hosted by ITU and will take place at the Conference Centre of the International Labour Organization (ILO). Remote Participation will be an integral component of the Forum details on both onsite and remote participation will be available soon. Onsite participants can network with each other using the imeetyouatWSISForum social networking platform...]
Gonzalo San Gil, PhD.

Making UEFI Secure Boot Work With Open Platforms | The Linux Foundation - 0 views

  •  
    ["Secure boot" is a technology described by recent revisions of the UEFI specification; it offers the prospect of a hardware-verified, malware-free operating system bootstrap process that can improve the security of many system deployments. Linux and other open operating systems will be able to take advantage of secure boot if it is implemented properly in the hardware. This document is intended to describe how the UEFI secure boot specification can be implemented to interoperate well with open systems and to avoid adversely affecting the rights of the owners of those systems while providing compliance with proprietary software vendors' requirements. To learn more about the recommendations please download the .PDF below. ]
Gonzalo San Gil, PhD.

E-Books And Guides Of Top 5 Upcoming Programming Languages - 2 views

  •  
    "To stay up and high in the field of programming, it is essential for any programmer to stay updated with the latest programming languages. You can learn atleast 5 from these references and ebooks. "
Gonzalo San Gil, PhD.

Document Freedom Day - 0 views

  •  
    " Celebrating information accessibility and raising awareness of Open Standards. Learn more. "
Gonzalo San Gil, PhD.

Opt out of PRISM, the NSA's global data surveillance program - PRISM Break - 0 views

  •  
    "Use a combination of Tor Browser and another free browser to surf the web. Try to use Tor for as many things as possible. Browsing the web may be slower, but it will offer you far better anonymity. Make sure to learn the basics of Tor before using it."
Gonzalo San Gil, PhD.

Guide to Creative Commons » OAPEN-UK - 1 views

  •  
    "An output of the OAPEN-UK project, this guide explores concerns expressed in public evidence given by researchers, learned societies and publishers to inquiries in the House of Commons and the House of Lords, and also concerns expressed by researchers working with the OAPEN-UK project. We have also identified a number of common questions and have drafted answers, which have been checked by experts including Creative Commons. The guide has been edited by active researchers, to make sure that it is relevant and useful to academics faced with making decisions about publishing."
Gonzalo San Gil, PhD.

The Freenet Project - /index - 3 views

  •  
    " Share files, chat on forums, browse and publish, anonymously and without fear of blocking or censorship! Then connect to your friends for even better security! Learn more!"
Gonzalo San Gil, PhD.

Smarter Than You Think | The Book - 1 views

  •  
    "It's undeniable: technology is changing the way we think. But is it for the better? Amid a chorus of doomsayers, Clive Thompson votes "yes". The Internet age, he argues, has produced bold new forms of human cognition, worthy of both celebration and investigation. We learn more and retain the information longer, write and think with global audiences, and even gain an ESP-like awareness of the world around us."
Gonzalo San Gil, PhD.

Best of 2013: Guides and tutorials from Opensource.com | opensource.com - 0 views

  •  
    "This year at Opensource.com, we challenged our contributors to give us the best and most useful guides, how-tos, and tutorials they could produce from their experiences and work in various open source industries and sectors. In this Best of Opensource.com, our top guides and tutorials this year fell within the four buckets you see below. If you can answer YES to any of the following questions, there's an open source way guide here for you! Do you... Participate in open source projects or communities? Want to learn more about open source? Want to write a book? Create a video? Teach? Work with students?"
Paul Merrell

Hackers Prove Fingerprints Are Not Secure, Now What? | nsnbc international - 0 views

  • The Office of Personnel Management (OPM) recently revealed that an estimated 5.6 million government employees were affected by the hack; and not 1.1 million as previously assumed.
  • Samuel Schumach, spokesman for the OPM, said: “As part of the government’s ongoing work to notify individuals affected by the theft of background investigation records, the Office of Personnel Management and the Department of Defense have been analyzing impacted data to verify its quality and completeness. Of the 21.5 million individuals whose Social Security Numbers and other sensitive information were impacted by the breach, the subset of individuals whose fingerprints have been stolen has increased from a total of approximately 1.1 million to approximately 5.6 million.” This endeavor expended the use of the Department of Defense (DoD), the Department of Homeland Security (DHS), the National Security Agency (NSA), and the Pentagon. Schumer added that “if, in the future, new means are developed to misuse the fingerprint data, the government will provide additional information to individuals whose fingerprints may have been stolen in this breach.” However, we do not need to wait for the future for fingerprint data to be misused and coveted by hackers.
  • Look no further than the security flaws in Samsung’s new Galaxy 5 smartphone as was demonstrated by researchers at Security Research Labs (SRL) showing how fingerprints, iris scans and other biometric identifiers could be fabricated and yet authenticated by the Apple Touch ID fingerprints scanner. The shocking part of this demonstration is that this hack was achieved less than 2 days after the technology was released to the public by Apple. Ben Schlabs, researcher for SRL explained: “We expected we’d be able to spoof the S5’s Finger Scanner, but I hoped it would at least be a challenge. The S5 Finger Scanner feature offers nothing new except—because of the way it is implemented in this Android device—slightly higher risk than that already posed by previous devices.” Schlabs and other researchers discovered that “the S5 has no mechanism requiring a password when encountering a large number of incorrect finger swipes.” By rebotting the smartphone, Schlabs could force “the handset to accept an unlimited number of incorrect swipes without requiring users to enter a password [and] the S5 fingerprint authenticator [could] be associated with sensitive banking or payment apps such as PayPal.”
  • ...1 more annotation...
  • Schlab said: “Perhaps most concerning is that Samsung does not seem to have learned from what others have done less poorly. Not only is it possible to spoof the fingerprint authentication even after the device has been turned off, but the implementation also allows for seemingly unlimited authentication attempts without ever requiring a password. Incorporation of fingerprint authentication into highly sensitive apps such as PayPal gives a would-be attacker an even greater incentive to learn the simple skill of fingerprint spoofing.” Last year Hackers from the Chaos Computer Club (CCC) proved Apple wrong when the corporation insisted that their new iPhone 5S fingerprint sensor is “a convenient and highly secure way to access your phone.” CCC stated that it is as easy as stealing a fingerprint from a drinking glass – and anyone can do it.
Gary Edwards

» 21 Facts About NSA Snooping That Every American Should Know Alex Jones' Inf... - 0 views

  •  
    NSA-PRISM-Echelon in a nutshell.  The list below is a short sample.  Each fact is documented, and well worth the time reading. "The following are 21 facts about NSA snooping that every American should know…" #1 According to CNET, the NSA told Congress during a recent classified briefing that it does not need court authorization to listen to domestic phone calls… #2 According to U.S. Representative Loretta Sanchez, members of Congress learned "significantly more than what is out in the media today" about NSA snooping during that classified briefing. #3 The content of all of our phone calls is being recorded and stored.  The following is a from a transcript of an exchange between Erin Burnett of CNN and former FBI counterterrorism agent Tim Clemente which took place just last month… #4 The chief technology officer at the CIA, Gus Hunt, made the following statement back in March… "We fundamentally try to collect everything and hang onto it forever." #5 During a Senate Judiciary Oversight Committee hearing in March 2011, FBI Director Robert Mueller admitted that the intelligence community has the ability to access emails "as they come in"… #6 Back in 2007, Director of National Intelligence Michael McConnell told Congress that the president has the "constitutional authority" to authorize domestic spying without warrants no matter when the law says. #7 The Director Of National Intelligence James Clapper recently told Congress that the NSA was not collecting any information about American citizens.  When the media confronted him about his lie, he explained that he "responded in what I thought was the most truthful, or least untruthful manner". #8 The Washington Post is reporting that the NSA has four primary data collection systems… MAINWAY, MARINA, METADATA, PRISM #9 The NSA knows pretty much everything that you are doing on the Internet.  The following is a short excerpt from a recent Yahoo article… #10 The NSA is suppose
Gonzalo San Gil, PhD.

Warning 'Strikes' Don't Work On Me, Movie Boss Admits | TorrentFreak - 0 views

  •  
    " Andy on June 26, 2015 C: 0 Breaking A key strategy of the entertainment industries is to repeatedly warn pirating Internet users of their illegal behavior in the belief they will change their ways. However, co-chief of movie company Village Roadshow has just admitted that he's been caught breaking the law numerous times - and he still hasn't learned."
Gonzalo San Gil, PhD.

Say It Ain't So, Woz: Steve Wozniak Says Patent Trolls Are Okay | Techdirt - 0 views

  •  
    "from the too-bad dept Via Joe Mullin, we learn the rather unfortunate news that, when asked about Paul Allen's decision to sue lots of big tech companies over questionable patents, Wozniak comes out in favor of "patent trolls" and patent holders suing companies who actually innovate. "
Gonzalo San Gil, PhD.

Learn it Faster: The Complete Linux Kernel in a Single Map - 1 views

  •  
    "Short Bytes: Today, we are sharing an interactive Linux Kernel map that will teach you the basics and understand the various subsystems. Take a look."
Paul Merrell

Join The Internet Vote - 0 views

  • Congress is about to introduce a bill to fast track a secret deal that could lead to global censorship. It’s called the Trans-Pacific Partnership (TPP). We think Internet users everywhere should have a say in decisions that affect the Internet — but if “Fast Track” legislation passes, there is no chance that the public will see the text before the deal is approved. Join the Internet Vote on April 23rd and let’s make it clear to DC how we’re voting: against Fast Track and against Internet censorship. (Learn More)
  •  
    Sign up (email address) for updates on a monumental lobbying effort coming up in the next few days when Congress comes back into session and the legislation to "Fast Track" the TPP *and all future trade agrerements* is introduced. From leaked draft portions, we know that the TPP brings us internet censorship and a mass of copyright law changes that have the giant intellectual property corproate folk drooling at the mouth, because they helped write it while the public was excluded. This is your chance to help end secret trade agreements that the public doesn't even get to see until they have already been made into law.
Gonzalo San Gil, PhD.

The anti-counterfeiting trade agreement: the ethical analysis of a failure, and its les... - 0 views

  •  
    "Abstract: The anti-counterfeiting trade agreement (ACTA) was originally meant to harmonise and enforce intellectual property rights (IPR) provisions in existing trade agreements within a wider group of countries. This was commendable in itself, so ACTA's failure was all the more disappointing. In this article, I wish to contribute to the post-ACTA debate by proposing a specific analysis of the ethical reasons why ACTA failed, and what we can learn from them. I argue that five kinds of objections- namely, secret negotiations, lack of consultation, vague- ness of formulation, negotiations outside any international body, and the creation of a new governing body outside already existing forums-had only indirect ethical impli- cations. "
« First ‹ Previous 41 - 60 of 144 Next › Last »
Showing 20 items per page