616 posts • joined 29 May 2007
So how does it work then ?
This Turla cd00r-based malware maintains stealth without requiring elevated privileges while running arbitrary remote commands. It can't be discovered via netstat, a commonly used administrative tool. It uses techniques that don't require root access, which allows it to be more freely run on more victim hosts. Even if a regular user with limited privileges launches it, it can continue to intercept incoming packets and run incoming commands on the system.
If it does not use elevated privileges then, I assume, that it has not tampered with the kernel. So how does it hide from netstat ?
Ah, later he says: The module statically links PCAP libraries, and uses this code to get a raw socket, ..., but use of PCAP requires superuser privileges???
I am not saying that this is not a threat ... but I would like to see something more plausible - if only so that we can protect ourselves -- without having to buy something from Kaspersky ... which is what I get the feeling this is all about - a marketing exercise.
The public sector spent £290m in 2013 with Oracle
If they put 10% of that into sponsoring open source projects I wonder how long before they have a royalty free suite that does what they need ? Run it on top of Linux using PostgreSQL, etc, and the bills would drop.
OK: open source projects will not do exactly what is needed, so pay FLOSS hackers to write the code and release it under the GPL. This code could be used/shared by different government departments, by industry and even other governments[**].
Do they not think that this is what Oracle is doing ? Write the code once and then implement it many times at different customers ?
I do realise that requirements will change, so any solution will need maintainance. I also realise that different use cases will have different detailed requirements, but well designed core components will be able to be reused.
[**] Hmmm, the thought of helping the French might put the kibosh on this :-)
If it turns out to be a bug
in the Microsoft s/ware, will they pay the $499 back ?
Oh - look at the pigs fly by ...
Re: Buying For The Sake Of It.
I have not felt the slightest urge to go out and buy anything today. Is there something wrong with me that even my best friend won't tell me ?
The wrong story
Assange was about Wikileaks and, at the time, Snowden. It looks that the USA have succeeded in neutralising him as I seem to remember that there was a lot of talk about the rape charges being 'encouraged' by USA operatives. Assange has now been removed from this.
What would Assange have gone on to do if he were not holed up at the embassy ?
BTW: I wonder what he does with his time and how he pays for his keep ? Does he wash the dishes or perform office tasks ?
How to bring competition
Is to ban exclusive deals, ie insist that every football match can be broadcast by at least 2 TV channels (or Internet stream). That gives the media the incentive to be cheaper than their rivals to get the eyeballs - thus introducing real competition. If the price paid to clubs drops, then so be it. There should be no minimum fee that has to be paid to a club; so if no (second) bidder bids more than your £100 to be there streaming from a web cam - then so be it.
The fans will gain from this.
The only losers will be the clubs & media.
Expect collusion between the clubs and the media and a few people going to prison as a result.
Re: One leg in the air?
It is looking for a lamp post to pee on -- wouldn't you be after 10 years ?
About £4.60 per customer affected
A few days bank charges will pay that.
No one else.
Give us the evidence - then I might trust you
I remember all too well Tony Blair saying how Saddam could blast us in 40 minutes and lots of other stuff from the dodgy dossier. I remember him asking us to trust him. What Therea May and the chief spooks are saying today smells as it came from a similar source.
If they want to convince me then show me the real evidence, come out with real numbers - not ones massages to support their case. I accept that I cannot see everything as it may destroy current investigations, but they could show it later. Show how they got to feel the bad guy's collars, how much by wire tapping, how much by old fashioned investigation. Do not sex it up.
And please don't blather mindlessly about terrorists, drug lords & paedophiles while vaguely waving your hands - it just does not wash. Whenever anyone tries to use emotions to make me forget logic: I switch off and put them in the 'not to be trusted' box.
Teenage pregnancy ?
Where is the daddy ?
Name and shame
We need to start to name & shame ISPs who do not offer IPv6 support.
I will start with Direct Save Telecom. I used them when I set up IP connectivity for the local community group office. I was told that they would provide IPv6 soon. Querying this 6 months later I was told "Oh, that was just the salesman - we have no plans for IPv6".
All that lovely data going overseas ...
where it will be perfectly safe! Ahem :-(
What could possibly go wrong ?
+1 to MOJ ignoring the cost to the tax payer through job losses & tax lost if it were done in the UK.
#100m over 10 years = #10m a year. Job loss: 65000 = #154/year saved for every job lost!
MoJ might gain; UK as a whole loses. Morons.
Presumably this crack is legal
They say that it bears the hallmarks of a state-sponsored attack, so presumably the White House will say ''fair enough, this is a legal crack into our network'', after all Prosecutors in Silk Road raid trial: If you're outside the US, you're fair game for hacking.
What is sauce for the goose, is sauce for the gander.
Currently EULAs are one of several wild wests of the Internet. However: because they do not disadvantage corporations there is little action to control them and certainly no campaign contributions for doing so.
Computer Misuse or Data Protection ...
Surely there must be some infringement under the Computer Misuse Act for it doing something that the owner does not want .... Oh, he agreed to it on installing it did he ? Does this thing record the number of people who did not read the agreement ?
Looking at what is collected - it is personal information. This information is being taken out of the UK.
However I agree with those above who say ''just say 'no' - don't use it''.
Subject data access request
I wonder what would happen, if in a few years time, I were to demand that the insurance company were to give me a copy of all the information that it has on me. This would have to include anything obtained from the GP records.
Who defines terrorist ?
What if someone goes to join the conflict in Gaza, should he be allowed to go ?
Yes/no if he goes to join Hamas to throw bombs ?
Yes/no if he goes to join the Israeli army to throw bombs ?
Both almost as bad as each other - but I bet only one gets stopped!
Re: "I've never been someone who is a scaremonger..."
He might not be - but too many people like him have called 'wolf' too many times - we no longer believe them.
Re: Closed is out of flavour these days.
The difference between closed and open source is rather like the difference between religion and science.
Religion (closed source): you do not have evidence (source code) and have to just accept what someone says is true. Theory correction (bug fixes) is hidden - if it happens at all.
Science (open source): you know that you can look at the evidence (source code) and verify what you are being told. Theory correction (bug fixes) happens in public view.
You might not have the ability/desire to look at the source code, but know that other can.
Open source problems are visible for all the world to see, do you know what horrors lurk in closed source ?
I wonder what he would say about the idea that attacking computers in another country is OK and that those who do so are immune from prosecution ?
If nothing else this is breach of copyright .... people get sued for millions by the record/... companies for doing just that.
This will end up being ignored/forgotten
in a few weeks time. Just as almost everything else that Israel does as it slowly takes more Palestinain land to build more 'settlements'. It is a simple fight for land and resources that the rest of the world does nothing more than wring its hands muttering 'how terrible'. However genocide in other countries does get action.
Neither side comes out of it smelling of roses, but Palestinian fighters are called 'terrorists' and Israeli ones 'the army' -- in the sound bite media 'armies' are OK, 'terrorists' are not. But does it make a difference what they are called - they still kill people, the Israelis kill far more than do the Palestinians.
Israel has been condemned in 45 UN resolutions but the rest of the world looks the other way: https://en.wikipedia.org/wiki/List_of_the_UN_resolutions_concerning_Israel_and_Palestine
What is going on is a form of aparteid: http://www.youtube.com/watch?v=93hqlmrZKd8
Please do something useful with it
like recording details of the scammer's machine:
* machine registration details, OS, timezone, ...
* traceroute to google - will give some real IP address on the way out
It is the second that is useful - it should not be hard to work out who is using that IP address and send in the fuzz to grab all machines and use the first to identify the individual machine. They can then start throwing these people in jail.
Assuming that local law enforcement or politicians are not bought off with bribes - these scammers could be a non trivial foreigh earner in some parts of the world.
Don't tell the Daleks
This sounds like an excellent story for Dr Who - where the good Dr can, yet again, foil a darstadly plot by the tin pepper pots!
Re: BBC Worldwide
Some machines that I ssh into I do over a VPN ... does that make me doubly suspicious ?
The only way that I can see this coming in is if there is some kind of way of tunneling TCP inside NDN. Yes: this is not what you are supposed to do, but I cannot see people rewriting their applications until a lot of other applications exist -- so a chicken & egg situation.
Distasteful or Terrorist Act ?
Whereas watching someone being beheaded could be thought of distasteful or ghoulish, is it really a terrorist act ? This overly enthusiastic condemnation makes me less likely to believe that ISIS/IS really is ''The Threat'' to our way of life - just as Saddam being able to hit us with missiles in 45 minutes never was.
Anyway: what is the difference between watching this clip and the Texas Chainsaw Massacre or World War II footage or even playing Grand Theft Auto, all show people being killed - to various levels of realism ?
For the family involved - I have complete sympathy, but that is another matter.
Re: Missing information
both OS-X and enterprise Linux distributions have had far more security vulnerabilities than current Windows versions
Can you provide some information to back that claim up please.
I can see the start of a new game ...
asking Siri outrageous questions:
* what is the nearest bank that I can rob ?
* where is my nearest drug dealer ?
* how can I transfer money to ISIS ?
Points awarded on how funny the replies are; a bonus if the cops want to know why you are asking the questions.
How the gov't sets itself up for a fail ....
If you are carrying a covert mobile phone, you MUST NOT carry any personal communications device e. g. mobile phone, ....
and (my boldening):
officers .... may wish to advise family or friends of disruption to their travel plans. .... If a phone is not available at the airport, then during office hours contact the OPA-TAS OOA number ...
In other words they do not keep the OOA number monitored 24x7 which will vastly increase the temptation for a quick call home to tell the missus that you are late ...
For the sake of a few bob they increase the risk a security breach - stupid!
Re: Removable batteries
Could this be part of the reason for the recent requirement to switch on such devices when passing through airports ... most people will then just leave the battery in the device.
Re: "they would release the name of the daughter of St Louis County’s police chief"
Read further in the article ... they recognised the point that you make and said that they would not release the name.
Re: Any consequences?
The names of those responsible for this criminal activity have been REDACTED, so none of them will pay the price.
Until *individuals* are held responsible for their actions nothing will change.
Re: It's not Open Source it's an open standard
That is important since it levels the playing field, allows other s/ware to interoperate. I do not expect a sudden switch to Open Source s/ware, but people will start to care less since they do not need MS s/ware to properly handle their documents. One they care less the market will open out to other suppliers.
Also: documents will now be readable in 100 years time.
The link Sunswift in the article
takes you to something about sitting being bad for you. What is the relevance of this? OK: the study was done at Uni of NSW, but still hardly relevant ???
What a waste of space ...
has anyone told the ICO that their purpose is to protect us from people using data inappropriately ? Keeping registered is the least important part of that.
This tallys with my experience of them (when making a complaint) they are not very interested. When asking for advice on the cookie law a couple of years ago they were very reluctant to make clear statements.
I can see that from the ICO's point of view they need to keep the cash coming in - but that is not the purpose that Parliament created them for!
I may be naive ...
but these bandits extract money from their victims. That money will need to be extracted from a bank or similar somehow - why can the police not ''follow the money'' and collar whoever walks away with the foldy stuff ? I accept that it might be hard, but that they don't seem to do it at all suggest that the cops are not interested; each one might be small beer, but added up it is a lot of dosh, quite apart from the anguish caused and time wasted.
Also: Edward Snowden has told us how much the NSA/GCHQ snoop - why do they not put their efforts to some useful end -- I thought that they were charged with protecting us from harm. If this is not harm ... then what the hell is ?
Re: Educate the public
Add to that:
"I know, but what can I do about it ?
"I am too busy
I quote pastor Martin Niemöller at them, but they still can't be arsed :-(
Is the sun growing up ?
No longer a teenager - no more spots on it's face ?
Re: See ...
Am I the only one who wonders about the coincidence of timing:
* government rushes through act for preservation of snooping powers. Ministers cite dangers to this country from terrorism and paedophiles.
* last week there were increased restrictions of mobile phones, etc, on flights to the USA
* today 660 suspected paedophiles were arrested after a 6 month operation
Just what was needed to ensure that the act sailed though Parliament!
Not an ISO 3166 code
So it isn't a real country TLD therefore it is a vanity one.
Are they also going to get their own 'phone telephone country code or continue to live under +44 ?
Giving the NSA all the UK government confidential information is part of its bid to become the 51st state of the USA.
Robot taxi cabs
I wonder what grounds the TLC will use to ban robot taxi cabs when they become feasible in a few years time.
A lack of training by the BBC
This sort of thing will happen again & again. Education about computers in schools is hopeless; for most it centers around things like trying to produce powerpoint presentations in a point and click manner without much thought and imparting little insight. Few are taught a bit about what is happening behind the GUI menus. Hardly surprising since most school teachers do not have much IT clue.
Talk to many about security and they will think of blocking porn sites and stare blankly if you press for more.
Companies are generally little better: assume that staff will muddle through.
Until some real understanding is properly taught this script will be repeated endlessly.
This is easy to prevent
The problem is that file name starting with a '-' will be pattern matched; words on the command line that start with '-' can be interpretted as options. This is not usually a problem as most people do not create files with names starting '-', but a cracker might.
So get the shell to not expand (do wild card matching) on file names that start '-'. Put the following into your environment (eg via /etc/profile):
The first is for ksh, the second for bash. QED.
Re: dot and slash
P.S. If you really *were* trying to write a trapdoor into a system, surely you'd use "invisible" files with names containing backspaces or octal \000 characters?
You cannot create a file name with a NUL character in it - that would be the end of string to the system call.
We owe this man a debt of gratitude
for providing the evidence of what the spooks were up to in a form that is hard for them to deny and available to the general public.
However: let us not forget others who have helped to expose the malfaisance of governments, eg: Bradley/Chelsea Manning and those who have helped them, eg Wikileaks. Here is a list that may be of interest: https://en.wikipedia.org/wiki/List_of_whistleblowers
Re: I harbor some darknet myself
The folders in which said pics are stored are not indexed by Google because there is no link to them.
And if you send the private URL one of your friends via their Gmail account ... does google still not index it ? Are you quite sure about that ?