|
|
|
|
California Bans Default Passwords on Any Internet-Connected Device (engadget.com)
In less than two years, anything that can connect to the internet will come with a unique password -- that is, if it's produced or sold in California. From a report: The "Information Privacy: Connected Devices" bill that comes into effect on January 1, 2020, effectively bans pre-installed and hard-coded default passwords. It only took the authorities about two weeks to approve the proposal made by the state senate. The new regulation mandates device manufacturers to either create a unique password for each device at the time of production or require the user to create one when they interact with the device for the first time. According to the bill, it applies to any connected device, which is defined as a "physical object that is capable of connecting to the Internet, directly or indirectly, and that is assigned an Internet Protocol address or Bluetooth address." |
|
|
|
There are no conversations. |
|
|
|
|
Steve Jobs |
You can't connect the dots looking forward; you can only connect them looking backwards. So you have to trust that the dots will somehow connect in your future. You have to trust in something - your gut, destiny, life, karma, whatever. This approach has never let me down, and it has made all the difference in my life. |
Mike Davidson |
Now that digital lifestyle devices, tablets, wireless phones, and other Internet appliances are beginning to come of age, we need to worry about presenting our content to these devices so that it is optimized for their display capabilities. |
William M. Daley |
The Microsoft actions announced today are exactly the kinds of industry initiatives we need. Microsoft is using its resources to bring real privacy protection to Internet users by creating incentives for more websites to provide strong privacy protection. |
Epicurus |
I have never wished to cater to the crowd; for what I know they do not approve, and what they approve I do not know. |
Ken Ham |
What is sad to me is not what Bill Nye thinks about me. What I found really unfortunate is that after presenting my stand on God's Word, there were a number of Christians who were more complimentary of Bill Nye than of me because Bill Nye was defending evolution and billions of years. |
James Fenton |
Metrics are not a device for restraining the mad, any more than 'open form' or free verse is a prairie where a man can do all kinds of manly things in a state of wholesome unrestrictedness. |
Stephen Covey |
When it comes to developing character strength, inner security and unique personal and interpersonal talents and skills in a child, no institution can or ever will compare with, or effectively substitute for, the home's potential for positive influence. |
Ernst Haas |
Without touching my subject I want to come to the moment when, through pure concentration of seeing, the composed picture becomes more made than taken. Without a descriptive caption to justify its existence, it will speak for itself - less descriptive, more creative; less informative, more suggestive - less prose, more poetry. |
M. H. Abrams |
When something startlingly new comes up, young people, especially, seize it. You can't complain about that. I think its heyday has passed, but it's had an effect and will continue to have an effect. |
Julia Cameron |
I think writing is by its very nature transformational. I believe that the minute you put pen to page you start to alter your consciousness, and the more writing you do, the more closely connected you are to a higher power. Some people can call it the muse. Other people say it's God. Whatever you care to call it, when you write, you connect to it. |
|
|
California High Schooler Changes Grades After Phishing Teachers, Gets 14 Felonies for His Efforts
Police in Concord, California arrested a teenager earlier this week and charged him 14 felony counts after discovering the high schooler launched a phishing campaign directed at teachers in order to steal their passwords and change grades. From a report: The 16-year-old student, whose name was not released because he's a minor, was arrested Wednesday following an investigation launched by local law enforcement, with assistance from a Contra Costa County task force and the US Secret Service, KTVU reported. Reports of the hack first started to trickle into police two weeks ago, when teachers in...
|
|
|
|
Senator Introduces Bill That Would Send CEOs To Jail For Violating Consumer Privacy
Oregon Senator Ron Wyden has introduced the Consumer Data Protection Act that "would dramatically beef up Federal Trade Commission authority and funding to crack down on privacy violations, let consumers opt out of having their sensitive personal data collected and sold, and impose harsh new penalties on a massive data monetization industry that has for years claims that self-regulation is all that's necessary to protect consumer privacy," reports Motherboard. From the report: Wyden's bill proposes that companies whose revenue exceeds $1 billion per year -- or warehouse data on more than 50 million consume...
|
|
|
|
Russia's Anti-VPN Law Goes Into Effect
A Russian law that bans the use or provision of virtual private networks (VPNs) will come into effect Wednesday. The legislation will require ISPs to block websites that offer VPNs and similar proxy services that are used by millions of Russians to circumvent state-imposed internet censorship. It was signed by President Vladimir Putin on July 29 and was justified as a necessary measure to prevent the spread of extremism online. Its real impact, however, will be to make it much harder for ordinary Russians to access websites ISPs are instructed to block connections to by Russian regulator Roskomnadzor, aka the Federal Service for Supervision of Communications, Information Technology and Mass Media. The law is just one part of a concerted effort by t...
|
|
|
|
WPA2 Security Flaw Puts Almost Every Wi-Fi Device at Risk of Hijack, Eavesdropping
A security protocol at the heart of most modern Wi-Fi devices, including computers, phones, and routers, has been broken, putting almost every wireless-enabled device at risk of attack. From a report: The bug, known as "KRACK" for Key Reinstallation Attack, exposes a fundamental flaw in WPA2, a common protocol used in securing most modern wireless networks. Mathy Vanhoef, a computer security academic, who found the flaw, said the weakness lies in the protocol's four-way handshake, which securely allows new devices with a pre-shared password to join the network. That weakness can, at its worst, allow an atta...
|
|
|
|
California DMV Changes Rules To Allow Testing and Use of Fully Autonomous Vehicles msmash 3 hours ago 35 The California Department of Motor Vehicles is changing its rules to allow companies to test autonomous vehicles without a driver behind the wheel -- and to let the public use autonomous vehicles. From a report: The DMV released a revised version of its regulations and has started a 15-day public comment period, ending October 25, 2017. California law requires the DMV to work on regulations to cover testing and public use of autonomous vehicles, and the regulator said that this is the first step. "We are excited to take the next step in furthering the development of this potentially life-saving technology in California," the state's Transportation Secretary, Brian Kelly, said in a stat...
|
|
|
|
I had this idea one night for creating a decentralized search engine. It would pull data from other search engines (through proxies or from a single server, so no personal user data is involved) and then re-display it to the user.
The next additional thought I had was to make it into a 'roll your own' search engine, so users could then deploy their search engine on their own server to have further control of the traffic as you obviously cant trust shit like duckduckgo (fishy)
Then you could m...
|
|
|
|
Phones Can Now Tell Who Is Carrying Them From Their Users' Gaits (economist.com)
Most online fraud involves identity theft, which is why businesses that operate on the web have a keen interest in distinguishing impersonators from genuine customers. Passwords help. But many can be guessed or are jotted down imprudently. Newer phones, tablets, and laptop and desktop computers often have beefed-up security with fingerprint and facial recognition. But these can be spoofed. To overcome these shortcomings the next level of security is likely to identify people using things which are harder to copy, such as the way they walk. Many online security services already use a system called device fingerprinting. This employs software to note things like the model type of a gadget employed by a partic...
|
|
|
|
Don’t keep cell phones next to your body, California Health Department warns
The California Department of Public Health (CDPH) issued a warning against the hazards of cellphone radiation this week. Yes, the thing we are all addicted to and can’t seem to put down is leaking electromagnetic radiation and now California has some guidance to safeguard the public.
The CDPH asks people to decrease their use of these devices and suggests keeping your distance when possible.
...
|
|
|
|
Humans Might Be Able To Sense Earth's Magnetic Field
A new study from researchers at the California Institute of Technology suggests that humans can sense the Earth's magnetic field. "We have not as a species lost the magnetic sensory system that our ancestors [millions of years ago] had," said Prof Joseph Kirschvink, leader of the research from the California Institute of Technology. "We are part of Earth's magnetic biosphere." The Guardian reports: Writing in the journal eNeuro, Kirschvink and colleagues in the U.S. and Japan describe how they made their discovery after building a six-sided cage, the walls of which were made of aluminium to shield the setup from electromagnetic interfer...
|
|
|
|
Once a cyber-attack has been initiated, there are certain targets that need to be attacked to cripple the opponent. Certain infrastructures as targets have been highlighted as critical infrastructures in time of conflict that can severely cripple a nation. Control systems, energy resources, finance, telecommunications, transportation, and water facilities are seen as critical infrastructure targets during conflict. A new report on the industrial cybersecurity problems, produced by the British Columbia Institute of Technology, and the PA Consulting Group, using data from as far back as 1981, reportedly[weasel words] has found a 10-fold increase in the number of successful cyber-attacks on infrastructure Supervisory Control and Data Acquisition (SCADA) systems since 2000.[3] Control systems ...
|
|