mersenneforum.org  

Go Back   mersenneforum.org > Extra Stuff > Soap Box

Reply
 
Thread Tools
Old 2014-04-10, 01:36   #408
Fusion_power
 
Fusion_power's Avatar
 
Aug 2003
Snicker, AL

95910 Posts
Default

I'm paranoid.

Scrub EVERYTHING.

Don't take any chances.

Once the gap is plugged and you know it is safe, change your password immediately.

More important, NEVER NEVER EVER place any risky information online no matter how secure the system. It is 100% certain that if someone wants it, it can be had. Don't speak it aloud on a telephone, 100% of international calls are recorded and domestic calls can be. Don't even think about it, they are working on brain wave interpreters that will tell them what you are thinking. Bury it in the deepest darkest part of your brain and leave it there forever. Yes, I'm definitely paranoid.
Fusion_power is offline   Reply With Quote
Old 2014-04-10, 01:47   #409
retina
Undefined
 
retina's Avatar
 
"The unspeakable one"
Jun 2006
My evil lair

622810 Posts
Default

Quote:
Originally Posted by Fusion_power View Post
More important, NEVER NEVER EVER place any risky information online no matter how secure the system.
So you mean I can't mention that my password is "Squeamish Ossifrage". Okay, noted. Thanks.
Quote:
Originally Posted by Fusion_power View Post
Once the gap is plugged and you know it is safe ...
How will I know when it is safe? I guess I can just trust the website to tell me that it is safe. Yeah, that seems reasonable. I trust them to protect me. It's not like they've ever failed me before or anything.
retina is offline   Reply With Quote
Old 2014-04-10, 07:22   #410
xilman
Bamboozled!
 
xilman's Avatar
 
"𒉺𒌌𒇷𒆷𒀭"
May 2003
Down not across

2·5,393 Posts
Default

Quote:
Originally Posted by ewmayer View Post
Comments from the cryptic and spooky folks appreciated.
I'm taking a multi-layered approach.

My internet-facing systems have already had their SSL upgraded, not that I provide many services to the world. The systems behind them will be updated over the next week or two when the time is convenient.

"Trivial" services, where I really don't care whether our friends in Cheltenham, Maryland, etc, as well as their enthusiastic but amateur colleagues know my passwords, are accessed as normal and I'll change passwords in a few weeks, earlier if the service provider advise me.

Others I'm accessing as little as possible and keeping a close eye on relevant information such as bank and CC statements. Password changes will be made according to the procedure outline above.


Further, and IMAO, good advice is given towards the bottom of this article on the BBC technology site.

Last fiddled with by xilman on 2014-04-10 at 09:02 Reason: Add Beeb link
xilman is offline   Reply With Quote
Old 2014-04-11, 02:48   #411
kladner
 
kladner's Avatar
 
"Kieren"
Jul 2011
In My Own Galaxy!

2·3·1,693 Posts
Default

http://www.dailykos.com/story/2014/0...ncil-of-Europe

Quote:
Edward Snowden provided more than a half-hour’s worth of truly stunning testimony to the Parliamentary Assembly of the Council of Europe (PACE), in Strasbourg, France on Tuesday, only a few details of which made it through to the general public via the mainstream media; and, then only via a handful of media outlets, most of which are not even based in the United States.
What was widely reported from the event were the many statements made by Snowden regarding how the National Security Agency has been spying—and continues to do so--upon human rights groups, throughout the world, including right here at home.
More about those aspects of Snowden’s statements on Tuesday, plus significant and (and, yes, I'm going to use the word again) stunning info about what was not widely reported (from TechDirt's Mike Masnick, the Guardian's Luke Harding, Marcy Wheeler and yours truly) farther below the complete, 35-minute video of Snowden’s testimony, via RT.com and YouTube (many copies of this have appeared online in the past 12+ hours), that is available immediately below…
kladner is offline   Reply With Quote
Old 2014-04-11, 21:20   #412
ewmayer
2ω=0
 
ewmayer's Avatar
 
Sep 2002
República de California

19·613 Posts
Default

Quote:
Originally Posted by ewmayer View Post
Most of you have likely already heard about the Heartbleed OpenSSL vulnerability, but here's a link to Bruce Schneier's piece on it anyway:

Bruce shneier: Heartbleed is a catastrophic bug in OpenSSL

The first question that popped into my head on first hearing the news was "might this bug have something to do with the NSA's long-term efforts to backdoor all web cryptography?"
Well, lookee here:

NSA Said to Have Used Heartbleed Bug, Exposing Consumers
Quote:
The U.S. National Security Agency knew for at least two years about a flaw in the way that many websites send sensitive information, now dubbed the Heartbleed bug, and regularly used it to gather critical intelligence, two people familiar with the matter said.

The NSA’s decision to keep the bug secret in pursuit of national security interests threatens to renew the rancorous debate over the role of the government’s top computer experts.
ewmayer is online now   Reply With Quote
Old 2014-04-12, 16:24   #413
Fusion_power
 
Fusion_power's Avatar
 
Aug 2003
Snicker, AL

95910 Posts
Default

The guy who wrote the offending code has weighed in that it was a mistake on his part and not some sinister plot. Regardless, to know of a critical security vulnerability and deliberately leave the door open is in my opinion a criminal act. NSA should have acted but did not.
Fusion_power is offline   Reply With Quote
Old 2014-04-17, 20:46   #414
ewmayer
2ω=0
 
ewmayer's Avatar
 
Sep 2002
República de California

101101011111112 Posts
Default

Study Finds No Evidence of Heartbleed Attacks Before the Bug Was Exposed
Quote:
Ever since the Heartbleed bug was exposed last week, the question everyone has been asking is: Did anyone exploit it before a Google researcher first discovered it?

The worry is that in the two years since the bug was accidentally incorporated into OpenSSL — a crucial piece of free security software used by governments and companies like the F.B.I. and Google — attackers could have exploited Heartbleed to take sensitive information like passwords and the virtual keys used to decipher any scrambled information stored on a web server.

What’s more, they could have done so without leaving evidence detectable by the normal methods used to track who has gained access to a server.

But security researchers at the Energy Department’s Lawrence Berkeley National Laboratory, which conducts unclassified scientific research, say that it is still possible to look for past Heartbleed exploitations by measuring the size of any messages sent to the vulnerable part of the OpenSSL code, called the Heartbeat, and the size of the information request that hits a server.

In an attack, the size of the response would be larger than the size of the request. And because the Heartbleed flaw can expose only a small amount of information at one time — 64 kilobytes — an attacker would probably have to use it repeatedly to collect valuable data, producing even longer responses.

For the last week, researchers at the Berkeley National Laboratory and the National Energy Research Scientific Computing Center, a separate supercomputer facility, have been examining Internet traffic they recorded going in and out of their networks since the end of January, looking for responses that would indicate a possible Heartbleed attack.

They found none, said Vern Paxson, a network researcher at Berkeley Lab and associate professor of electrical engineering and computer science at the University of California, Berkeley.

The research does not rule out the possibility that Heartbleed was exploited before January. Because the Heartbleed bug was first introduced in March 2012, would-be attackers would still have had 18 months to exploit the flaw. It also does not rule out the possibility that the bug was used in an attack beyond what Berkeley Lab and the National Energy scientific computing center monitor.

The network traffic for both Berkeley Lab and the scientific computing center touch thousands of Internet systems and both facilities had maintained comprehensive logs going back a few months. Mr. Paxson said that if there were widespread scanning for the Heartbleed vulnerability, that would have been picked up by those important Internet hubs.
Interesting -- Let's hope it's true.
ewmayer is online now   Reply With Quote
Old 2014-04-22, 00:24   #415
ewmayer
2ω=0
 
ewmayer's Avatar
 
Sep 2002
República de California

19×613 Posts
Default

As we sweat government surveillance, companies like Google collect our data: Unless we demand changes, Big Tech will continue to profit off our personal information – with our benighted permission

Aside: The author of the above, Dan Gillmor, was the leading tech writer at Silicon Valley's major newspaper when I moved here 15 years ago:
Quote:
From 1994 to 2005, Gillmor was a columnist at the San Jose Mercury News, Silicon Valley’s daily newspaper, during which time he became a leading chronicler of the dot-com boom and its subsequent bust. Starting in October 1999, he wrote a weblog for the Mercury News, which is believed to have been the first by a journalist for a traditional media company.[2] Gillmor's eJournal archives were believed to be lost but have been found in the Internet Archive and are now restored at Bayosphere.com.
ewmayer is online now   Reply With Quote
Old 2014-04-28, 07:27   #416
xilman
Bamboozled!
 
xilman's Avatar
 
"𒉺𒌌𒇷𒆷𒀭"
May 2003
Down not across

2A2216 Posts
Default

In another major boost to the non-US economy, a US judge has ruled that US companies must turn over data held outside the US. Fuller report here: http://news.yahoo.com/u-judge-rules-...--finance.html

Way to go guys! Help build up the European and Asian owned cloud providers.
xilman is offline   Reply With Quote
Old 2014-05-02, 17:56   #417
Xyzzy
 
Xyzzy's Avatar
 
"Mike"
Aug 2002

100000001101012 Posts
Default

Vaguely related to this thread:

https://www.eff.org/privacybadger

https://panopticlick.eff.org/
Xyzzy is offline   Reply With Quote
Old 2014-05-15, 16:41   #418
Nick
 
Nick's Avatar
 
Dec 2012
The Netherlands

29×59 Posts
Default

Glenn Greenwald's new book "No place to hide" is just out - and even the Dutch version is already available!
http://www.glenngreenwald.net/
Nick is offline   Reply With Quote
Reply



Similar Threads
Thread Thread Starter Forum Replies Last Post
I'm rich AND on a government check. jasong jasong 18 2013-08-12 18:21
How does proper government manifest in regulation? cheesehead Soap Box 10 2011-04-17 02:29

All times are UTC. The time now is 22:43.


Fri Aug 6 22:43:07 UTC 2021 up 14 days, 17:12, 1 user, load averages: 5.09, 4.25, 3.78

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2021, Jelsoft Enterprises Ltd.

This forum has received and complied with 0 (zero) government requests for information.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation.
A copy of the license is included in the FAQ.