Google AI coming to a computer near you...
We welcome Google Cyberdyne Skynet into our daily lives!
Watch out NSA, the GDDN will be on your tail.
296 posts • joined 11 Sep 2007
We welcome Google Cyberdyne Skynet into our daily lives!
Watch out NSA, the GDDN will be on your tail.
Heh, YouTube knows how to use HTML 5, but the Security Researcher doesn't... Amusing.
So, I had to deploy a brand new Windows 8.1 workstation the other day and by the time I got through, Microsoft had downloaded 1.8G of patches to install... Begs the question, where's the service pack to help prevent this? Oh, wait, we'll be getting Service Pack X (Windows 10) soon.
My question, after the same period of time after release, is Spartan going to be coming home on its shield?
Just remember, Microsoft needed help the first time as well. They bought SpyGlass in a panic over Mosaic's success on the infant web of the time. And think how NSA appropriate the original name SpyGlass for the Internet Browser sieve that got renamed to Microsoft Internet Explorer.
Yet another group of computer wizards finding out they need to hire competent professionals for a separate area of expertise. Always fear engineers who think that just because they can analyze the environmental forces, span requirements and loading calculations, create the plans and spec the materials for building a bridge, that knowledge confers on them the ability to do the ironwork, pour the concrete, run the crane or any other number of items necessary to create the finished work.
One thing that Komodia has shined a light on. All MITM software that pretends to inspect SSL traffic for your security, privacy, intellectual traffic protection and malware protection has probably been doing it wrong.
It's just a given in the slap-dash "OMG, SSL's gonna bypass our packet inspection and everything will be insecure again" way that this stuff has been thrown together, especially since the Google push for EVERYTHING HTTPS!
Growing pains, gotta love them. For most programmers, as in all things, hindsight's 100%, after all. Schneier's law kind of thing, the people coming up with this need someone external to break their stuff as they've focused so well on the implementation, that they've forgotten that there are a million people out there willing to crack bad implementation and use their product against their "customers".
Expect all security/safety MITM scan software to have severe flaws that allow them to rubber stamp invalid, revoked, specially crafted and self-signed certificates as fully non-trust breaking connections via their faked reassigned certificates unless proven otherwise.
What I'm coming to realize over a lifetime is that there aren't that many competent people on the planet. A lot of the population who think they're intelligent, are merely clever. Competence and management are two words that often don't ever match.
A really exasperating point is that it will downgrade connections to SSL V2 and SSL V3 connections on request to your MITM bogus server in addition to converting its cert to a trusted certificate. What have we been wasting our time for over the last 10 years by trying to improve security. It's the Sony rootkit all over again, easily appropriated and usable by anyone out there with bad intent.
And that twin headed hydra Konovo/Lomodia gives us the same assurances Sony did back in the day that nothing's wrong. We've heard it all before, denial, spin, eventual capitulation. Time for some class action lawsuits by some fortune 500 companies who will soon get hit by a quick spearfish attack enabled by using Komodia's severely broken software.
The private key is stored as a string in the adware program package software.
Hey guys, the bank safe is uncrackable, don't worry.
For ease of use, I just set the clock to allow 24hr entry, taped the combination knob key to the door and wrote the combination code on the front with a jumbo indelible felt marker.
Somebody once told me that all freedom will be lost by the simple premise, "We're doing it for the sake of the children!", one of the most basic knee jerk, hotbutton issues ever invented.
All you ever need to know about government is there in the "Yes, Minister" and "Yes, Prime Minister" BBC series.
It never was a comedy, but a detailed study on how we are on the gaff hook of bureaucracy.
Every time I hear any politician or bureaucrat talking, I just remember Jim Hacker, Sir Humphry Applebee and Bernard Wooley explaining the workings of government in detail.
Administration is eternal. Forever and ever. Amen.
The best way of handling telecommunications security is to assume that you've never had it and that everything you're currently doing to ensure it is ineffective or has been backdoored and bypassed.
The only thing you can do is attempt to prevent massive leakage to the lowest common denominators, but if you have anything that is wanted bad enough, it's already in someone else's hands.
Lenovo, NSA firmware hacks, now we know GSM was secure as the good old analog days if any intercept hardware was near. "May we live in interesting times!"
Ooh, you mean I might escape "Death by Powerpoint" at that overly long, semi-necessary Power Point Slide reading session called a Weekly Strategy Meeting on Monday?
I vote we give Microsoft a bonus every time they make people talk from outlined notes and actually give shortened, hopefully content rich presentations, not those graphically literate fluff sessions we've come to know and hate.
Welcome to more granite embedded in the cloud...
Your data is truly safe, just never to be seen again in this life.
My impression of most Google offerings purportedly targeting the business environment is that they are trying to undermine their competition by offering "free" services,
Free consumer grade services at that even if you're paying for it.
Every time you get used to something being useful in business, Google changes it to be more touchy-feely and social, often gutting the reasons you started using it in the first place. I've come to despise Google Apps.
Flash and Java popup alerts are always a good indicator you're on a compromised WordPress website...
Not that your long removed and nonexistent Oracle Java is in need of upgrade.
Or not that your recently manually upgraded Adobe Flash player is defunct because you didn't want to wait till the automatic update kicked in and you finally gave in and installed Flash Block because you don't really trust that the latest upgrade actually did anything (aka January 2015 0-day fatigue)
The annoyance continues with all the other popups including the marginal security goofery mentioned.
Google vs. Microsoft. Consumer Grade product vs. Commercial Grade product.
Welcome to the Google's new clothes, get used to seeing wedding tackle flopping about.
And that Sherman superiority in numbers had an acknowledged really bad history, such that tank crews nicknamed them "Ronsons, guaranteed to light on the first strike". Their popgun was a joke as they were out-gunned by the Panzers in range and striking power. You didn't just run a Sherman out to do head-to-head battle, you tried to get a group of Shermans positioned to exploit the weaknesses that Panzers exhibited.
Thankfully, as shown in Operation Barbarossa against the Russians, the German army had superior technology supported by inferior tactics and logistics.
Hmm, wonder were all that Apple product comes from? Don't worry, Japan got accused of the same thing before their automobile industry ate the US car manufacturer's lunch.
Borrowed engine designs modified for easier manufacture and field repairability
Mazda 626/Ford Courier = BMW 1600-2002 4 cyl
Toyota 4M = SOHC Mercedes 6 cyl
Toyota Landcruiser = Chevy 235 6 cyl
Datsun 1600-2000 = SOHC Mercedes 4 cyl
And then they came up with their own designs and the rest is history.
Heh, that beautiful CMS environment strikes again.
Maybe we need Microsoft to buy out WordPress and rework the security. While I'm not a particular fan of Internet Explorer, it would be nice for WP to at least be as good as or better at not serving as an infection vector.
Sounds like a designed in single point of failure. Time to eat the dogfood and make it distributed, like it should have been done in the first place. We been bein' dazzled by all those onion layers and multipath jiggery-pokery, only to have it vulnerable to this?
OMG, I'm all TORn up, my TORnography habit may be exposed...
Nice to know there's always an end run around this stuff. Get them to come in flocks, identify and flag the paranoid as some of them might be criminal... Sounds like a honeytrap to me.
Death by Powerpoint - heh, hehheh, hehh...
From all of us who've dealt with zombification by bullet point slide and an uninspired reader of said slides who purports to be giving an informational presentation.
Heh, my millwright uncle had no problems with the magstripe technology, he says a day at work around any heavy motors degausses them pretty effectively. His maximum life on card readability was about two weeks once.
We'll have to see how chip & pin and NFC fare under that environment.
"The Wife" doesn't seem to mind as she's also "The Better Half" and thinks "The Husband" is reasonably adequate to being a companion.
And what a thread hijack this whole discussion turned into... Worries of cloning Chip&Pin cards (soon to be standard in the US latecomer market as a platinum answer to all our woes) all swept aside in a flurry of pedantic semantics.
"The Better Half" tends to look after the bills and finds the discussion a waste of time as card security worries and dealing with credit card companies eats up real time unlike the gust of hot air and insignificance that has been the topic here.
Too much stench of the G-Man on it...
One of the first of many firsts...
Which will be repeated many times in the future.
Your TORnograpy isn't safe, your criminal activity isn't safe, your underground political activity isn't safe, your wish for anonymity isn't safe.
It's becoming increasingly easy to trap the paranoid, spread news that they can be paranoid in total anonymity and they will come sucking at the honeypot in droves.
The average Bitcoin user doesn't understand runs on banks and not being able to cover lender's balances... Otherwise no regulation wouldn't be such a "feature".
To complete that, it would be funny if any attorneys involved were required to take their payment solely in Bitcoin.
Belongs to them what owns their own aerospace program with launch facilities, their own chip fabbers, electronics manufacturers and satellite manufacturing.
Outsourcing is the first step in losing national security.
Free standing towers of data security.
Hardened against backdoor penetration by the NSA et. al.
May the Schwartz be with you!
The A-Nutty-Mess wars against something will pass on to mean pretty much nothing...
Honk if you love Jesus and all that rot.
You baggin' on Notwork Pollutions who keeps spamming me to have a free website built to better my business? Yep, they're still highly automated and deaf as they've always been.
Reduce your threat surface, don't follow the Silk Road.
Java is a system where compiled bytecode runs under a runtime environment.
The Java browser plugin hands off the execution to the Java runtime environment installed on your computer
ECMAScript runs within the browser
State it for what it really is, increased WAGS as to what on earth is happening. Welcome to faith based explanations over increase in traffic on a faith based TORnogrpahy network.
Simplicity by Complexity - or it takes another right Charlie to Foxtrot the system.
First thing, lock down sysadmin access to only what's necessary for the sysadmin to do his job. Shouldn't be a global account that has access outside his well define access level and job scope.
This is one reason to not trust the NSA. If he had GOD level status just because he was a puny SysAdmin, how do we know that Putin also doesn't have access... due to high level incompetence and the data leaks this enables.
Or they intentionally wished that the information be leaked so they can build a strawman.
Keeps you from being spied on by offering Privoxy and TOR for anonymously accessing your pedobear stash. First proxy/TOR node is your friendly local strongarm looking for marks to extort. Wubba wubba wubba.
But its so darn convenient!
Welcome over for tea, the Spandaus are warmed up, and the Jenny is dead.
In the haystack that is Linux, there is room for many needles to hide.
With all those lines of code, Detective Lecoq would be looking for the rumpled envelope in the letter basket.
In other words, it may have actually been a partner trying to expedite getting the job done.
Easiest way, hack QinetiQ.
It gets in the way of Agility, Extreme Programming, BYOD and whatever other latest Management Fad that hits the fan.
It is with greatest humility and admiration that we find our patch systems to be highly useful at doing much more than just making our computers run slower and inevitably need to be replaced as they start crashing from the continuous stream of CYA patch code.
Our computers become ever more needful of having multi-core systems with appreciable memory to run security software in the hopes that at least 5% of their processing power be left for doing other mundane activities, usually the tasks for which we purchased them in the first place despite the reality that the systems are probably already secretly compromised despite the 95% devotion of processing power for the prevention thereof.
Let the patches freely flow!
And also really useful as a buffing wheel compound for producing a really high polish on metal!
Oracle Sievemaster Sisyphus, just keep rolling that stone!
One day it may stay up there at the top of the hill, somewhere around the heat death of the universe.
All these Oracle Sievemaster Java fans like to make noise by pointing out that Android phones supposedly run Java applications.
Android uses the Java programming language and the Android API. Java source code is compiled to run on Dalvic. They had the good sense to boot the Java API and Java Virtual Machine to the curb.
So basically one Adobe PDF Reader vulnerability that was patched two years ago and one Smoking Piece o'Java that was patched last year.
Despite Oracle Slagware being a torture hole of demonic spew, if you'd kept it patched to the latest vulnerable version, you would still have missed out on joining the trojanfest. Nice to know that keeping the patches up had some little use and wasn't totally a Sisyphean task heading towards Pyrrhic Victory.