COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Mar 06 08:19

Huawei’s Plan to File Lawsuit Against US Government ‘Very Valid’

This week, Meng Wanzhou, the CFO of Chinese telecommunications giant Huawei, filed a lawsuit in Canada, claiming her constitutional rights were violated during her arrest, while the company itself intends to file a lawsuit against the US administration over its law banning US federal agencies from purchasing Huawei products.

Jude Woodward, the author of the new book "The US vs China: Asia's new Cold War?" told Radio Sputnik's Loud & Clear Wednesday that Huawei's reported plans to sue the US government over its ban on Huawei products is valid, given the lack of evidence provided by the US government over its claims that the Chinese company spies on US technology.

Mar 06 08:08

How Would People React To A Social Media Tax? Look At Uganda

The East African nation with a population of 43 million has become the latest country to attempt to gag the voice of its citizens after imposing a social media tax intended to ‘‘curb gossip.’’ The Ugandan government has introduced a tax of 200 Uganda shilling (5.4 cents) a day to use social sites such as Facebook, Twitter, WhatsApp and others.

And, perhaps to the delight of the Ugandan government, millions of its citizens are quitting these networks.

Mar 05 22:41

Mystery as Quadriga crypto-cash goes missing

Efforts to recover millions in crypto-cash from the digital wallets of a man who died without revealing passwords to access them have hit a snag.

The wallets have been found to be empty.

The discovery was made by a firm appointed to oversee QuadrigaCX after the death of founder Gerald Cotten.

It expected to find the wallets full of C$180m ($137m; £105m) in crypto-cash deposited by the coin exchange's customers.

Mr Cotten, who died in India in December, had sole responsibility for handling the funds and coins passing through the site.

Mar 05 22:40

Why 'ji32k7au4a83' Is a Remarkably Common Password

Have I Been Pwned is an aggregator that was started by security expert Troy Hunt to help people find out if their email or personal data has shown up in any prominent data breaches. One service it offers is a password search that allows you to check if your password has shown up in any data breaches that are on the radar of the security community. In this case, “ji32k7au4a83" has been seen by HIBP in 141 breaches.

Several of Ou’s followers quickly figured out the solution to his riddle. The password is coming from the Zhuyin Fuhao system for transliterating Mandarin. The reason it’s showing up fairly often in a data breach repository is because “ji32k7au4a83" translates to English as “my password.”

Mar 05 11:55

MIT's creepy 'Cheetah' robot can now do backflips

If a robot that can run, jump and climb isn't your thing, maybe one that can do backflips is.

The Massachusetts Institute of Technology (MIT) recently unveiled a new video of its Mini Cheetah robot, demonstrating that the four-legged android is now capable of doing backflips.

Webmaster's Commentary: 

BUT.... can it clean, iron, and fold clothing!?!?! -- Claire

Mar 05 11:40

Wi-Fi in Schools: Experimenting with the Next Generation

When it comes to accessing this ocean of information, we have two basic choices: wired or Wi-Fi. The vast majority of schools have embraced the wireless revolution. It’s easy to see why. Compared to wired internet, wireless is simpler, cheaper, and faster for schools to install.

Today, students are trading notebooks and textbooks for laptops, cellphones, iPads, and all manner of “smart” devices connected to a potent wireless infrastructure that lets them be used virtually anywhere on school grounds.

But that wireless web comes with a devastating downside. Doctors and scientists say that the students and teachers who attend these schools are risking their health.

Mar 05 11:28

ADL CEO Jonathan Greenblatt on working with Silicon Valley tech giants on creating algorithms to censor opinion they don't like.

Mar 05 11:22

Controversial NSA phone data collection program shut down, aide says

The National Security Agency has quietly discontinued a controversial program put in place after the September 11 terrorist attacks that collected and analyzed millions of Americans' domestic calls and texts, according to a senior Republican congressional aide.

The NSA hasn't used the system in months, and the Trump administration might not seek to renew its legal authority, Luke Murray, the national security advisor for House minority leader Kevin McCarty (R-Calif.), said in a podcast Saturday.

Under a controversial national security policy put in place by the Patriot Act in 2001, the NSA had been collecting large amounts of metadata, the digital information that accompanies electronic communications. That information included what phone numbers were on the call, when the call was placed and how long it lasted, which was then saved in a database.

Webmaster's Commentary: 

My guess; they couldn't get usable intelligence out of that mess.

Mar 05 09:15

All Intel chips open to new Spoiler non-Spectre attack: Don't expect a quick fix

Researchers have discovered a new flaw affecting all Intel chips due to the way they carry out speculative execution for CPU performance gains.

Like the Spectre and Meltdown attacks revealed in January 2018, Spoiler also abuses speculative execution in Intel chips to leak secrets.

However, it targets a different area of the processor called the Memory Order Buffer, which is used to manage memory operations and is tightly coupled with the cache.

Researchers from Worcester Polytechnic Institute, Massachusetts, and the University of Lübeck in north Germany detail the attack in a new paper, 'Spoiler: Speculative load hazards boost Rowhammer and cache attacks'. The paper was released this month and spotted by The Register.

Mar 05 02:17

Smart Phones, Smart Appliances…Smart People? Brain Chip Will Create Super-Intelligent Humans

What if you could have a chip installed in your brain that would increase your intelligence? Would you be interested?

While this kind of brain-computer interface technology might sound like something out of a dystopian science fiction novel, scientists are working hard to develop it, and it will likely be available in the near future.

This gives a whole new meaning to the phrase “smart person.”

Mar 04 19:17

Facebook Doubles Down On Misusing Your Phone Number

By Gennie Gebhart

When we publicly demanded that Facebook stop messing with users’ phone numbers last week, we weren’t expecting the social network to double down quite like this: By default, anyone can use the phone number that a user provides for two-factor authentication (2FA) to find that user’s profile. For people who need 2FA to protect their account and stay safe, Facebook is forcing them into unnecessarily choosing between security and privacy.

While settings are available to choose whether “everyone,” “friends of friends,” or “friends” can use your phone number this way, there is no way to opt out completely...

Mar 04 16:36

Hackers have started attacks on Cisco RV110, RV130, and RV215 routers

The vulnerability, tracked as CVE-2019-1663, was of note when it came out on February 27 because it received a severity score from the Cisco team of 9.8 out of a maximum of 10.

It received such a high rating because the bug is trivial to exploit and does not require advanced coding skills and complicated attack routines; it bypasses authentication procedures altogether; and routers can be attacked remotely, over the internet, without attackers needing to be physically present on the same local network as the vulnerable device.

Affected models include the Cisco RV110, RV130, and RV215, all of which are WiFi routers deployed in small businesses and residential homes.

Mar 04 16:33

Surprise! Facebook Low-Balled The Percentage Of Teens It Paid To Install Spyware

In January, when news first broke that Facebook had been paying teens in gift cards to let it install what is, by definition, essentially spyware on their phones, it seemed like just another Tuesday. Had it been virtually any other company, the outrage would have been tenfold.

After all, paying 13-year-olds to gain access to their mobile app usage and browser traffic is, on its face, an unconscionably creepy way for a business to gather intelligence about its competitors. But this shameless undertaking is now precisely the kind of dissolute conduct we’ve come to expect from the occupants 1 Hacker Way.

Facebook’s moral turpitude aside, it’s now come to light that the company also initially underreported the percentage of teens that it had paid to become lab rats, while falsely stating that parental consent forms were required.

Mar 04 16:20

German Data Privacy Commissioner Says Article 13 Inevitably Leads to Filters, Which Inevitably Lead to Internet "Oligopoly"

The Directive will be voted on at the end of this month, and its Article 13 requires that online communities, platforms, and services prevent their users from committing copyright infringement, rather than ensuring that infringing materials are speedily removed.

In a new official statement on the Directive (English translation), Kelber warns that Article 13 will inevitably lead to the use of automated filters, because there is no imaginable way for the organisations that run online services to examine everything their users post and determine whether each message, photo, video, or audio clip is a copyright violation.

Kelber goes on to warn that this will exacerbate the already dire problem of market concentration in the tech sector, and expose Europeans to particular risk of online surveillance and manipulation.

Mar 04 15:54

Facebook is slammed for 'unconscionable' security risks after it's revealed profiles are searchable by phone number - including the one meant to protect your account

A tweet posted this weekend by Emojipedia founder Jeremy Burge revealed a worrying method for looking up specific profiles that most users are unaware of: the phone number you provided for two-factor authentication.

Facebook allows people to search for profiles using phone numbers linked to a particular account, even if you’ve chosen to hide this information from the public. Profiles can also be searched by phone number in the Messenger app.

But, it was not previously clear that this also includes numbers provided to the site only for security reasons.

The shocking revelation comes months after Facebook admitted it was using these phone numbers for targeted ads.

Mar 04 11:56

Sorry, Russia-Gaters: WikiLeaks Got the DNC Emails From Insider, Not Russia

Thinking back, President Barack Obama dropped a huge hint two days before he left office, using his last press conference to point out that the “conclusions of the intelligence community” regarding how WikiLeaks received the DNC emails were “inconclusive.” The nerve! Daring to say that just 13 days after the U.S. intelligence Gang of Four briefed Obama up and down on their evidence-free “assessment” that WikiLeaks got the DNC emails via a Russian hack.

This was one time Obama summoned the courage to face down James (the-Russians-are-almost-genetically-driven-to-deceive) Clapper and other intelligence chiefs. After all, Obama is a lawyer. He “does evidence.” In contrast, ex-CIA Director John Brennan, told Congress that he does not “do evidence.”

Mar 04 11:26

EU SCARED: Attempts to Move ACTA 2 Vote Before Protest Date — See Protest Map To Save Your Internet

By Aaron Kesel

Protests all over Europe have been planned by Anonymous and Pirate Parties International (PPI) for March 23rd, to fight against copyright companies and EU bureaucrats seeking to destroy the internet with their proposed upload filter and link tax, (Article 11 and Article 13.) Meanwhile, the Bureaucrats are trying to push the vote before there is wide scale outrage for their proposals for the Internet.

The first wave of street protests in at least 20 different cities in 15 countries took place on January 19, 2019, all across Europe.

Now, Anons, Pirates and activists alike are planning more massive demonstrations across Europe to show members of the European Parliament (MEPs) that public consensus is against the proposed articles. The Articles 11,12 and 13, were finalized for voting at the end of March...

Mar 04 10:08

As Trump and Kim Met, North Korean Hackers Hit Over 100 Targets in U.S. and Ally Nations

North Korean hackers who have targeted American and European businesses for 18 months kept up their attacks last week even as President Trump was meeting with North Korea’s leader in Hanoi.

The attacks, which include efforts to hack into banks, utilities and oil and gas companies, began in 2017, according to researchers at the cybersecurity company McAfee, a time when tensions between North Korea and the United States were flaring. But even though both sides have toned down their fiery threats and begun nuclear disarmament talks, the attacks persist.

Mar 04 09:59

The secret tricks Apple store staff use to push certain products

It all started with an insult.

An Apple store customer in Australia complained that a store employee had "questioned my intelligence" by insisting he use Apple Pay for a transaction.

Also: Apple was right, people love expensive iPhones

That customer was fed up with the pushiness and walked out.

I, however, wanted to help him. I wanted to see if this behavior was widespread. So I walked into a couple of Apple stores to learn whether its salespeople really are incentivized to push certain products or services.

None would admit to any sort of commission payments.

I did, though, receive word from former Apple store employees who said, in essence, that these salespeople may not appreciate everything that's really going on.

Mar 03 12:37

THE REAL REASON WHY GLOBALISTS ARE SO OBSESSED WITH ARTIFICIAL INTELLIGENCE

It is nearly impossible to traverse web news or popular media today without being assaulted by vast amounts of propaganda on Artificial Intelligence (AI). It is perhaps the fad to end all fads as it supposedly encompasses almost every aspect of human existence, from economics and security to philosophy and art. According to mainstream claims, AI can do almost everything and do it better than any human being. And, the things AI can't do, it WILL be able to do eventually.

Mar 03 09:04

Comcast set mobile pins to “0000,” helping attackers steal phone numbers

A bad security decision by Comcast on the company's mobile phone service made it easier for attackers to port victims' cell phone numbers to different carriers.

Comcast in 2017 launched Xfinity Mobile, a cellular service that uses the Verizon Wireless network and Comcast Wi-Fi hotspots. Comcast has signed up 1.2 million mobile subscribers but took a shortcut in the system that lets users switch from Comcast to other carriers.

Mar 03 08:52

The Age of Tyrannical Surveillance: We’re Being Branded, Bought and Sold for Our Data

Uncle Sam wants you.

Correction: Big Brother wants you.

To be technically accurate, Big Brother—aided and abetted by his corporate partners in crime—wants your data.

That’s what we have been reduced to in the eyes of the government and Corporate America: data bits and economic units to be bought, bartered and sold to the highest bidder.

Those highest bidders include America’s political class and the politicians aspiring to get elected or re-elected. As the Los Angeles Times reports, “If you have been to a political rally, a town hall, or just fit a demographic a campaign is after, chances are good your movements are being tracked with unnerving accuracy by data vendors on the payroll of campaigns.”

Mar 03 08:46

Wi-Fi in Schools: Experimenting With the Next Generation

The internet has unleashed human knowledge. Never before has it been so easy to learn so much. Of course, it has also drowned us in distraction and created a breeding ground for trolls and misinformation, but if the internet is redeemed by anything, it is its liberation of education.

When it comes to accessing this ocean of information, we have two basic choices: wired or Wi-Fi. The vast majority of schools have embraced the wireless revolution. It’s easy to see why. Compared to wired internet, wireless is simpler, cheaper, and faster for schools to install.

Today, students are trading notebooks and textbooks for laptops, cellphones, iPads, and all manner of “smart” devices connected to a potent wireless infrastructure that lets them be used virtually anywhere on school grounds.

But that wireless web comes with a devastating downside. Doctors and scientists say that the students and teachers who attend these schools are risking their health.

Mar 02 14:26

Robots Take Record Number Of Jobs In The U.S. According To Robotic Industries Association

By Aaron Kesel

According to the Robotic Industries Association (RIA), robots/artificial intelligence has taken over a record number of jobs in the U.S. proving what we have been sounding the alarm about for months...

Mar 02 10:14

IT'S NOT THE INTERNET THAT'S DARK. IT'S HUMANITY

From degrading comments to vile posts to videos that urge self-harm, the internet is a cesspool that shows the worst of humankind. Pedophilia, hate, racism, sexism, rape, animal abuse, bullying, and murder are everywhere. But it’s not the internet that is the problem.

Mar 02 09:58

Amazon Joins Big Tech Assault on Anti-Vaccine Information

By Jason Erickson

As major media and big tech continue freaking out over 159 measles cases in the U.S., anti-vaccine campaigners are increasingly being likened to terrorists as their ability to share information and earn money is being cut off.

The origin of this latest move against the free flow of information seems to have stemmed from a letter sent by Adam Schiff (D-CA)...

Mar 02 09:15

China’s Social Credit System Barred Millions from Traveling in 2018

Your bags are packed, your rooms are booked, you’re all set for your vacation; there’s just one problem, the government has canceled your tickets.As early as 2014, China began conceptualizing a Social Credit System (SCS), sort of like a credit score for citizen behavior where behaviors deemed good for society are rewarded with privileges and bad behaviors result in a poor score and loss of privileges. China has since been working to test its new method of population control and has been slowly conscripting citizens into the system. Now, a new report acquired by the Associated Press, suggests millions of would-be travelers had their plans canceled as a result of the SCS in 2018.

Mar 02 09:02

REVEALED: FACEBOOK’S GLOBAL LOBBYING AGAINST DATA PRIVACY LAWS

Social network targeted legislators around the world, promising or threatening to withhold investment
Facebook has targeted politicians around the world – including the former chancellor, George Osborne – promising investments and incentives while seeking to pressure them into lobbying on Facebook’s behalf against data privacy legislation, an explosive new leak of internal Facebook documents has revealed.

The documents, which have been seen by the Observer and Computer Weekly, reveal a secretive global lobbying operation that has targeted hundreds of legislators and regulators in an attempt to procure influence across the world, including in the UK, US, Canada, India, Vietnam, Argentina, Brazil, Malaysia and all 28 states of the EU. The documents include details of how Facebook:

• Used chief operating officer Sheryl Sandberg’s feminist memoir Lean In to “bond” with female European commissioners it viewed as hostile.

Webmaster's Commentary: 

Color me completely unsurprised at these developments.

Facebook has long been the 4th arm of US government, and its surveillance capabilities make it the "poster child" for digital dismemberment, should one's thoughts differ, in any way, from what the official narrative might be.

Mar 02 06:05

It’s Not the Internet That’s Dark. It’s Humanity.

Maybe it isn't the internet that is the problem. Maybe it is the same dark segments of humanity who have been our neighbors all along.

Mar 01 12:17

Amazon-owned Ring has reportedly been spying on customer camera feeds

If you own a Ring doorbell camera system, we’ve got some bad news. The smart home company owned by Amazon, which the Internet retail giant shelled out more than $1 billion to acquire, has apparently been violating its customers’ privacy in a pretty shocking way. A new report from The Intercept quotes unnamed sources who confirm that engineers and executives at Ring have “highly privileged access” to live customer camera feeds, utilizing both Ring’s doorbells as well as its in-home cameras.

All that’s apparently required to tap into the live feeds is a customer’s email address. Meaning, the company has been so egregiously lax when it comes to security and privacy that even people outside the company could have potentially done this, using merely an email address to begin spying on customers, according to the report.

Mar 01 10:55

Kremlin says cyber attacks on Russia often launched from U.S. territory

The Kremlin on Wednesday said that U.S. territory was constantly being used to launch cyber attacks against Russia, but said it was unable to confirm a U.S. media report that the U.S. military had disrupted the internet access of a Russian troll farm.

The Washington Post reported on Tuesday that the U.S. military had disrupted the internet access of a Russian troll farm accused of trying to influence American voters on Nov. 6, 2018, the day of the congressional elections.

Kremlin spokesman Dmitry Peskov told reporters he did not know how much truth there was to that media report.

Feb 28 12:28

LIMITING YOUR DIGITAL FOOTPRINTS IN A SURVEILLANCE STATE

In China, evading the watchful eyes of the government sometimes feels like an exercise in futility. The place is wired with about 200 million surveillance cameras, Beijing controls the telecom companies, and every internet company has to hand over data when the police want it. They also know where journalists live because we register our address with police. In Shanghai, the police regularly come to my apartment; once they demanded to come inside.

That said, China is big, and the government less than competent. Sometimes the police who come to my door have no idea I’m a journalist. Usually the higher-ups who deal with my visa don’t know about the house visits. The lack of coordination means one of the best things to do is to try to slip through the cracks. Basically, protect yourself but also leave an innocent trace.

Webmaster's Commentary: 

IF you think this kind of surveillance won't be coming to the US soon, you had better revisit that conclusion, and fast!!!!

Feb 28 12:11

WATCH Russian Soyuz rocket launch 1st OneWeb satellites to revolutionize internet

A Soyuz rocket has successfully launched six OneWeb satellites in the first of 21 planned launches to place 650 units in orbit with the ultimate goal of providing broadband internet “everywhere” to “everyone.”

Feb 28 12:06

FTC SLAMS TIKTOK WITH RECORD FINE FOR SPYING ON PRE-TEENS

HIT OR MISS
TikTok, the video-sharing social media app that works like a cursed reincarnation of Vine, just got slapped with a $5.7 million fine for collecting personal information about its pre-teen users.

The U.S. Federal Trade Commission (FTC) announced on Wednesday that TikTok agreed to the settlement after allegations that the app knowingly and illegally stored the names, email addresses, and locations of users under the age of 13. The FTC’s fine is the largest to ever be imposed for a violation of the Children’s Online Privacy Protection Act (COPPA), according to the FTC’s statement — and a heartening sign that regulators are unwilling to cede privacy protections for young internet users.

PARENTAL CONSENT
Part of the reason for the severe fine might be because TikTok received thousands of complaints from concerned parents without changing its business practices.

Feb 28 10:48

Scientists Want Orwellian A.I. Sentient Smart Assistants To Snitch On Owners And Discuss Contacting Police

By Aaron Kesel

Smart assistants like Siri, Google Home, and Amazon Echo could soon be implemented with a “moral AI” to decide whether to report their owners for breaking the law.

Scientists at the University of Bergen, Norway proposed the incredibly Orwellian idea of inserting morals into A.I. code at the ACM conference in Hawaii on Artificial Intelligence, Ethics and Society...

Feb 28 10:10

Popular video game Plague Inc. adds in 'stupid' ANTI-VAXXERS as one of its fictional threats to humanity after 20,000-strong petition

The hugely popular video game Plague Inc. sees players take on the role of deadly pathogens hellbent on destroying the world.

But rather than morphing into Black Death or Ebola to wipe out humanity, players will soon be able to rely on a little help from anti-vaxxers.

More than 20,000 fans of the game - which was played by over 25million people worldwide in 2012-to-13 alone - campaigned for 'stupid anti-vaxxers' to become a 'fictional' threat to humanity.

And the brains behind Plague Inc. have now announced they will be adding anti-vaxxers 'very soon', saying '[they're] dying to try and get inside our heads'.

Feb 28 09:15

MAJOR REVELATION, FORMER NSA AND CIA: “WHY THE DNC WAS NOT HACKED BY THE RUSSIANS”

The FBI, CIA and NSA claim that the DNC emails published by WIKILEAKS on July 26, 2016 were obtained via a Russian hack, but more than three years after the alleged “hack” no forensic evidence has been produced to support that claim. In fact, the available forensic evidence contradicts the official account that blames the leak of the DNC emails on a Russian internet “intrusion”. The existing evidence supports an alternative explanation–the files taken from the DNC between 23 and 25May 2016 and were copied onto a file storage device, such as a thumb drive.

Feb 28 09:12

Total Data Domination: 5G, IoT, AI Surveillance And The Smart City

By Patrick Wood

People who have a modern smartphone normally think of 5G as nothing more than a progression from 3G and 4G. Offering fewer dropped calls, faster data transfer, and more convenience. 5G is the fifth generation of wireless technology.

This thinking barely scratches the surface. There must be a greater reason why CEOs of major cellular carriers are breaking their necks to railroad the fastest implementation in history of a new communication standard.

This reason has little to do with your personal cellphone and everything to do with the so-called Internet of Things (IoT) where all electronic devices will be connected together in real-time. Collectively, the IoT is the core technology used to implement Smart City makeovers...

Feb 27 18:24

BOMBSHELL: Facebook whistleblower exposes malicious algorithm to shadow ban and “de-boost” conservative content

Project Veritas has just unleashed another massive bombshell that could begin the process of bringing down the dishonest social media tech giants and their “content cartels.”

Posted at this link on ProjectVeritas.com, a former high-level Facebook employee has gone public with irrefutable proof that Facebook applies a “de-boost” algorithm to conservative content in order to suppress its visibility and sharing.

Shockingly, internal Facebook documents admit this is being done “leading up to important elections,” thereby admitting to criminal election meddling and fraud. This is the crime that Robert Mueller claims “the Russians” carried out against the United States of America. In reality, Facebook has been engaged in this election meddling crime for several years now.

Feb 27 14:29

Online Censorship: The Cure is Worse than the Disease

Fake news is a big problem. And as I’ve written, technology is about to make a lot worse. -- But censoring online content to combat fake news is equally problematic. And it doesn’t matter where on the political spectrum your opinions lie…it’s a problem for everyone.

Feb 27 10:51

Boeing Unveils Frightening Video of its New AI-Powered Combat Drones

In a tweet today, Boeing unveiled a frightening video of its new unmanned combat drones powered by artificial intelligence. The drones are part of Boeing’s Airpower Teaming System and are expected to enter service in Australia in 2020. The tweet, video and press release are below.

Feb 27 10:01

The Age of Tyrannical Surveillance: We’re Being Branded, Bought and Sold for Our Data

Uncle Sam wants you.

Correction: Big Brother wants you.

To be technically accurate, Big Brother—aided and abetted by his corporate partners in crime—wants your data.

That’s what we have been reduced to in the eyes of the government and Corporate America: data bits and economic units to be bought, bartered and sold to the highest bidder.

Feb 27 10:00

Raspberry Pi: No longer the fastest $35 computer but still the best

The past year has produced a steady stream of single-board computers that surpass the specs of the flagship Raspberry Pi 3 Model B+, some of which have also matched its rock-bottom $35 price tag.

But getting hands-on with these boards reveals the specs sheet only tells half the story. Boot up one of these theoretically more powerful computers and you're likely in for a nasty surprise.

While they may look the part, all that latent power is largely useless if there isn't the software to take advantage of it.

A case in point is my experience with the Orange Pi 3, a recently released $35 board with a faster processor and double the memory of the Raspberry Pi 3, as well as modern features, such as USB 3.0 and HDMI 2.0a.

But tapping into that power is another matter. Start up the version of the Ubuntu 16.04 operating system provided for the board and the problems soon become apparent.

Feb 27 09:56

Huawei Chairman Mocks US "Security Threat" Claims With Jab At Snowden

Huawei executives took advantage of this week's Mobile World Conference in Barcelona - one of the global telecom industry's biggest trade events - to mock US allegations that Chinese telecom giant represents a possible security threat for the US's western allies, when he correctly pointed out that US law requires the same type of security cooperation for which Huawei is allegedly complicit.

Feb 26 23:24

Mike Cernovich: Hi @AOC, Your Former Roommate Nathan Bernard Has Been Responsible for Death [Threats] Received by My Daughter.

"He has also sexually harassed my wife, and is under investigation.

Would you please tell your creepy friend to stop harassing my wife and daughter?"

See also: https://www.cernovich.com/stalkers-with-verified-twitter-accounts-are-...

Feb 26 18:37

The ‘Russian bots’ that weren't: Twitter backtracks on troll claims, media ignores updated info

Twitter quietly revised its public database of ‘Russian bot’ accounts earlier this month, removing 228 accounts it previously said were “connected to Russia”— but the admission has gone almost completely unnoticed by the media.

Bloomberg reported on the “burst of activity” from the bot accounts and claimed that Russia's “social-media trolling operation” was “stepping up its Twitter presence to new heights.”

Fast-forward to 2019 and Twitter has removed 228 of these accounts from the database, saying they had “initially misidentified” them as being linked to Russia, but nobody in the media seems to have noticed.

In fact, Bloomberg is the only major US outlet which bothered to correct the story to reflect reality, admitting that Twitter’s changes to the dataset “invalidate central portions” of its original report and that there was “no surge” in this so-called Russian bot activity at the time in question. Oops!

Feb 26 18:33

MarioNET attack lets hackers control your browser, even after you leave the attack page

A new attack, called MarioNET by the researchers that discovered it, highlights that APIs may also be abused if no proper safeguards are in place (which is the case right now).

The attack relies on existing HTML5 APIs that all modern web browsers support. It does not require the installation of software or user interaction, and persists even after the user leaves the web page the attack originated on.

The attacker may abuse the resources of the computer for all kinds of activities including DDOS attacks, crypto-mining operations, or password cracking.

Block Service Workers

https://chrome.google.com/webstore/detail/block-service-workers/ceokjgeibfjfcboemhdpkdalankbmnej

https://addons.mozilla.org/en-US/firefox/addon/block-service-workers/

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA