Skip to main content

Home/ Groups/ Future of the Web
Gonzalo San Gil, PhD.

Cloud Servers Are More Secure Than Your Data Center. Here's Why. - Datamation - 0 views

  •  
    "Without the expertise, experience and security commitment a cloud vendor, your company's data center is unlikely to match the cloud for security."
Paul Merrell

Apple's New Challenge: Learning How the U.S. Cracked Its iPhone - The New York Times - 0 views

  • Now that the United States government has cracked open an iPhone that belonged to a gunman in the San Bernardino, Calif., mass shooting without Apple’s help, the tech company is under pressure to find and fix the flaw.But unlike other cases where security vulnerabilities have cropped up, Apple may face a higher set of hurdles in ferreting out and repairing the particular iPhone hole that the government hacked.The challenges start with the lack of information about the method that the law enforcement authorities, with the aid of a third party, used to break into the iPhone of Syed Rizwan Farook, an attacker in the San Bernardino rampage last year. Federal officials have refused to identify the person, or organization, who helped crack the device, and have declined to specify the procedure used to open the iPhone. Apple also cannot obtain the device to reverse-engineer the problem, the way it would in other hacking situations.
  •  
    It would make a very interesting Freedom of Information Act case if Apple sued under that Act to force disclosure of the security hole iPhone product defect the FBI exploited. I know of no interpretation of the law enforcement FOIA exemption that would justify FBI disclosure of the information. It might be alleged that the information is the trade secret of the company that disclosed the defect and exploit to the the FBI, but there's a very strong argument that the fact that the information was shared with the FBI waived the trade secrecy claim. And the notion that government is entitled to collect product security defects and exploit them without informing the exploited product's company of the specific defect is extremely weak.  Were I Tim Cook, I would have already told my lawyers to get cracking on filing the FOIA request with the FBI to get the legal ball rolling. 
Paul Merrell

Apple could use Brooklyn case to pursue details about FBI iPhone hack: source | Reuters - 0 views

  • If the U.S. Department of Justice asks a New York court to force Apple Inc to unlock an iPhone, the technology company could push the government to reveal how it accessed the phone which belonged to a shooter in San Bernardino, a source familiar with the situation said.The Justice Department will disclose over the next two weeks whether it will continue with its bid to compel Apple to help access an iPhone in a Brooklyn drug case, according to a court filing on Tuesday.The Justice Department this week withdrew a similar request in California, saying it had succeeded in unlocking an iPhone used by one of the shooters involved in a rampage in San Bernardino in December without Apple's help.The legal dispute between the U.S. government and Apple has been a high-profile test of whether law enforcement should have access to encrypted phone data.
  • Apple, supported by most of the technology industry, says anything that helps authorities bypass security features will undermine security for all users. Government officials say that all kinds of criminal investigations will be crippled without access to phone data.Prosecutors have not said whether the San Bernardino technique would work for other seized iPhones, including the one at issue in Brooklyn. Should the Brooklyn case continue, Apple could pursue legal discovery that would potentially force the FBI to reveal what technique it used on the San Bernardino phone, the source said. A Justice Department representative did not have immediate comment.
Gonzalo San Gil, PhD.

conflict situationJoint Declaration on Freedom of Expression and Responses to Conflict ... - 1 views

  •  
    "1. Scope of the Joint Declaration This Joint Declaration addresses systematic or targeted attacks on freedom of expression which are aimed at silencing certain perspectives or voices, whether internationally, nationally or locally, and State responses to such attacks. Such attacks are perpetrated in different contexts, including of international and non-international armed conflicts, terrorist attacks and widespread organised crime. 2. General Principles a) States have a direct responsibility under international human rights law to respect freedom of expression and they are also under a positive obligation to take effective measures to protect freedom of expression against attacks by third parties, including by ensuring accountability for any attacks on those exercising their right to freedom of expression and by raising awareness about the importance of freedom of expression. ..."
Gonzalo San Gil, PhD.

28% of Piracy Takedown Requests Are "Questionable" - TorrentFreak - 0 views

  •  
    " Ernesto on March 31, 2016 C: 13 Breaking A new study published by researchers from Columbia University's American Assembly and Berkeley reveals that more than 28% of the takedown requests received by Google are "questionable." Nearly five percent of the takedown notices that were reviewed did not target the supposed infringing content, while another 24 percent raised other concerns, including fair use. "
Gonzalo San Gil, PhD.

SCO Again Returns From Dead, Plans Appeal | FOSS Force - 1 views

  •  
    "FOSS Force Staff FOSS Force has learned that we shouldn't write obituaries until we actually see a death certificate. SCO intends to file an appeal over the dismissal of its case against IBM."
  •  
    "FOSS Force Staff FOSS Force has learned that we shouldn't write obituaries until we actually see a death certificate. SCO intends to file an appeal over the dismissal of its case against IBM."
Gonzalo San Gil, PhD.

Open Source Security Process -- Part 1: A Cloud Security Introduction | Linux.com - 0 views

  •  
    [In part one of this four-part series, Xen Project Advisory Board Chairman Lars Kurth takes a look at the theories behind cloud security and how they relate to The Walking Dead -- yes, the TV show. Read on to find out more. ...]
Paul Merrell

FBI's secret method of unlocking iPhone may never reach Apple | Reuters - 0 views

  • The FBI may be allowed to withhold information about how it broke into an iPhone belonging to a gunman in the December San Bernardino shootings, despite a U.S. government policy of disclosing technology security flaws discovered by federal agencies. Under the U.S. vulnerabilities equities process, the government is supposed to err in favor of disclosing security issues so companies can devise fixes to protect data. The policy has exceptions for law enforcement, and there are no hard rules about when and how it must be applied.Apple Inc has said it would like the government to share how it cracked the iPhone security protections. But the Federal Bureau of Investigation, which has been frustrated by its inability to access data on encrypted phones belonging to criminal suspects, might prefer to keep secret the technique it used to gain access to gunman Syed Farook's phone. The referee is likely to be a White House group formed during the Obama administration to review computer security flaws discovered by federal agencies and decide whether they should be disclosed.
  • Stewart Baker, former general counsel of the NSA and now a lawyer with Steptoe & Johnson, said the review process could be complicated if the cracking method is considered proprietary by the third party that assisted the FBI.Several security researchers have pointed to the Israel-based mobile forensics firm Cellebrite as the likely third party that helped the FBI. That company has repeatedly declined comment.
  •  
    The article is wide of the mark, based on analysis of Executive Branch policy rather than the governing law such as the Freedom of Information Act. And I still find it somewhat ludicrous that a third party with knowledge of the defect could succeed in convincing a court that knowledge of a defect in a company's product is trade-secret proprietary information. "Your honor, my client has discovered a way to break into Mr. Tim Cook's house without a key to his house. That is a valuable trade secret that this Court must keep Mr. Cook from learning." Pow! The Computer Fraud and Abuse Act makes it a crime to access a computer that can connect to the Internet by exploiting a software bug. 
Gonzalo San Gil, PhD.

Why Cyber-Criminals Are Always One Step Ahead - 1 views

  •  
    "Cyber-criminals have an uncanny ability to stay under the radar for long periods of time-making the difficult business of cyber-protection even more difficult."
Gonzalo San Gil, PhD.

Open Source Security Process Part 2: Containers vs. Hypervisors - Protecting Your Attac... - 0 views

  •  
    "In part two of this series, Xen Project Advisory Board Chairman Lars Kurth discusses the different security vulnerabilities of containers and hypervisors. Read Part 1: A Cloud Security Introduction."
  •  
    "In part two of this series, Xen Project Advisory Board Chairman Lars Kurth discusses the different security vulnerabilities of containers and hypervisors. Read Part 1: A Cloud Security Introduction."
Gonzalo San Gil, PhD.

Copyright Troll Partner Threatens to Report Blogger to the Police - TorrentFreak [# ! '... - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! :/ Just another #sad #copyright #trolling #story...
  •  
    " Andy on April 3, 2016 C: 43 Breaking A company assisting US-based copyright troll outfit TCYK LLC has just threatened to report a blogger to the police. Joe Hickster, an anti-troll activist who has helped dozens of wrongfully accused individuals avoid paying settlement fees, was threatened after describing troll services company Hatton and Berkeley as being involved in a smoke-and-mirrors operation."
  •  
    " Andy on April 3, 2016 C: 43 Breaking A company assisting US-based copyright troll outfit TCYK LLC has just threatened to report a blogger to the police. Joe Hickster, an anti-troll activist who has helped dozens of wrongfully accused individuals avoid paying settlement fees, was threatened after describing troll services company Hatton and Berkeley as being involved in a smoke-and-mirrors operation."
Gonzalo San Gil, PhD.

The-Speculative-Invoicing-Handbook.pdf - 0 views

  •  
    "Stage One: Put The Kettle On So you've received a letter, you feel intruded upon and threatened. You're wondering if you even did w hat you've been accused of - well, at least, what your connection , has been accused of... You're not the first and you're unlikely to be the last to get one of these 'nastygrams'. The first step to managing the situation you've been put in is to tackle it calmly. You have been invited to play a game. This particular game requires careful thought and rational, planned actions. It is not best played while emotions are running high; never do anything in haste. You're reading this handbook so you've clearly used your head so far and are on the right track. If you've not already done so, make yourself a cuppa and sit down to read the rest of this. Relax... you're among friends now. Welcome to the team."
Gonzalo San Gil, PhD.

Trying to install Gnormalize - FedoraForum.org - 0 views

  •  
    "Trying to install Gnormalize I am trying to install Gnormalize for my recently installed Fedora 22 and it does not work. My distribution is i686/32 bits and I have downloaded Gnormalize from rpmfind.net, rpm.pbone.net, rpmseek.com and a similar one, and the Install program says always that it has failed. "
Gonzalo San Gil, PhD.

The Linux Foundation Launches First Linux-Based Civil Infrastructure Project - 0 views

  •  
    "By Linux_Foundation - April 4, 2016 - 3:57pm Civil Infrastructure Platform to provide software building blocks that support reliable transportation, power, oil and gas, and health care infrastructure"
Gonzalo San Gil, PhD.

Movie Studios Want to Copy Megaupload's Servers - TorrentFreak [# ! N ] - 0 views

  •  
    "Hollywood's major movie studios are protesting a request from Megaupload's legal team to put their civil lawsuit on hold for another six months. The movie studios will only agree to the request if they can get copies of the Megaupload servers stored at Cogent, something the defunct cloud-hosting service fiercely objects to."
Gonzalo San Gil, PhD.

Media Extractor :: TechnologyTo.com - 1 views

  •  
    "A Firefox extension to extract the original audio file embedded in video files usig FFMpeg command-line tool. This extension can extract the original audio file out of video files and hence the original quality audio will be obtained. It is also possible to convert the extracted audio files to the famous MP3 format."
Gonzalo San Gil, PhD.

Improving your ISOC membership service - 0 views

  •  
    " Dear 'whoever You were, (Español abajo / Français au dessous) At the Internet Society we know that each of our members is essential to fulfilling our mission. That's why we want to better understand and improve your membership experience. Please, click the link below and take our 15 - 20 minutes survey to give us your ideas and feedback. Your opinion will help shape the future of our community: "
Gonzalo San Gil, PhD.

Do you think Accelerated Mobile Pages (AMP) are open or closed? | Opensource.com - 0 views

  •  
    "A few months ago Google announced a new open source project called Accelerated Mobile Pages (AMP) that promised to "dramatically improve the performance of the mobile Web," and now Google features AMP content at the top of mobile search results. As the amount of AMP content continues to grow, more questions are being asked about whether or not AMP benefits the open web, and whether AMP is a closed silo."
Paul Merrell

Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People | W... - 0 views

  • For most of the past six weeks, the biggest story out of Silicon Valley was Apple’s battle with the FBI over a federal order to unlock the iPhone of a mass shooter. The company’s refusal touched off a searing debate over privacy and security in the digital age. But this morning, at a small office in Mountain View, California, three guys made the scope of that enormous debate look kinda small. Mountain View is home to WhatsApp, an online messaging service now owned by tech giant Facebook, that has grown into one of the world’s most important applications. More than a billion people trade messages, make phone calls, send photos, and swap videos using the service. This means that only Facebook itself runs a larger self-contained communications network. And today, the enigmatic founders of WhatsApp, Brian Acton and Jan Koum, together with a high-minded coder and cryptographer who goes by the pseudonym Moxie Marlinspike, revealed that the company has added end-to-end encryption to every form of communication on its service.
  • This means that if any group of people uses the latest version of WhatsApp—whether that group spans two people or ten—the service will encrypt all messages, phone calls, photos, and videos moving among them. And that’s true on any phone that runs the app, from iPhones to Android phones to Windows phones to old school Nokia flip phones. With end-to-end encryption in place, not even WhatsApp’s employees can read the data that’s sent across its network. In other words, WhatsApp has no way of complying with a court order demanding access to the content of any message, phone call, photo, or video traveling through its service. Like Apple, WhatsApp is, in practice, stonewalling the federal government, but it’s doing so on a larger front—one that spans roughly a billion devices.
  • The FBI and the Justice Department declined to comment for this story. But many inside the government and out are sure to take issue with the company’s move. In late 2014, WhatsApp encrypted a portion of its network. In the months since, its service has apparently been used to facilitate criminal acts, including the terrorist attacks on Paris last year. According to The New York Times, as recently as this month, the Justice Department was considering a court case against the company after a wiretap order (still under seal) ran into WhatsApp’s end-to-end encryption. “The government doesn’t want to stop encryption,” says Joseph DeMarco, a former federal prosecutor who specializes in cybercrime and has represented various law enforcement agencies backing the Justice Department and the FBI in their battle with Apple. “But the question is: what do you do when a company creates an encryption system that makes it impossible for court-authorized search warrants to be executed? What is the reasonable level of assistance you should ask from that company?”
Gonzalo San Gil, PhD.

Linking to pirated material doesn't infringe copyright, says top EU court lawyer | Ars ... - 0 views

  •  
    "Key question is whether the Court of Justice of the European Union agrees with him. by Glyn Moody - Apr 7, 2016 10:08 am UTC"
« First ‹ Previous 3121 - 3140 Next › Last »
Showing 20 items per page