Shared posts

01 Oct 02:09

Male domestic violence victims 'often arrested due to false accusations by their abusers'

01 Oct 12:53

Pornography users found to be more supportive of women and hold less sexist views than nonusers in representative US sample

27 Aug 09:09

“Spookiness” Confirmed by the First Loophole-free Quantum Test



21 Aug 14:30

Companion Helps You Stay Safe When You're Walking Somewhere Alone

by Kristin Wong

Walking alone at night can be dangerous, but with an app like Companion, you can use your smartphone to stay a little safer.


22 Jul 11:32

US Company Takes First Steps Towards Mining Asteroids In Space

09 Jul 20:01

That Government Hack Was Much, Much Bigger Than Initially Reported

by Gabrielle Bluestone

That Government Hack Was Much, Much Bigger Than Initially Reported

ABC News reports that at least 25 million people were affected by the recent Office of Personnel Management hack—more than six times the number originally reported by authorities.

The government’s apparent explanation for the wildly disparate reports is that they counted the breach as two hacks, the larger of which they considered to be a “separate but related” issue that was still “under investigation” at the time. Via ABC:

At the time, OPM only disclosed that the personnel records of 4.2 million current and former federal employees had been compromised.

But there was little doubt — at least privately –- that the universe of victims was vastly bigger because the hackers had access to far more than personnel records, including files associated with background investigations and information on government workers’ families.

In fact, the hackers allegedly rummaged through various OPM databases for more than a year — and lawmakers and U.S. officials alike have described the breach as a significant threat to national security.

It’s still unclear how many Americans were actually affected (most reports cite anonymous sources) but Politico says it’s actually more like 21.5 million because some identities were essentially hacked twice. Either way, it’s clear the government drastically underreported the extent of the damage.

And it wasn’t just basic information—the hackers got away with highly sensitive documents that include “military records and veterans’ status information, address, birth date, job and pay history, health insurance, life insurance, and pension information; age, gender, race data,” plus reportedly unencrypted social security numbers.

The breach reportedly began in 2013 when hackers obtained credentials through an employee of a government contractor, KeyPoint Government Solutions. It wasn’t detected until April, ABC reports.

Contact the author at

08 Jul 14:00

Hacking Team's Lame Excuse for Selling Digital Weapons to Sudan

by Kate Knibbs on Gizmodo, shared by Leah Beckmann to Gawker

Hacking Team's Lame Excuse for Selling Digital Weapons to Sudan

Hacking Team, the company now equally known for selling intrusive spyware to governments and getting royally hacked, has words for people who disagree with its habit of peddling powerful cyberweapons to regimes with terrible human rights records: What’s a “repressive” regime, anyway?

I asked Hacking Team if someone would speak directly to its reputation for selling its remote access spyware—which lets law enforcement and governments turn on webcams, record phone calls, steal files, and track messages—to repressive regimes. US spokesperson Eric Rabe informed me that it’s all relative:

This issue may appear to be simple. In reality it is a complicated one for several reasons. For one thing, some have labeled certain long-time allies of the West “repressive.” Furthermore, it happens that governments change, and, therefore they become more or less criticized over time.

Hacking Team’s excuse for its eccentric roster of clients basically boils down to “you say terrorist, I say freedom fighter, nothing matters lol.” Just because some fuddy-duddy activist group like the UN puts LABELS on a government doesn’t mean it’s necessarily “repressive,” you hippie. Which explains why Hacking Team decided to sell spyware to Sudan’s intelligence service in 2012, even though UN sanctions prohibited the sale of weapons, including digital weapons, at that time.

(The leaked emails show that Hacking Team halted sales to Sudan in 2014, after pressure from a UN panel monitoring the implementation of weapons sanctions in Sudan.)

But wait, there is more excuse:

Finally, even some governments that are deeply criticized by some activists may have a very legitimate need for our technology. For example, such a state, though the focus of activist anger, may also be a breeding ground for terrorists. The technology provided by HackingTeam is particularly useful in detecting and prosecuting terrorists.

Ah, gotcha, cool cool. So when Hacking Team decided to renew its license with Ethiopia’s Information Network Security Agency even after the INSA was discovered to be using the software to spy on journalists, it was because INSA also wanted it to fight terrorists...except INSA categorized the journalists as terrorists...

This muddled official excuse is similar to the line of thinking Hacking Team CEO and co-founder David Vincenzetti put forth in one of his leaked emails to a colleague, where he complains about the negative press Hacking Team receives for its clientele:

“I have a question for you all: PLEASE NAME a single really ‘democratic’ country, a country which does not violate anybody’s rights and has a TOTALLY clean human rights record,” he wrote.

If you’re looking for more gems like that, a non-profit called Transparency Toolkit has made the entire trove of leaked data available online for download. We’ll be combing through over the next few days, but if you find anything worth checking out, let me know in the comments, or email me.

Contact the author at
Public PGP key
PGP fingerprint: FF8F 0D7A AB19 6D71 C967 9576 8C12 9478 EE07 10C

30 Jun 02:03

How IKEA Patched Shellshock

by samzenpus
jones_supa writes: Magnus Glantz, IT manager at IKEA, revealed that the Swedish furniture retailer has more than 3,500 Red Hat Enterprise Linux servers. With Shellshock, every single one of those servers needed to be patched to limit the risk of exploitation. So how did IKEA patch all those servers? Glantz showed a simple one-line Linux command and then jokingly walked away from the podium stating "That's it, thanks for coming." On a more serious note, he said that it took approximately two and half hours to upgrade their infrastructure to defend against Shellshock. The key was having a consistent approach to system management, which begins with a well-defined Standard Operating Environment (SOE). Additionally, Glantz has defined a lifecycle management plan that describes the lifecycle of how Linux will be used at Ikea for the next seven years.

Share on Google+

Read more of this story at Slashdot.

03 Mar 17:15

Flaw In GoPro Update Mechanism Reveals Users' Wi-Fi Passwords

by timothy
An anonymous reader writes A vulnerability in the update mechanism for the wireless networks operated by GoPro cameras has allowed a security researcher to easily harvest over a 1,000 login credentials (including his own). The popular rugged, wearable cameras can be controlled via an app, but in order to do so the user has to connect to the camera's Wi-Fi network. Israel-based infosec expert Ilya Chernyakov discovered the flaw when he had to access the network of a friend's camera, but the friend forgot the login credentials.

Share on Google+

Read more of this story at Slashdot.

06 Feb 20:17

Ask Slashdot: With Whom Do You Entrust Your Long Term Data?

by Soulskill
jppiiroinen writes: F-Secure, a company based in Finland, has sold its cloud storage business to a U.S. company (Synchronoss Technologies, Inc) speculated to have ties to the NSA. In previous, public announcements, they used arguments equivalent to, "trust us, your data will be safe." Now, it's likely F-Secure simply realized that competing against the big players, such as Google and Dropbox, didn't make much sense. But it makes me wonder: Whom do you trust with your data? And who really owns it? What about in 3-6 years from now? How should I make sure that I retain access to today's data 20 years from now? Is storing things locally even a reasonable option for most people? I have a lot of floppies and old IDE disks from the 90s around here, but no means to access them, and some of the CDs and DVDs has gone bad as well.

Share on Google+

Read more of this story at Slashdot.

04 Feb 19:00

Why the "Internet As a Utility" Is Good for Net Neutrality

by Eric Ravenscraft

Why the "Internet As a Utility" Is Good for Net Neutrality

Today, the FCC officially announced that it will vote on whether to classify the internet as a utility under Title II regulations. Here's what that mess of jargon means and how it affects you.


28 Jan 10:40

FCC: Blocking Wi-Fi in hotels is prohibited: Marriott asked the FCC to please let it block Wi-Fi. The hotel gets a firm answer -- "Persons or businesses causing intentional interference to Wi-Fi hotspots are subject to enforcement action"

05 Dec 15:01

On Reddit, it's more risqué to show your face than it is to show your butthole.

17 Sep 14:16

TIL New York's area code is 212 because it was the fastest number to dial on a rotary phone

01 Aug 01:13

A bridge's weight limit is more of a guideline than a rule. Most of the time [Scary]

08 Apr 14:49

Kissy Congressman Confesses to Texting Stranger: "I Messed Up"

by Adam Weinstein

Kissy Congressman Confesses to Texting Stranger: "I Messed Up"

Last night, after Rep. Vance McAllister (R-La.) publicly apologized for snogging, on surveillance video, in his congressional office, a staffer who was not his wife, he received a text from a stranger: "Hey bro. How's your day goin." For some inexplicable reason, he replied—at length.


07 Apr 12:17

First official climate change refugees evacuate their island homes forever, before they are washed away in 2015 [Sad]

27 Mar 20:40

Newlywed Wife Gets 30 Years in Bizarre Death Shove Case

by Michelle Dean

Newlywed Wife Gets 30 Years in Bizarre Death Shove Case

Today, a Montana federal court sentenced 22-year-old Jordan Graham to thirty years in prison for, well, there's really no delicate way of putting this: Shoving her husband of approximately eight days, 25-year-old Cody Johnson, off a cliff in Glacier National Park.



15 Feb 16:31

200-400 Gbps DDoS Attacks Are Now Normal

by Soulskill
An anonymous reader writes "Brian Krebs has a followup to this week's 400 Gbps DDoS attack using NTP amplification. Krebs, as a computer security writer, has often been the target of DDoS attacks. He was also hit by a 200Gbps attack this week (apparently, from a 15-year-old in Illinois). That kind of volume would have been record-breaking only a couple of years ago, but now it's just normal. Arbor Networks says we've entered the 'hockey stick' era of DDoS attacks, as a graph of attack volume spikes sharply over the past year. CloudFlare's CEO wrote, 'Monday's DDoS proved these attacks aren't just theoretical. To generate approximately 400Gbps of traffic, the attacker used 4,529 NTP servers running on 1,298 different networks. On average, each of these servers sent 87Mbps of traffic to the intended victim on CloudFlare's network. Remarkably, it is possible that the attacker used only a single server running on a network that allowed source IP address spoofing to initiate the requests. An attacker with a 1 Gbps connection can theoretically generate more than 200Gbps of DDoS traffic.' In a statement to Krebs, he added, 'We have an attack of over 100 Gbps almost every hour of every day.'"

Share on Google+

Read more of this story at Slashdot.

13 Feb 16:49

Star Wars | df2.jpg

19 Jan 23:00

the Golden Songbird

23 Nov 00:26

FDA: Anti-smoking drug Chantix linked to more than 500 suicides

17 Sep 20:41

U.S. to seize Manhattan skyscraper secretly owned by Iran


I wonder if some of these victims of Iranian terrorism might be currently supporting the rebel faction in Syria. I feel like it's the 80's this morning.

07 Sep 23:05

Walmart, supporting stereotypes since 1962

10 Jul 08:12

Now we know: the United States of America is partially governed by a deep state, undemocratic, secret, aligned with intelligence agencies, spying on friend and foe, lawless in almost every respect.

03 Jul 14:09

Snowden and a muzzled free press

Frank Snepp says reporters are dangerously blase in the face of a Justice Department intent on stemming leaks, even if it means targeting journalists as conspirators under espionage laws.
02 Jul 19:01

We are the National Organization of "Restore the Fourth", which is coordinating nationwide protests on July 4th in opposition to the unconstitutional surveillance methods employed by the US government, especially via the NSA and its recently-revealed PRISM program. Ask us anything

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

The Fourth Amendment to the United States Constitution


I'm Douglas. Some of you might know me from elsewhere but right now I am the Social Media Coordinator and Interim Press Coordinator for Restore the Fourth. /u/BipolarBear0 and I will be taking questions for at least an hour. Here are some other folks that I hope will drop by to answer some questions as well...

/u/veryoriginal78 - Our National Coordinator

/u/scarletsaint - Lead organizer in Washington and our Outreach Coordinator

/u/Mike13815 - One of the lead organizers in Buffalo and our Marketing Coordinator

/u/neutralitymentality - One of the lead organizers in New York and Assistant Press Coordinator

/u/vArouet - Lead organizer in New York; he probably won't be available for a few hours but he told me he will visit some time after 6 EDT


subreddit: /r/restorethefourth


List of Protests:




Donations, which we just finally started taking this morning, will be used for an advertising blitz tomorrow and what's donated after that on setting up a long-term organization dedicated to protecting the 4th amendment and ourselves from unwarranted surveillance. See the indiegogo page or ask a question below for more info.

6:32pm EDT Alright, after 3 and a half hours of focusing primarily on this and writing various long-winded answers, I need to focus on my many other Rt4 responsibilities for a while. Hopefully some of the others will keep answering for a bit longer. I will take at least one more look at this thread later on and address the more important things I missed - so remember to check back.

submitted by douglasmacarthur to IAmA
[link] [830 comments]
02 Jul 18:01

Reddit, Mozilla, WordPress, and others plan July 4 protest against NSA surveillance

30 Jun 10:52

Spiegel Online reveals the extent of NSA spying on Germany - 500 million connections spied on in a month make it the biggest victim of NSA attacks in the EU

30 Jun 10:50

The United States taps half a billion phone calls, emails and text messages in Germany in a typical month and has classed its biggest European ally as a target similar to China..