Jump to content

Windows 8 - Deeper Impressions


JorgeA

Recommended Posts

In privacy news:

Report: NSA intercepts computer deliveries

LONDON (AP) -- A German magazine lifted the lid on the operations of the National Security Agency's hacking unit Sunday, reporting that American spies intercept computer deliveries, exploit hardware vulnerabilities, and even hijack Microsoft's internal reporting system to spy on their targets.

.

One of the most striking reported revelations concerned the NSA's alleged ability to spy on Microsoft Corp.'s crash reports, familiar to many users of the Windows operating system as the dialogue box which pops up when a game freezes or a Word document dies. The reporting system is intended to help Microsoft engineers improve their products and fix bugs, but Der Spiegel said the NSA was also sifting through the reports to help spies break into machines running Windows. One NSA document cited by the magazine appeared to poke fun at Microsoft's expense, replacing the software giant's standard error report message with the words: "This information may be intercepted by a foreign sigint (signals intelligence) system to gather detailed information and better exploit your machine."

The arrogance of these people is monumental.

Here's the link to the original article by Der Spiegel, which offers a more extensive and somewhat more detailed discussion. Read it and start shakinhg your head. :no:

image-583918-galleryV9-onik.jpg

image-583917-galleryV9-akfw.jpg

(Sorry for the enormous amount of space used up there.)

A comprehensive internal presentation titled "QUANTUM CAPABILITIES," which SPIEGEL has viewed, lists virtually every popular Internet service provider as a target, including Facebook, Yahoo, Twitter and YouTube. "NSA QUANTUM has the greatest success against Yahoo, Facebook and static IP addresses," it states. The presentation also notes that the NSA has been unable to employ this method to target users of Google services. Apparently, that can only be done by Britain's GCHQ intelligence service, which has acquired QUANTUM tools from the NSA.

.

Once TAO teams have gathered sufficient data on their targets' habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service's covert servers, known by the codename FOXACID.

This NSA server coerces the user into connecting to NSA covert systems rather than the intended sites. In the case of Belgacom engineers, instead of reaching the LinkedIn page they were actually trying to visit, they were also directed to FOXACID servers housed on NSA networks. Undetected by the user, the manipulated page transferred malware already custom tailored to match security holes on the target person's computer.

.

And the techniques go beyond digital theft to physical theft:

Sometimes it appears that the world's most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors.

Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer.

These minor disruptions in the parcel shipping business rank among the "most productive operations" conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks "around the world."

Things aren't as bad as they seem -- they're worse. :realmad:

--JorgeA

Link to comment
Share on other sites


Yes JorgeA ... you are so right ... It just gets worse !

I was reading all this earlier but I figured you or Charlotte would bring everyone up to speed on the latest news.

This part is crazy ... "The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer."

What other stuff is being "carefully opened" and being resealed?

Link to comment
Share on other sites

An excellent question IMHO.

That part, at least, isn't new -- I think that as far back as World War I, the feds were opening people's mail in an effort to root out opponents. I do know (or have been told, anyway) that the FBI developed effective techniques for steaming envelopes open so that then they could reseal them without the recipient's ever knowing.

But all that is piecemeal, targeted, and labor-intensive. Today they can do mass surveillance at the click of a mouse button.

Here's one bit of fallout from all the nosing around:

A New Twist in International Relations: The Corporate Keep-My-Data-Out-of-the-U.S. Clause

Some companies are apparently so concerned about the NSA snooping on their data that they're requiring - in writing - that their technology suppliers store their data outside the U.S.

[...]

Thompson said the language began appearing in contracts over the past couple weeks, and could be an early indicator of things to come as businesses adapt to a landscape altered by former NSA contractor Edward Snowden's leaks. Documents leaked by Snowden indicate that the NSA has tapped fiber-optic cables abroad, circumvented or cracked encryption and is massively collecting telephone records and Internet traffic. Facebook, Google, Apple and Yahoo were among 15 technology companies that asked President Barack Obama Dec. 17 to restrain the spy programs. Cisco said Nov. 13 that NSA spying has caused delays to networking equipment orders.

U.S.-based technology companies face a serious threat. The NSA disclosures may reduce U.S. technology sales overseas by as much as $180 billion, or 25 percent of information technology services, by 2016, according to Forrester Research Inc., a group in Cambridge, Massachusetts.

* * *

Everybody (else) seems to be on vacation this week. I'll keep posting here and there, holding the fort 'til they come back.

Happy New Year! :thumbup

--JorgeA

Link to comment
Share on other sites

More rumors on Microsoft's "Threshold" Windows plans pop up ( NeoWin 2013-12-26 )

The report begins by claiming that a minor update to Windows 8.1 will be released by the third quarter of 2014, which will help the OS work better with Windows Phone 8.1 and the first major software update for the Xbox One.

[...]

The report also claims that the official start of development for Threshold is supposed to happen by the spring of 2014. However, it adds that could change depending on a number of factors, including the basic issue of making all of this work from a engineering aspect. It's also possible that the new CEO of Microsoft, who will likely be picked early in 2014, might have different plans for Windows.

NeoWin article with supposedly new information but it really just looks like clickbait for NeoKids since there is nothing new or solid that I can see. Using history as a guide, and by that I mean Microsoft always being "a day late and a dollar short" that timeline would be believable, but it will be fatal. In fact it might already be too late. Over this holiday season I was continually stunned by the amount of TV commercials for apps and services which always said "now available for iOS and Android" and never a mention of WP or Windows 8. I almost began to feel sorry for Microsoft and all the NeoKids who must be madder than hell when these commercials air. That also reinforces the huge problem they got themselves into with the stupid idea of not clearly differentiating mobile from the native OS. When an app is for Android or iOS you know you can use it. Thanks to Microsoft Idiocracy even a fabulous hypothetical app written for WP would start out with a disadvantage - no clear platform identification. If they had kept "Metro" and reserved that name for "apps" it would have been so simple. What a disaster. Now the rumors are they will take their time and maybe iron things out in another year! They will be screwed beyond hope.

Two Microsoft Windows veterans depart the company today ( NeoWin 2013-12-31 )

Microsoft's Windows team will be without two of their most influential team members when the new year begins on Wednesday. Jon DeVaan, who worked at the company for almost 30 years, has announced he will leave Microsoft along with Grant George. Today is officially the last day for both men at the company.

[...]

According to GeekWire, DeVaan announced his departure on his personal Facebook page Monday. He later sent out an email statement saying, "I am spending time with my family and holding space open to see what opportunities develop." He first joined Microsoft in 1984 and rose through the ranks to become the Corporate Vice President of Windows Development. He is credited with helping to launch Windows 7 after the poor reception to Windows Vista.

[...]

Both DeVaan and George were rumored to be leaving Microsoft for the last few months, as part of the company's reorganization that put Terry Myerson in charge of all operating system development. A few weeks ago, it was revealed that two other major Windows leaders, Ted Dworkin and Jensen Harris, are now a part of Microsoft's Bing team.

Hmmmm, the NeoKids always tell us Sinofsky saved Windows 7 ( yeah right ). Anyway, the carnage continues ( reminds me of lyrics in a famous Black Sabbath song: "In the fields of bodies burning" :lol: ). The comments just got started but already a few are pouring gasoline into the thread. Expect a nice fire.

Google files lawsuit to fight off patent consortium that includes Microsoft ( NeoWin 2013-12-25 )

Google Files Lawsuit Against Apple- and Microsoft-backed Patent Group. Rockstar Consortium under fire after targeting Android. ( Maximum PC 2013-12-26 )

Google has decided that enough is enough. The company has filed a lawsuit against Rockstar Consortiuma patent group backed by many of Googles biggest competitorsclaiming that the groups patent campaign is unfairly targeting Google and its Android partners.

[...]

The thousands of patents and patent applications involve core phone technologies like wireless connectivity, networking, and even semiconductors. Googles fighting back with its own lawsuit, and it seems that Rockstars confidence is wavering. Bloomberg recently reported that some of the Nortel patents are already being sold off.

If you can't beat Android, sue 'em and tax 'em. What a perfect case for a sane judge to rollback the patent craziness. Let's hope this one ends well.

Link to comment
Share on other sites

Microsoft May be Working On New Non-Windows OS ( Tom's Hardware 2013-12-31 )

Sources say this new language is codenamed "M#," or M sharp; Duffy names this new language as "C# for Systems Programming." Sources also claim that M# is an extension of Microsoft's C#, and reportedly grew out of Sing#, which is the system language of Microsoft's Research Singularity OS.

There's a possibility the M# platform will go open-source.

ZDNet reports that a "skunkworks" team began working on Midori since at least 2008. The project was originally "championed" by Microsoft CTO Eric Rudder, and the team itself consisted of all-star Microsoft veterans, including Duffy. The project also had several developers pulled in from the outside.

Ultimately, what's expected to happen is that parts of this operating system will be pulled out to be used in Windows 9 and beyond.

Well that is way, way too much speculation there. And I suspect any such plans are subject to scrapping at a moment's notice considering the disaster that Microsoft Tiles has become. If they cannot even get traction with a captive monopolized OEM channel and with the obvious ability to kill the competition by decree ( Windows 7 and Windows XP ) and with the benefit of a multi-billion dollar advertising budget, then what hope does some little geek project have in this bureaucracy. None. They're spinning their wheels. My bet is that this kind of research has but one goal - to lock up ideas into patents to be pulled out of their hat later to thwart actual open source or even retail efforts.

Windows 8.1 Causing Wi-Fi Connectivity Issues ( Tom's Hardware 2013-12-30 )

A Microsoft rep explains that a limited connection means the device has connected to a router, but the PC wasn't assigned a valid IP address. However, Internet connection problems are most commonly caused by disconnected cables or by routers and modems that aren't working correctly, the rep says. The rep then points to links for wired and wireless network problems, and why users can't connect to the Internet.

"This is horrible response and I've seen it given by other MS engineers," another complaint reads. "Thousands of people are having this problem since the 8.1 release. I highly doubt all of us had our routers go bad at the same time. Own up to this Microsoft and please fix it. The standard response will not cut it anymore."

I love it. No connection and the best answer is to visit a website, such is the built-in problem to client-server models. It reminds me of in the mid-1980's getting told that some big-iron terminals went down ( 3270's all over a huge building ) and the easiest way to find them was to walk around the plant and look for people slacking off and talking or missing from their station. :lol: The funny thing is that as more Microsoft devices arrive on the scene ( well that's their plan ) and less OEM devices, something different will happen this time around. These support calls are going to wind up at Microsoft rather than at Dell or HP. They got off easy in the past as the OS software supplier, even though so many problems originated from the OS itself they managed to divert attention from themselves to the poor OEM hardware maker. It was quite an accomplishment. I'm not sure they really thought this whole thing through.

Microsoft offers free 30-day subscription to New York Times on Windows devices ( NeoWin 2013-12-29 )

As it turns out there is no promotion from Microsoft here, it was merely a NYT offer seen on the Microsoft Store that for some strange reason NeoWin took as a Microsoft promotion ( and the page still stands that way ). Whatever.

But when I first read this what came to mind was something completely different than the NeoKids would think of, and that is some MicroSheep reading the NYT on their Microsoft Tiles device and then getting news on the Snowden leaks. :lol: NeoWin has this image in the article. But I made my own instead which shows some of the headlines from the past few months that the fanboys might have missed ...

xMljHaG.gif

( Sources: 1, 2, 3, 4, 5, 6, 7, 8, 9 )

Link to comment
Share on other sites

Infamous NSA leaker Edward Snowden says he's "already won" ( TechSpot 2013-12-23 )

Snowden cites Orwell in Christmas message ( New York Post 2013-12-26 )

Orwell? Snowden "already won"? :yes: Absolutely can't argue with either of those points. But if he won then who lost? The Feds? :no: No. The real losers are not the government spooks, but the peasants I mean citizens of all countries because we are witnessing a worldwide phenomenon where all "governments", the ruling class are erecting a deep network of spying, not to protect their sheeple from terrorist bombings, but as the eyes and ears components of their Praetorian guardship. They are dug in, thorough and omnipresent and with the remaining exception of murder and genocide ( even this is debatable ) they have long left the infamous pioneers of the police state - the SS and KGB, in the rear view mirror. Snowden is clearly the "man of the year" in my book, and favorite for "man of the century". I wonder if there are any people around who haven't been surprised by the content of the leaks. BTW, you really got to give credit to the reporters in this case, particularly Glenn Greenwald at the Guardian ( and I can't believe I just said that ~ahem~ ). They are using a smart strategy of a continuous parade of information rather than dropping them all at once. Had they done the latter the story would have been effectively countered and many details would have been already lost to short term memory. Now each and every facet of the spying is being scrutinized. A New Year's toast to these folks. :yes:

Security firm RSA "categorically denies" accepting money from NSA to use flawed crypto code ( TechSpot 2013-12-23 )

RSA Denies Secret $10 Million Contract With NSA ( Tom's Hardware 2013-12-26 )

Very slippery statements from what I have read. You guys want credibility? Then do a non-restricted interview with Bruce Schneier and even competitors and answer their questions. For example, when did you first learn of the backdoor in Dual_EC_DRBG, and when did you warn your customers about it. And that would be the easiest question I would expect. The fact of the matter is that the spooks would have an elaborate web of plausible deniability concocted for all the private companies they compromise, consisting of answers that avoid perjury yet seemingly absolve them of obvious cooperation. This is quite a mess we have here and for all we know every single company has been compromised. Therefore we will need to crucify a few of them to start rolling back this thing.

NSA Lawsuit Attorney: Ignore White House Panel ( U.S. News & World Report 2013-12-23 )

One suggestion from the panel is that the NSA's collection of all American phone records be discontinued and replaced with the voluntary two-year-or-longer retention of those records by phone companies. The records could then be acquired in non-emergency cases by court order.

Michelle Richardson, legislative counsel with the ACLU's Washington Legislative Office, tells U.S. News such a measure might eliminate an important "de facto civil liberties protection" by making the data available for civil and criminal cases when it otherwise might not have been.

"I share the same concern, if not horror," Klayman says. "You cannot trust Verizon and the other companies."

Yeah, wouldn't that be the perfect pea under the shell game. The government spooks compromise all the companies we have and then in parallel do their own spying, and if they ever get caught with their hand in the cookie jar, just fallback to letting the companies do their dirty work. Important Note: this story came out before the latest ruling on the case where the government won on appeal.

Metadata Not Anonymous at All, Stanford Researchers Show ( Tom's Hardware 2013-12-26 )

If you're not concerned about government surveillance of your phone because the National Security Agency (NSA) only collects metadata, think again. A study from Stanford University shows that connecting "anonymous" metadata to compromising personal information is trivially easy.

[...]

A research team operating out of Stanford University disagrees, and hopes to prove its point with a new Android app called MetaPhone. By accessing your phone number and your Facebook page, this app does what any NSA program could do: It acquires your metadata, then correlates it with your social-media information to see how much it can learn about you.

[...]

When Tom's Guide tried the app, we found that the results supported Stanford's assertion: Dozens of different organizations had the phone number we tried on file. The NSA or worse, a cybercriminal would be able to find our name, our geographic location, our bank, our medical facilities and even our eating habits with just a simple cross-check online.

Not news to anyone here but perhaps enlightening to the sheeple. Well probably not.

Link to comment
Share on other sites

Already mentioned by Jorge, this stuff is very important IMHO ...

Shopping for Spy Gear: Catalog Advertises NSA Toolbox ( Der Spiegel 2013-12-29 )

NSA intercepting PC shipments to install spyware ( NeoWin 2013-12-29 )

The NSA Has An Elite Team Of Hackers Nationwide ( Tom's Hardware 2013-12-30 )

Leaked NSA document claims covert program grants complete access to the iPhone ( TechSpot 2013-12-31 )

NSA Reportedly Hijacks PCs to Install Spyware, Has Backdoor Access to iPhones ( maximum PC 2013-12-31 )

After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices.

[...]

A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.

[...]

The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet.

[...]

The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on.

This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access.

Well, IMHO this latest revelation is nothing short of huge. :yes: We are getting into black bag jobs here and it could lead to big problems for the spooks and those who authorize and enable them. It pretty much indicates that nothing is safe anywhere, the cloud, the comm traffic there and back, or even the local hardware and software. Ironically we were just musing a few weeks ago about the possibility of compromised BIOS code with respect to laptop webcams, and now this thing pops up describing it in a generic fashion. It is a must-read article at Der Spiegel, focusing on several spook methods including grabbing devices in transit to your door, installing bugs and then letting them go on their way. No part of the Fourth Amendment appears to be in effect any longer and at the end of this controversy we just might be looking at the end of these agencies. The Church Committee didn't have a fraction of the evidence we are now seeing, let alone outright crimes against key Amendments in the Bill of Rights. This is shaping up to be the single biggest story in USA history and is on course now to possible revolution. Well, that is if the sheeple ever wake up.

The next story, the updated ruling on the recent case dovetails right here very nicely ...

Judge rules NSA phone tracking legal ( Politico 2013-12-27 )

NSA collection of phone data is lawful, federal judge rules ( Washington Post 2013-12-27 )

A federal judge in New York ruled Friday that the massive collection of domestic telephone data brought to light by former National Security Agency contractor Edward Snowden is lawful, rejecting a challenge to the program by the American Civil Liberties Union.

The decision marked a victory for the government less than two weeks after a District Court judge ruled against it, finding that the NSAs program was almost certainly unconstitutional. If the split in rulings continues through the appeals process, it is likely the Supreme Court will have to decide the issue.

In a 53-page opinion, U.S. District Judge William H. Pauley III said Friday that the program, which collects virtually all Americans phone records, represents the U.S. governments counter-punch to eliminate the al-Qaeda terrorist network and does not violate the Fourth Amendment, which prohibits unreasonable search and seizure.

Here's a photo of the perp I mean judge, found on this page. Apparently nothing violates the Fourth Amendment and nothing ever will as long as it is couched in anti-terrorism rationale. In other times this honorless idi0t would be tarred and feathered by now. Personally I would support construction of a tall circular skyscraper where each room is a prison cell dead center in Arlington National Cemetary where all our tyrants and their enablers would be sentenced to hard time in solitary confinement staring out at the acres and acres of granite and marble monuments to so many that died protecting that Constitution. Even that would be too good for them though.

nbbruckenthal-funeral-services-photo-03.

Playing Taps, but for a lone soldier or the Constitution itself? ( Image Source: Arlington National Cemetery )

BTW, here is a flashback to six years ago when the government seemingly anticipated the current mess and granted the telcos immunity from lawsuits:

New Federal Wiretap Law Granting Phone Companies Retroactive Immunity Challenged in Court ( LawReader 2008-10-18 )

The law, passed in July, granted retroactive protection to AT&T, Verizon and other companies against lawsuits accusing them of illegally sharing their telephone and e-mail networks and millions of customer records with the National Security Agency. The NSA began monitoring Americans communications with alleged foreign terrorists, without court warrants, after the Sept. 11, 2001, terrorist attacks.

They are of course talking about the FISA court Amendments in 2008 where they allowed the phone companies to become their partners with nothing to lose by granting immunity from lawsuits. Remember how that turned out? From that wikipedia page ...

The American Civil Liberties Union (ACLU) filed a lawsuit challenging the FISA Amendments Act of 2008 on the day it was enacted. The case was filed on behalf of a broad coalition of attorneys and human rights, labor, legal, and media organizations whose ability to perform their workwhich relies on confidential communicationscould be compromised by the new law.[24] The complaint, captioned Amnesty et al. v McConnell and filed in the United States District Court for the Southern District of New York, argued that the eavesdropping law violated people's rights to free speech and privacy under the First and Fourth Amendments to the Constitution.[25] The case was dismissed from the district court on the grounds that the plaintiffs could not prove their claims, but was revived in March 2011 by the United States Court of Appeals for the Second Circuit, which disagreed.[26] The subsequent citation was Amnesty v. Blair. On February 26, 2013, the U.S. Supreme Court dismissed the lawsuit, deciding that the plaintiffs did not have standing to sue.[27]

That sure is some twisted rigged system they got going. No way to lose! :yes:

Link to comment
Share on other sites

Target admits encrypted debit card PIN data was stolen during Black Friday hack ( TechSpot 2013-12-27 )

Target Says Hackers Stole Encrypted PIN Numbers ( Tom's Hardware 2013-12-27 )

Target: Encrypted PIN numbers taken in recent credit card data theft ( NeoWin 2013-12-27 )

Unnamed sources close to the Target hacking incident revealed last week have confirmed with Reuters that encrypted personal identification numbers (PINs) were also stolen. One major U.S. bank even fears that the thieves will be able to crack the encryption code and make huge, fraudulent withdrawals from consumer bank accounts.

A Target rep reassured Reuters on Friday that "no unencrypted PIN data was accessed," and so far there is no evidence to support talk that PIN data was "compromised." However, the rep did confirm that some encrypted data was stolen, but did not say that PINs were part of the theft.

Jeez Louise, this one can't get much worse now can it? Will anyone learn anything from this, probably not. Folks are too busy connecting their Christmas presents online as we speak, opening accounts, buying junk, you know, business as usual.

Snapchat Exposed: Angry Hackers Post Exploit Code Online ( Tom's Hardware 2013-12-27 )

Four months later, your phone number is still accessible to Snapchat hackers ( NeoWin 2013-12-27 )

Australian hackers have just given private instant-messaging service Snapchat its worst Christmas present ever. Detailed code for two Snapchat exploits is now publicly available online, as is Snapchat's API (application programming interface), thanks to the security firm that first found the flaws.

The Snapchat app, for iOS and Android, lets users send each other picture messages that self-destruct a few seconds after being opened so that no one other than the sender and recipient can see them. Intended to appeal to the security-minded, Snapchat has gained a reputation as a means of transmitting salacious and pornographic images. The app is also popular with teenagers looking to communicate outside their parents' watchful eyes, according to some reports.

One of the two posted exploits could be used to search Snapchat's entire user base for individuals' names and numbers approximately 8 million accounts, according to a Nielsen study. The other could be used to create unlimited dummy Snapchat accounts in bulk. Together, the two exploits could undermine Snapchat's supposedly secure messaging service.

Hacker compromised BBC server, tried to sell access on underground forum ( TechSpot 2013-12-30 )

BBC FTP Server Hacked And Access Sold for Christmas ( Tom's Hardware 2013-12-30 )

A well-known Russian hacker recently gained access to one of the BBCs servers prior to Christmas Day and tried to sell access to it on an underground forum according to cyber security firm Hold Security LLC. The company, which monitors black market forums for such activity, said the site that was compromised was a file transfer protocol at ftp.bbc.co.uk.

And another week, another round of exploits and hacks. Hey, that cloud thing is really coming along nicely don't ya think?

IBM Patents Data Encryption Technique For Cloud Computing ( Tom's Hardware 2013-12-26 )

IBM has patented a new data encryption technique, called "fully homomorphic encryption." Under other encryption techniques, data must be decrypted before it can be analyzed; fully homomorphic encryption allows data stored anywhere to be analyzed without compromising its security.

Ummm, what? So I guess that means they can say to the public: 'don't worry it's encrypted' and then let the spooks do their thing? This puts a whole new coat of lipstick on this pig.

Link to comment
Share on other sites

NPD: Chromebooks claim 21 percent of all U.S. commercial notebook sales so far in 2013 ( NeoWin 2013-12-25 )

Chromebooks accounted for 21 percent of all notebook sales through November ( TechSpot 2013-12-30 )

If you are wondering why Microsoft is now suddenly launching TV commercials that claim Chromebooks are not real notebooks, the latest U.S. sales figures for PC and tablet sales from the NPD Group research firm may be a big clue. According to their newest report, Chromebooks claimed 21 percent of all commercial channel-based notebook sales and eight percent of all commercial PC and tablet sales in the US between January to November 2013.

The report adds that in the first 11 months of the year, 1.76 million Chromebooks and Android-based tablets were sold, compared to just 400,000 units in 2012. By contrast, Windows notebooks showed no sales growth in the past year, according to NPD, although sales of Windows desktops did rise up by 10 percent in 2013.

The spike in Chromebooks sales is good news for Google, along with its third party OEM partners like HP, Dell, Samsung, Acer and others who have all released notebooks based on Chrome OS in the past year. The news isn't as good for Microsoft, which now sees Chromebooks as a real threat to its Windows OS-based laptop sales.

If the planned rebellion against Microsoft Windows at next month's Consumer Electronics Show wasnt enough to keep Redmond up at night, the latest notebook sales figures from The NPD Group will likely do the job. The consumer market research firm found Chromebooks accounted for 21 percent of all notebook sales and nearly 10 percent of all computer sales through November.

And that first story there was from NeoWin! Wow. Who knew. And you gotta love it when the leadoff comment at NeoWin is "Well isn't that a surprise. Neowin made me believe that these things are garbage. Seeing just how many different manufacturers are releasing them, looks like they got more OEM support than RT." because when the NeoKids read that story and that comment all manner of hilarity ensues :yes:

Apple signs deal with world's largest mobile carrier ( NeoWin 2013-12-27 )

According to reports, Apple has finally signed a deal with China Mobile, the world's largest mobile phone carrier with over 750 million subscribers. The multi-year deal will allow consumers on China Mobile's network to purchase the iPhone 5C and iPhone 5S, and the phones will be sold in China Mobile and Apple retail stores starting January 17th.

And that means it is pretty much game over for Windows Phone, at least with respect to gaining marketshare compared to the big two. Whatever tiny gains they have made in Europe will be swallowed up by the Chinese tsunami. Microsoft's only chance now is to raise an army and conquer India and then round up and burn all competing phones to even have a chance of a double digit worldwide marketshare, ever. It's over folks. Windows Phone will forever be the desktop Linux of the cellphone universe. Meanwhile NeoWin has a story up called AdDuplex: Nokia Lumia 520 continues to dominate Windows Phone handset market which of course is meant to cheer the NeoKids but which is like saying Metamucil dominates the over-the-counter Procter & Gamble laxative market. :lol:

Laptop Makers are Feeling Skeptical About Convertible Models Heading into 2014. Vendors don't want to get stuck with a bunch of 2-in-1 devices. ( Maximum PC 2013-12-27 )

There's still no clear cut indication from consumers whether or not hybrid notebooks that also function as tablets are all that desirable compared to keeping the form factors separate. That being the case, notebook vendors are reportedly having cold feet when it comes to stockpiling 2-in-1 devices, fearing that weak sales could leave them with a bunch of unsold inventory needing to be written off.

0gjnEzA.jpg

( Image Source: Maximum PC )

Hmmmm. Chromebooks being shipped by the formerly loyal and captive OEM network, Microsoft Scroogle and anti-Chromebook commercials, Microsoft apparent about-face on Windows, perhaps they were all seeing inside information a while back and the symptoms are just now manifesting themselves in public. Of course you would never know any of this by reading the NeoKids comments over the past year. They were busy telling us how it would all turn around when the OEM's stopped slacking off and made yet more devices using Microsoft Tiles. But that's not even close to being accurate. It seems the market wants clear delineation between mobile and classic. Now what?

Link to comment
Share on other sites

PC makers to rebel against Microsoft Windows at Consumer Electronics Show ( TechSpot 2013-12-27 )

Microsoft could find itself in a precarious position at the Consumer Electronics Show early next month in Las Vegas. Thats because a number of computer manufacturers are expected to unveil systems that can simultaneously run Windows and Googles Android mobile platform according to two different analysts as reported by Computerworld.

Tentatively known as PC Plus, these machines will run Windows 8.1 as well as Android apps. Tim Bajarin of Creative Strategies said the initiative would take place through software emulation and was being backed by Intel. He wasnt sure what kind of performance could be expected but it is their way to try and bring more touch-based apps to the Windows ecosystem.

Yet even more evidence of a revolt in the OEM channel, or at least serious hedging of bets. How will Microsoft stop the bleeding now I wonder. Everyone warned them about screwing around with the OEM network. By directly competing with them with Surface ( well, at least that was the plan ) they only managed to tick them off. Now the chickens are apparently coming home to roost.

Google's Eric Schmidt on 2014: 'Big data' will be everywhere ( NeoWin 2013-12-30 )

Ummm, ya think? They're already everywhere. And Eric, I already coined that term ( inspired by Big Government and Big Hollywood ) and let me tell you, it is not a compliment. :no: Meanwhile another Microsoft-Google war in the comments of course since that was the entire point of the post.

Steam Machine Review ( NeoWin 2013-12-25 )

How to Install SteamOS ( Maximum PC 2013-12-27 )

A couple of good, and well-documented hands-on experiences. Note that there are severe partition wiping risks from the SteamOS installer that testers should be aware of.

Link to comment
Share on other sites

I read this story yesterday but I'm sure Charlotte or JorgeA will be able to find more information dealing with it. Nothing is safe anywhere, even if you live in the "back woods" minding your own business ... thinking "just me and my Wi-Fi" !

NSA Can Hack WiFi Devices From Eight Miles Away

http://www.engadget.com/2013/12/30/nsa-can-hack-wifi-devices-from-eight-miles-away/

The NSA may have the ability to intercept data from around the world, but we now know that it has some impressive (and intimidating) equipment for snooping on nearby targets. Security guru Jacob Appelbaum told those at the Chaos Communications Congress this weekend that the NSA's big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The Linux-powered device can exploit Windows systems from up to eight miles away; it's unlikely that you'll catch agents wardriving in the parking lot. Nightstand may not see significant use today given that it dates back to 2008, but its existence suggests that the NSA also has newer, more advanced WiFi surveillance gear at its disposal.

.... there isn't too much more on the subject, if it's true. Maybe our crack spy news team can find more. They find many links to everything.

Link to comment
Share on other sites

[...]NeoWin has this image in the article. But I made my own instead which shows some of the headlines from the past few months that the fanboys might have missed ...

( Sources: 1, 2, 3, 4, 5, 6, 7, 8, 9 )

Great you have you back, Charlotte! :thumbup

that was a very cool image you posted there, with the cycling headlines. B) How'd you do that?

--JorgeA

Link to comment
Share on other sites

Target admits encrypted debit card PIN data was stolen during Black Friday hack ( TechSpot 2013-12-27 )

Target Says Hackers Stole Encrypted PIN Numbers ( Tom's Hardware 2013-12-27 )

Target: Encrypted PIN numbers taken in recent credit card data theft ( NeoWin 2013-12-27 )

Unnamed sources close to the Target hacking incident revealed last week have confirmed with Reuters that encrypted personal identification numbers (PINs) were also stolen. One major U.S. bank even fears that the thieves will be able to crack the encryption code and make huge, fraudulent withdrawals from consumer bank accounts.

A Target rep reassured Reuters on Friday that "no unencrypted PIN data was accessed," and so far there is no evidence to support talk that PIN data was "compromised." However, the rep did confirm that some encrypted data was stolen, but did not say that PINs were part of the theft.

Jeez Louise, this one can't get much worse now can it? Will anyone learn anything from this, probably not. Folks are too busy connecting their Christmas presents online as we speak, opening accounts, buying junk, you know, business as usual.

Gotta wonder how many more of these mass breaches of private info it will take before the public decides that the cloud isn't all that "convenient" after all.

--JorgeA

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...