Skip to main content

Home/ Digit_al Society/ Group items tagged protocols

Rss Feed Group items tagged

dr tech

A search-engine for insecure cameras, from baby-monitors to grow-ops / Boing Boing - 0 views

  •  
    "Shodan is a search engine for the Internet of Things, scanning the public Internet for devices communicating on ports and over protocols that are commonly used by IoT devices. By feeding it the right parameters -- Real Time Streaming Protocol (RTSP, port 554) -- you can find innumerable publicly shared webcams, ranging from CCTVs that oversee marijuana grow-ops and many, many baby-monitors. "
dr tech

How the internet was invented | Technology | The Guardian - 0 views

  •  
    "In response, the architects of the internet developed a kind of digital Esperanto: a common language that enabled data to travel across any network. In 1974, two Arpa researchers named Robert Kahn and Vint Cerf published an early blueprint. Drawing on conversations happening throughout the international networking community, they sketched a design for "a simple but very flexible protocol": a universal set of rules for how computers should communicate."
dr tech

What is HTTP/2 and is it going to speed up the web? | Technology | The Guardian - 0 views

  •  
    "HTTP/2 is a more modern protocol that essentially speeds web browsing up using new ways of transporting data between the browser and server across the internet. It is backwards compatible with HTTP1.1 and uses most of the same technologies, but it is more efficient and allows servers to respond with more content than was originally requested, removing the need for the user's computer to continually send requests for more information until a website is fully loaded."
dr tech

Efail: can email be saved? / Boing Boing - 0 views

  •  
    "The revelation that encrypted email is vulnerable to a variety of devastating attacks (collectively known as "Efail") has set off a round of soul-searching by internet security researchers and other technical people -- can we save email? One way to think about Efail is that it was caused by a lack of central coordination and control over email-reading programs -- the underlying protocols are strong and robust, but they can be implemented in ways that create real problems. In particular, the ability to show HTML inside a message makes email very hard to secure:"
dr tech

Android devices ensnared in DDoS botnet | ZDNet - 0 views

  •  
    "Netlab researchers, who are usually among the firsts to discover emerging botnets, said the botnet contains several clues to suggest this is the work of the same group which developed the Moobot botnet in 2019 and the LeetHozer botnet in 2020. Both botnets were essentially built and used for launching DDoS attacks, which also appears to be Matryosh's primary function, as well. The Netlab team says they found functions in the code specific to features that will use infected devices to launch DDoS attacks via protocols like TCP, UDP, and ICMP."
dr tech

Google introduces the biggest algorithm change in three years | Technology | theguardia... - 0 views

  •  
    "Not everything is so straightforward in Google land, as Google's chat protocols Hangouts and Talk, suffered a privacy issue on the 26 September that saw instant messages routed to unintended recipients."
dr tech

The UK government's voice-over-IP standard is designed to be backdoored / Boing Boing - 0 views

  •  
    "GCHQ, the UK's spy agency, designed a security protocol for voice-calling called MIKEY-SAKKE and announced that they'll only certify VoIP systems as secure if they use MIKEY-SAKKE, and it's being marketed as "government-grade security." But a close examination of MIKEY-SAKKE reveals some serious deficiencies. The system is designed from the ground up to support "key escrow" -- that is, the ability of third parties to listen in on conversations without the callers knowing about it."
dr tech

Major vulnerability in 5G means that anyone with $500 worth of gear can spy on a wide a... - 0 views

  •  
    "That's why it was so important that the new 5G mobile protocol be designed to foil IMSI catchers, and why the 3rd Generation Partnership Project, or 3GPP (the body standardizing 5G) updated the Authentication and Key Agreement (AKA) to resist IMSI catching techniques."
dr tech

I helped build ByteDance's censorship machine - Protocol - The people, power and politi... - 0 views

  •  
    "My job was to use technology to make the low-level content moderators' work more efficient. For example, we created a tool that allowed them to throw a video clip into our database and search for similar content. When I was at ByteDance, we received multiple requests from the bases to develop an algorithm that could automatically detect when a Douyin user spoke Uyghur, and then cut off the livestream session. The moderators had asked for this because they didn't understand the language. Streamers speaking ethnic languages and dialects that Mandarin-speakers don't understand would receive a warning to switch to Mandarin."
aren01

Protocols, Not Platforms: A Technological Approach to Free Speech | Knight First Amendm... - 1 views

  •  
    "Some have argued for much greater policing of content online, and companies like Facebook, YouTube, and Twitter have talked about hiring thousands to staff up their moderation teams.8 8. April Glaser, Want a Terrible Job? Facebook and Google May Be Hiring,Slate (Jan. 18, 2018), https://slate.com/technology/2018/01/facebook-and-google-are-building-an-army-of-content-moderators-for-2018.html (explaining that major platforms have hired or have announced plans to hire thousands, in some cases more than ten thousand, new content moderators).On the other side of the coin, companies are increasingly investing in more and more sophisticated technology help, such as artificial intelligence, to try to spot contentious content earlier in the process.9 9. Tom Simonite, AI Has Started Cleaning Up Facebook, But Can It Finish?,Wired (Dec. 18, 2018), https://www.wired.com/story/ai-has-started-cleaning-facebook-can-it-finish/.Others have argued that we should change Section 230 of the CDA, which gives platforms a free hand in determining how they moderate (or how they don't moderate).10 10. Gohmert Press Release, supra note 7 ("Social media companies enjoy special legal protections under Section 230 of the Communications Act of 1934, protections not shared by other media. Instead of acting like the neutral platforms they claim to be in order obtain their immunity, these companies have turned Section 230 into a license to potentially defraud and defame with impunity… Since there still appears to be no sincere effort to stop this disconcerting behavior, it is time for social media companies to be liable for any biased and unethical impropriety of their employees as any other media company. If these companies want to continue to act like a biased medium and publish their own agendas to the detriment of others, they need to be held accountable."); Eric Johnson, Silicon Valley's Self-Regulating Days "Probably Should Be" Over, Nancy Pelosi Says, Vox (Apr. 11, 2019), https:/
  •  
    "After a decade or so of the general sentiment being in favor of the internet and social media as a way to enable more speech and improve the marketplace of ideas, in the last few years the view has shifted dramatically-now it seems that almost no one is happy. Some feel that these platforms have become cesspools of trolling, bigotry, and hatred.1 1. Zachary Laub, Hate Speech on Social Media: Global Comparisons, Council on Foreign Rel. (Jun. 7, 2019), https://www.cfr.org/backgrounder/hate-speech-social-media-global-comparisons.Meanwhile, others feel that these platforms have become too aggressive in policing language and are systematically silencing or censoring certain viewpoints.2 2. Tony Romm, Republicans Accused Facebook, Google and Twitter of Bias. Democrats Called the Hearing 'Dumb.', Wash. Post (Jul. 17, 2018), https://www.washingtonpost.com/technology/2018/07/17/republicans-accused-facebook-google-twitter-bias-democrats-called-hearing-dumb/?utm_term=.895b34499816.And that's not even touching on the question of privacy and what these platforms are doing (or not doing) with all of the data they collect."
dr tech

Myspace lost all the music its users uploaded between 2003 and 2015 / Boing Boing - 0 views

  •  
    "It's been a year since the music links on Myspace stopped working; at first the company insisted that they were working on it, but now they've admitted that all those files are lost: "As a result of a server migration project, any photos, videos, and audio files you uploaded more than three years ago may no longer be available on or from Myspace. We apologize for the inconvenience and suggest that you retain your back up copies."
dr tech

The Guardian view on free speech online: let law decide the limits | Editorial | Opinio... - 0 views

  •  
    "The standards by which the internet is controlled need to be open and subject to the workings of impartial judiciaries. But the task cannot and will not be left to the advertising companies that at present control most of the content - and whose own judgments are themselves almost wholly opaque and arbitrary."
dr tech

MIT trains self-driving cars to change lanes like human drivers do - 0 views

  •  
    "MIT researcher's at CSAIL have developed a lane-changing algorithm for self-driving cars. the algorithm allows for aggressive lane changes much like the kind only real drivers would be capable of.   it works by computing 'buffer zones' around autonomous vehicles and reassessing them on the fly. MIT uses a mathematically efficient approach which calculates new buffer zones if the default buffer zones lead to performance that's far worse than a human's driver."
dr tech

Gadgets have stopped working together, and it's becoming an issue | Smartphones | The G... - 0 views

  •  
    "Interoperability is the technical term for what we've lost as tech has matured. Software can be interoperable, either through common, open file formats, or through different programs speaking directly to one another, and so too can hardware: open standards are what allow you to use any headphones with any music player, for instance, or buy a TV without worrying if it will work with your streaming set-up."
dr tech

How Excel may have caused loss of 16,000 Covid tests in England | Health policy | The G... - 0 views

  •  
    "But while CSV files can be any size, Microsoft Excel files can only be 1,048,576 rows long - or, in older versions which PHE may have still been using, a mere 65,536. When a CSV file longer than that is opened, the bottom rows get cut off and are no longer displayed. That means that, once the lab had performed more than a million tests, it was only a matter of time before its reports failed to be read by PHE."
dr tech

The US has suffered a massive cyberbreach. It's hard to overstate how bad it is | Techn... - 1 views

  •  
    "This is called a supply-chain attack, because it targets a supplier to an organization rather than an organization itself - and can affect all of a supplier's customers. It's an increasingly common way to attack networks. Other examples of this sort of attack include fake apps in the Google Play store, and hacked replacement screens for your smartphone."
dr tech

U+237C ⍼ RIGHT ANGLE WITH DOWNWARDS ZIGZAG ARROW · Jonathan Chan - 0 views

  •  
    "Known as right angle with downwards zigzag arrow, angle with down zig-zag arrow, \rangledownzigzagarrow, and ⍼, no one knows what ⍼ is meant to represent or where it originated from. Section 22.7 Technical Symbols from the Unicode Standard on the Miscellaneous Technical block doesn't say anything about it."
1 - 20 of 22 Next ›
Showing 20 items per page