COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED

COMPUTERS/INTERNET/SECURITY

Aug 24 11:45

The White House Just Blamed Bitcoin for America’s Opioid Crisis

By Graham Smith

The opioid epidemic is the new devil Bitcoin is being blamed for inflaming, to be added to the already long list of heinous crimes crypto is supposedly responsible for, like terrorism, money laundering, and trafficking. While it’s painfully clear that the U.S. dollar is a much more common tool for these unethical and illicit activities, that doesn’t stop the powers that be from continuing their propagandistic assault on financial freedom — ignoring their own central role in creating these massive problems by pumping up the artificial monopolies that peddle them, and outlawing less dangerous and non-addictive solutions...

Aug 24 09:50

Scott Adams: China, Kanye, Outrage Theatre, Zombies, Goofy Warren, Google vs PragerU

Comments at: https://twitter.com/ScottAdamsSays/status/1165262862631129088?s=20

ALL Americans have a COMMON ENEMY…Fentanyl China
Is our Commander in Chief…able to “order” US out of China?
Economically, China IS a “villain”…AND pushing Fentanyl on us
PragerU goes to Ninth Circuit Court fighting YouTube’s suppression
Will the discovery process make their algorithm available?
Elizabeth Warren’s dancing and fitness levels are age-impressive
Do WOMEN think she dances “goofy” like men do?
Kamala Harris game hasn’t improved over time
Elizabeth Warren in contrast…has learned and improved
Drug problem + Mental Health Problem = Homeless Zombies
The “zombie class” is growing fast
Kanye's TEST dome-shelters, California says tear them down
Kanye TRIED, he’s working a good systems approach
Build some TEST domes…see how they work out
If they work, build more…if not, modify and try again

Aug 24 09:23

Telecom Lobbying: $80M in 2018 and $1.2B Since 1998. Details On Who Spent How Much and Why This Matters

By B.N. Frank

Lobbyists have a bad name for good reason. Activist Post has reported before about telecom and tech companies spending beaucoup bucks to sway elected officials and government employees to force the installation of risky technology – including utility “Smart” Meters and 5G – in communities across the U.S.

Thanks to Comparitech.com for providing more nauseating details in this recent article, “How much does your ISP spend on lobbying?”...

Aug 24 07:01

Law Firm Investigates Smartphone RF Levels Exceeding Federal Safety Limits and Coverup By Telecoms

By B.N. Frank

The Chicago Tribune conducted an investigation of various smartphone models and found that many exceed federal RF safety limits. Thanks to law firm Fegan Scott for starting their own investigation.

U.S. safety limits for cell phones were established in 1996. They don’t apply to today’s cell phones or other wireless devices. They also don’t apply to the way most people are exposed to wireless radiation emitting sources either...

Aug 23 10:11

The TAPS Act, Predictive Policing, and a PreCrime Dystopian Nightmare?

By Michael Boldin

If you’ve seen the film Minority Report – or read the Philip K Dick short story it’s based on, you’re familiar with the idea of “precrime.”

It’s a dystopian vision of a predictive policing system where government detains people before they commit a given crime.

Is that what the TAPS Act is going to do in Congress? Plus predictive policing with Palantir and LASER in Los Angeles.

Path to Liberty, Fast Friday Edition: August 23, 2019

Aug 23 09:57

MoviePass database exposes 161 million records

An exposed database on a MoviePass subdomain housing 161 million records was left unsecured and exposed credit card and customer card information on at least 60,000 of the ticket service’s customers.

The database, which included expiration dates, names and addresses on some users as well as email and passwords, was discovered by SpiderSilk security researcher Mossab Hussein, according to a report from TechCrunch, which said the information may have been exposed for several months.

Aug 23 09:25

Since Smartphones Are Exceeding RF Safety Limits, Does That Mean Wearables Could Be Also?

By B.N. Frank

Yesterday, Activist Post reported about a Chicago Tribune investigation that uncovered how many popular smartphones exceed federal RF safety standards. Does it make you wonder how many wireless wearable devices — Bluetooth, ear buds, hearing aids, Fitbits, smart watches, etc. — are exceeding federal safety limits, too?...

Aug 23 08:50

Ninth Circuit Goes a Step Further to Protect Privacy in Border Device Searches

By Sophia Cope and Adam Schwartz

The U.S. Court of Appeals for the Ninth Circuit issued a new ruling in U.S. v. Cano [.pdf] that offers greater privacy protection for people crossing the border with their electronic devices, but it doesn’t go as far as we sought in our amicus brief.

Cano had attempted to cross the border near San Diego...

Aug 23 08:39

Say No to the “Cashless Future” — and to Cashless Stores

By Jay Stanley

I went to a counter-serve restaurant recently, and when the time came to pay for my order, took out my wallet, presented a $20 bill, and was told, “Sorry, we don’t accept cash.” I was flabbergasted. What happened to “legal tender for all debts public and private,” as it says right there on the bill?

This has now happened to me at three separate establishments in recent months. The rise of cashless establishments is happening amid continuing hype over the supposed dawn of a “cashless future” and agitation by some very powerful interests that would love to see cash disappear. The credit card companies love it, naturally, and tech industry associations have also pushed for the concept.

Meanwhile, a backlash has prompted several cities and states including San Francisco, Philadelphia, and New Jersey to ban cashless stores ...

Aug 23 07:45

How Amazon and Silicon Valley Seduced the Pentagon

By James Bandler, Anjali Tsui and Doris Burke

On Aug. 8, 2017, Roma Laster, a Pentagon employee responsible for policing conflicts of interest, emailed an urgent warning to the chief of staff of then-Secretary of Defense James Mattis. Several department employees had arranged for Jeff Bezos, the CEO of Amazon, to be sworn into an influential Pentagon advisory board despite the fact that, in the year since he’d been nominated, Bezos had never completed a required background check to obtain a security clearance.

Aug 23 07:38

Second Steam Zero-Day Impacts Over 96 Million Windows Users

A second Steam Windows client zero-day privilege escalation vulnerability affecting over 96 million users has been publicly disclosed today by Russian researcher Vasily Kravets.

This happens after Valve disputed the significance of the previous Steam 0day disclosed by Kravets on Twitter and banned him out of their HackerOne bug bounty program.

Seeing that this vulnerability impacts only the Steam Windows client, with Steam having over 100 million registered users and 96.28% of them are running Windows according to the Steam Hardware & Software Survey: July 2019, the systems of roughly 96 millions of them are currently affected.

Aug 23 07:16

Cities Unveil Unethical Homeless Reporting, While LA Pushes Anti-Homeless Law

By Aaron Kesel

The cities of San Francisco and Seattle are testing a new way to report homeless encampments or “tent cities” via dialing 311 or using an app. Meanwhile, LA lawmakers are pushing to ban homeless people from parks, schools, and other designated areas.

There's one problem conflating homelessness into other public service issues as the author writes for Smart Cities Dive, "people aren't potholes." ...

Aug 22 18:42

Research Says Checking Your Phone While On A “Break” = Less “Recharging” of Brain

By B.N. Frank

Considering all the research and news reports on “Screentime” being addictive and behaviorally, emotionally and physically harmful, even horn growth inducing – and kids being especially affected by all of this – these new findings can’t be all that surprising, can they? Heck – even the U.S. government offered up some pretty scary research confirming that “Screentime” is harming kids’ brains...

Aug 22 11:51

Chicago Tribune Reports Various Smartphones Substantially Exceed Outdated Gov’t Safety Limits

By B.N. Frank

Those of us who are old enough remember that there were no “Smart” phones in 1996. There were cell phones for making calls — that’s it. Most people didn’t own them. Parents certainly weren’t giving them to their kids.

U.S. safety limits don’t apply to today’s cell phones and other wireless devices. They don’t apply to the way most people are exposed to them either. It’s not surprising that the Chicago Tribune discovered that various smartphones exceed the FCC safety limits. What’s unfortunate is that these limits have offered no protection to any of us for many years now...

Aug 22 08:32

Researcher Strikes Back in Epic Twitter Storm After Hillary Clinton Says Google Research Had Been “Debunked”

By Sean Walton

Renowned psychologist Robert Epstein blew the lid off Big Tech’s censorship and voter manipulation during his July Senate testimony, and now he’s shifting focus to the woman who gained the most from the scam in 2016...

Aug 22 07:12

Zendrive Can Turn Drivers Smartphones Into Insurance Surveillance Devices

By MassPrivateI

Leave it to Zendrive to create a safe driving app that can turn your smartphone into an insurance surveillance device.

Zendrive encourages people and companies to download their safe driving app which uses a person’s smartphone to detect unsafe driving habits.

Their video claims that they do not track or identify individual drivers, but towards the end of the video they boast that “it is easy to identify, coach and improve unsafe drivers.”...

Aug 22 06:14

A ‘Fact Checker’ Declares War On Satire

Lies claiming to be objective truth are a problem, and sometimes people mistake satire for fact. But let’s not give up our sense of humor just because some “fact checker” pretends not to have one.

Aug 21 18:32

Hackers Could Steal Personal Info By “Listening” To Your Keyboard, Alarming Study Finds

By John Anderer

As if you needed another cybersecurity issue to worry about, a team of researchers at Southern Methodist University have discovered that it is quite possible for hackers to use your smartphone’s sensor to intercept the sound of your keyboard typing. After picking up these sound waves, a skilled hacker could potentially analyze and decipher which keys were struck and piece together the words being typed.

Even in a loud and crowded room filled with people talking amongst each other and typing, researchers say they were able to capture and decode the majority of what was being typed...

Aug 21 11:30

Meddling For We, But Not For Thee

Twitter announced Monday that they had suspended over 200,000 accounts allegedly linked to a Chinese government influence operation in Hong Kong and claimed that "covert, manipulative behaviors have no place on our service."

Aug 21 09:53

CA High School Becomes Largest American Public School to Ban Phones and Kids Dig It

By B.N. Frank

Reports about phone bans in schools in the U.S. and around the world aren’t new, and many of the comments posted with this news story mention that.

It’s still good news and many of the kids interviewed at this school seem to be embracing as well as thriving from the new policy...

Aug 21 08:06

CHINESE SOCIAL CREDIT SCORE PREVENTS 2.5 MILLION “DISCREDITED ENTITIES” FROM BUYING PLANE TICKETS

And please do not believe, for one millisecond, that certain American officials don't want to see this happen right here in the US.

Aug 21 07:15

Facial Recognition: 10 Reasons You Should Be Worried About The Technology

By Birgit Schippers, Queen’s University Belfast

Facial recognition technology is spreading fast. Already widespread in China, software that identifies people by comparing images of their faces against a database of records is now being adopted across much of the rest of the world. It’s common among police forces but has also been used at airports, railway stations and shopping centres.

The rapid growth of this technology has triggered a much-needed debate. Activists, politicians, academics and even police forces are expressing serious concerns over the impact facial recognition could have on a political culture based on rights and democracy.

As someone who researches the future of human rights, I share these concerns. Here are ten reasons why we should worry about the use of facial recognition technology in public spaces...

Aug 21 06:42

MERCEDES HAS SPARKED PRIVACY CONCERNS BY ADMITTING IT SPIES ON DRIVERS WITH TRACKING DEVICES COVERTLY INSTALLED IN ITS CARS

SOURCE: THE SUN UK

MERCEDES has sparked a privacy row by admitting it spies on drivers with tracking devices covertly installed in its cars.

Drivers who buy a Mercedes through a finance plan give their permission for the vehicle to be tracked when signing lengthy terms and conditions

The secret sensors, fitted to all new and used motors sold by the firm’s dealers, pinpoint the vehicle’s exact location.

The firm sold more than 170,000 new cars in Britain alone last year.

Mercedes will not say how long it has used the sensors.

And it insists they are only activated in “extreme circumstances” — when finance customers have defaulted on their payments.

But it admits sharing car owner information and vehicle location details with third-party bailiffs and recovery firms who repossess the cars.

Webmaster's Commentary: 

Color me completely unsurprised by this development, and look for other auto manufacturers, to follow suit.

Aug 20 13:59

Court Rules That “Patent Troll” is Opinion, Not Defamation

By Joe Mullin

Free speech in the patent world saw a big win on Friday, when the New Hampshire Supreme Court held that calling someone a “patent troll” doesn’t constitute defamation. The court’s opinion is good news for critics of abusive patent litigation, and anyone who values robust public debate around patent policy. The opinion represents a loss for Automated Transactions, LLC (ATL), a patent assertion entity that sued more than a dozen people and trade groups claiming it was defamed.

EFF worked together with the ACLU of New Hampshire to file an amicus brief [PDF] in this case, explaining that the lower court judge got this case right when he ruled against ATL. That decision gave wide latitude for public debate about important policy issues—even when the debate veers into harsh language. We’re glad the New Hampshire Supreme Court agreed...

Aug 20 10:24

Scott Adams: #AntiRa, Biden Family Gaffing, Polls, Google Manipulation, The Squad

Comments at: https://twitter.com/ScottAdamsSays/status/1163813591478222849?s=20

AntiRa…A group for people who are Anti-Racist
If you’re anti-racist, you’re a “natural member” of AntiRa
If you’re OPPOSED to AntiRa…you’re obviously a racist
CNN guest Angela Rye’s reaction to the word “hijack”
The growing list of common words that are now unacceptable
Google’s alleged vote-shifting bias
Isn’t unintentional political bias…still political bias?
Culture differences between upstate NY and California
Will Biden destroy Obama’s legacy if he’s the candidate?
Isn’t AOC…”The Squad”, aren’t the others just coat-tailing AOC?
Interesting CNN coverage of the non-AOC squad members
Buttigieg has proven…America doesn’t care if our POTUS is gay
“Life Strategy” college degree concept
Things that work together for super-productivity
How employable would you be with a fully loaded talent stack?

Aug 20 07:55

Hospital Reduces Children’s Exposure to WiFi Radiation Because They Are More Vulnerable to It

By B.N. Frank

The American Academy of Pediatrics (AAP) and other health experts warn that kids are more vulnerable than adults to exposure. In fact, no safe level of exposure has even been determined for children or pregnant women. This is why many health experts, parents and teachers in the U.S. and around the world have been trying to get schools to replace WiFi with wired internet.

One hospital is determined to reduce exposure to pediatric patients AND encourage parents to reduce their children’s exposure everywhere else...

Aug 20 07:41

Law Enforcement To Flag and Spy On Future Criminals

By MassPrivateI

America’s fear of mass shootings is about to take a truly bizarre turn. That’s because our law enforcement will soon be used as fortune tellers to spy on future criminals.

How will law enforcement be used as fortune tellers?

A recent Albuquerque Journal article revealed that law enforcement will flag people who they think might pose a potential risk. They've also asked the public to help report...

Aug 20 07:13

Mercedes spies on drivers by secretly installing tracking devices in cars and passing information to bailiffs

MERCEDES has sparked a privacy row by admitting it spies on drivers with tracking devices covertly installed in its cars.

The secret sensors, fitted to all new and used motors sold by the firm’s dealers, pinpoint the vehicle’s exact location.

The firm sold more than 170,000 new cars in Britain alone last year.

Mercedes will not say how long it has used the sensors.

And it insists they are only activated in “extreme circumstances” — when finance customers have defaulted on their payments.

But it admits sharing car owner information and vehicle location details with third-party bailiffs and recovery firms who repossess the cars.

Aug 19 19:29

Apple accidentally 'unpatches' bug in iOS 12.4, leaving users with the latest version of the software vulnerable to hackers

Apple has inadvertently unpatched a bug in its iOS that makes users with the newest software able to jailbreak phones, but also leaves them vulnerable to attack.

The bug, identified over the weekend by security researchers, was previously identified by Google analysts and patched in iOS 12.3, but a recent transition to 12.4 which was released in July, has given the more than 100-day-old flaw new life.

According to anonymous researchers who spoke to Motherboard, the bug significantly lowers the barrier for hackers looking to steal users' data.

Aug 19 16:36

CNET Journalist Promotes 5G as Safe Even When Telecom Execs Say They Have No Evidence That It Is

By B.N. Frank

In February, the Telecom Industry gave congressional testimony that they have NO scientific evidence that exposure to 5G is safe. This being said, it’s always bizarre and annoying when journalists defend it.

CNET Science Editor Jackson Ryan must not have gotten that memo. Then again, maybe Jackson prefers living in a fantasy world remaining completely oblivious to any research that has already determined exposure to all sources of wireless radiation is harmful – not just 5G...

Aug 19 10:11

Texas government organisations hit by ransomware attack

Hackers have infected 23 organisations connected to local government in the US state of Texas with ransomware.

Officials indicated the attack over the weekend was co-ordinated.

The Texas Department of Information said the attack had primarily affected smaller local government departments.

A spokesman said the situation was still ongoing on Monday morning.

Texan authorities have drafted in cyber-security experts, as well as the military and counter-terrorism units, to help bring systems back online.

Aug 19 09:49

A Cycle of Renewal, Broken: How Big Tech and Big Media Abuse Copyright Law to Slay Competition

By Cory Doctorow

As long we’ve had electronic mass media, audiences and creators have benefited from periods of technological upheaval that force old gatekeepers to compete with brash newcomers with new ideas about what constitutes acceptable culture and art. Those newcomers eventually became gatekeepers themselves, who then faced their own crop of revolutionaries. But today, the cycle is broken: as media, telecoms, and tech have all grown concentrated, the markets have become winner-take-all clashes among titans who seek to dominate our culture, our discourse and our communications.

How did the cycle end? Can we bring it back? To understand the answers to these questions, we need to consider how the cycle worked — back when it was still working...

Aug 19 09:17

MX Linux

One of the best,if not the best Linux Distro out there. Try it!

MX Linux is a cooperative venture between the antiX and former MEPIS communities, using the best tools and talents from each distro. It is a midweight OS designed to combine an elegant and efficient desktop with simple configuration, high stability, solid performance and medium-sized footprint.

Aug 19 07:21

Why Hasn’t The History Channel Been Shut Down?

By Jon Rappoport

As I pointed out in a recent article, mainstream media outlets are delivering conspiracy theories—at least by implication. Therefore, in light of the recent FBI “finding” that such theories can fuel violent terrorism, these outlets should be investigated, censored, blacked out, and de-platformed.

The History Channel would be a prime candidate.

In its series, Ancient Aliens, we are treated to the theory that John Kennedy was murdered to keep him from…here is the quote from the History Channel:

“Theorists propose the possibility that John F. Kennedy was assassinated in order to keep the truth about [extraterrestrial] aliens on Earth from getting out in this clip from Season 12, Episode 9, The Majestic Twelve.”...

Aug 18 15:23

NRDC and American Tribal Groups’ Update on Cell Tower Lawsuits, The FCC, and Why You Should Care About 5G

By B.N. Frank

The FCC is supposed to protect the public by regulating the Telecom Industry. Instead they have a long history of protecting the telecom industry at the public’s expense. This has become way scarier due to the “Race for 5G” which involves installing hundreds of thousands (maybe millions) of small cells in front of homes and everywhere else.

Opposition and warnings have been publicized by a growing list of credible sources including Natural Resources Defense Council (NRDC) and 19 American tribal groups...

Aug 18 08:05

Chinese State Media Announces 2.56M “Discredited Entities” Prevented From Purchasing Plane Tickets Under Social Credit System

By Chris Menahan

This is the system our ruling oligarchs are trying to implement in America.

Big Tech has already implemented their own “social credit score” system where they punish people for their political views by deplatforming them, censoring their websites and closing their PayPal/bank accounts...

Aug 17 16:09

People Already Hurting From 5G in Geneva, Switzerland

By B.N. Frank

In 2017, Swiss doctor Bertrand Buchs launched a petition asking for a moratorium on installation and many doctors and scientists have already signed it.

Worldwide opposition to 5G is growing and includes individuals and organizations concerned about other issues associated with this technology in addition to biological and environmental risks. Regardless, 5G continues to be installed and operated in the U.S. and around the world even though it’s been reported that people and their pets have been getting sick from exposure. This is now also being reported in Geneva, Switzerland...

Aug 17 07:07

Cherish Your Privacy? New Anti-Surveillance Clothes Trick Cameras by Making You Look Like a Car

By B.N. Frank

The rise of “Surveillance Capitalism” by businesses and other entities has made it so that we’re all being subjected to data collection by multiple sources almost all of the time whether we’re conscious of it or not.

Some people willingly participate in data collection. Others don’t like it but believe there is no point doing anything to stop it. Then there are those who continue to try to reduce their involuntary participation. One way is by wearing clothes that trick privacy violating cameras...

Aug 16 18:43

Spying on You Is a Team Sport

By Chris Mishevski

Most people know that the NSA spies on Americans thanks to the revelations by Edward Snowden and other whistleblowers. But the NSA is just the tip of the surveillance iceberg. State, local and federal agencies have joined together the create a massive surveillance-state using a vast array of intrusive technology.

Federal intelligence agencies, including the NSA, CIA and DEA, collect data without a warrant, analyze it to build profiles on its targets and encourages state and local law enforcement to violate our fundamental right to privacy...

Aug 16 16:17

Why Were Hillary Clinton's Emails Blind-Copied To Gmail Address Named After Chinese Firm?

All but four of the 30,490 emails from Hillary Clinton’s unauthorized email server were forwarded to a private Google email address featuring the name of a Chinese company, according to documents released on Aug. 15.

Virtually every email which was sent to and received on the Clinton server was forwarded to “carterheavyindustries@gmail.com,” the documents show.

Aug 16 11:16

U.S. Military Designing A.I. Missiles to Seek and Destroy Targets from 40 Miles Away

By Nicholas West

Unlike my previous post that took a lighthearted look at the newest Robo-Dog on the market, which has a Doberman head filled with artificial intelligence, the U.S. Army’s newest plans for artificial intelligence aren’t even close to a laughing matter.

The U.S. military has long been obsessed with integrating artificial intelligence into weapons of war, and it appears that they are getting closer to the full-scale rollout of these systems...

Aug 16 10:36

Man’s Best Friend? A.I. Robo-Dog Gets a Doberman Head

By Nicholas West

While I don’t subscribe to the idea that there are inherently bad breeds of dogs, Hollywood has done its best to create the Doberman as an iconically terrifying animal. Which makes it even stranger that the A.I. Robo-Dog, which already crosses the creepy line for most people, would be topped off by a 3D-printed Doberman head equipped with a neural network that can learn on its own...

Aug 16 09:08

Indian Government Asks Twitter to Remove Accounts “Spreading Rumours” About Kashmir

By Rezwan

On August 5, India’s BJP-led government revoked Article 370 of the Indian constitution that gave special autonomy status to the disputed state of Jammu and Kashmir dividing it into two union territories – Jammu & Kashmir and Ladakh. Fearing unrest, protests, and opposition, the authorities put hundreds of political leaders and their aides under house arrest and suspended access to mobile, landline and internet networks...

Aug 16 08:17

Victory! California Supreme Court Blocks Sweeping Search Condition of Minors’ Electronic Devices and Social Media Accounts

By Jamie Williams

The California Supreme Court just rejected the government’s attempt to require a youth probationer, as a condition of release, to submit to random searches of his electronic devices and social media accounts. The trial court had imposed the condition because the judge believed teenagers “typically will brag” about drug use on the Internet—even though there was no evidence that the minor in this case, Ricardo P., had ever used any electronic devices in connection with any drugs or illegal activity, let alone ever previously bragged about drug use online.

EFF and the ACLU filed an amicus brief in the case back in 2016, warning that the search condition imposed here was highly invasive, unconstitutional, and in violation of the California Supreme Court’s own standard...

Aug 16 08:03

Silicon Valley Wants To Read Your Mind – Here’s Why You Should Be Worried

By Garfield Benjamin, Solent University

Not content with monitoring almost everything you do online, Facebook now wants to read your mind as well. The social media giant recently announced a breakthrough in its plan to create a device that reads people’s brainwaves to allow them to type just by thinking. And Elon Musk wants to go even further. One of the Tesla boss’s other companies, Neuralink, is developing a brain implant to connect people’s minds directly to a computer.

Musk admits that he takes inspiration from science fiction, and that he wants to make sure humans can “keep up” with artificial intelligence. He seems to have missed the part of sci-fi that acts as a warning for the implications of technology.

These mind-reading systems could affect our privacy, security, identity, equality and personal safety. Do we really want all that left to companies with philosophies such as that of Facebook’s former mantra, “move fast and break things”?...

Aug 15 17:46

Facebook Paid Contractors Like Amazon And Apple To Listen To Your Conversations — Code Named PRISM

By Aaron Kesel

In another Facebook scandal of the year, the company has been accused of paying hundreds of outside contractors to transcribe clips of audio from users of its services...

Aug 15 14:17

Office 365 alternative: Consider LibreOffice for your next PC office suite

If you want a standalone office suite for your computer, LibreOffice may soon not just be your best choice, it will be close to your only PC-based choice.

Aug 15 13:59

Ohio City Replacing ShotSpotter Surveillance with More Intrusive WiFi Tech

By B.N. Frank

Never mind that WiFi exposure reduces impulse control, which can increase potential for violence.

Most are familiar with the saying – “Guns don’t kill people. People kill people.” Because of increased gun violence, many American law enforcement agencies have been asking that communities invest in expensive WiFi operating technology to be installed for deterring crime...

Aug 15 11:25

Scott Adams: Epstein, Stock Markets and Trump, Deep Fakes, Simulation Proof, Hong Kong

Comments at: https://twitter.com/ScottAdamsSays/status/1162001287661195265?s=20

Always bet on human incompetence over a complex explanation
Kamala Harris…politicizing an active ongoing police event
If you can’t solve a problem any other way…”Trump it”
Shake the box till the variables produce a potential solution
Deep Fakes amazing video of Bill Hader’s face imperceptibly morphing
China will NEVER approve a fair trade deal…for cultural reasons
So how is a fair deal possible?
Thomas Friedman says he’d prefer TPP over trade war
Hong Kong situation and the likely outcome
Stock market prediction filter for 2020 election results
Will elite Democrats intentionally crash the stock market?
Is “political selling” happening to intentionally drive it down?
“Inverted Yield Curve” and recession fears…why?
Bill Clinton portrait at Epstein’s…wearing a blue dress and red shoes?

Aug 14 20:49

We checked and yup, it's no longer 2001. And yet you can pwn a Windows box via Notepad.exe

Software buried in Windows since the days of WinXP can be abused to take complete control of a PC with the help of good ol' Notepad and some crafty code.

On Tuesday, ace bug-hunter Tavis Ormandy, of Google Project Zero, detailed how a component of the operating system's Text Services Framework, which manages keyboard layouts and text input, could be exploited by malware or rogue logged-in users to gain System-level privileges. Such level of access would grant software nasties and miscreants total control over, and surveillance of, the computer.

The flaw, designated CVE-2019-1162, is patched in this month's Patch Tuesday release of security fixes from Microsoft. The relevant update should be installed as soon as possible.

Aug 14 09:49

Petition Started Against P&G’s Pampers “Smart” Diapers

By B.N. Frank

Activist Post recently reported about the dangers associated with babies wearing P&G’s “Smart” Diapers. Many health experts including The American Academy of Pediatrics (AAP) warn kids are more vulnerable to exposure to all sources of wireless radiation.

No safe level of exposure has even been determined for children or pregnant women. Earlier this year 250 scientists signed a petition warning against numerous products that emit Radio Frequency (RF) Radiation. This now includes “Smart” diapers which are also being manufactured and marketed by Huggies...

Aug 14 08:32

Major breach found in biometrics system used by banks, UK police and defence firms

The fingerprints of over 1 million people, as well as facial recognition information, unencrypted usernames and passwords, and personal information of employees, was discovered on a publicly accessible database for a company used by the likes of the UK Metropolitan police, defence contractors and banks.

Aug 13 18:31

Windows Certified Drivers Apparently Unsafe

Eclypsium, an Oregon security company, claims that drivers on Microsoft’s Windows platform are a security mess. Who could have guessed? Their researchers found serious flaws in more than 40 drivers from at least 20 different hardware vendors. Apparently every single one of these vulnerabilities allows the driver to hand over “access to the hardware resources, such as read and write access to processor and chipset I/O space, Model Specific Registers (MSR), Control Registers (CR), Debug Registers (DR), physical memory and kernel virtual memory. This is a privilege escalation as it can move an attacker from user mode (Ring 3) to OS kernel mode (Ring 0).” Basically, complete control of the impacted machine. Not only that, these potentially allow malware to compromise your UEFI and persist across an operating system re-installation. They also add that not only do these drivers provide the necessary access, they also provide the mechanism to make changes.

Aug 13 17:21

4 New BlueKeep-like 'Wormable' Windows Remote Desktop Flaws Discovered

If you are using any supported version of the Windows operating system, stop everything and install the latest security updates from Microsoft immediately.

Windows operating system contains four new critical wormable, remote code execution vulnerabilities in Remote Desktop Services, similar to the recently patched 'BlueKeep' RDP vulnerability.

Discovered by Microsoft's security team itself, all four vulnerabilities, CVE-2019-1181, CVE-2019-1182, CVE-2019-1222, and CVE-2019-1226, can be exploited by unauthenticated, remote attackers to take control of an affected computer system without requiring any user interaction.

Just like BlueKeep RDP flaw, all four newly discovered vulnerabilities are also wormable and could be exploited by potential malware to propagate itself from one vulnerable computer to another automatically.

Aug 13 17:19

Whistleblowers Report New Cars Are Vulnerable To Hacking And Thousands Could Die Because Of It

By B.N. Frank

The world would undoubtedly be a better place if there was never ever another impaired driver on the road. But what about when vehicles are impaired due to hacking?

Older vehicles weren’t able to be hacked, and studies continue to warn about the potential for new vehicles to be hacked and how this could lead to massive traffic gridlocks as well as people dying...

Aug 13 16:02

Facial recognition mistakes lawmakers for CRIMINALS in tests conducted by ACLU as California mulls ban on police use of the technology

Despite facial recognition's seal of approval from law enforcement agencies across the U.S., recent experiments show the technology is far from infallible.

In a demonstration by the American Civil Liberties Union, about 26 California lawmakers were misidentified by face-matching software built by Amazon, putting the rate of a mismatch at about 1 in 5.

The results mimic a similar test done by the advocacy group in 2018 when a test saw Amazon's software, called 'Rekognition', mismatch 28 members of congress -- many of whom were people of color.

Aug 13 15:54

Even digital cameras are at risk of hacking: Security researchers warn WiFi enabled DSLRs can be infected with ransomware

Not even your digital camera is safe from the threat of malicious computer bugs, according to security researchers.

In a report released earlier this week by analysts at Check Point Software Technologies, researchers detail how they were able to remotely install ransomware on a DSLR by exploiting the standardized Picture Transfer Protocol.

The protocol, developed to allow the transfer of pictures from a camera to one's computer via WiFi is a particularly easy target according to researchers.

Aug 13 08:45

What Microsoft's upcoming 'outsourcing' licensing changes could mean for your business

Enterprise customers relying on Microsoft 'Bring Your Own License' option to run Windows Server, SQL Server and other enterprise software in Amazon's or Google's clouds may be in for a rude awakening this fall.

Aug 13 07:17

Amazon’s Treasure Trucks Sell Discounted Ring Doorbells Across The US And UK

By MassPrivateI

Leave it to Amazon to create circus sideshow trucks, sorry I meant “Treasure Trucks” to promote neighborhood spying.

Last year, Slick Deals announced that Amazon’s treasure trucks were selling Ring doorbells at the discounted price of $139.00 in “select U.S. cities.”

And last December, Amazon’s Facebook page announced that their treasure trucks were offering discounted Ring doorbells for the holidays...

Aug 13 05:36

CLASS ACTION LAWSUITS HOPES TO HOLD GITHUB RESPONSIBLE FOR HOSTING DATA FROM CAPITAL ONE BREACH

SOURCE: TIM CUSHING @ TECH DIRT
As soon as the Capital One breach was announced, you knew the lawsuits would follow. Handling the sensitive info of millions of people carelessly is guaranteed to net the handler a class-action lawsuit or two, but this one -- filed by law firm Tycko & Zavareeri -- adds a new twist.

The 28-page lawsuit filed Thursday in the U.S. District Court for the Northern District of California asserted that GitHub "actively encourages (at least) friendly hacking."

It notes that the hacked Capital One information was posted online for months and alleges that the company violated state law to remove the information. "GitHub had an obligation, under California law, to keep off (or to remove from) its site Social Security numbers and other Personal Information," the suit says

Webmaster's Commentary: 

(Sigh) why don't companies take better care of the data they mine?!?One would think that in the 21st century, breaches like this would not happen, but yet, it seems to happen on a pretty basis.

Aug 12 17:56

How the Turkish Government Exploits Social Media Removal Requests to Silence Criticism

By Arzu Geybullayeva

Hundreds—if not thousands—of Twitter accounts have been targeted by the Turkish government using the platform’s “Country Withheld Content” tool (CWC). In 2010, Twitter unveiled the tool which allows it to censor content on a country by country basis. At that time, Twitter may not have completely envisaged how its tool could be abused by a number of of increasingly authoritarian countries where social media platforms have been targeted by the authorities in the face of growing crackdown and censorship, most notably Turkey. Many other governments...

Aug 12 16:44

Steam Zero-Day Vulnerability Affects Over 100 Million Users

The popular Steam game client for Windows has a zero-day privilege escalation vulnerability that can allow an attacker with limited permissions to run a program as an administrator

Privilege escalation vulnerabilities are bugs that enable a user with limited rights to launch an executable with elevated, or administrative privileges. With Steam having over 100 million registered users and millions of them playing at a time, this is a serious risk that could be abused by malware to perform a variety of unwanted activities.

Aug 12 16:33

Facebook ‘News’: A bold step toward total control of reality?

Facebook's plan to hook ad-cash-deprived mainstream outlets on licensing payouts seems to be an attempt to hijack narrative control en route to total domination of the infosphere – the ultimate safe space, Zuckerberg-style.

More than two thirds of American adults get their news from social media at the same time that more than half expect that news to be "largely inaccurate." Perhaps sensing a business opportunity, Facebook has moved in to manage that news consumption, reportedly offering mainstream outlets millions of dollars per year to license their content in order to present it to users authoritatively, as "Facebook News" – having long since ceased trusting users to share news among themselves.

But trusting Facebook to deliver the news is like trusting a cheetah to babysit your gazelles – all that's left at the end is likely to be a pile of bones.

Aug 12 11:54

OK, WTF is THIS NOTICE??? A concern or? Help pls

In comments

A legal notice from the Russian Gov

Aug 12 11:05

Leaked Draft of Trump Executive Order to 'Censor the Internet' Denounced as Dangerous, Unconstitutional Edict

"In practice, this executive order would mean that whichever political party is in power could dictate what speech is allowed on the Internet."

Aug 12 10:56

U.S. Customs Continues to “Modernize” Its System to Include Biometrics For All Passengers

By Nicholas West

One aspect often lost in the immigration debate is the rollout of government solutions that are set to restrict the freedom of the perfectly innocent. A key component of this is the increased collection of passenger biometrics.

A new report shows how this will be integrated across the globe, including domestic travel inside the United States...

Aug 12 09:37

John Bolton to Lobby for Harsher UK Stance on Iran, Huawei During Visit to London

The US has been carrying out a "maximum pressure" sanctions campaign against Iran and cracking down on Chinese tech giant Huawei for some time, but these polices found little support in the previous UK Cabinet.

US National Security Adviser John Bolton will try to convince the new Cabinet of Prime Minister Boris Johnson to align its foreign policies more with the American "maximum pressure" campaign against Iran and to discard its plans to use Huawei equipment in developing its 5G networks during his upcoming visit to the UK, Reuters reported, citing an anonymous source within the US administration.

Aug 12 07:43

Apparently Twitter is testing out selective censorship of replies

Soon, everyone can have squeaky clean comment threads with no criticism or opposing viewpoints!

Aug 11 20:58

This Teen Hacker Found Bugs in School Software That Exposed Millions of Records

At the Defcon hacker conference in Las Vegas today, 18-year-old Bill Demirkapi presented his findings from three years of after-school hacking that began when he was a high school freshman. Demirkapi poked around the web interfaces of two common pieces of software, sold by tech firms Blackboard and Follett and used by his own school. In both cases, he found serious bugs that would allow a hacker to gain deep access to student data. In Blackboard's case in particular, Demirkapi found 5 million vulnerable records for students and teachers, including student grades, immunization records, cafeteria balance, schedules, cryptographically hashed passwords, and photos.

Demirkapi points out that if he, then a bored 16-year-old motivated only by his own curiosity, could so easily access these corporate databases, his story doesn't reflect well on the broader security of the companies holding millions of students' personal information.

Aug 11 19:35

Microsoft axes Office 2019 from 'Home Use Program'

The company is moving away from perpetually-licensed Office 2019 and now offers annual subscriptions to Office 365 Personal and Office 365 Home for $69.99 and $48.99, respectively.

Aug 11 18:28

Leaked Documents Show White House is Planning Executive Order to Censor the Internet

Fight For The Future

Leaked documents show that the Trump administration is drafting an executive order that, if upheld by the courts, could essentially end free speech on the Internet. The draft order would put the FTC and the FCC, headed by its notoriously corrupt chairman Ajit Pai, in charge of monitoring and policing online speech on social media platforms, online forums, and more.

Aug 11 16:13

Ohm my God: If you let anyone other than Apple replace your recent iPhone's battery, expect to be nagged by iOS

According to equipment repair nerve-center iFixit and Justin Ashford, who runs The Art of Repair channel on YouTube, third-party battery replacement in an iPhone XR, XS, or XS Max running iOS 12 or iOS 13 beta leads to the presentation of a "Service" message in the Battery Health sub-menu that's part of the fondleslab's Battery settings menu.

This message urges the iPhone owner to have the newly installed battery replaced – which Apple advises should be done only through an Apple Store or authorized service provider due to potential safety issues – even if an Apple-supplied battery is installed by a third-party.

Aug 11 15:13

The US Navy will replace its touchscreen controls with mechanical ones on its destroyers

After a deadly 2017 crash between a destroyer and an oil tanker

Aug 10 11:48

FCC Decides NO CHANGE to Radiation Limits For 5G Despite Research Supporting Public Outcry Over Risks

By B.N. Frank

The role of the Federal Communications Commission (FCC) is to regulate the Telecom Industry even though they are not a health or environmental agency.

Current rules, safety limits and guidelines for RF radiation exposure were adopted in 1996 and don’t apply to how most people use or are exposed to RF emitting devices and infrastructure today. They even don’t apply to how current technology and products are manufactured and marketed...

Aug 09 18:21

The “Science” That Google Relies On

By Lynne McTaggart

Under the emphatic headline ‘This has to stop,’ my good friend, bestselling author Arielle Ford (The Soulmate Secret), posted an article claiming that Google was burying Alternative Medicine sites to ‘protect people against false claims.’

Among the comments from her readers was someone who wrote in to defend Google’s and Wikipedia’s decisions. As it turned out, he revealed, he was one of Google’s rankers, who determine the placement of information on the search engine’s pages. Naturally, he said, the Mayo Clinic would appear in an earlier page above an alternative medicine site because its practices are based on far more science than alternative medicine is.

This was a fascinating, if brief, insight into the minds of Google’s and Wikipedia’s adjudicators and how they are determining what version of reality the likes of you and me are allowed to see. I have to take issue with this fellow’s definition of the word ‘scientific.’...

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA