It would be amazing if Sony actually worked to improve the quality of their PlayStation server infrastructure. It’s insane that I have to wait 4-5 hours to download 80GB on a 250Mbps symmetrical connection.
This dark concept of total distrust was mostly spread via the Internet because it was what the Internet was built for—sharing ideas. Although the Internet is the most democratic means of communicating, it can be also be misused by governments and other groups.
Does this mean we should accept the concept that the Internet carries more threats than benefits?
The creators of the Internet supported the opposite concept. Unlike Putin, they believed in people and built the global network under the assumption that it would be used for sharing something good. They may look naïve these days, but we have our modern linked-up technological world thanks to their concepts, not Putin’s. These days, we all speak the language of suspicion and threats posed by the Internet. In a way, in means we are speaking Kremlin’s language. Do we really need to?
- Andrei Soldatov, “Speaking the Kremlin’s language”
As the capacity of networks like Cloudflare continue to grow, attackers move from attempting DDoS attacks at the network layer to performing DDoS attacks targeted at applications themselves.
For applications to be resilient to DDoS attacks, it is no longer enough to use a large network. A large network must be complemented with tooling that is able to filter malicious Application Layer attack traffic, even when attackers are able to make such attacks look near-legitimate.
The pace of change in how DDOS attacks are being conducted, and efforts to use best and worst security practices alike to threaten Internet-connected resources, is a serious and generally under appreciated problem.
From Network World:
In case you are wondering, that firmware for the R7000 – Nighthawk AC1900 smart router – is the newest firmware available by Netgear. Here are Netgear’s links to the R8000 – Nighthawk AC3200 tri-band gigabit router and the R6400. Hopefully those – and any other vulnerable models – will soon be updated with less insecure firmware.
Hopefully less insecure firmware will be provided to turn a burning dumpster fire into a merely-smouldering-mess. Hurray for (possible, but don’t bet on it) progress.
Two reasons that journalists should be concerned about DDoS attacks:
First, while the use of common household devices to execute the attacks against Krebs and Dyn was novel, the hackers got control of those devices using one of the oldest and easiest methods out there: bad passwords, a vulnerability most journalists share.
The second reason journalists should attend to these attacks is that strategic use of both DDoS attacks (for example, recent attacks on Newsweek and the BBC) and DNS manipulation are common tools for censorship. This is in part because they are cheap, easy (the software credited with Friday’s attack was posted openly just a few weeks ago), and highly effective in preventing some or all internet users from accessing the content they target.
We’re at the edge of a particularly bad security chasm we’re just about to fall into (if we haven’t already!). The question is whether we can actually avoid the fall or whether the best we can do right now is lessen the hurt on the way down.
It seems that what companies like Cisco and app developers and startups seem to forget is that people can tell the difference between transformative innovation and shopping. Bogost adds: “It’s time to admit that the Internet of Things is really just the colonization of formerly non-computational devices for no other reason than to bring them into the fold of computation. […] Operational benefit is deemphasized in favor of computational grandstanding, data collection, and centralization.”
The best definition of the Internet of Things I’ve come across in a while.
When WIRED reached out to trucking industry body the National Motor Freight Traffic Association about the Michigan research, the NMFTA’s chief technology officer Urban Jonson said the group is taking the researchers’ work seriously, and even funding future research from the same team. And Jonson acknowledged that the possibility of the nightmare scenario they present, of a remote attack on heavy vehicles, is real. “A lot of these systems were designed to be isolated,” says Jonson. “As automobile manufacturers are increasingly connecting vehicles with telematics systems, some of these issues need to be addressed.”
That the Association’s reaction is to work with researchers instead of trying to sue them is a very good sign.
And then there’s the sheer randomness of it all. Some services you can’t access for no apparent reason, others are so slow that you can’t figure out if they’re blocked or just snail-paced. And as I experience this, I wish some of our politicians and media people, those who see net neutrality as the enemy, I wish they’d come here and experience what a radical version of non-neutrality is. Again, I have a VPN service to overcome most of this (at the cost of speed) but most people don’t and/or can’t afford one.
Don’t get me wrong, I’m not suggesting that not enshrining net neutrality is the equivalent of doing what the Chinese (or Iranian, or Indian) government does. But I look at the UK’s blocking mechanisms supposed to protect children but really targeting just about any kind of site for arcane reasons that no one can figure out, and I think that what I have here is an extreme version of the same thing.
“Women are the niggers of gender,” the email said. “If you killed yourself, I wouldn’t even fuck the corpse.”
I blinked at my phone, fighting simultaneous urges to hurl my phone across the room in anger and cry. Later that day, someone texted me my address — telling me they’d “See me when I least expected it.”
I haven’t been out to my car at night by myself since January 2nd.
My name is Brianna Wu. I lead a development studio that makes games. Sometimes, I write about issues in the games industry that relate to the equality of women. My reward is that I regularly have men threatening to rape and commit acts of violence against me.
The aggression committed towards these women is truly abhorrent – it speaks poorly to the various efforts to effectively combat sexism and misogyny. No one should be on the receiving end of such comments, ever, and to normalize the sending and reception of them is just wrong. To be clear: this isn’t bullying, but the cases speak to acts of hate. And it’s an area where hate speech laws should be triggered to bring offenders to justice.
A week spent playing NSA reveals just how much data we leak online.
This is an absolutely terrific piece of technical journalism. If you ever wanted to know the significance of the data that ‘leaks’ from your phone, laptop, and other computing devices then this is an absolute must-read piece.