Skip to main content

Home/ Indie Nation/ Group items tagged company

Rss Feed Group items tagged

John Lemke

Exclusive: Secret contract tied NSA and security industry pioneer | Reuters - 0 views

  • Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.
  • RSA, meanwhile, was changing. Bidzos stepped down as CEO in 1999 to concentrate on VeriSign, a security certificate company that had been spun out of RSA. The elite lab Bidzos had founded in Silicon Valley moved east to Massachusetts, and many top engineers left the company, several former employees said.And the BSafe toolkit was becoming a much smaller part of the company. By 2005, BSafe and other tools for developers brought in just $27.5 million of RSA's revenue, less than 9% of the $310 million total."When I joined there were 10 people in the labs, and we were fighting the NSA," said Victor Chan, who rose to lead engineering and the Australian operation before he left in 2005. "It became a very different company later on."By the first half of 2006, RSA was among the many technology companies seeing the U.S. government as a partner against overseas hackers.New RSA Chief Executive Art Coviello and his team still wanted to be seen as part of the technological vanguard, former employees say, and the NSA had just the right pitch. Coviello declined an interview request.An algorithm called Dual Elliptic Curve, developed inside the agency, was on the road to approval by the National Institutes of Standards and Technology as one of four acceptable methods for generating random numbers. NIST's blessing is required for many products sold to the government and often sets a broader de facto standard.RSA adopted the algorithm even before NIST approved it. The NSA then cited the early use of Dual Elliptic Curve inside the government to argue successfully for NIST approval, according to an official familiar with the proceedings.RSA's contract made Dual Elliptic Curve the default option for producing random numbers in the RSA toolkit. No alarms were raised, former employees said, because the deal was handled by business leaders rather than pure technologists.
  • Within a year, major questions were raised about Dual Elliptic Curve. Cryptography authority Bruce Schneier wrote that the weaknesses in the formula "can only be described as a back door."
John Lemke

Apple CarPlay debuts with Ferrari, Mercedes-Benz and Volvo | Technology | theguardian.com - 0 views

  • Ferrari, Mercedes-Benz and Volvo as the first partners to build it into their vehicles.
  • connect iPhones into in-car information and entertainment systems
  • in-car equivalent to Apple’s AirPlay technology in the living room.
  • ...1 more annotation...
  • The company said today it also has deals with 13 more manufacturers to integrate CarPlay in the future: BMW Group, Ford, General Motors, Honda, Hyundai Motor Company, Jaguar Land Rover, Kia Motors, Mitsubishi Motors, Nissan Motor Company, PSA Peugeot Citroën, Subaru, Suzuki and Toyota Motor Corp.
John Lemke

FCC chairman revises fast-lane option in net neutrality - 0 views

  • Wheeler's latest revision doesn't entirely ban Internet fast lanes and will leave room for some deals, including public-interest cases like a health care company sending electrocardiography results.But unlike his initial proposal last month, Wheeler is seeking to specifically ban certain types of fast lanes, including prioritization given by ISPs to their subsidiaries that make and stream content, according to an FCC official who wasn't authorized talk about the revisions publicly before the vote. The FCC would retain powers to review any prioritization deals that may pose public harm.
  •  
    "Wheeler's latest revision doesn't entirely ban Internet fast lanes and will leave room for some deals, including public-interest cases like a health care company sending electrocardiography results. But unlike his initial proposal last month, Wheeler is seeking to specifically ban certain types of fast lanes, including prioritization given by ISPs to their subsidiaries that make and stream content, according to an FCC official who wasn't authorized talk about the revisions publicly before the vote. The FCC would retain powers to review any prioritization deals that may pose public harm."
John Lemke

California Governor Signs the Spaceflight Liability and Immunity Act - Commercial Space... - 0 views

  • California Governor Jerry Brown announced today that he has signed into law the Spaceflight Liability and Immunity Act, AB 2243.  This law provides the necessary liability protections for compliant companies in the state, should any spaceflight participant who has acknowledged the risks sustain any bodily injury during spaceflight activities. Currently, Florida, Virginia, and Texas also provide spaceflight companies liability protection.
John Lemke

Toyota shows off all solid state lithium superionic conductor based prototype battery - 0 views

  • last year the company described a prototype solid state lithium superionic conductor battery in an article in the journal Nature Materials that was based on a three dimensional framework. And just this month the company announced plans to introduce several new lines of hybrid and all electric vehicles over the next three years (after also announcing that the Prius hybrid now accounts for ten percent of all sales). The sticking point has been and remains, the batteries used in such vehicles which can account for up to half their cost to consumers.
  • The new battery, first described last year, uses Li10GeP2S12 in a layered three dimensional framework where cells are sandwiched together to create a stack of seven tiers with each having a voltage of four volts for a total of twenty eight at normal temperatures. The result, they say is a battery with five times the output density of previous varieties. To demonstrate its progress in refining the battery, the prototype was demonstrated recently to a group attending a green technology seminar as a power source for an electric scooter.
John Lemke

Japanese company proposes to build solar power cells on the Moon to provide clean energ... - 0 views

  • the 11,000 mile Lunar equator
  • will beam microwave and laser energy to giant energy conversion facilities on Earth. These beams will travel to semiconductors and inverters which will convert that energy to clean electricity to the grid that will power households, businesses and factories.
  • Shimizu’s plan uses Earthly materials, ceramics, water, glass, concrete, oxygen and solar cells. They would not ship water from Earth, they will make user of the Moon’s own resources and reduce the lunar soil using hydrogen shipped from our planet and then extract the water for use in construction.
John Lemke

Rep. Goodlatte Slips Secret Change Into Phone Unlocking Bill That Opens The DMCA Up For... - 0 views

  • Because of section 1201 of the DMCA, the "anti-circumvention" provision, companies have been abusing copyright law to block all sorts of actions that are totally unrelated to copyright. That's because 1201 makes it illegal to circumvent basically any "technological protection measures." The intent of the copyright maximalists was to use this section to stop people from breaking DRM. However, other companies soon distorted the language to argue that it could be used to block certain actions totally unrelated to copyright law -- such as unlocking garage doors, ink jet cartridges, gaming accessories... and phones
  • Separately, every three years, the Librarian of Congress gets to announce "exemptions" to section 1201 where it feels that things are being locked up that shouldn't be. Back in 2006, one of these exemptions involved mobile phone unlocking.
  • Every three years this exemption was modified a bit, but in 2012, for unexplained reasons, the Librarian of Congress dropped that exemption entirely, meaning that starting in late January of 2013, it was possible to interpret the DMCA to mean that phone unlocking was illegal. In response to this there was a major White House petition -- which got over 100,000 signatures, leading the White House to announce (just weeks later) that it thought unlocking should be legal -- though, oddly, it seemed to place the issue with the FCC to fix, rather than recognizing the problem was with current copyright law.
  • ...2 more annotations...
  • While this gives Goodlatte and other maximalists some sort of plausible deniability that this bill is making no statement one way or the other on bulk unlocking, it certainly very strongly implies that Congress believes bulk unlocking is, in fact, still illegal. And that's massively problematic on any number of levels, in part suggesting that the unlocker's motives in unlocking has an impact on the determination under Section 1201 as to whether or not it's legal. And that's an entirely subjective distinction when a bill seems to assume motives, which makes an already problematic Section 1201 much more problematic. Without that clause, this seemed like a bill that was making it clear that you can't use the DMCA to interfere with an issue that is clearly unrelated to copyright, such as phone unlocking. But with this clause, it suggests that perhaps the DMCA's anti-circumvention clause can be used for entirely non-copyright issues if someone doesn't like the "motive" behind the unlocker.
  • Unfortunately, the bill was deemed so uncontroversial that it's been listed on the suspension calendar of the House, which is where non-controversial bills are put to ensure quick passage. That means that, not only did Goodlatte slip in a significant change to this bill that impacts the entire meaning and intent of the bill long after it went through the committee process (and without informing anyone about it), but he also got it put on the list of non-controversial bills to try to have it slip through without anyone even noticing.
John Lemke

Microsoft's OneDrive For Business Throws Down Gauntlet For Box, Dropbox | TechCrunch - 0 views

  • be unshackled from its other services, and sold as a standalone cloud storage solution for corporate customers. 
  • Now, with OneDrive for Business — the new SkyDrive Pro — Microsoft is selling cloud storage directly to businesses, no other strings attached. If you don’t want to buy into an Office-as-a-service contract, you can still buy cloud storage from Microsoft.
  • Microsoft is offering a deep discount — 50 percent
  • ...1 more annotation...
  • Dropbox has raised $607 million. Box has raised $414 million. That’s more than a billion for just two players in the market.
John Lemke

How LexisNexis and others may have unwittingly aided identity thieves | Ars Technica - 0 views

  • Wednesday's report exposes serious risks in what banks, mortgage companies, and other financial services call "knowledge-based authentication." Representatives from these services frequently rely on a list of about 100 questions such as "What was your previous address?" or "Which company services your mortgage?" when trying to determine if the person on the phone or filling out an application is the individual he claims to be. Ready access to the data stored by the data aggregators can make the difference between a fraudulent application being approved or rejected. Krebs goes on to recount a story told by Gartner fraud analyst Avivah Litan about a fellow analyst who witnessed an identity thief in action.
John Lemke

Former Microsoft Privacy Chief Says He No Longer Trusts The Company - HotHardware - 0 views

  • This is a fundamental problem for nations that aren't interested in exposing their traffic to American observation, whether they're engaged in nefarious activities or not. Long term, the problem could lead to the construction of digital firewalls, in which the United States is effectively isolated behind protective nodes built by local governments to scrub and redirect traffic away from potential capture points. This is directly in opposition to the central concept of the Internet, which is a dynamic structure capable of responding to outages or damage by routing around the problem.
John Lemke

Petition Launched To Get The White House To Open Source Healthcare.gov Code | Techdirt - 0 views

  • Of course, there are a few issues with this. First of all, while things created by government employees is automatically public domain, works created by contractors is not. So while conceptually we can argue that the code should be open sourced, it's not required by law. Second, and more importantly, it's a lot harder to take proprietary code and then release it as open source, than it is to build code from the ground up to be open source (and it's even more difficult to make sure that code is actually useful for anything). Indeed, if the code had been open sourced from the beginning, perhaps they wouldn't make embarrassing mistakes like violating other open source licenses.
  • By this point, open sourcing the code isn't going to fix things, but if more attention is put on the issue of closed vs. open code in government projects, hopefully it means that government officials will recognize that it should be open source from the beginning for the next big government web project.
  • After the disastrous technological launch of the healthcare.gov website, built by political cronies rather than companies who understand the internet, there has been plenty of discussion as to why the code wasn't open sourced. At that link, there's a good discussion from On the Media, with Paul Ford, discussing what a big mistake it was that the government decided not to open source the code and be much more transparent about the process. It discusses the usual attacks on open source and why they almost certainly don't apply to this situation.
John Lemke

Microsoft Announces Windows 10 | TechCrunch - 0 views

  • Starting tomorrow, Microsoft will launch a Windows Insider Program that will give users who are comfortable with running very early beta software access to Windows 10. This first preview will be available for laptops and desktops. A build for servers will follow later.
  • The company went on to detail that its new operating system will have a tailored user experience between different screen sizes — that’s to say that if you are on a smaller device, you will see a different sort of user interface. The code will run across all device categories: “One product family. One platform. One store.”
  • Put more bluntly, the company is going for the enterprise crown.
  • ...4 more annotations...
  • bringing back a few features of Windows 7
  • ncluding a redesigned start menu that combines the basic Windows 7 menu with the (resizable) tiles of the Windows 8 start screen. Windows 8 Metro apps can now also open in a windowed mode on the desktop, so you aren’t taking into the full-screen mode by default and you can use a “modern” Windows 8 side by side with a standard Windows desktop app.
  • multiple desktops
  • command line, too, which has also been improved quite a bit.
  •  
    "the last 943 people to cover the operating system got the name wrong."
John Lemke

The White House Big Data Report: The Good, The Bad, and The Missing | Electronic Fronti... - 0 views

  • the report recognized that email privacy is critical
  • one issue was left conspicuously unaddressed in the report. The Securities and Exchange Commission, the civil agency in charge of protecting investors and ensuring orderly markets, has been advocating for a special exception to the warrant requirement. No agency can or should have a get-out-of-jail-free card for bypassing the Fourth Amendment.
  • the algorithm is only as fair as the data fed into it.
  • ...22 more annotations...
  • the danger of discrimination remains due to the very digital nature of big data
  • especially the elderly, minorities, and the poor
  • an example of this in Boston, which had a pilot program to allow residents to report potholes through a mobile app but soon recognized that the program was inherently flawed because “wealthy people were far more likely to own smart phones and to use the Street Bump app. Where they drove, potholes were found; where they didn’t travel, potholes went unnoted.”
  • The authors of the report agree, recommending that the Privacy Act be extended to all people, not just US persons.
  • metadata (the details associated with your communications, content, or actions, like who you called, or what a file you uploaded file is named, or where you were when you visited a particular website) can expose just as much information about you as the “regular” data it is associated with, so it deserves the same sort of privacy protections as “regular” data.
    • John Lemke
       
      What is Metadate... then discuss
  • The report merely recommended that the government look into the issue.
    • John Lemke
       
      Did the report give a strong enough recommendation? "looking into" and doing are much different
  • several other government reports have taken a much stronger stance and explicitly stated that metadata deserves the same level of privacy protections as “regular” data.
  • We think the report should have followed the lead of the PCAST report and acknowledged that the distinction between data and metadata is an artificial one, and recommended the appropriate reforms.
    • John Lemke
       
      I very strongly agree.  The report failed in this area.
  • the White House suggested advancing the Consumer Privacy Bill of Rights, which includes the idea that “consumers have a right to exercise control over what personal data companies collect from them and how they use it,” as well as “a right to access and correct personal data.”
  • Consumers have a right to know when their data is exposed, whether through corporate misconduct, malicious hackers, or under other circumstances. Recognizing this important consumer safeguard, the report recommends that Congress “should pass legislation that provides a single national data breach standard along the lines of the Administration's May 2011 Cybersecurity legislative proposal.”
  • While at first blush this may seem like a powerful consumer protection, we don’t think that proposal is as strong as existing California law. The proposed federal data breach notification scheme would preempt state notification laws, removing the strong California standard and replacing it with a weaker standard.
    • John Lemke
       
      In other words, it failed at what can be done and it would actually lower standards when compared to what California has in place currently.
  • We were particularly disconcerted
  • the Fort Hood shooting by Major Nidal Hasan
    • John Lemke
       
      WTF? how did he get in this group?
  • two big concerns
  • First, whistleblowers are simply not comparable to an Army officer who massacres his fellow soldiers
  • Secondly, the real big-data issue at play here is overclassification of enormous quantities of data.
  • Over 1.4 million people hold top-secret security clearances. In 2012, the government classified 95 million documents. And by some estimates, the government controls more classified information than there is in the entire Library of Congress.
    • John Lemke
       
      Don't leave this stat out.  More classified documents than LOC documents.  WTF? A "democracy" with more secret documents than public?
  • The report argues that in today’s connected world it’s impossible for consumers to keep up with all the data streams they generate (intentionally or not), so the existing “notice and consent” framework (in which companies must notify and get a user’s consent before collecting data) is obsolete. Instead, they suggest that more attention should be paid to how data is used, rather than how it is collected.
    • John Lemke
       
      This is the most troubling part perhaps,  isn't the collection without consent where the breech of privacy begins?
    • John Lemke
       
      "notice and consent"
  • An unfortunate premise of this argument is that automatic collection of data is a given
  • While we agree that putting more emphasis on responsible use of big data is important, doing so should not completely replace the notice and consent framework.
  • Despite being a fairly thorough analysis of the privacy implications of big data, there is one topic that it glaringly omits: the NSA’s use of big data to spy on innocent Americans.
    • John Lemke
       
      If we ignore it, it will go away?  Did they not just mostly ignore it and accept it as a given for corporations and completely ignore it regarding the government? Pretty gangster move isn't it?
  • Even though the review that led to this report was announced during President Obama’s speech on NSA reform, and even though respondents to the White House’s Big Data Survey “were most wary of how intelligence and law enforcement agencies are collecting and using data about them,” the report itself is surprisingly silent on the issue.2 This is especially confusing given how much the report talks about the need for more transparency in the private sector when it comes to big data. Given that this same logic could well be applied to intelligence big data programs, we don’t understand why the report did not address this vital issue.
John Lemke

Active malware operation let attackers sabotage US energy industry | Ars Technica - 0 views

  • Researchers have uncovered a malware campaign that gave attackers the ability to sabotage the operations of energy grid owners, electricity generation firms, petroleum pipelines, and industrial equipment providers.
  • the hacking group managed to install one of two remote access trojans (RATs) on computers belonging to energy companies located in the US and at least six European countries, according to a
  • Called Dragonfly
  • ...3 more annotations...
  • "This campaign follows in the footsteps of Stuxnet, which was the first known major malware campaign to target ICS systems," the Symantec report stated. "While Stuxnet was narrowly targeted at the Iranian nuclear program and had sabotage as its primary goal, Dragonfly appears to have a much broader focus with espionage and persistent access as its current objective with sabotage as an optional capability if required."
  • been in operation since at least 2011
  • "The Dragonfly group is technically adept and able to think strategically," the Symantec report stated. "Given the size of some of its targets, the group found a 'soft underbelly' by compromising their suppliers, which are invariably smaller, less protected companies."
John Lemke

Mega Goes Legal, Issues Ultimatum Over Cyberlocker Report | TorrentFreak - 0 views

  • Mega was founded by Kim Dotcom but the site bears little resemblance to his now defunct Megaupload. Perhaps most importantly, Mega was the most-scrutinized file-hosting startup ever, so every single detail simply had to be squeaky clean. As a result the site took extensive legal advice to ensure that it complies with every single facet of the law. Nevertheless, NetNames took the decision to put Mega in its report anyway, bundling the site in with what are described as some of the market’s most dubious players. This was not received well by Mega CEO Graham Gaylard. In a TorrentFreak article he demanded a full apology from NetNames and Digital Citizens Alliance and for his company to be withdrawn from the report. Failure to do so would result in “further action”, he said.
  • “Mega’s legal counsel has written to NetNames, Digital Citizens Alliance and The Internet Technology & Innovation Foundation (ITIF) stating that the report is clearly defamatory,” Mega CEO Graham Gaylard told TorrentFreak this morning.
  • Firstly, Mega’s legal team are now demanding the removal of the report, and all references to it, from all channels under the respondents’ control. They also demand that further circulation of the report must be discontinued and no additional references to it should be made in public.
  • ...3 more annotations...
  • also demanding a list of everyone who has had a copy of the report made available to them along with details of all locations where the report has been published.
  • Finally, Mega is demanding a full public apology “to its satisfaction” to be published on the homepages of the respondents’ websites.
  • Mega has given the companies seven days to comply with the above requests.
John Lemke

Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks | Ars Technica - 0 views

  • Since some time in the second half of 2014, a different state-sponsored group had been casing their corporate network using malware derived from Stuxnet, the highly sophisticated computer worm reportedly created by the US and Israel to sabotage Iran’s nuclear program.
  • the malware was more advanced than the malicious programs developed by the NSA-tied Equation Group that Kaspersky just exposed. More intriguing still, Kaspersky antivirus products showed the same malware has infected one or more venues that hosted recent diplomatic negotiations the US and five other countries have convened with Iran over its nuclear program.
  • We see this battle or arms race emerging and now it involves some kind of confrontation between the security industry and nation-state sponsored spies
  • ...3 more annotations...
  • Kaspersky officials first became suspicious their network might be infected in the weeks following February's Security Analyst Summit, where company researchers exposed a state-sponsored hacking operation that had ties to some of the developers of Stuxnet. Kaspersky dubbed the highly sophisticated group behind the 14-year campaign Equation Group. Now back in Moscow, a company engineer was testing a software prototype for detecting so-called advanced persistent threats (APTs), the type of well-organized and highly sophisticated attack campaigns launched by well-funded hacking groups. Strangely enough, the developer's computer itself was having unusual interactions with the Kaspersky network. The new APT technology under development, it seemed, was one of several things of interest to the Duqu attackers penetrating the Kaspersky fortress. "For the developer it was important to find out why" his PC was acting oddly, Kamluk said. "Of course, he did not consider that machine could be infected by real malware. We eventually found an alien module that should not be there that tried to mask behind legitimate looking modules from Microsoft. That was the point of discovery."
  • What they found was a vastly overhauled malware operation that made huge leaps in stealth, operational security, and software design. The Duqu actors also grew much more ambitious, infecting an estimated 100 or so targets, about twice as many as were hit by the 2011 version.
  • So the Duqu 2.0 attackers pulled an audacious feat that Kaspersky researchers had never seen before. Virtually all of the malware resided solely in the memory of the compromised computers or servers. When one of them was restarted, the infection would be purged, but as the rebooted machine reconnected to the network, it would be infected all over again by another compromised computer in the corporate network. The secret lynchpin making this untraceable reinfection scheme possible was the Windows vulnerability Microsoft patched only Tuesday, which has been designated
John Lemke

Cops: Orlando Man Sabotaged "Whac-A-Mole" Games - News Story - WFTV Orlando - 0 views

  •  
    We've all seen the Whac-A-Mole arcade game. Now, police say an Orlando man sabotaged the Holly Hill company that makes that game by planting a software virus. It shut down hundreds of games all over the world.
John Lemke

Quadruped CHEETAH robot to outrun any human - 0 views

  •  
    It would be scary to be chased by a military robot. It would also be scary to be chased by a cheetah. So, imagine what it would be like to have a military robotic cheetah sprinting after you. Such a scenario could one day be possible, as robotics company Boston Dynamics recently announced that America's Defense Advanced Research Projects Agency (DARPA) has awarded it a contract to design and build such a ... critter. The contract also includes the creation of an agile, bipedal humanoid robot. It's hard to say which one might ultimately be creepier.
John Lemke

The Land Walker: the world's first 340cm bipedal exoskeleton - 0 views

  •  
    Japanese machinery and robotics manufacturer Sakakibara-Kikai has released the first genuine bi-pedal exoskeleton - a landmark event and one which is certain to attract a lot of attention for the company. Mechanatrons and BattleMechs have long been the subject of scifi books, comics and movies with the promise of cyborg technology popularised by the smash sixties television series "The Six Million Dollar Man." We've previously seen some celebrated exoskeletons in films such as Alien (Sigourney Weaver's Ripley takes out the Queen alien in an exoskeleton), Star Wars (the AT-ST Imperial Scout Walker) and RoboCop (the ED209), but until now, the nearest thing we've seen in the metal was the 3.5 metre superhero exoskeleton Enryu from Tmsuk in Japan. Sakakibara-Kikai's Land Walker is just a tad shorter than Enryu at 3.4 metres, weighs 1000kg and shuffles along at 1.5kmh. Enryu is a lot faster than Land Walker but uses caterpillar-like tracks rather than legs to perform its chores - the strapping 3.5 metre Enryu will be called upon to rush into burning buildings, lift heavy objects and rescue people.
John Lemke

Roxxxy the US$7,000 companion/sex robot (NSFW) - 0 views

  •  
    When it comes to technology, the sex industry is no laggard, and as robots become more human-like in their appearance and abilities, US-based company TrueCompany is poised to launch Roxxxy - the world's first sex robot - that has many more capabilities than your average sex doll. Apart from having better defined physical features than previous dolls, Roxxxy has been programmed with her own personality and her manufacturers say she can listen, talk, carry on a conversation, feel your touch and respond to it, as well as move her private areas inside when she is being "utilized" to deliver an unforgettable erotic experience. There are even plans for a male version - Rocky the Robot.
1 - 20 of 37 Next ›
Showing 20 items per page