Friday Squid Blogging: New Foods from Squid Fins

We only eat about half of a squid, ignoring the fins. A group of researchers is working to change that.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Read my blog posting guidelines here.

Posted on January 19, 2024 at 5:07 PM105 Comments

Comments

Glenn Hyatt January 19, 2024 5:23 PM

Read the complaint the SEC filed against SolarWinds. It’s just a complaint; the SEC still has to prove the allegations in court. But it’s breathtaking in the amount and severity of failure and deceit it describes. It’s a terrific cautionary tale about underfunding controls while publishing happy talk about your stellar security practices.

Hat tip to Kevin Mandia. I picked this up listening to episode 153 of Google’s Cloud Security Podcast, in which Mandia was interviewed by Anton Chuvakin and Timothy Peacock.

V. F. Stevenson January 19, 2024 5:24 PM

re: hxxps://ellenbrown.com/2024/01/17/casino-capitalism-and-the-derivatives-market-time-for-another-lehman-moment/ towards end of article, says:
“… For protecting title to assets, blockchain is a promising tool…”
When evaluating blockchain, please remember to incorporate
blockchain’s theft rates.
Cyber hackers follow fads, and as hacking blockchains
becomes easier to do, more hackers will focus on
direct withdrawals from the bank (blockchain)
rather than wasting their time and effort
trying to extort ransomware victims.
(additional thought)
If blockchain operators were penalized for thefts,
would they make blockchains much more difficult to rob?
###

lurker January 19, 2024 5:27 PM

How to read a WEF report from Davos, or not. Reuters says extreme weather will be the greatest risk in 2024, with mis/dis/information next. CNN reverses the order of risk for these two events. Everybody seens to agree that cyber insecurity will be a greater risk than armed conflict between nations.

WEF’s own summary, and a downloadable pdf for masochists is at

‘https://www.weforum.org/publications/global-risks-report-2024/digest/

vas pup January 19, 2024 5:34 PM

In world first, Israel approves cultured beef for sale to the public
https://www.timesofisrael.com/in-world-first-israel-approves-cultured-beef-for-sale-to-the-public/

“In a world first, Israel has approved the sale of cultured meat based on beef, the Health Ministry said Wednesday.

Permission for a “new food” product was given to Aleph Farms to sell its cultured meat in Israel.

In the past Singapore and the US have approved cultured chicken for sale, but Israel is the first to give beef the go-ahead.

To produce its meat, Aleph leverages the ability of animals to grow tissue muscle constantly and isolates the cells responsible. It then reproduces the optimal conditions for these cells to grow into tissue, basically growing meat outside the animal. The tissue is grown in tanks that act as fermenters, similar to those in a brewery. There the cells are nurtured and shaped into a 3D structure that makes the meat.”

vas pup January 19, 2024 7:07 PM

@Ismar – on anything which is not ‘approved’ by deep state. They monitor everything: media, blogs, private phone calls – see in this blog AT&T, bank transactions. The list is unlimited.
On the other hand I am absolutely against any =violent= protest on any subject and those protests disrupting federal highways, train lines on and under ground, access to airports. There is no excuse for those and such protest not covered by 1st Amendment. In only such cases I am on the side of law enforcement.

JonKnowsNothing January 19, 2024 10:08 PM

@ vas pup, All

re: Israel approves cultured beef for sale to the public

The real question is who is the “public”.

It certainly is not Kosher and it definitely is not Halal. It’s not Vegetarian and would fall off the Vegan list.

There are other diet restrictions that are not necessarily religious based, people are eating less meat of all kinds due to health conditions. So it’s not on their list either.

If the Israel has approved it, they must see some benefit. They had a large influx of Europeans after glasnost. The group that came from Eastern Europe did not have an aversion to items on the Not Kosher List. There was some fancy slight of hand done to get Kielbasa-Wiejska on the menus for them. Similar to the slight of hand done to approve caviar in countries bordering the Caspian Sea and Black Seas.

===

ht tps: //en.wikipedia.org/wiki/Kosher

h tt ps:// e n.wikipedia.org/wiki/Kosher_slaughter

ht tps: // en.wikipedia.org/wiki/Halal

ht tps: //en.wikipedia.org/wiki/Vegitarian

ht tps: //en.wikipedia.org/wiki/Veganism

Australia January 19, 2024 10:18 PM

I just heard on Australian domestic news radio, federal buildings in Australia, UK and US are removing CCTV security cameras because they are owned by a chinese company, the largest manufacturer of CCTV cameras. Now, public transport in Sydney Australia is concerned about their CCTV and are considering removing them

Australia January 19, 2024 10:22 PM

The following isn’t really news to anyone here. But it is worth repeating.
Be careful with lithium batteries! E-bikes and e-scooter fires have been causing massive devastation here in Sydney. People are escaping blazes igniting by exploding e-bike/scooter with only seconds to spare before their entire bedroom or premises is decimated with nothing but ash remaining. Shocking.

The fire brigades are especially concerned and are researching what to do about it. Fire are going off in garbage trucks and waste disposal centres, with employees narrowly escaping serious injury. It’s in the news media frequently.
Watch out for those batteries..

JonKnowsNothing January 19, 2024 10:28 PM

@Clive, All

re: Vanishing COVID History

As countries hold inquires into their government responses to the SARS-CoV-2 Pandemic, a good part of the historical trail is being truncated. Government agencies using WhatsApp style social media exchanges just deleted the lot.

(1)
[Scotland] Nicola Sturgeon has been accused of “a shocking betrayal of the people of Scotland” as it emerged that the former first minister, along with other senior ministers and health officials, deleted all their WhatsApp messages related to the Covid pandemic.

Sturgeon “retained no messages whatsoever”

[Scotland] national clinical director, Jason Leith, (2) joked … that WhatsApp deletion was his “pre-bed ritual”.

The old NSA, CIA, FBI, UK canard of

  • “If you’ve got nothing to hide, you’ve got nothing to fear”

would seem to imply, that Scotland’s C19 Response and deaths of so many in care homes and left to die in their apartments, should indeed be something that the then Scottish Government should fear.

===
1)
HAIL Warning

ht tps ://w w w.theguardian.com/politics/2024/jan/19/nicola-sturgeon-deleted-all-pandemic-whatsapps-covid-inquiry-hears

  • The UK Covid Inquiry, taking evidence in Scotland, heard on Friday that Sturgeon “retained no messages whatsoever”
  • Sturgeon had previously refused to confirm or deny allegations that she deleted the messages but insisted she was committed to “full transparency” about her conduct during the pandemic, adding: “I have nothing to hide.”

2)
h ttps: //e n.wikipedia.org/wiki/Jason_Leitch

  • Jason Leitch is the National Clinical Director of the Scottish Government. He is a Senior Clinical Advisor to the Scottish Government and a member of the Health and Social Care Management Board. Leitch provided key leadership throughout the response to the COVID-19 pandemic.

h ttp s://en.wikipedia.org/wiki/Nothing_to_hide_argument

  • The nothing to hide argument states that individuals have no reason to fear or oppose surveillance programs unless they are afraid it will uncover their own illicit activities.

ResearcherZero January 19, 2024 11:54 PM

@lurker

Cash will be around for a long time yet, as digital services do not work once the network goes down, or the power grid is interrupted. You can’t pump fuel or water either without a hand pump or mobile generator. None of the emergency services work too well without those critical services either.

Even the camp-on system, designed to transfer emergency calls to another mobile carrier, failed when Optus went down. (Optus has poor coverage without an outage anyway)

‘https://www.abc.net.au/news/2024-01-20/optus-outage-triple-0-emergency-issues-revealed-in-foi-documents/103367212

There is not a great deal of information available from individual carriers how they themselves implement or support various features, but there is some information here:

-ECC (emergency call center)

-UE (user equipment)

‘https://www.sharetechnote.com/html/BasicProcedure_LTE_Cell_Search.html

“On detecting an emergency call (a UE detected emergency call), the device performs domain (CS or PS) selection to complete the emergency call in the VPMN.”

“In some cases, the device can initiate a call to the HPMN-IMS, which is in fact an emergency call (a non-UE detected emergency call). In this case, the HPMN-IMS is responsible for rejecting the call attempt. The call rejection informs the device that this is an emergency call which must be completed in the VPMN. The device then behaves as for a UE-detected emergency call.”

‘https://www.gsma.com/get-involved/working-groups/wp-content/uploads/2021/01/VoLTE-Implementation-Guide-Jan-2021.pdf

“In Long-Term Evolution (LTE) cellular networks, system information blocks (SIBs) provide relevant information for a connecting UE to assist the UE in accessing and/or re-selecting a cell, as well as information related to intra- and inter-frequency cell selections. For example, in 4G/5G cellular networks a first type of SIB, sib1, is broadcast by each cell on a repeating schedule and may include an explicit indication (via the ims-EmergencySupport parameter) of whether the associated cell offers ECC call support for UEs in limited-service mode. If the sib1 parameter is absent, then ECC calls are not supported.”

‘https://www.tdcommons.org/dpubs_series/5056/ (the link itself the download link for the document does not always work)

‘https://cafetele.com/system-information-block1/

‘https://cafetele.com/roaming-reference-architectures-5g-nr/

Chat Control and attempts at breaking encryption…

“The structural reasons are simple enough: they favour centralised policing over local efforts, and electronic surveillance over community work.”

‘https://www.lightbluetouchpaper.org/2023/12/14/grasping-at-straw/

ResearcherZero January 20, 2024 12:24 AM

Considering Telstra is the last carrier to be switching off 3G, they are likely still testing compatibility, roaming and limited-service features. Older devices may not support newer features (3G phones for example have reached EoL on most other carriers).

In many rural and remote areas 4G coverage is still pretty rubbish and even 3G was never that flash to begin with. In some small towns people have to make calls from the roof of their house, or the top of a hill. In one town they have an X painted in a car park to make calls from. Optus does not even work in many of these areas, especially if you venture any distance from built-up areas, you will find there is no reception at all.

ResearcherZero January 20, 2024 1:34 AM

process crashing is closely aligned with the exploitation of CVE-2023-34048

‘https://www.mandiant.com/resources/blog/chinese-vmware-exploitation-since-2021

InMarket Apps have been downloaded onto over 30 million unique devices since 2017

‘https://www.ftc.gov/system/files/ftc_gov/pdf/Complaint-InMarketMediaLLC.pdf

What InMarket is supposed to stop doing:

‘https://www.ftc.gov/system/files/ftc_gov/pdf/D%26O-InMarketMediaLLC.pdf

X-Mode still does not appear to have gotten the memo. Maintains it did not and will not continue to do anything wrong by providing the means to collect precise location and detailed device identification information via use of it’s SDK.

‘https://techcrunch.com/2024/01/09/ftc-x-mode-ban-delete-location-data/

There are hundreds of SDKs that collect location data and a large number of trackers…

https://reports.exodus-privacy.eu.org/en/trackers/

ResearcherZero January 20, 2024 2:43 AM

@Glenn Hyatt, Unsure

They are always very interested in this particular line of inquiry.

“The investigation indicates they were initially targeting email accounts for information related to Midnight Blizzard (APT29) itself.”

‘https://www.sec.gov/Archives/edgar/data/789019/000119312524011295/d708866dex991.htm

Currently, the largest amount of unclaimed back wages includes food services, health services, construction, temp work and agriculture…

‘https://www.usatoday.com/story/news/nation/2024/01/04/american-workers-back-pay/72097581007/

“When someone steals a six-pack of beer from a grocery store or a sweater from a boutique, it is generally treated as a criminal matter. The billions of dollars in wages stolen from workers, however, are almost always treated as a civil offense.”

According to EPI, “[i]n 2012, the probability that a U.S. employer would be investigated by the WHD was a paltry 0.5%.” And even when an emloyer is investigated, and evidence of wage theft is found, the consequences are minimal.

‘https://popular.info/p/the-fleecing-of-americas-hourly-workers

10 companies convicted out of 3,000 repeat offenders of wage theft.

‘https://www.piie.com/sites/default/files/documents/wp21-9.pdf

“more than a third of those successful cases — totaling nearly a billion dollars — showed no money was ever recovered.”

https://www.cbsnews.com/news/owed-employers-face-little-accountability-for-wage-theft/

The Economic Policy Institute (EPI) estimated that wage theft costs workers more than $50 billion per year, most of which was unreported.

‘https://files.epi.org/2014/wage-theft.pdf

emily’s post January 20, 2024 4:06 AM

Re: squid fin gastronomy

Possible goods, which will be designed for preparation at home or in restaurants, may include frozen appetizers, entrees, nuggets and sliders.

And don’t forget squid fin soufflé, squid fin en croûte, eggs Black Bear, navarin of squid fin printanier (takes a cheaper cut of squid and turns it into something very special), and of course frozen squid fin pop-tarts.

Gerard van Vooren January 20, 2024 5:42 AM

@lurker,

IMO mis/disinformation (and simply not publishing) is –by far– the greatest thread for society. I mean, come on, I can’t even see anything coming out of MSM without thinking. I don’t know, as always they went too far. That counts too for politics. But why do I always see the things that are –not– reported by the MSM, on alternative media? What is wrong with the MSM? The answer to that question is easy to find out when you really want to see it.

That scares me but it is how I see the things. MSM is about to die.

Winter January 20, 2024 6:10 AM

@Gerard van Voorden

But why do I always see the things that are –not– reported by the MSM, on alternative media?

I see that too. But generally, I find they were not reported in MSM because they did not happen. Most of those unreported things that did indeed happen were rather obscure and I was the only one interested in my circles. I can understand that MSM do not cater to my eclectic interests.

JonKnowsNothing January 20, 2024 6:15 AM

@All

re: You are Who you are matched with

A MSM report of a pensioner who was declared dead (1) and had their pensions stopped with some difficulty in proving they were Very Much Alive had this indicator of how it happen(s).

  • UK Department for Education (DfE), oversees Teachers’ Pension
  • a normal vetting procedure that regularly checks pension beneficiaries against the death register
  • death register entries may be matched to scheme members even if personal details differ

So, How do they do it?

The intended output is to remove the dead from the payments register.

So how do they remove live people from the payments register? How do you get matched with a record where “personal details differ”? How different can the records be?

  • DfE said it would make an exception and decouple [the] name from the deceased

This is the 4th time such decoupling failed.

===

1)
HAIL Warning

htt ps://ww w.t heguardian.com/money/2024/jan/20/retired-teachers-pension-stopped-as-provider-refuses-to-believe-she-is-not-dead

  • Retired teacher’s pension stopped as provider refuses to believe she is not dead
  • Payments halted four times

lurker January 20, 2024 12:20 PM

@Glenn Hyatt
“It’s just a complaint; the SEC still has to prove the allegations in court.”

Maybe it’s evolution of language, maybe they’re coming down heavy here: I see “knew, or ought to have known” has become “knew, or recklessly or negligently failed to know”.

Glenn Hyatt January 20, 2024 12:51 PM

@lurker

Thank you. That does read as particularly harsh, especially when applied so many times. But I rarely read these legal documents, so I didn’t know it was a departure from past practice.

One thing that caught my eye me was the way the SEC hammered repeatedly on the allegation that SolarWinds’ published security statement was false, and one category of evidence for that was that they had been breached. So it seems if you’re a publicly traded company and have a breach, you’d better immediately take down or modify your security statement to make sure you’re not lying…at least during the current administration.

Another thing that astonished me is that as recently as 2020, people still felt comfortable writing emails and online messages that said, in essence, “We’re doing crimes.”

&ers January 20, 2024 2:40 PM

@Ismar

hxxps://news.err.ee/1609186075/police-impose-fines-on-5-participants-in-demonstration-in-support-of-palestine

All that just for the “From the river to the sea”.

&ers January 20, 2024 3:14 PM

@ALL

hxxps://news.sky.com/story/dragonfire-uk-fires-high-power-laser-at-aerial-targets-for-first-time-with-intense-beam-of-light-able-to-cut-through-drones-13051553

echo January 20, 2024 3:17 PM

One of many reasons why I no longer regard this blog as authoritative or safe is the poor education and quality of information on critical issues.

While I am not a fan of SNP dogma on independence, defence, or nuclear their public policy position is generally constructive, progressive, and well formed. I don’t have much time for shouty men who wave certificates and job titles in my face so will skip a bigger deconstruction of the “normalised chaos” and “manufactured consent” and “managed decline” of the UK post circa 1973-1979 and onwards to the mess we are in today. What I will do is point out that Nicola Sturgeon is a lawyer and not just a lawyer but a very careful and competent lawyer.

All official communication was conducted on official mediums.
All ad-hoc informal discussion was passed on for retention.
All information has already been passed to the inquiry.

https://twitter.com/NicolaSturgeon/status/1748735614189539825
Statement re UK Covid Inquiry:

[CONTINUES]

Multiple members of the current UK government conducted official business through unofficial “Whatsapp” channels away from public scrutiny, and “deleted” this data or “lost their phones” or “forgot their passwords” and have persistently failed to give the inquiry access to this data which is a contempt and a criminal offence. And this is why they want you to swallow disinformation about Nicola Sturgeon…

So please do your due diligence because not doing it makes this blog whiff of techbro misogynists coasting to retirement.

Clive Robinson January 20, 2024 5:22 PM

@ Anonymous, ALL,

Re : Comms chanals, data serialization, EM fault injection, etc.

” I found a Canadian vulnerability iOS Researcher who found in a Proof of Concept that by modulating and oscillating various freq he could causes buffer overflow on the A-10 and later chipsets”

What you give in upper case after that is a real mess. The kind of mess you sometimes see after automated translation of language.

But trying to piece it together is difficult as there are several things conflated in there.

First off the 1.5GHz / 19cm L Band of microwave frequences is quite susceptable to QRN (natural) and QRM (man made) interferance especially with the very low signal levels used by the US GNSS as one of a number of “Global Positioning/Navigation Systems”(GPNS). There are also the Russian GLONASS and European Galileo systems that are available for civilian use and have been for some time. China is a more recent entrant in the game with BeiDou and also India has NavIC that is currently called a regional system, Japan with QZSS which from memory is the most accurate position at under 10cm for civilian use. As well there are several other satellite navigation systems upgrades and enhancments in progress some of which are NGO systems for commercial systems (think drone package delivery, you don’t want your little delivery bot that’s replaced a human to go off the walkway into the road and become a traffic hazzard or get crushed).

The systems I’ve mentioned have or plan to have similar characteristics so in theory all could be used on the same device with appropriate hardware / firmware[1] / software. For instance NavIC chips since 2020 have been made by Qualcomm and are in some phones for the Broader Asian area bounded vy East Africa to Pacific West. The Indian Government have indicated upgrades to make it more compatible with existing systems.

Thus there is considerable complexity for mobile phones, cameras and many other GPS added systems to deal with, thus the potential for vulnerabilities is rated as “high” and some are already known to exist.

I’ve independently shown that nearly all GPS systems are very vulnerable to replay attacks which also means they are susceptible to “Code synthesis” attacks where you generate false signals with the correct time delays (there is even “test equipment” available). It’s been claimed that both Russia and Noeth Korea have attacked the US system experimentaly from time to time. It’s one of the reasons the US Mil Version is having it’s code generation now being done by cryptographically in very secure Key Generation (KeyGen) Hardware Securiry Moduals (HSM) with built in destructive protection that get “built into” equipment following high security Key Managment and use life / Audit (KeyMan / KeyLog) proceadures.

So yes there is vulnerabiliries in both the software and firmware involved with GPS that can be exploited. But does that have “further security reach?”. In some circumstances “Yes” but mostly it should be “No”. That is anything critically dependent on position such as Geo-Fenced security systems for the likes of Key Destruction etc will obviously be vulnerable to DoS / Bricking. Other systems such as those used to automatically point physical systems like antennas will fail to aim correctly and as sometimes already happens with Solar storms, guidence systems will fail and physical systems like vehicles go the wrong way such as “into the drink” of rivers, canals and even larger bodies of water.

The increased use of GPS without due consideration by system designers is going to cause some other significant problems[2]. Some of which will effect “Smart Weapons” and Geo-Fencing security systems[3] and more prosaicaly “advertising and marketing” and automated systems for drones and bots used increasingly in civilian systems.

But these attacks so far given are on the GPS system and will work against any GPS enabled device.

An iOS or iPhone specific attack has to involve an attack specific to iOS that escapes the GPS subsystem security sandbox. Which it might be but from what you quote appears unlikely.

Which leaves us something called,

“An Active EM Fault Injection Attack”[4].

In essence point a high level of EM radiation at Radio Frequencies at the tracks going into or out of a CPU chip and you can control it’s execution such that security features fail.

Worse the use of RF sub-systems makes getting such EM radiation or the attacking signals modulated on them way way easier.

I suspect that this type of EM fault injection attack that is now well into it’s fourth decade from my certain knowledge and research might have been “re-discovered” by somebody who has potentially worked it into exploiting one of many such vulnarabilities in all consumer devices into a viable attack.

Such attacks are also called “Active EmSec” or “Active TEMPEST”.

The two problems with using them are,

1, Synchronising to the device under attack.
2, Comming up with a suitably reliable attack signal.

If you have a look back there was not long ago an academic paper that showed how you could fake touch screen finger pressing by having an EM radiating coil in very close proximity. In effect it was “self synchronising” and the attack signal very simple.

But as a “Public Proof of Concept”(P-Poc) it spoke volumes about what is to come, even though nearly every one found an excuse to ignore the implications…

I hope that helps.

[1] Firmware used to have a specific meaning, but as “Programmable Array Logic”(PAL) devices went beyond the 22V10 in the 90’s and “Gate Array Logic”(GAL) became reprogramable “Field Programable Gate Array”(FPGA) the meaning got broadened to include the “Register Transfer Language”(RTL) and other “net lists” that in more modern devices are produced and compiled exactly the same way as software is and loaded into not just Flash ROM but registered memory (as mutable and as if not faster than SRAM and can often be treated like bit wide RAM) the difference between the net-list and high level “micro code” RTL is now effectively non existant from that envisaged in the 1940’s into 50’s with Maurice Willks dual diode array microprograming that gave us microcode and a very rapid increase in computer capability. This is especially true now with FPGAs being used in CPU’s to speed up algorithms much like the Math Co-Processors did just before the turn of the century. In nearly all cases you will find arrays used as “Look Up Tables”(LUTs) as this is aside from the addressing circuits the simplest and fastest way to give a measure of customizable programability.

[2] One significant aspect of GPS systems which will become a real issue when it is nolonger being “kept under the rug” will be it’s “evidentiary use”. Currently I know of no forensics based on GPS systems that actually tests for GPS soft or transitory failures and vulnerabilities, which makes all GPS Evidence decidedly questionable if not suspect currently. Especially as in many places “The Court” has a “Duty of Care” to ensure evidence meets not just certain standards but the required “burden of proof”. Amongst which is the forensic methods which is supposed to be enforced on the prosecution to reveal to the defence as part of evidence. At some point it will get argued especially as we are heading into sun spot maxima with vastly increased GPS effecting adverse solar weather, and the decreasing cost and increasing availability of GPS effecting technology (not just 1.5G / 19cm L band jammers).

[3] Back some multiple decades ago I demonstrated a relay attack against GPS. The simple form was simply mounting the GPS antenna with broadband amplifer on the end of 300m of coax connected to the GPS signal processing unit. The unit was kept in a fixed position but the antenna was moved. The processing unit displayed not the position of the unit, but the position of the antenna. So move the antenna around and it appeared as though the unit was moving. The coax can be replaced with say a 10Ghz X-Band link that can be built with less than $100 of readily available sub-assemblies (I designed with a friend and sold such links for outside broadcasts and such decades ago). Now flip things on their head… Geo-Fencing around airports and other facilities work on an invalid assumption that the GPS antenna is on the drone thus a ROM holds places the drone is not supposed to go. But when the effective antenna is not on the drone the drones geo-fence data will not relate to it’s actual position. Put the drone into a GPS position held hover and you can the fly it around by moving the effective antenna. Thus fly the drone right into any part of the geo-fenced area you want… But it gets worse, most anti-drone systems are simply GPS and control frequency jammers. If you build your own counter-jammer you can blast the signal from your effective antenna way above that of nearly all the anti-drone systems in what becomes a battle of the beams or if you want a visual pop-culture analog a StarWars fight with light sabers…

[4] Back in the 1980’s when CPUs were mostly 8bit and NMOS devices as CMOS was not upto speed. During research testing of a “Remote Telemetry Unit”(RTU) for use in the petro-chem industry I independently discovered that the use of a 1 watt hand held two way radio on VHF or UHF could make the CPU “soft-fail” which is very very bad news in a safety critical system whic RTUs mostly are. I went on to further the research finding that by modulation of the EM signal not only could I get around many shielding systems I could control the way the CPU “soft failed” such that it would cause the likes of branches in code to fail or go the wrong way. Thus for example a failure to authenticate could be flipped into a successful authentication without having to guess usernames or passwords. Of particular interest I later demonstrated this against “pocket financial” systems such as casino devices, electronic wallets and telephone payment systems.

lurker January 20, 2024 5:29 PM

@Glenn Hyatt

My previous readings of similar complaints has been tame stuff: DoJ (copyright) & USPTO (patent infringement). Here SEC has a follow the money game, but wholly on behalf of the investors. They seem to have no interest in SW’s customers, nor any bystanders who might be hit by flying debris.

bl5q sw5N January 20, 2024 5:29 PM

@ Gerard van Vooren

anything coming out of MSM

A great art everyone needs to cultivate is how to read a newspaper. At a minimum it is to go through all the newspapers, and sift sift sift. They are nearly all mixing their particular ideology with their reporting so one has to be careful to guard against becoming enchanted to a newspaper’s line of view.

Clive Robinson January 20, 2024 7:20 PM

@ lurker, Glenn Hyatt, ALL,

Re : SolarWinds.

“Here SEC has a follow the money game, but wholly on behalf of the investors.”

I’ve not read the documentation.

But my abiding memory from the time was the “new owners” were a bunch of Venture Capitalists who were working what appeared to be the equivalent of a “Pump and Dump”. Which would in some cases be illegal even in Corporate friendly America.

From whay you say the SEC might be thinking along similar lines.

However there might be other reasons, the customers most hit by work that was done for next to nothing in the old Soviet “backyard” were part of or close to the US Government. It could be that someone is discreetly bendin the SEC ear to send a message or equivalent that making money is not more important than entirely disregarding “National Security” and that punative measures will always appear for those that don’t learn or chose to ignore the lesson.

I’ve yet to “put the popcorn in the pot” over this one let alone turn up the heat.

I guess in part because I’ve grown apathetic over VC and Hedge Fund get rich quick schemes and bubbles of which crypto-coin, blockchain, NFTs, Web3 and more recently LLM AI have been closer to my “tech entertainment” interests.

If you look back on this blog you will find conversations between primarily @Nick P and myself as well as @Wael and one or two others over “Code Signing” and why it was not fit for purpose and importantly why it would fail to stop exactly the sort of nonsense that happened with SolarWinds. If memory serves we started talking about it here oh more than a decade ago.

pup vas January 20, 2024 7:22 PM

What happens when you think AI is lying about you?
https://www.bbc.com/news/technology-67986611

=Experts in several countries are agreed that humans must always be able to challenge AI actions, and as time goes on AI tools are increasingly both generating content about us and also making decisions about our lives.

There is no official AI regulation in the UK yet, but the government says issues about its activity should be folded into the work of existing regulators.

“Illegal content… means that the content must amount to a criminal offense, so it doesn’t cover civil wrongs like defamation. A person would have to follow civil procedures to take action,” it said.

There are a handful of ongoing legal cases round the world, but no precedent as yet.

In the US, a radio presenter called Mark Walters is suing ChatGPT creator OpenAI after the chatbot falsely stated that he had defrauded a charity.

And a mayor in Australia threatened similar action after the same chatbot wrongly said he had been found guilty of bribery. He was in fact a whistleblower – the AI tool had joined the wrong dots in its data about him. He settled the case.

…the onus would be on me to prove the content was harmful. I’d have to demonstrate that being a journalist accused of spreading misinformation was bad news for me.

AI chatbots are known to “hallucinate”, which is big-tech speak for making things up. Not even their creators know why. They carry a disclaimer saying their output may not be reliable. And you don’t necessarily get the same answer twice.

The task for AI regulators is to make sure there’s always a straightforward way for humans to challenge the computer. If AI is lying about you – where do you start? I thought I knew, but it was still a difficult path.=

Clive Robinson January 20, 2024 8:02 PM

@ &ers, ALL,

Re : Funny two EM radiation comments like StarWars light sabers and drones.

“dragonfire-uk-fires-high-power-laser-at-aerial-targets-for-first-time-with-intense-beam-of-light-able-to-cut-through-drones”

The problem with lasers, is kind of two fold,

1, The power drops off at 1/(r^2)
2, The efficiency of generation at useful frequencies is realy quite low.

In the case of the second, those green lasers used for outdoor shows were about 10watts out of the emitter. However the input power was not far off 10kW ie an efficiency of 10/10,000 or 0.1%. Untill quite recently, lasers used in home laser engravers push out about 40-60 Watts but not in ideal frequencies…

Also getting rid of waste heat is going to put quite a damper on firing rate.

But… the chances are it’s not “cutting through” but “shaking appart”.

One of the down side of lasers is they “drill through” and as with mechanical drills the waste has to go somewhere. Mechanical drills even with “cutting swarf lifiting flutes” still fowl unless you “pull back”.

The problem with lasers is you can not lift the waste out of the hole, thus you end up not cutting the object but burning the waste over and over.

It must be getting on for a third of a century ago that some one designed a system where you fired very very short pulses. These not only alowed some of the waste to clear easily it built up energy in the object at one of it’s resonant frequencies. This mechanical energy built up lineraly and the result was a bit like that “singing at wine glasses” untill they shatter technique.

Two things have changed in more recent times,

1, LED lasers have 30Watt output at much higher efficiency.
2, LD-MOS power FETs designed to replace the magnetrons in microwave ovens can be used in high efficiency Class D and above drivers with pulse rates up well into the VHF if not UHF frequency bands.

Whilst not quite “home constructor / maker” due to geting the find and hold at resonance feedback system working, I suspect it won’t be very long before someone finds a way to do it easily and inexpensively.

Which “brings up the spector” of a “home laser pistol” (even though it will probably need a backpack for the power and control systems). So more like those space lasers in the 1979 James Bond movie “Moonraker” 😉

JonKnowsNothing January 20, 2024 8:04 PM

@pup vas, All

re: Holding binary objects accountable

The problem with binary objects being accountable for anything, has beginnings when Search Engine Results and the Right to be Forgotten got the public notice.

Binary objects, aka strings of 00001111000001111, are not entities, not human, not animal, vegetable or mineral.

The corollary of humans being held accountable for outputs has a slightly longer history, with a lot of new laws enacted so 3d Party Platforms are Not Accountable for the content created by users of those platforms.

A curious case in Australia involves Elon Musk, Tesla and published documents about Tesla [2022].

Per the MSM

  • [2022] WhistleblowerA leaked Tesla internal documents
  • [The documents] claiming the technology behind Tesla’s self-driving cars is not safe enough to allow the cars to be driven on public roads
    • the documents included complaints about Tesla’s braking and self-driving software
  • PersonB obtained a copy of the documents
  • PersonB published the documents and posted links to them
  • A court order restricted PersonB from publishing anything more from the document stash
  • PersonB subsequently again posted links to the documents on the social media site Threads, Meta’s answer to X
  • Tesla/Elon Musk requested an arrest warrant for PersonB for continuing to post links to the documents.
    • The court refused to issue an arrest warrant

Justice Jonathan Beach said the company [Tesla] had obvious remedies, including requesting that Meta and Google and the other platforms continue to remove the posts of the documents.

Ready? Here is comes…

Tesla’s counsel said the company had approached Meta seeking to have [redacted] account removed, but had found the company would only remove individual posts rather than the account itself.

[Tesla] had to “in effect play whack-a-mole” as new posts could appear on a number of different social media platforms

Lots of people have run into this problem where something belonging to them is posted without authorization by another.

It’s one of the current arguments about HAIL AI Systems which consume vast amounts of copyrighted material without compensation to the creators-owners while regurgitating reams of paraphrased or direct quote outputs to millions of AI users. Sometimes the AI vomit is attributed to the wrong creators and other times it doesn’t provide any attribution at all.

Illegal posting of items on For Sale Sites has been a huge problem that remains unrestricted. Only well-heeled entities can afford the costs of constant patrol for forged materials. It’s not just handbags but books and rare items. The normal response for finding a suspicious item is

  • Report the item to the site moderator and we will investigate (maybe)

Authors like JK Rowling take pains to make sure items presented, like signed editions, are authentic and authorized. A entire phalanx of legal experts hunt for faked items.

It becomes whack-a-mole trying to trace wrong, false or inaccurate information and get a Take Down.

Today we call this “misinformation” or “exposing wrongful acts” or “doxing”.

Our host is currently a victim of such actions.

===

HAIL Warning

ht tps://w ww.theguardian.com/australia-news/2024/jan/19/tesla-confidential-document-leak-australia-keith-leech-judge-refuses-arrest-draconian-lukasz-krupski

  • Australian judge refuses carmaker’s ‘draconian’ request for arrest warrant
  • Company sought arrest warrant for [redacted] after he allegedly posted links to confidential documents on social media in defiance of court order
  • German newspaper Handelsblatt published the “Tesla Files” based on 100GB and more than 23,000 documents of internal data [2022].

Clive Robinson January 20, 2024 8:32 PM

@ vas pup, JonKnowsNothing, ALL,

With regards,

“The task for AI regulators is to make sure there’s always a straightforward way for humans to challenge the computer.”

That is a “political untruth”… The likes of LLM AI gives Politicians “arms length” ways to persecute people on political whims / mantras.

@ JonKnowsNothing, has given a new one today over a UK Gov agency stopping payment pension. He’s along with @ResearcherZero have highlighted not just another UK agency the Post Office and the Horizon scandle. But also both have talked about Australia and the US and variations on RoboDebt and similar.

The Politicians realy do not care who outside of their circle gets hurt provided they don’t carry any responsability thus potential blaim and loss of status / office.

They are guarenteed to be attracted to LLMs and other AI like flies to a turd on a warm summer day.

Thus they are not going to allow people an easy way to challenge their use of AI to persecute their chosen targets who are grnerally at the lower end of the socio-economic ladder regardless of if they are blue or red hence “purple politics” and as pointed out by Ralph Nader,

“The only difference between the Republican and Democratic parties is the velocities with which their knees hit the floor when corporations knock on their door. That’s the only difference.”

The same is true in the UK and I suspect Australia as well as quite a few other WASP style nations where neo-cons are found to be building well featherd nests for politicians.

Thus expect placating talk whilst they keep kicking regulation of AI except to their and “their friends” benifit “into the long grass”.

Sadly some people make the mistake of,

“Listening to the talk instead of keeping an eye on the behaviours”

JonKnowsNothing January 20, 2024 10:39 PM

@Clive, @ vas pup, All

re: The Politicians really do not care who outside of their circle gets hurt provided they don’t carry any responsibility

If one considers the length of time many of these conditions have existed, where incorrect computer matching, selecting, sorting have been used to disenfranchise, exclude, limit, obliterate valid records for real people, these programs span decades.

Over these many decades Politicians come and Politicians go, but the programs remain untouched. It does not matter much which party structure or economic policy a group avows, these programs remain intact.

There is an extraordinary benefit for each group to maintain these systems, regardless of lip service to the contrary. Defining the benefit is often difficult because the underlying reasons are shrouded to avoid unsavory inspection.

When they show up in the public sphere, there is a general hysteria pantomime for consumption of the press and for a distraction for the public.

  • Nothing to see here

These computer systems are faulty by design. It is not an error that they behave the way they do, they are designed to do the unsavory tasks and to do them in a way that it is easy to obscure the real reasons.

  • Teresa May did not destroy the original manifest records for the Windrush people because she thought they were not needed. She destroyed them BECAUSE they were needed.

The one thing that can be said of every computer system created to date is

  • Computers are incredibly dumb. They only do what they are programmed to do.

Consider exactly what they are really programmed to do and how long they have been successful at doing it. Computers have no remorse.

JonKnowsNothing January 21, 2024 10:18 AM

@Clive, All

re: it’s not the password protection that failed

An interesting MSM story about a password hack at M$ in November 2023. (1) Details about how the hackers got into a secured area of M$ and did hacker stuff.

The story explains how M$ separates this area from external hacks.

  • To safeguard this dedicated environment, email, conferencing, web research, and other collaboration tools aren’t allowed …. Further, this environment is segregated from the rest of Microsoft’s network, where workers have access to email and other types of tools.

Sounds pretty standard stuff until you read at the bottom of the article the following

[2021] two years before Storm-0558 gained access to Microsoft’s network.

a workstation in the dedicated production environment crashed, Windows performed a standard “crash dump,” in which all data stored in memory is written to disk so engineers can later diagnose the cause. The crash dump was later moved into Microsoft’s debugging environment.

Normally, crash dumps strip out signing keys and similarly sensitive data. In this case, however, a previously unknown vulnerability known as a “race condition” prevented that mechanism from working properly.

So what really happened is this:

  • A workstation crashed to the desktop
  • A crash dump file was created
  • The crash dump file was sent for debug eval for the condition that caused the crash to the desktop
  • The crash dump included the keys and PWs
  • The crash dump file was archived

The kicker is this:

The crash dump program is not supposed to log the keys and the PWs. This is claimed to be a “previously unknown race condition”.

Soo how did they get in the file to begin with?

The problem is not just with M$ environment, the program that failed, the root cause, was the crash dump program.

It seems that no one bothered to look at the crash dump output when it was initially created, no one bothered to look at the output when it was updated (eg to include more telemetry) and no one in the Debug Eval team checking the Crash to the Desktop condition noticed the PWs and Keys were in the file data structure.

Can’t say as I blame the Debug Eval Team too much as anyone who has had the miserable experience of reading XML and JSON files can attest, there’s a lot of crap in those file structures. Maybe they missed the JSON block marker PASSWORD & SIGNING KEY.

fwiw: This is not the first crash dump file or similar WhoCares file, to have such issues.

===
1)
HAIL Warning

h ttp s:// arstechnica.com/security/2024/01/microsoft-network-breached-through-password-spraying-by-russian-state-hackers/

  • Microsoft network breached through password-spraying by Russian-state hackers
  • Russia-state hackers exploited a weak password to compromise Microsoft’s corporate network and accessed emails and documents that belonged to senior executives and employees working in security and legal teams, Microsoft said late Friday.
  • The attack, which Microsoft attributed to a Kremlin-backed hacking group it tracks as Midnight Blizzard, is at least the second time in as many years that failures to follow basic security hygiene has resulted in a breach that has the potential to harm customers.

lurker January 21, 2024 12:39 PM

@JonKnowsNothing, ALL

Russians this time, eh? It was Chinese before,

Those safeguards broke down in April 2021, more than two years before Storm-0558 gained access to Microsoft’s network.

What’s that song @Clive sings, “When will they ever learn”?

Clive Robinson January 21, 2024 1:10 PM

@ JonKnowsNothing, ALL,

Re: it’s not the password protection that failed…

“Soo how did [the credentials] get in the file to begin with?”

As importantly from the bottom of the article is,

“Those safeguards broke down in April 2021, more than two years before Storm-0558 gained access to Microsoft’s network. When a workstation in the dedicated production environment crashed”

Begs an obvious question about these “workstation” credentials,

“Why were the ‘workstation’ credentials still valid some considerable time ie ‘more than two years’ later?”

Or are M$ saying that the Ruski’s,

“Just logged in and stayed the equivalent of logged in for a couple of years on a ‘workstation’?”

Or are M$ saying,

“Our test people create account with identical credentials over and over again.”

This indicates there is way more to this story…

But the ARS journalist says,

“The explanation means that the password for that account was also weak and that the account wasn’t protected by 2FA.”

Whilst the lack of 2FA would be considered a grevious mistake by some these days, the “also weak” appears to been an unverified assumption… It could have been a very strong password… Because,

“Credential strength matters not a jot if ‘it’s known to the attacker'”.

One of the annoying things about the frequent distinction made between “insider” and “external” attackers. Because in ICTsec it distorts the way people think. The reality is that “it’s an attack” and it’s not “one thing or the other” the overlap is so broad it should not be distinguished.

Back in Sept 2000 I made a couple of points in a presentation to European academic and commercial/corporate security people.

The one most remember is my acidic comment that,

“The day Microsoft require a five pin din socket in the back of my head is the day I retire to sanity.”

OK it would be USB-C with “Win ToGo” these days but, the point still holds.

But I also quite vociferously defended an earlier comment I’d made about both watching and logging outbound, inbound, and internal traffic, that got questioned. I did this by saying that where the attacker appeared to be did not actually matter during investigation, because,

“If I was a smart insider making an attack on internal systems I would do everything I could to make it look like an outsider and vice vesre. In fact I would find a way to covertly crack out and more overtly crack back in to cover myself, which is why you always have to monitor outbound as well as inbound traffic and likewise internal traffic.”

Whilst the academics accepted it with nods, those who worked for commercial/corporate organisations (one ironically being Moscow City Council) were not as happy, the reason being the usuall “to much work, to few resources” dictated from managment above. Nearly a quater of a century later… The managment / resource issues are still almost the same… shame we can not say the same for the attackers (and so the hamsterwheel of pain spins on ever faster).

lurker January 21, 2024 2:39 PM

@Clive Robinson
“stayed the equivalent of logged in for a couple of years”

Yup, it’s an industry standard now. If PayPal and Google can allow users to “stay logged in on this trusted device” then MS has to follow, badly.

But yes, a workstation crashed badly enough to require dump analysis should also require cancellation of its password/keys.

Clive Robinson January 21, 2024 3:23 PM

@ lurker, JonKnowsNothing, ALL,

“What’s that song @Clive sings, “When will they ever learn”?”

That’s the “polite one”, there are as you will appreciate others that shall we say are “more robust” in a faux-rustic way…

Back when I was in secondary school, I found out that our “Drawing Master” had been a member of the “Bonzo Dog Doo-Dah Band”. And at that time was still performing solo at pubs etc.

‘https://en.m.wikipedia.org/wiki/Bonzo_Dog_Doo-Dah_Band

Most who remember them is for their “I’m an urban spaceman” record.

Through him I got to find out about a “secret hole in the ground” in Kingston-upon-Thames where underneath a tool shop (now Dentists Practice and no the irony is not lost on me), beneath what looked like a drain cover –over the emergancy exit— was a recording studio, of indi label “Beggars Banquet Records”[2] much famed by many now legendary bands and artists,

‘https://en.m.wikipedia.org/wiki/Beggars_Banquet_Records

I got involved in various ways due to being an “engineer type” in Pirate Radio. One of the people I met there was “Dr Cox” also known for a spoof act like the Bonzo’s but of much more ribald songs where he went by the name of “Ivor Biggun”.

One of his songs got “re-mixed” for a friend at the BBC where he and I worked, for when he ws doing live gigs. He’d play it if the “bar staff” shut the bar to quickly[1] 😉

The song was officially “The Winker’s Song (Misprint)” and pushed by amoungst others Johnny Rotten. Which was why for a record by an unknown act and absolutly no “Air Play” on any station other than Pirates it did quite well,

https://en.m.wikipedia.org/wiki/The_Winker%27s_Song_(Misprint)

You can find the release version up on YouTube where today –four and a half decades later– it’s considered kind of quaint though smutty (it surfaced again a few years back when ukulele music in a similar but more “family friendly” style became briefly popular at music festivals).

I must however warn two things,

1, It’s “Not suitable for work” and why I’ve not given a link.
2, It sticks in your head and is as difficult to shift as “Poo on a blanket”.

So you might find yourself whisteling the chorus even after only one listen…

The “special version” for my friend got the chorus at the end sung by the backing singers used through out, and “I’m” etc changed to “He’s”.

[1] Back in the late 1970’s and through the 80’s British Licencing Law introduced in “The Great War” to cover up senior military commanders incompetence was fairly strict. Whilst it was possible to get “Licennce extensions” they were problematic and “authorities” of various forms watched like the Harpies of myths and legends, and would rip out a landords liver for political benifit if they could. Hence bar staff and the lsndlords were “oft over zealous”. Which is why the expression “Lock in” has much different and fonder menories than more contempory usage. Back then It refered to the trick some “Landlords” had of locking the Pub Doors so “officials” could not get in and holding the equivalent of a private party. To avoid charges of “Retailing after hours” before “time” was called youl’d “buy a raffle ticket for charity” at the then enormous price of £5 which got you unlimited consumption of beer and spirits (beer was less than 30pence a pint back then and few can drink two British Gallons) later bottles of whisky and similar would get “raffled” to be “carried” for the journey home” of course 😉

[2] Beggars Banquet Records are still very much around today and have had an interesting history,

https://www.beggars.com/martin-mills-qa/

Oh and they still do indi stuff in Kingston though mostly above ground, big gigs in Pryzm

https://www.banquetrecords.com/james-arthur/pryzm%2C-7%3A00pm-%2814%2B%29/JA220124

And more intermate gigs in the oldest church in Surrey,

‘https://www.flickr.com/photos/guynamedfawkes/51837583635/

[In the foreground one of the ever present “friendlies” that cadge enough food to feed a small army.]

I’ve spent many a happy hour listening to music in there, and sitting just drinking tea in the temporary café and enjoying the peace and beauty of the place.

JonKnowsNothing January 21, 2024 8:03 PM

@Clive, @lurker, All

re: a workstation crashed badly enough to require dump analysis should also require cancellation of its password/keys

I may have misread some of the article but I got the impression that the workstation (hardware) was not part of the problem for the PWs.

It was the archived dump file.

Somehow M$ thought the dump file was clean of PWs and Keys. However, no one checked if that was correct.

In RL, if you crash your system (eg spill your coffee on the laptop), you don’t always reset every PW you have, you just replace the hardware; changing the required PWs and presume all “untouched” systems are OK.

It’s questionable if anyone even looked at the crash dump, just archived it and reloaded the OS. An activity that many programmers do regularly.

It does imply there are at least 2 versions of the crash dump program. One that takes everything including PWs and Keys, and a second one that strips them from the final output.

The race condition might be

  • How fast can the dump be created when the system hits BSOD

If the PW/Keys stripping comes as a secondary pass it might not get done in time.

Also, the article is not clear about what systems crashed. In the above scenario it’s like power outage or fatal execution error. But if it was in something like Word, Excel or Paint, there would normally be enough time to create the crash dump then parse out the forbidden items.

What is odd to me is that the PW/Key would even be part of the crash dump in any situation. It also implies that every crash dump has these in them if you can get the system to fail in a particular order.

This software-bomb was sitting in the archives for 2years. Those archives were network accessible. As @Clive has said before

  • What is the business case for having such archives.
  • What is the business case for keeping them network linked

lurker January 21, 2024 11:09 PM

@JonKnowsNothing
“the workstation (hardware) was not part of the problem for the PWs.”[?]

Maybe it’s too easy to conflate the two separate intrusions described in the article:

1) in April 2021 a workstation in the dedicated production environment crashed;

its dump file, archived outside the secure environment, contained an Exchange key;

this key was consumer grade, but was being used on enterprise accounts with a converged API endpoint;

“an engineer’s account was hacked” [how? phishing? weak or reused PW?] allowing Storm-0558 to access the dump file and extract the key which was then used for nefarious purposes, worldwide.

Mistakes were made, lessons learned, stuff now fixed, says Windows maker [1]

2) in November 2023 a “legacy non-production test tenant account” was brute-forced;

this legacy test account was then used by Midnight-Blizzard to pivot into enail accts of senior MS staff.

nothing else of value is known or admitted to have been compromised by M-B.

So I ask along with @Clive, why was the dump archive accessible online? And why was a legacy test machine still plugged in? Yes, this goes beyond weak and reused PWs. Oh, but I might still keep those dumps, for research, to compare with newer dumps, but accessible only in strict offline conditions. Knowing how/why Windows crashes is an extremely valuable trade secret. More questions: did the Chinese know the key was in that dump? or was it just a lucky dip?

[1] ‘https://www.theregister.com/2023/09/06/microsoft_stolen_key_analysis/

Clive Robinson January 21, 2024 11:36 PM

@ JonKnowsNothing, @lurker, All,

Re : Workstation credentials.

“I may have misread some of the article…”

Lets just say you are probably not the only one 😉

Because of the way the article was written, I get the feeling the journalist had to little information and was stretching it not just thin, but to cover a lot of potential bases that might or might not be actual involved.

That said I probably did not make myself clear as I’m still cautious of the automod.

That said, you get the same basic factoid I spotted,

“This software-bomb was sitting in the archives for 2years.”

What I was questioning was why after two years the credentials still worked…

Enforced Policy on CAs for PKcerts used for access authentication is max life of just over a year.

Enforced Policy by audit for “Payment Card Industry”(PCI) accreditation etc for Passwords during that two year period which M$ actually built into their systems was “Revoke and replace” maximum of 90days to revoke maximum 30days thereafter to replace.

Thus if the otherwise enforced standard policy rules were being followed… then even though the credebtials became known to the enemy, they most definately should have been invalid thus not worked after two years…

Which begs the question,

“What is the business case for having the authentication credentials working long after standard and automatically enforced security policy said they should not?”

I can make some guesses based on assumptions, such as,

1, Automated test/install tools.
2, Disjoint authentication process.

The first almost always involves the distinct “No No” of embeding the credentials in multiple scripts.

The second is sometimes called a “Browse-Up Process and is like people inventing their own crypto algorithms… In essence they are trying to emulate a “sudo” like process for authentication across the network for siloed, disjoint, or disparate systems.

That is the user uses their “unprivileged account” authentication credentials to access a sudo like network process that uses an entirely different set of “privileged account” authentication credentials to auto-login the user with system/administrator rights on another entirely seperate system on a network they have no account etc on such as a server that gets managed by multiple people.

Developing such a network process is functionally not hard, but to also make it secure is frought with difficulties thus potential vulnerabilities and is realy best avoided.

Because if an attacker knows or suspects there is such an ad hoc system on the network it would almost certainly be a way an attacker would look to exploit as it would probably give network wide privilege escalation (which might be what happened here).

Thus both are realy not at all smart things to do from a security perspective but from a managment and work flow perspective,

“They are a convenient convenience”

Saving resources, reducing work load, increasing flexibility, and numerous other “this looks good” effects (Shades of SolarWinds). Thus in the less knowledgeable a sense of “What’s not to like?” and from managment that knee jerk “Make it so” nonsense follows almost automatically on such proposals…

It’s the same nonsense that connects systems to the Internet without good cause, lets “full stack” developers punch holes in firewals for dangerous if not vulnerable kitchen sink “serialisation” code in libraries and FOSS etc, and all manner of other “Security Anti-Patterns”,

https://www.ncsc.gov.uk/whitepaper/security-architecture-anti-patterns

Clive Robinson January 22, 2024 12:57 AM

@ lurker, JonKnowsNothing, ALL,

Re : Lack of clarity is a barbarity.

Thanks for “The Register” older link, like a mountain stream it has a much clearer and flowing stream (without the turbidity and eddies of the ARS piece).

“Maybe it’s too easy to conflate the two separate intrusions described in the article:”

“And then there were three”

With apparently the Russian’s looking at M$ seniors, legal etc inboxes

“Microsoft on Friday admitted a Moscow-backed crew broke into “a very small percentage of Microsoft corporate email accounts” and stole internal messages and files.

These inboxes included those belonging to the leadership team, cybersecurity and legal employees, and others. The criminals exfiltrated not only emails but their attached documents, too.

Redmond blamed Midnight Blizzard, aka APT29 or Cozy Bear, for the intrusions, and said the “attack was not the result of a vulnerability in Microsoft products or services.” “

https://www.theregister.com/2024/01/20/chinese_russia_vmware_microsoft/

I think I’m due a large helping of what Douglas Adams described as,

“The principle of generating small amounts of finite improbability by simply hooking the logic circuits of a Bambleweeny 57 Sub-Meson Brain to an atomic vector plotter suspended in a strong Brownian Motion producer (say a nice hot cup of tea) were well understood.”

Clive Robinson January 22, 2024 2:07 AM

@ lurker, JonKnowsNothing, ALL,

Re : Then there were three[1].

Is possibly a little enigmatic for some…

It actually goes back to a childrens nursery rhyme that was used as part of the plot in the Agatha Christie’s novel “Then there were none” which is the final line of the rhyme…

Even back then the original name of the rhyme had become “socially unacceptable” and it got changed eventually becoming “Ten little Soldier Boys”.

The two verses where “three appears” are both relevant,

“Four little Soldier Boys going out to sea; A red herring swallowed one and then there were three.

Three little Soldier Boys walking in the zoo; A big bear hugged one and then there were two.”

So to misquote Lewis Carol’s childrens poem on the absurdity of life,

‘”The time has come,’ the walrus said, “to talk of many things: Of cozy bears that hug – and stealing soldier boys so lax – of savages and red-hearings.”‘

P.S. Blaim the lack of lemon tea 😉

[1] Also used as the name of a film and an album. The 1961 Italian film can be traced back via the unknown killer theme to the book. Of the 78 Genesis Album it’s hard to say, who came up with the name, or ifvit traced back to the rhym… Knowing such things was once important as there was “The chain game” where you were given catagories that you had to link as cleverly or obscurely or both as possible.

ResearcherZero January 22, 2024 3:10 AM

10 (complete takeover) – unknown file type circumvents security and scan detection

“Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this the vulnerability.”

‘https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/apache-activemq-vulnerability-leads-to-stealthy-godzilla-webshell/

MDK January 22, 2024 8:32 AM

@vas pup, @ALL

Regarding hxxps://www.timesofisrael.com/in-world-first-israel-approves-cultured-beef-for-sale-to-the-public/

Besides vitamins, amino acids, sugars, trace elements, buffers, and, in some cases, proteins I’m wondering what else is going into feeding the cellular tissue? Seems to be a vague topic. Thoughts?

Have a great week!

Winter January 22, 2024 9:14 AM

@PaulBart

Yes, let us ignore …

what the people of Ukraine want. Just like Putin and the Russians ignore what the people of Ukraine want.

Clive Robinson January 22, 2024 10:44 AM

@ PaulBart,

Re : History.

“What a privileged statement.”

Nope, just historically factual and not deliberately short term a failing of many neo-cons. But if you go back you will see I already explained not just the Who but the Why such corrupt people were still in post.

So the real question to ask you is,

Are you,
1, As dumb as a stump
2, Being a troll
3, Failing at being a disseminator of far right propaganda by faux-whataboutism protestations?

Yes I know it’s a “multi-choice” question, but hey is anything more than one too cognitively taxing for you?

Or perhaps the concept of non exclusive OR answering where it could be say “the first and second” choices or all three that gets you to look the way you do so often…

JonKnowsNothing January 22, 2024 12:06 PM

@MDK, All

re: Besides vitamins, amino acids, sugars, trace elements, buffers, and, in some cases, proteins I’m wondering what else

The Matrix movie series had a good explanation:

  • A bowl of snot

&ers January 22, 2024 12:59 PM

@ALL

Some time ago i posted this link here but in connection with this
thread i post it again.

hxxps://www.businessinsider.com/ukraines-real-power-broker-yermak-zelensky-russia-war-biden-2023-12

Attacks against those journalist and the means how it was done – wiretapping – suggests that whoever organized this is reasonably high up in the system and well connected. Not just anyone can order the wiretapping. So the hints in the original article that this Telegram channel might be linked to the presidential office and then reading above mentioned article allows to draw some conclusions. Power is always very sweet and can intoxicate you.

Clive Robinson January 22, 2024 3:08 PM

@ MDK, JonKnowsNothing, All,

Re : Live broth to meat analog.

“Besides vitamins, amino acids, sugars, trace elements, buffers, and, in some cases, proteins I’m wondering what else is going into feeding the cellular tissue?”

Well cells require walls… In mamals these are usually made with lipids[1] (plant cell walls are quite different and made of long chain carbs that whilst they give you fibre have other issues and don’t cross the gut wall so won’t be needed for “making meat analog”).

Of course, there is another way to get your protiens… “eat bugs” whilst rare in the West both Africa and Asia have traditional bug recipies… Munching on locust is not much diferent to prawns…

[1] If you do not have lipids in your diet, unlike not having carbohydrates you can get quite sick, and develop very poorly and your fertility will be down the pan somewhere. It’s one of the issues certain types of vegitarians fall into and early death can be a result. Getting information on hypolipidimia as opposed to hyperlipidemia is not as easy as you might expect… Because the medical profession is still hyped up about too much not to little lipids in the majority of western diets.

https://www.livestrong.com/article/309929-what-will-happen-if-your-diet-lacks-lipids/

echo January 22, 2024 7:04 PM

On this blog a woman was accused of doing something she didn’t. Evidence was posted clearing her name. Another women who discovered she was wrong in attacking this woman retracted her accusation and apologised. Response from this ever so male dominated blog? crickets

https://www.thenational.scot/news/24065223.carol-vorderman-clarifies-misleading-post-nicola-sturgeon-whatsapps/

Carol Vorderman clarifies ‘misleading’ post about Nicola Sturgeon WhatsApps

Not a peep from this very male dominated blog about the very male Minister of Defence Grant Shapps (lol) telling a lie this week. Curious that.

https://fullfact.org/news/grant-shapps-labour-majority-lords/

Grant Shapps wrong to say Labour has a majority in the House of Lords.

Here’s another scorcher on this “security” blog…

Authors like JK Rowling take pains to make sure items presented, like signed editions, are authentic and authorized. A entire phalanx of legal experts hunt for faked items.

This comment attribute qualities and abilities to a person simply by dint of perceived authority and fame.

Authors like JK Rowling in practice have little to nothing to do with authentication of goods and services on the second hand market or third parties. As for the kind of all seeing and all knowing 365/24/7 Nobel prize winning forensic level of due diligence being being claimed there is no evidence JK Rowling is capable of this at a fundamental level.

https://www.vox.com/culture/23622610/jk-rowling-transphobic-statements-timeline-history-controversy

Is J.K. Rowling transphobic? Let’s let her speak for herself.

An exhausting — if not exhaustive — timeline of J.K. Rowling’s transphobia.

Hello, hello.

https://www.advocate.com/news/project-2025-republicans-maga

Republicans Advocate Transphobic, Authoritarian ‘Project 2025’’ Even After Election Failures.

There’s nothing like signalling plans in advance is there? The word people are looking for is “genocide”.

Add to the list of red flags being missed of genocide in Yugoslavia, Rwanda, Israel-Gaza. That’s not even counting the more subtle genocides which are less kenetic and more democide – examples being LGBT+ persecution in Iran, Saudi Arabia, and much of central Africa, and Uyghur persecution in China.

Just more reasons why I can’t take this “security” blog seriously.

JonKnowsNothing January 22, 2024 7:13 PM

@Clive, @lurker, All

re: Why was the software-bomb on the M$ network

I was considering this aspect and I wonder if…

What if they were using some sort of network based project management system, network based source repository and network based bug error database and network based test generation system? (1)

Project Management cloud systems are nearly required these days. Earlier is was only for the benefit of management reporting. Now, PostPandemic (2), employees that have network access can do the majority of their work remotely.

Source code, build and release systems are popular on the cloud. Probably not many developers use own-system these days. Even gamer mods are developed, using cloud based source, history, compile systems.

Bug databases used to be restricted access to Engineering only but now many are included into Project Management, WorkFlow, Critical Path, Work Assignment systems.

Testing areas are highly automated. There are still manual tests but the goal of many companies is OneButtonPushToTest as much as possible. Test cases are held in specialty systems. Thousands of test steps are automated this way.

Of course, once you are in the Cloud, all security goes POOF.

What if the entire debacle at M$ originated with a networked management system, such that bugs, analysis, code sharing and code updates were held in the cloud.

If they were using an automated test scripting system, all that would need it all to be networked.

If they were testing various builds for errors and determining release candidates, those baselines and tests were likely automated and require network access.

If they were testing various crash load cases for crash prevention they might have an archive of crash dumps as an error baseline. These would be used for various versions of automated checking for the specific error condition. They would not be tested for other errors outside of the bug tracked one.

  • eg: Subsystem59 crashed, fix to Subsystem59 submitted, tested Subsystem59 by bit wise compare to crash dump at segment for section Subsystem59.

IF this is what happened underneath, the spearphishing was just an excuse to cover up the unsafe setup. Prolly, all major companies use this setup now. The spearphishing might not have actually been the only method of intrusion. It was just one that they found.

===

1)

ht tps: //en.wikiped ia.org/wiki/Agile_software_development

  • In software development, agile practices (sometimes written “Agile”) include requirements, discovery and solutions improvement through the collaborative effort of self-organizing and cross-functional teams with their customer(s)/end user(s). Popularized in the 2001 Manifesto for Agile Software Development, these values and principles were derived from, and underpin, a broad range of software development frameworks, including Scrum and Kanban.

h ttp s://en.wikipedia.org/wiki/Jira_(software)

  • Jira is a proprietary product developed by Atlassian that allows bug tracking, issue tracking and agile project management. Jira is used by a large number of clients & users globally for project, time, requirements, task, bug, change, code, test, release, sprint management.

2) PrePandemic, PostPandemic are global associations of time division.

&ers January 22, 2024 7:20 PM

@Sir Clive

Something for you:

hxxps://euromaidanpress.com/2023/10/10/ukraine-rolls-out-secure-radio-to-counter-russian-electronic-warfare/

JonKnowsNothing January 22, 2024 7:23 PM

@echo, All

re:
@JKN: Authors like JK Rowling take pains to make sure items presented, like signed editions, are authentic and authorized. A entire phalanx of legal experts hunt for faked items.

@E: This comment attribute qualities and abilities to a person simply by dint of perceived authority and fame.

Actually, no.

JK Rowling, Louis Vuitton, and other holders of important copyright and trademarked goods spend thousands on tracking and removing faked goods in the market place.

As you noted, they can rarely stop the production of fake goods, but they have the funds to hire track-n-trace firms and work with law enforcement to remove the faked goods from the marketplace.

Periodically, large bonfires are built in major fashion industry cities to burn the counterfeit items.

As for the rest of your “echo”, that can remain without comment.

my my my my music January 22, 2024 8:52 PM

My p3nis likes to wear clown makeup and be sucked sideways.

STOP! Hammer time!

du-du-du-du-DU-DU-can’t suck this!

Clive Robinson January 23, 2024 1:54 AM

@ JonKnowsNothing, ALL,

Re : Echos of the past not?

“As for the rest of your “echo”, that can remain without comment.”

As can be seen from #comment-431305 above, a certain “nastyness” has returned and got emboldened and what looks like “political games” undertone.

In the past the nastyness tried impersonation of other commenters @Winter got hit quite hard back then and can confirm it degenerated and was not at all pleasant and gave the @Moderator one heck of a clean up job.

Coincident with nastyness reapperance is the comments under the handle of “echo”. Which are redolent of “AI hallucination” over and above not being thread relavant.

It might be wise not to engage, otherwise it just gives attention to what is potentially the nastyness.

ResearcherZero January 23, 2024 1:55 AM

@JonKnowsNothing, Clive

As easy as 123…

Plenty of unsafe practices within the M$ dev setup in the past. Intel had many of the same problems, such as folders publicly facing with bad passwords. Updates within.

An APT could have had access for many years and have gone unnoticed.

‘https://www.varonis.com/blog/outlook-vulnerability-new-ways-to-leak-ntlm-hashes

Plenty of old bugs floating around in stacks that still get migrated to new products.

Firmwar: Attackers are targeting lower levels of the computing stack. Firmware attacks are becoming much more common as bootkits become increasingly available at a low price point.

‘https://www.youtube.com/watch?v=io2MCK3M_pw&t=735

mitigations
https://eclypsium.com/blog/the-ilobleed-implant-lights-out-management-like-you-wouldnt-believe/

“the implant took the added steps of silently preventing the system from updating the BMC firmware while spoofing results to make it appear that the firmware had been updated”

‘https://eclypsium.com/2022/12/05/supply-chain-vulnerabilities-put-server-ecosystem-at-risk/

“The main payload of the attack is an executable named msapp.exe, and its purpose is to take the victim machine out of service by locking it and wiping its contents. Upon execution, the malware hides this executable’s console window to decrease the suspicion of vigilant victims.”

‘https://research.checkpoint.com/2021/indra-hackers-behind-recent-attacks-on-iran/

ResearcherZero January 23, 2024 2:19 AM

@echo

Likely full of aging men. It’s a security blog, not the Guardian or the Daily Mail. Certainly not the Bulletin of Atomic Scientists or the UN Special Rapporteur for Human Rights. Should anyone be taking it that seriously is the question?

RATs and Fake Browser Updates

“Parrot TDS injects a landing JavaScript code snippet into existing JavaScript files. If conditions set by the landing script are successfully met, the victim’s web browser queries a payload server.”

‘https://unit42.paloaltonetworks.com/parrot-tds-javascript-evolution-analysis/

Can target specific users and phish credentials with convincing fake login pages.

‘https://decoded.avast.io/janrubin/parrot-tds-takes-over-web-servers-and-threatens-millions/

Over 2,100 systems infected – actors patched the scanner.py file for the built-in Integrity Checker Tool to avoid detection.

“Organizations must apply the mitigation after importing any backup configurations in order to prevent potential re-compromise of a device that was thought to be mitigated.”

‘https://www.volexity.com/blog/2024/01/18/ivanti-connect-secure-vpn-exploitation-new-observations/

unauthenticated RCE

‘https://dashboard.shadowserver.org/statistics/iot-devices/time-series/?date_range=7&vendor=atlassian&model=confluence&group_by=geo&style=stacked

“the fix will not be backported to Confluence 8.0.x.” etc

‘https://confluence.atlassian.com/kb/faq-for-cve-2023-22527-1332810917.html

Now said to be a position with a US defence company. (there might be more than just defence companies interested in his AUKUS insights)

‘https://www.smh.com.au/politics/federal/morrison-heading-towards-the-exit-eyes-uk-defence-job-20230501-p5d4oz.html

“The code is currently enforced by the government of the day.”

Both Transparency International Australia and the Centre for Public Integrity say the situation posed by Morrison’s potential job is a stark reminder of the need for reform.

https://www.theguardian.com/australia-news/2023/may/02/scott-morrisons-reported-links-to-uk-defence-job-shows-lobbying-reforms-needed-integrity-experts-say

was already thinking about a new position perhaps?

‘https://www.abc.net.au/news/2023-03-14/scott-morrison-defends-secrecy-of-early-aukus-plans/102094886

Winter January 23, 2024 2:30 AM

@Clive, All

was not at all pleasant and gave the @Moderator one heck of a clean up job.

That is indeed the real target of the “Firehose of falsehood” [1]. It drowns out every conversation and is the new censorship.

The best counterattack currently available is education. Our local version of the Today Show launched a new game: AI or MP, where you have to guess whether a photo+name+party is real or AI generated.

[1] https://en.wikipedia.org/wiki/Firehose_of_falsehood

ResearcherZero January 23, 2024 2:55 AM

another silly idea

‘https://www.wired.com/story/parabon-nanolabs-dna-face-models-police-facial-recognition/

Clive Robinson January 23, 2024 5:00 AM

@ &ers, ALL,

Re : Ukrain $110 “secure” radio.

The EuroMaiden article starts off with an assumption of,

“… effectively, creating a nearly undetectable communication system.”

The handset is apparently “Frequency Hopping Spread Spectrum”(FH-SS) which back last century was known to have issues even though called “Low Probability of Intercept”(LPI).

I suspect what they have done is taken a standard low cost HT motherboard design and replaced the keyboard interface with a microcontroler device such as those like the Adruino.

The fact it’s only got 2^16 hop channels means it’s probably got a less than 100MHz operating bandwidth in the UHF band. Which means you can see it on a “Spectrum Analyser”(SA) with a “Log Periodic Dipole Array”(LPDA) or “Biconical” or “Discone” broad band antennas that are all “Standard Test Kit”. Thus the Discone being omnidirectional will let you know a handset is transmitting and the LPDA will give you basic directional information.

You can buy low cost “Software Defined Radios” with network interfaces where you can “sync them together” such that you can easily make a “phased cardiod” synthetic antenna or similar such as an “Adcock antenna”(from WWI) that at UHF would hang easily under a DJI drone (as I’ve found out[1]). Such phased antennas can have a very narrow directional “notch” getting down to just a degree or two (see “Elephant Cage” for one of greater accuracy).

You can get the price of the RF front end right down using the likes of a couple of $15 RTL-SDR and a small “Single Board Computer”(SBC) or strip down a low cost “mobile Phone” (which makes it effectively unlimited control range with “mobile broadband”). Hang this off of a helium weather ballon and you get a very interesting EW capability. The equivalent the US used to buy for “tens of millions” was the forerunner of Boeing’s RC-135 Rivet Joint, the latest of which come in for something over $300million each for the base model…

For the Ukraine the prevailing wind direction from the west favours them not Russia. And the advantage of splitting the sensor head from the intelligence processing body means that it’s quite expendable and does not reveal anything of consequence if “captured”…

The problem with FH-SS is not the complexity or unpredictability of the “hopping sequence”, but how long it takes the “Variable Frequency Oscillator”(VFO) to “come on frequency” and the RF TX circuit to stabilize[2]. Also there are synchronisation and modulation issues. But… You can get it “All in a SoC” these days with WiFi and LoRa chip sets[3].

Solving the “sync” problem in SS systems traditionally is done in one of three ways,

1, High precision clocks.
2, Sync / heartbeat Transmissions
3, Preamble transmissions.

The first is expensive, and the other two can make a handset “more visable” to EW as well as more susceptable to jamming.

Anyway this post though of interest to quite a few people is now way to long 😉

[1] The Adcock Antenna,

‘https://en.m.wikipedia.org/wiki/Adcock_antenna

Is made from four vertical dipoles. That on ground stations are often quaterwaves over a couterpoise mat, or halfwave verticles fed in the center mounted on a mast (you can see pictures of them on uptodate “field EW Units”. Both of these are mechanically problematical for hanging under a drone. The solution I’ve designed and done a little playing with is a variation of the halfwave dipole made from “semi-rigid coax” where you use the striped center to make one half of the dipole, and the outer of the coax as the other, and you “choke it off” with a ferrite bead and a bend at 90degrees in the coax. The “tails” then get soldered to a PCB in the center with diodes used to provide the electronically adjustable “phasing”. It’s a variation on a Datong “Direction Finding”(DF) design going back nearly a half century the design of which has been published a few times and I’ve mentioned it on this blog before so it’s nothing “secret”. If you see a Police Car with four antennas on the roof in a square it’s almost certainly a phased antenna of this sort, used to direction find high end stolen cars and security trucks and similar.

When used with SDR’s in I/Q mode and software processed, the likes of Adcock and similar antenna based systems can get a direction in less than 1/10,000/Sec and for multiple signals even with consumer priced equipment. The bulk of the cost not being in the sensor head but in the “Intelligence Processing Unit” which can be on the ground in a bunker or armoured vehicle hundreds of meters away. The “radio horizon” to which you could DF to with even a low cost drone would be upto ~100kM…

Using say one of the more high end “Lime SDR” boards and modifing “Open Source Software” a little you can make a networked EW recever of more than sufficient quality for well under $1000. using an “Adcock Antenna” all suspended from a bigger commercial drone using amplified WiFi and a directional antenna you have a very powerfull EW system that even a few years ago would have been near impossible or up well over the $100,000/unit price range.

[2] One solution to the long time in “Phase Locked Loop”(PLL) VFO issue is to use a “Numeracally Controled Oscillator”(NCO). NCOs can come in one of two forms, one has a Digital(D-NCO) output the other analog(A-NCO). The D-NCO is slower to change frequency as it’s output waveform is generated by the “accumulator” carry overflow, however it can run at a “clocked rate”(fclk) well up in the GHz range thus can generate VHF/UHF output (and spurs up into the microwave bands). The A-NCO can change frequency as fast as the accumulate value can be changed, however it’s upper frequency is limited by the performance of the “Digital to Analog Converter”(DAC) which are still comparatively slow compared to digital counters. Both however are not sufficiently “spectrally clean” to use directly as the TX frequency source so additional circuitry is required that will effect the frequency hopping rate in an FH-SS system. However both D-NCO’s and A-NCO’s can be made in software for low frequencies and can easily have very very low frequency steps of fclk/(2^48) or effectively “to small to measure in 3million life times”. I was doing software NCO’s back in the 1980’s in seismology test equipment, RF Modems, and later in very inexpensive cordless phones. These days you can get chips in the $1 range with three NCO’s in some Analog output some Digital with I/Q outputs. They are even built into very low cost microcontroler chips,

‘https://m.youtube.com/watch?v=bWHe_PBEPdU

[3] LoRa chipsets,

‘https://en.m.wikipedia.org/wiki/LoRa

Are realy inexpensive which is why you can tell “Hellium Mining” is a variation of the now burst blockchain crypto-coin mining bubble/scam. That said the chips can be used with a mixer and an NCO chip in a down converting hetrodyne system to give an easy low cost Combined/hybrid Spread Spectrum system with a high degree of AES encryption and very much increased difficulty for EW surveillance. I’ve got a “test board” I designed to work in the 144Mhz Ham Band that is both low power and fits easily into a CubeSat 10cm cube along with power supply in orbit stabalisation and some other “research” instruments. It makes an interesting “technology demonstrator” for potential CubeSat constalation systems using Ad Hoc Mesh communications,

‘https://en.m.wikipedia.org/wiki/Wireless_ad_hoc_network

ResearcherZero January 23, 2024 5:52 AM

sexually assaulted in jail after being falsely accused of armed robbery due to a faulty facial recognition match

‘https://www.washingtonpost.com/technology/2024/01/22/facial-recognition-wrongful-identification-assault/

NSA and GCHQ arguments against hybrids:

‘https://blog.cr.yp.to/20240102-hybrid.html

NSA uses two independent encryption layers “to mitigate the ability of an adversary to exploit a single cryptographic implementation”.

‘https://web.archive.org/web/20220524232250/https://www.nsa.gov/Portals/75/documents/resources/everyone/csfc/threat-prevention.pdf

Clive Robinson January 23, 2024 7:36 AM

@ ResearcherZero, ALL,

Re : SigInt arguments against hybrids.

I’m long known to be infavour of not jusu hybrids but systems where you use the strong parts of different crypto systems to produce new types of crypto system.

Bit I know of only one practical and only one theoretical argument against hybrids.

On the theoretical side, the two algorithms might just work in contradiction to each other.

That is in theory the first algorithm encrypts and the second algorithm then partially decrypts it.

You can see that with XOR doing it twice in a row with the same secret value unmasks the data byte. Likewise with ADD MOD X if the values effectively and up to zero the data byte gets unmasked.

These sorts of theoretical issues can be designed out.

The practical issue, happens already and it’s a version of “man in the middle fall back attack”.

Consider what happens when the two ends of communications do not have the same “strongest algorithm” they fall back to the next strongest algorithm untill they find they have an algorithm in common.

Well what happens if they don’t have an algorithm in common?

Well you could end up using “no algorithm” or “not communicating”.

Normally the “no algorithm” case can not happen because if there is no common algorithm it’s easy to see.

In hybrid systems it’s a little more complex as you have two algorithms in series.

We know that with embedded systems such as utility meters, they may only have a single “Traditional”(T) algorithm and not a “Quantum”(Q) algorithm. The aim is that over a period of time applications will nolonger suppprt T but only Q algorithms. That is not going to happen in my lifetime and probably not in the working liftime of all this blogs current readers.

Now… You connect and go into the protocol negotion phase. There are four possibilities,

1, T,Q
2, -,Q
3, T,-
4, -,-

You don’t want the fourth “neither” to happend and you’ld rather the third “Traditional only” did not happen. The SigInt agencies want the second which is as I said unlikely to happen any time soon.

Which means the first option od hybrid is what is realy wanted.

But the logic can get muddled and third could in the future slide through when only the first or second is considered acceptable.

It’s even possible for the fourth to slide through as well if the logic is not properly stiched together.

But… If you are aware of this then it should not happen.

Unless someone leaves in a null algorithm. That is where during testing the least secure algorithm gets made “plaintext”. This can and does currently happen when people are trying to test for faults…

Similarly if you use the same algorithm twice and somehow end up with one as encrypt and the second as decrypt and the key the same, or have a weak / trivial key difference.

So yes there is a danger, with hybrids but should it be OMG?

PaulBart January 23, 2024 7:58 AM

@CLive

Don’t bend too far over your marxist elitism is showing.

Aww. Did my wittle comment hurt, cuz I no longer see it.
Waaaahbulance, someone call a waaahbulance for the marixists.
LOL

Disgusting elites.

Winter January 23, 2024 8:14 AM

@PaulBart

Don’t bend too far over your marxist elitism is showing.

What is your definition of “Marxism” and even “Marxist Elitism”?

Because, you accuse many people of being Marxists without anyone understanding what that means.

We have quite a number of Marxists in Europe and there were even more in the pre-1990 era. Clive does not look in any way like any of those well known official Marxists. So it looks like you have some secret knowledge about Marxists.

Please educate us.

Clive Robinson January 23, 2024 8:57 AM

@ PaulBart,

Re : Privileged, Marxists, Elites communism and similar.

“Did my wittle comment hurt, cuz I no longer see it.”

Funny that because I’d no reason to notice the effluvia had gone. That said I note the replys are still there, which is not the case generally… I wonder if that is so a message is not just sent but received.

As has been noted several times, in fact as far as I can remember every time you’ve posted, you have totally missused words that have “common meaning” on both sides of the Atlantic and many other places besides.

Thus I suspect in your addled thinking they are just abusive or grevious insults, to be hurled as your abilities are no better than foot stoping and crying something childish.

The bad news for you is they are neither abusive or grevious insults, but your repeate usage says a lot about your inadequacy to either comprehend or get past your deep seated cognative biasis and similar failings.

Which makes me wonder,

Are you trumped at which way to put on a red baseball cap?

Which way do you point the peak, certainly not forward looking, so leaning to the right, or just generally backwards?

Remember it’s a style thing, how you present, is how other people decide what you are and if you have worth.

At the moment, well what can people politely say?

Remember their silence could be the equivalent of politely registering the equivalent of no worth, so just a zero in the accounting of life.

echo January 23, 2024 4:44 PM

There’s some very polarised and partial mindsets on this blog.

You are ascribing abilities and actions to a high profile wealthy person simply because they are a high profile wealthy person. JK Rowling does nothing to protect her IP. She has a management team. IP protection is either baked in to her publishers business model or outsourced to a third party or part of due diligence by resellers and auction houses. It’s the same with reputation management (and financial management). It’s all hired in from outside and the ethics of a lot of those companies especially the London based ones is dubious at best.

In any case JK Rowling has no spare time as she spends a good portion of it ruining her reputation on Twitter, threatening SLAPP suits, and providing funding of far right and far right aligned hate groups and individuals such as a certain poundshop Eva Braun who was thrown out of New Zealand and Australia for hate related activity. It’s this kind of hate related activity that had Vladimir Putin openly praise JK Rowling in a recent state of the nation keynote speech. In fact JK Rowling is so far gone the pseudonym she uses for her latest none fantasy fiction franchise is a phobic dogwhistle – the name of a discredited psychologist who would today be disbarred from practice. This is not an accident.

JK Rowling has even been quoted by right wing US based politicians and used as an excuse alogn with “dark money” funded legal cases no matter how vexatious (and counter to the most senior expert judge in the UK’s opinion) in state level law to disenfranchise people. The mess in London (which both the security services and financial regulators among others bear responsibility) is part of the reason why Brexit happened and part of the reason how Rode Versus Wade fell in the US and the rise of the far right in mainland Europe and increasingly in Ireland. Cambridge Analytica and Golden Dawn were just a trial run. Anyone tracking far right activity knows this.

As for a certain “certified professional” on this blog straying out of their lane and their libelous namecalling? That person calling Ukraine “the Ukraine” like it’s a region of Russia in a Cold War novel? Clearly dated with an inability to self-correct or be corrected. At least they have stopped slagging off entire industries of young coders. And their directly or indirectly calling people “it”? Tsk. That’s not the first slip up and an easy lawsuit if ever I saw one. Normally I’d feel annoyed with frustration or wounded. This time I’m finding it funny so the therapy must be working.

Impersonation? I have never impersonated anyone on this blog. AI hallucination? Not relevant? Again, more unforced errors from this person.

I dislike appeals to authority and framing. They’re far too gatekeepy for me. Statistically speaking that kind of behaviour is often found in men of a certain age. Status derived from rote learned certifications and formulas tends to take a bashing as the world changes which threatens ego collapse. 50+ are pretty chronic although many tend to mellow 60+ as developmental psychology and the odd tribunal would indicate. Worldviews do tend to be a bit sticky though due to emotional attachments and priorities being stuck in an earlier age. Anyone in the UK who is interested in this can look up voting intention by demographic, and some of the more recent interviews revealing differences between the generation who bought their house for £3000 in 1970 and for whom Avocado was a middle class luxury versus the millennial generation who can afford Avocado due to globalisation but who can’t afford to buy their own house as they have inflated many multiples beyond their annual income.

What does all of the above have to do with security? Rather a lot as anyone who has an interest in the general topic or governance and related topics would know. It’s just written up in casual form and from more of an end user perspective, and certainly more practical and relevant than fiddling with diodes in a spare room.

Hands up in this blog who is on the receiving end of hate crime or bomb threats? Exactly. Just because it doesn’t effect you doesn’t mean a whole lot of stuff is not going on. The whole point of a narrative is to break the topic and join the dots. It’s pragmatic not a pile of yellowing books on a shelf which haven’t been updated in 50 years.

A Tufton Street operation is currently canvassing opinion on a rebrand because they’re now openly discredited and seen as being an extremist far right group. At least one MP on the record in parliament during an annual special interest parliamentary debate has alluded to them (along with other bad faith actors in the ecosystem) being a national security threat. In the US a state official just appointed a known domestic terrorist who incited bomb threats against a school teacher to their advisory board. Both are connected. Discussing any of this on this blog no matter how relevant is a waste of time due to gatekeeping in spite of the technical issues being openly discussed in a later topic.

Fact check away. The odds on anyone finding anything untrue in this post and previous two posts would be very low.

Anyway, things are happening regardless of this blog. Nobody has to come on here to ask permission to exist or do stuff.

lurker January 23, 2024 6:04 PM

@echo
“JK Rowling does nothing to protect her IP. She has a management team.”

Sorry, I’m seeing an oxymoron here. When the job gets too big and complex to do one’s self, one pays someone else (or a team of someone elses) to do it. In a strictly pedantic sense one has stopped doing it, one’s self. But one cannot be said to be doing nothing about it.

lurker January 23, 2024 6:22 PM

@echo
re, the Ukraine

I thought that was a peculiarly English affectation. Dated, perhaps, but we don’t do ageism, do we? It was carried out to the colonies where it persisted to the point the NZ Geographic Placenames Board had to issue a statement that they could not be held responsible for the way people spoke about places. I can remember the British PM talking about “the Argentine” less than half my lifetime ago.

Clive Robinson January 23, 2024 6:38 PM

@ lurker,

“Sorry, I’m seeing an oxymoron here.”

It sounds more like the first cuckoo of spring has landed tried to surreptitiously lay an egg in some one elses nest and got miffed when it got shoved out of the nest…

But also consider he record is cracked and the needle keeps jumping all over the place but does not land except where things are obviuosly not just wrong but disharmoniously so.

Best to leave the player and go into the kitchen where there is convivial chat.

Sad realy but somebody must be 50+ by their own symptoms with an itching they can not scratch because it’s out of reach.

My advice if you are not qualified to deal with strange itches in persons that are scarlet best avoid they might be plaguing at best.

Clive Robinson January 23, 2024 8:32 PM

@ lurker,

Re : It’s never who you think wot dunit.

“I just want the facts ma’am.”

You must be Dan, Dan Aykroyd, but where is the virgin Connie Swail?

Watching the bay perhaps.

echo January 23, 2024 9:37 PM

https://news.slashdot.org/story/24/01/23/1810241/biden-aims-to-stop-countries-from-exploiting-americans-data-for-blackmail-espionage

The Biden administration is preparing an executive order that seeks to prevent foreign adversaries from accessing troves of highly sensitive personal data about Americans and people connected to the US government, Bloomberg News reported, citing documents.

The US would solve a lot of its domestic constitutional and governance woes by bringing the United Nations Universal Declaration of Human Rights (as championed by omg WOMAN alert Eleanor Roosevelt Chairperson of the drafting committee of the Universal Declaration of Human Rights) into domestic law as Europe apart from Russia and Belarus have done via the the European Convention. Signing up to this is mandatory for membership of the EU.

An intern of the US supreme court argued with me this will never happen and it is “settled law”. About as “settled” as Roe versus Wade one presumes? Yet something else which would have been avoided but for.

The GDPR naturally flows from the Convention… This latest national security disaster another but for.

https://www.theatlantic.com/ideas/archive/2024/01/joe-biden-democracy-defense-foreign-policy/677221/

Biden’s Democracy-Defense Credo Does Not Serve U.S. Interests.

Centering U.S. foreign policy on this principle is destabilizing abroad and divisive at home.

And:

https://www.theatlantic.com/newsletters/archive/2024/01/the-desantis-campaign-implosion-was-inevitable/677217/

The DeSantis-campaign implosion was inevitable.

And not just because he was a poor candidate.

From time to time The Atlantic produces very poorly judged content. But then the Atlantic can be as dodgy as the New York Times and now, sadly, the BBC and Guardian let alone the billionaire non-dom owned media. You tend to pay attention to this kind of thing if there are bad actors out there who want you eradicated. But I digress.

The US has a number of constitutional flaws and duff Supreme Court judgments. One missed opportunity is an earlier attempt to get rid of the electoral college and replace it with a popular vote. Another goof was erroneous case law which disabled effective gun regulation and changed the culture. A third one is the filibuster. All three play into undermining good governance and opening the door to gerrymandering and bad actors.

DeSantis is a war criminal whose entire military “career” is shorter than the time some spent at West Point, and fascist thug driving a genocide against LGBT people.

There are plenty of essays currently doing the rounds on why defending good governance, democracy, and its institutions is worth investing in. A primary reason is to maintain the integrity of the state but also to guard against domestic and foreign bad actors who prey on opportunistic and weak individuals. The far right are an infestation and spread like wildfire and are trying to bull themselves up and influence across borders. Again, very well commentated on and documented.

The Rise and Fall of the Nazis is a worryingly illuminating documentary series worth watching – the product of a BBC before it was got to by bad actors. Oh, and the European Convention was created specifically to avoid this kind of thing happening again. It’s why the current far right infiltrated Tufton Street “think tank” and billionaire backed Tory party are pushing to leave the European Court of Human rights and join Russia and Belarus as a fully signed up rogue state. Oh, what company.

As for Clive being a willfuly blind dictatorial bully. Well!

The unviewable by end user code I put in the email field matches previous posts. It’s checkable but you do you.

I’m still waiting for Clive’s trademark “Fisking” that would shame a Metropolitan police holding cell sergeant. Brrr. The frisson.

As for the peanut gallery I don’t hairsplit. I got told off by mum for doing that and it stuck. It’s bad manners like putting your elbows on the table not that it stopped me pulling funny faces when nobody was looking during grace (eyeroll) and getting everyone else in trouble.

Lastly, I don’t think I would be far wrong in saying most (all?) on this blog are unaware of UN Special rapporteur reports condemning UK treatment of LGBT and disabled people? I understand due to some information dropping today that some US based people are considering approaching the UN to grant refugee status to US citizens living in some states. Florida would be one. There are others. Just because you’re not reading about this in the somewhat captured mainstream legacy media doesn’t mean it’s not happening.

Don’t get me started on Charter cities by the backdoor. If you’re “not bovvered” by warning signals don’t complain when those smack you between the eyes.

No response because, tbh, he doesn’t have one!

lurker January 23, 2024 10:29 PM

@echo

I observe Biden is only “seeking to prevent foreign adversaries from accessing … ” Please explain how a stroke of POTUS’ executive pen can stop the baddies. Eleanor Roosevelt achieved what she did because people were ready for it after a long, bloody war. $Deity help us if it takes kinetic conflict to achieve anything socially useful.

echo January 24, 2024 1:28 AM

https://www.theclydetimes.com/2024/01/23/united-nations-blasts-uk-over-harsh-treatment-of-peaceful-activists/

United Nations Special Rapporteur on Environmental Defenders, Michel Forst, has expressed deep concerns over the treatment of climate activists in the United Kingdom, condemning what he describes as a disturbing escalation in suppressing peaceful protests.

Oh here we go… Another UN warning for the UK and this is by no means the worst of it. How many warnings are there now?

ResearcherZero January 24, 2024 3:05 AM

“The risks from last year continue with unabated veracity and continue to shape this year.”

“As though on the Titanic, leaders are steering the world toward catastrophe–more nuclear bombs, vast carbon emissions, dangerous pathogens, and artificial intelligence. Only the big powers like China, America, and Russia can pull us back. Despite deep antagonisms, they must cooperate – or we are doomed.”

As the first step, and despite their profound disagreements, three of the world’s leading powers—the United States, China, and Russia—should commence serious dialogue about each of the global threats outlined here. At the highest levels, these three countries need to take responsibility for the existential danger the world now faces. They have the capacity to pull the world back from the brink of catastrophe. They should do so, with clarity and courage, and without delay.

‘https://thebulletin.org/doomsday-clock/current-time/

Upgrade to version 7.4.1 or higher. (allows an attacker to create a new admin user)

‘https://www.horizon3.ai/cve-2024-0204-fortra-goanywhere-mft-authentication-bypass-deep-dive/

The vulnerability may also be eliminated in non-container deployments by deleting the InitialAccountSetup.xhtml file in the install directory and restarting the services.

For container-deployed instances, replace the file with an empty file and restart.

‘https://www.fortra.com/security/advisory/fi-2024-001

&ers January 24, 2024 1:00 PM

@ALL

Something fresh.

hxxps://www.mobile-hacker.com/2024/01/23/exploiting-0-click-android-bluetooth-vulnerability-to-inject-keystrokes-without-pairing/

&ers January 24, 2024 5:25 PM

@ALL

hxxps://kyivindependent.com/military-intelligence-cyber-attack-on-russian-space-hydrometeorology-research-center-deals-devastating-consequences/

echo January 24, 2024 5:58 PM

https://www.independent.co.uk/news/uk/home-news/britain-war-russia-putin-nato-b2483837.html

Britons face call-up to fight in the armed forces if UK goes to war with Russia, top army chief warns

British men and women should be prepared for a “whole-of-nation undertaking” if Nato goes to war with Russia, warns the head of the British army .

I’m skeptical of this announcement given the current Tory government is full of human rights abusing crooks and assorted far right nutters. It’s not helped by Gulf war 2 and stupid decisions with Libya and Syria, and big failures of foreign policy such as Brexit and robbing the foreign development budget, and various socio-economic brakes including but not limited to political cynicism and cowardice, gutted public services, and falls in GDP due to Tory dogma essentially being a failed experiment. Okay, so that’s the political picture.

While British military are well trained and have some good kit up there with the best it’s overstretched and under resourced. On top of now generational policy failure the past decade of political policy failure has also further discouraged people seeking careers in the military.

The Russian threat in Europe is real as is the rise of the far right and authoritarians globally. Far from being a solution to this problem the current government is part of the problem, yet, a position is required.

The chief of general staff is said to be opposed to conscription, but held that civilians need to be involved in defending the country at a time of conflict.

And the other shoe drops.

“We need an army designed to expand rapidly to enable the first echelon, resource the second echelon, and train and equip the citizen army that must follow,” he said.

Historically one of the near unique strengths of the British army is its ability to scale in short order. The mechanism to establish the recruitment pipeline is well known and well rehearsed. It’s not a problem if it comes to that. At least it wasn’t before recruitment offices were privatised…

Asked about Gen Sanders’ remarks, Rishi Sunak’s official spokesperson said “hypothetical scenarios” about potential future conflicts were “not helpful”. When asked if he agreed with the general, the spokesperson replied simply “no”.

Eh? Are we in or are we out? Make your mind up you dithering promoted above your abilities sociopathic crook.

And on whether Rishi Sunak could rule out conscription in future circumstances, they said: “There is no suggestion of that. The government has no intention to follow through with that. The British military has a proud tradition of being a voluntary force. There are no plans to change that.”

So that’s a no.

Gen Sanders added that the UK will not escape the consequences of all-out war and must be prepared for what may lie ahead. He said: “Ukraine brutally illustrates that regular armies start wars; citizen armies win them.”

Well sure Russian escalation would be a problem but then so was Brexit. I also really don’t get what’s being said here. Like, you’re paid to do a job so the rest of us don’t have to. It’s what the whole professional army versus conscripts are all about.

While recruitment has been a problem through public services “applications to join the army are the highest in six years. Our nation’s youth are as ready to serve, to seek adventure, to find where they belong, and to better themselves as they ever were. I see the very best of them every day, selflessly committed to service in the armed forces. Generation Z serves with distinction today, like their peers of any generation”.

No. They want a job and somewhere to live. It’s called failed public policy and a cost of living crisis. See first paragraph.

Writing in The Times, he drew parallels with the 1930s when the “woeful” state of the UK’s armed forces failed to deter Hitler. “There is a serious danger of history repeating itself,” he said.

Well, yes. This is what some people have been screaming about since Johnson and Trump opened the door to instability and far right agitators which the clown show of media and social media owners have encouraged. See paragraph one to three.

As the General is retiring and Sunak’s mob look like they’re being kicked out of power soon hopefully we’ll have some more sense at the top.

vas pup January 24, 2024 6:14 PM

What does the Doomsday Clock tell us about the future?
https://www.dw.com/en/what-does-the-doomsday-clock-tell-us-about-the-future/a-68062514

“The Bulletin of the Atomic Scientists describes the clock as a “metaphor for how close humanity is to self-annihilation.”

Albert Einstein, J. Robert Oppenheimer and other scientists who had worked on the Manhattan Project — a top-secret nuclear weapons program that resulted in the US dropping two atomic bombs on Japan — founded the Bulletin in 1945 in Chicago.

Two years later, they invented the Doomsday Clock. At that time, nuclear weapons were considered the greatest threat to humanity.

The Bulletin’s Science and Security Board uses data to form a perception of the
severity of current global threats, and then decides how close we are to midnight.

Originally set at seven minutes to midnight, the furthest the clock has been
from doom was at 17 minutes to midnight, following the end of the Cold War in 1991.

Although the clock originally focused specifically on the threat posed by
nuclear weapons, since the early 2000s it =>has also taken into account the risks that climate change and !!! disruptive technologies, such as artificial intelligence, pose to society.

The 17-member SASB says it calculates the time to midnight by tracking statistics, such as “the number and kinds of nuclear weapons in the world, the parts per million of carbon dioxide in the atmosphere, the degree of acidity in our oceans, and the rate of sea level rise.”

The board also takes into account the degree to which leaders, citizens and
institutions are working to counteract these threats.

The board encourages people to “get smart” about the “powerful technologies
that could destroy our way of life.”

They say people should share the knowledge they have about these technologies and threats with people in their direct environment. They encourage people to
write letters condemning the spending of public tax dollars on fossil fuel and
nuclear weapon technologies.”

lurker January 24, 2024 7:21 PM

@&ers

Another day, another bluetooth exploit. Yawn …

Today I acquired from the High St, a device not much bigger than a postage stamp; push the magic button until the power led flashes on; push it again until the blue led flashes fast; it is now attempting to pair with any Bluetooth speakers it can find; when paired the blue led will flash slowly. Push the magic button again until the red led flashes; It is now attempting to pair with any bluetooth audio source it can find. The only human action is the on switch.

Why would I allow such a dangerous device in my home? Because the younger generation don’t plug stuff in anymore, so it is difficult to find affordable, durable 3.5mm audio plugs and sockets anymore. Magic keyboard indeed …

Clive Robinson January 24, 2024 7:57 PM

@ &ers,

Sarah Meiklejohn, was not the first to realise that a public ledger by definition was neither anonymous or untracable if you correlate it to the meta-data of the transaction to the real world.

It’s little different to Traffic Analysis as I’ve mentioned befor and it’s something I’m researching with regards “Deniable Cryptography” and variations on MESH networks using a “Fleet Broadcast System”

Sarah however was the first “to put the work in” to take it from loose realisation to hard bitten proven fact that even ridged forehead guard labour types recognised as useful.

Speaking of de-anonymising, Sarah can probably de-anonymize me in Real Life as our paths have knowingly crossed in Gower St a couple of times.

If she remembers me or not I don’t know…

But back then looking like a cross between Karl Marx and an albino Klingon on a bad hair day, whilst being neigh on 2 meters high and 0.7 meters across the sholders, and as I’ve been told in the past not the usuall head in the clouds stuff but that I “fill a doorway” and “eclipse windows” and probably have my own “gravity well”. Especially with a party trick of being able to “high kick” the underside of the top of a door frame.

Thus you would think I’d be quite memorable… But apparently not though, as I’ve been frequently confused with other people by people who are more than acquaintances…

For instance my son’s maternal grandmother saw a friend of his mum and me a hundred miles or so up the country and thought the friend was me… I went abroad with another friend in a group to a country where the hotels take your passport. On our depature the hotel receptionist looked in our passports and at our faces before handing them back. Because the taxi to the airport had arrived we jumped in and traveled back to our respective homes. It was only the day after getting back and I was unpacking etc I found I had traveled all the way back on my friends passport and he had traveled on mine. Through quite a number of check points with people “inspecting papers” including “pasport control” officers. The reason I know it was “all the way” was because we traveled on different flights and from different dept lounges for “air mile reasons”.

But also being as physicall imposing as I am (“big as a brick 5h1t house” is what I was told over and over when wearing the green) I also annoyingly frequently “become invisable” or more correctly fade out of sight into the background… Great when you are being “sneaky beaky”, but I’ll be standing quite visibly at a bar or service point etc, and unless I take “active measures” I won’t get “seen or served”… However, apparently cocking a gun behind somebodies ear to say “Hi I’m behind you” is more frowned on as an attention getter when you are on guard duty than it is when on excercise “out in the ulu”, it’s why I discoverd just a quiet cough in the dark could cause bladder failure in people taking a crafty smoko where they shouldn’t).

That said, a very petite young lady I was going out with did point out that she recognised me by the scar on my chin… As I said to her the scar is not on the chin but under the chin and so I can not see it in the mirror… She then confessed she very nearly did not go out with me, because when she stood close when dancing or with my arm around her she could not look up lovingly into my face… As she explained unless I was leaning over to the point my chin was on my chest all she saw was my “double chin and nostril hair” which apparently are not my most attractive features…

The sad fact is many women of my generation and older can walk under my arm if I hold it out at shoulder hight, which makes putting my arm around them awkward and can very quickly give me backache. My solution, when I knew them well enough, was to sit and then sit them on my knee/lap and hug them with both arms, and they could comfortably put their arms on my forearms as you might do with a table top. The young lady who confessed about the nose hair, actually used to sit on my lap cross leged in the yoga lotus position and meditate whilst I’d read a newspaper over her shoulder, a quiet way to spend a sunday morning. Annoyingly though she could do The Times crossword in ten minuites or less whilst “getting comfortable”… apparently all without noticing me.

I’ve been tempted to get bright yellow T-shirts with “I’m T.I.M” on them in large black letters to see if it makes any difference.

echo January 24, 2024 8:39 PM

https://theconversation.com/new-fortnite-style-recruitment-video-shows-how-uk-armed-forces-are-getting-serious-about-prospects-of-nato-war-with-russia-221890

New Fortnite-style recruitment video shows how UK armed forces are getting serious about prospects of Nato war with Russia.

https://www.youtube.com/watch?v=unja96P135Q

Fortnite Army Recruitment Trailer

As the post WWII years demonstrated the British public were in no mood for having fought a war only for the toffs to carry on as if it was business as usual. This was the time when the post war settlement was created, the European Court of Human rights, the NHS and university education and better housing became a thing and other improvements flowed. Closer to the present day politics and demographics aside younger people and many older people are more clued up on the range of political issues today. Yes, people will fight when required but not as war of distraction so a sociopathic crook can dodge an election or ride back into power on a wave of national hysteria.

Mind you putting guns in the hands of an extra 100,000 young men and women whose siblings can’t get healthcare because of years long waiting lists, closed life opportunities because they’re not rich, grandparents dying of Covid, and crooks and chancers laughing at the law as they pass laws ripping the hope and life away from all their friends before returning back home with said guns?… That might work. It did last time!

It might not look like a career for the best and the brightest who might be more interested in becoming a social media influencer or the next Elon Musk.

Oh, do take a hike.

https://academic.oup.com/isagsq/article/3/4/ksad062/7473270

(Re)Designing Security and War? Reflections on Transgressive Creativity and International Relations

In this essay, I explore how the problem of this “transgressive creativity” is a concern shared by two groups working on the problems of security, war, technology, economy, and politics: critical designers and military designers (or the group that is becoming known as the Archipelago of Design). While the objectives of both communities are different, they both share a view that a sense of openness to collaboration is essential to go beyond traditional institutional approaches in order to make sense of complex and uncertain futures in a time of technological acceleration and geopolitical change.

This is a naive and skewed paper which misses the mark and isn’t worth the ink. Sure, there’s some interesting observations in there but the author doesn’t properly grasp them. They’re too trapped by their own material.

The process of collaboration on NSOP was exciting and stimulating, opening up new possibilities for research and thinking on security and global politics. But the concern with what would later by termed transgressive creativity—and the concern or anxiety that was later articulated clearly by Dunne and Raby—did shape the process, producing some limits and borders to the project. In many ways, bringing together critical designers and researchers in social sciences, in particular those working in critical security studies, was about two different worlds. But while there are many points of difference in terms of methods and intellectual histories, there were shared ethical and political concerns; the designers were just better dressed!

Better dressed? For sure. In fact I just bought a spiffy tailored jacket which will go well with a long flowing skirt. Maybe a touch over the top for dashing out for a jug of milk but standards must be maintained. But no. The differences are bigger than this and broader and more subtle than the problem domains he’s citing. His focus on military and militarised reasoning is a bit off too not to mention the dodgy feedback loops.

It remains to be seen how the visceral and brutal insights into the reality of war and violence will shape the views of the young people of liberal democracies considering a career in the military in a world that feels more dangerous than it ever has.

Oh I don’t know. Maybe you could try, like, asking them or maybe listen to what they’re already telling you??…

Jonathan Este
Associate Editor, International Affairs Editor

God help us…

The material was worth a skim and the headline points worth giving people a prod on who are new to these kinds of subject areas. That’s about as far as I will go though. It’s not just what was put in but some of the skews and what was left out. Almost all of the actual important stuff he left out. This is also reflected in the product he is attached to. While simulations have their place they have their limits both in terns of what the design intent expresses and what they can and can’t do. You’re just not going to get that with a simulator of the types proposed. In some respects they can make things worse as they’re answering some of the wrong questions or, at least, not answering some of the right questions because those questions are not asked. I’m not sure how much can be taught. It really has to be learned. That’s a different thing.

So, eh, nah… That paper was a waste of ink.

Clive Robinson January 24, 2024 8:40 PM

@ lurker,

“so it is difficult to find affordable, durable 3.5mm audio plugs and sockets anymore.”

Actually not if you know where to look…

The most prolific users of them are the “Ham Radio” community.

You can not by a hand held radio without it having a “Kenwood” connecter on the side for not just external microphones and speakers, but connecting up to a computer to program them with CHIRP etc.

Even though bluetooth is kind of moving into Ham Equipment it’s only in high end low power (QRP) systems as the bluetooth chips have lousy RF front ends both “wide open” and of “low dynamic range”[1]. So you key up with 100watts and a little “Common mode current” on the antenna cable and they go badly wrong…

I know you’ve said you live a ways from urban/city facilities, but it might be worth seeing if there is a local Ham club or similar. I can not count the number of times I’ve given and been given connectors, components and larger parts. Most Hams have “junk/bits boxes” and will let you rumage for a chin wag, or pint etc (their XYL’s will often look favourably on you for taking stuff away as like topsy’s cat junk boxes have a habit of growing… I’ve a garage and loft full of historical “junk” enough to set up a “mini Bletchley”).

[1] I was looking at using a blue tooth headset to get a much longer range out of a UHF hand held. Such headsets work three floors away with mobile phones. So using a J-Pole antenna directly connected to the handset antenna socket with a length of fishing line tied to the antenna top and a throw weight at the other end to hoist the handset up twenty feet or more into a tree or similar. So you could be down low out of wind/weather using the bluetooth head set… It failed as it suffered from dynamic range issues so whilst working fifty foot or more on receive, if you were more than about five feet away when you keyed up, it all went horribly wrong 🙁

echo January 24, 2024 9:37 PM

https://www.theguardian.com/world/2024/jan/23/disinformation-attacks-targeted-voters-media-and-lgbtq-groups-eu-report-finds

Disinformation attacks targeted voters, media and LGBTQ+ groups, EU report finds

Digital ‘warfare’ included manipulating voices and images of celebrities such as Margot Robbie and Nicolas Cage.

The Guardian just noticed while being one of the worst offenders with the fewest excuses.

Disinformation attacks in 2023 targeted European democracy but also media outlets and LGBTQ+ organisations, and involved the malicious manipulation of the images and voices of celebrities such as Margot Robbie and Nicolas Cage, an EU report has concluded.

The research, the EU’s second annual disinformation report, lifts the lid on digital weaponry deployed to undermine Ukraine, but also to spread fake news during elections in Poland and Spain.

It studied more than 750 disinformation attacks involving the strategic spread of false stories and harassment of legitimate sources to reduce trust in public institutions and sow hatred against nations and groups of people.

This new “warfare”, said the EU’s chief diplomat, Josep Borrell, “does not involve bombs that kill you” but words and ideas that “colonise you”.

Researchers found that Ukraine was the most frequently attacked but 149 entities including media organisations such as Euronews, Reuters, Deutsche Welle and the New York Times and LGBTQ+ organisations were also targeted.

The UK is horrendous for media disinformation. No specific mention here though likely because UK media is so bad off its own bat it’s not openly targeted by bad actors. The UK is also no longer in the EU which may be another reason why there’s no mention.

“Security is no longer a matter of weaponry, of army, it is a matter of information, how people get ideas and facts that will later determine how citizens will choose their governments,” said Borrell.

“Keep in mind that unchecked malicious content spreads like a cancer and puts the health of the democracy at risk, but we have the tools to fight against this.”

The current UK government and largely Tory supporting media and compromised BBC are appalling. Away from parliament and the media bubble people aren’t buying it which is notable. Institutional discrimination has increased and hate crime has soared which is a problem hut when the Tories are kicked out that should pull the rug from under most of this.

ResearcherZero January 25, 2024 12:35 AM

Exfiltration of SharePoint files in May 2023. December M$ 365 mailbox and email access still under investigation. HPE has not disclosed who informed them of the breach.

‘https://www.theregister.com/2024/01/25/hpe_russia_email_attack/

SVR begin to target email-based cloud computing resources in 2018 with password spraying.

SVR cyber operators have used open source or commercially available tools continuously…

‘https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-116a

‘https://www.cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av24-045

‘https://www.hpe.com/us/en/newsroom/press-release/2024/01/hpe-to-acquire-juniper-networks-to-accelerate-ai-driven-innovation.html

“HPE hopes to deliver WAN and cloud security controls directly to the application at the network edge, rather than routing data through a data center. In late February, it agreed to acquire private cellular technology provider Athonet to secure connectivity needs with SASE and private 5G solutions, and in January said it had acquired machine learning specialist Pachyderm to boost its AI services.”

https://www.csoonline.com/article/574677/hpe-to-acquire-axis-security-to-deliver-a-unified-sase-offering.html

‘https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-bWNzQcUm

echo January 25, 2024 12:41 AM

https://www.oecd-ilibrary.org/sites/bc4a57b3-en/1/3/3/index.html?itemId=/content/publication/bc4a57b3-en&_csp_=0aa641c3d4fda7ac26451f2c0133d8cf&itemIGO=oecd&itemContentType=book#

OECD Governance.

Public Communication Scan of the United Kingdom: Using Public Communication to Strengthen democracy and Public trust.

Building trust in public communication to succeed in a complex information ecosystem.

The review notes journalists “insufficient grasp of subject complexity and their focus on relaying political arguments over explanation of the underlying topics…”

https://pressgazette.co.uk/media-audience-and-business-data/trust-in-media-uk-edelman-barometer-2024/

Trust in media: UK drops to last place in Edelman survey of 28 nations

The annual survey asked how much people trust the media “to do what is right”.

Not a surprise…

https://www.youtube.com/watch?v=0arvnAlV_C4
Why YouTubers Hold Microphones Now

This is an interesting essay on new media and the relationship between quality, professionalism, and money and that things aren’t always what they appear to be. It’s notable that some of the more hip new media outlets are not just part of a larger network but also funded by slightly dodgy financiers. Exactly how that plays out time will tell. I note also that one of the mentioned Youtubers has had their format ripped off by a far right grifter.

It’s another topic but the far right discovered some time ago how to farm rage for clicks and make hate profitable. In some cases very profitable. This is bad enough but some legacy media and almost always right wing politicians leaning towards the far right are willing accomplices. It’s all part and parcel of the radicalisation and escalation pipeline with real world consequences.

https://www.youtube.com/watch?v=Cx9vcmh9a38
How Speedrunners Beat The Hitman Trilogy In Under 28 Minutes (Speedrun Explained)

Exploits…

lurker January 25, 2024 3:56 PM

@Clive Robinson

Thanks, I know some hams and they are gentlemen of our age, convinced that quarter inch (no 6.3mm for us!) is more robust. I can buy Neutrik, but the shell won’t fit the socket recess on some consumer eqpt. My point was that even the eqpt makers are believing that they cannot provide a reliable 3.5mm connection, so we now have phone handsets and portable speakers, boomboxes &c. that are BT only. For entertainment this may be acceptable, but I would not recommend a BT headset (earphones + mic) for professional applications, for the reasons demonstrated in the article linked by @&ers: the protocol is just too leaky.

Clive Robinson January 25, 2024 4:31 PM

@ lurker,

Re : Leaks with BT headsets.

“I would not recommend a BT headset (earphones + mic) for professional applications, for the reasons demonstrated in the article linked by @&ers: the protocol is just too leaky.”

My fear from experience is not a security leak but one of a different kind.

A friend had a HiFi headset that ran of WiFi not bluetooth, and he was listening to some quite clasical music with the volume turned up. When something caused it to go on the fritz and in his words “a chainsaw went off in his head”.

It nescesitated a visit to an audiologist to physically check his ears and a perforated ear drum was found. Apparently the audiologist thought the perf was probably down to physical illness but wryly noted that the headset behaving as described “would not have helped”…

Our ears like our eyes are rather more precious to us than we would care to realise. Having already got tinitus from to much time on the range when younger, the last thing I’d want is red stuff leaking out because bluetooth decided to run the equivalent of an audio drill press into my head…

echo January 25, 2024 5:04 PM

https://www.rga.org/republican-governors-ban-together-issue-joint-statement-supporting-texas-constitutional-right-self-defense/

Republican Governors Band Together, Issue Joint Statement Supporting Texas’ Constitutional Right to Self-Defense

And:

https://www.texastribune.org/2023/11/15/texas-secession-texit/

Texas secessionists feel more emboldened than ever

Clueless fragile masculinity in action. Speaker Johnson could allow voting which would solve the problem but much like Sunak in the UK with his “Stop the boats” rhetoric they don’t want to solve it because for them it’s an ego motivator to smash decent law and public policy and seize more power to sooth their egos.

https://www.advocate.com/politics/gen-z-lgbtq-republican-report

Less GOP and more LGBT — Gen Z is more likely to be queer than Republican, survey reveals.

And:

https://www.thepinknews.com/2024/01/24/more-gen-z-americans-identify-as-lgbtq-than-as-republican/

More Gen Z Americans identify as LGBTQ than as Republican.

And there you have it. A political party stuffed with people with regressive philosophies who are only in power because of gerrymandering and captured states and institutions. Demographics is putting conservative mindsets out of business and they’re running scared.

https://diva-magazine.com/2024/01/24/are-lesbians-really-disappearing/

Are lesbians really disappearing?

The demographics shows there are more lesbians than ever before especially as you go down the age range. The statistics loosely tally with political conservatism versus gender differences in sexual identity fluidity. This is also loosely replicated in terms of gender differences in social isolation as people grow older. There’s neuro-bio-social reasons for these tilts. There’s nothing difficult about the subject but the current generation of political leaders find it hard to grasp so they get entrenched and polarised but, again, demographics isn’t on their side. The window will shift within 10-20 years which is why conservatives are kicking up such a stink at the moment. It’s their last chance. Sadly for them the genie is out of the bottle. Once people sniff freedom they don’t want to go back.

ResearcherZero January 25, 2024 7:10 PM

@Glenn Hyatt

RE: complaint the SEC filed against SolarWinds

Defeats the purpose of network and resource monitoring if the product’s software development environment is less secure than the environment that is supposedly monitoring.

“In March 2020, SolarWinds learned that a threat actor had attacked SolarWinds’ MSPs using a list of 19,000 single sign-on customers, meaning that the threat actors had information to distinguish between customers who had enabled more secure multi-factor authentication and customers who did not have it enabled.”

It reads like a list of things not to do:

“shared SQL legacy account login credentials”

login credentials that were “stored in plain text in configuration files”

passwords that were “stored in plain text on the public web server in the web configuration file and in the system registry of the machine”

unnecessary “admin” rights, giving “[u]se of shared accounts throughout internal and external applications.”

“Access not audited nor monitored”

“As anticipated in Network Engineer D’s August 2018 presentation, once the threat actors accessed the system through a VPN connection on an unmanaged device, they were able to access SolarWinds’ entire network, moving laterally between its corporate and software development zones.”

“The case may determine the agency’s tolerance for a company’s ambiguity over its cyber hygiene.”

https://news.bloomberglaw.com/privacy-and-data-security/solarwinds-begins-defense-against-sec-claims-over-security-lies

“I assume every email is going to be read either by your mother or in a deposition, or… in an SEC complaint,”

‘https://techcrunch.com/2024/01/17/security-leadership-ciso-heat-risk/

ResearcherZero January 25, 2024 9:12 PM

“History could well identify this as the starting point of the next major arms race, one that has the potential to be humanity’s final one.”

‘https://theconversation.com/un-fails-to-agree-on-killer-robot-ban-as-nations-pour-billions-into-autonomous-weapons-research-173616

“you can’t program a machine to deal with an infinite number of situations”

Delegating life-and-death decisions to machines crosses a red line for many people. It would dehumanize violence and boil down humans to numerical values.

“We’re very concerned about the use of autonomous weapons systems falling in an accountability gap because, obviously, you can’t hold the weapon system itself accountable.”

“We also believe that the use of these weapons systems would undermine existing international criminal law by creating a gap in the framework; it would create something that’s not covered by existing criminal law.”

https://news.harvard.edu/gazette/story/2024/01/killer-robots-are-coming-and-u-n-is-worried/

On December 22, 2023, 152 countries voted in favor of the General Assembly resolution on the dangers of lethal autonomous weapons systems, while four voted no, and 11 abstained. General Assembly Resolution 78/241 acknowledges the “serious challenges and concerns” raised by “new technological applications in the military domain, including those related to artificial intelligence and autonomy in weapons systems.”

‘https://www.hrw.org/news/2024/01/03/killer-robots-un-vote-should-spur-action-treaty

On 1 November 2023, the First Committee of the UN General Assembly adopted the first ever resolution on autonomous weapons, stressing the “urgent need for the international community to address the challenges and concerns raised by autonomous weapons systems”.

https://www.stopkillerrobots.org/news/164-states-vote-against-the-machine/

ResearcherZero January 25, 2024 9:41 PM

APT10: Insights from LODEINFO v0.6.6 – v0.7.3 Analysis

‘https://blog-en.itochuci.co.jp/entry/2024/01/24/134100

Machines are compromised when legitimate software attempts to download updates from legitimate servers using the HTTP protocol.

“To download the backdoor, the orchestrator performs an HTTP request to the Baidu’s website – a legitimate Chinese search engine and software provider – with a peculiar User-Agent masquerading as Internet Explorer on Windows 98. The response from the server is saved to a file from which the backdoor component is extracted and loaded into memory.”

‘https://www.welivesecurity.com/en/eset-research/nspx30-sophisticated-aitm-enabled-implant-evolving-since-2005/

echo January 25, 2024 10:00 PM

https://www.mirror.co.uk/news/politics/rishi-sunaks-dangerous-war-talk-31969979

Rishi Sunak’s dangerous war talk bluster could spark off genuine conflict.

This is a worry. The story also seemed to emerge from too many media sources all at the same time which whiffs a bit and in a pre-election period too.

I think most British people are reasonably sound about maintaining a credible defence posture. Not so keen on toffs indulging their vanity or sabre rattling, or playing the cosplay hero firmly behind the lines just to sound good on television or as a feeble attempt to swing an election.

lurker January 25, 2024 11:10 PM

@ResearcherZero

76 years ago, 10 November 1947 the UN General Assembly adopted a resolution on a two state solution to Palestine Mandated Territories. Do you think a UNGA resolution gives us a better chance against autonomous weapons than the Palestinians have had against Hebrew terrorists, as they were called back then.

Winter January 26, 2024 2:28 AM

Read and Shudder:

Europe’s hidden security crisis
How data about European defence personnel and political leaders flows to foreign states and non-state actors
‘https://www.iccl.ie/wp-content/uploads/2023/11/Europes-hidden-security-crisis.pdf

Real-Time Bidding (RTB) allows foreign states and non-state actors to obtain compromising sensitive personal data about key European personnel and leaders.
Key insights:

  • Our investigation highlights a widespread trade in data about sensitive European
    personnel and leaders that exposes them to blackmail, hacking and compromise, and undermines the security of their organisations and institutions.
  • These data flow from Real-Time Bidding (RTB), an advertising technology that is active on almost all websites and apps. RTB involves the broadcasting of sensitive data about people using those websites and apps to large numbers of other entities, without security measures to protect the data. This occurs billions of times a day.
  • Our examination of tens of thousands of pages of RTB data† reveals that EU military personnel and political decision makers are targeted using RTB (page 11).
  • This report also reveals that Google and other RTB firms send RTB data about people in the U.S. to Russia and China, where national laws enable security agencies to access the data. RTB data are also broadcast widely within the EU in a free-for- all, which means that foreign and non-state actors can indirectly obtain them, too.
  • RTB data often include location data or time-stamps or other identifiers that make it relatively easy for bad actors to link them to specific individuals. Foreign states and non-state actors can use RTB to spy on target individuals’ financial problems, mental state, and compromising intimate secrets. Even if target individuals use secure devices, data about them will still flow via RTB from personal devices, their friends, family, and compromising personal contacts.
  • In addition, private surveillance companies in foreign countries deploy RTB data for surreptitious surveillance. We reveal “Patternz”, a previously unreported surveillance tool that uses RTB to profile 5 billion people, including the children of their targets.
  • Our examination of RTB data reveals Cambridge Analytica style psychological profiling of target individuals’ movements, financial problems, mental health problems and vulnerabilities, including if they are likely survivors of sexual abuse.

ResearcherZero January 26, 2024 3:17 AM

@lurker

Considering people are assassinated around the world with nay a flippance given on a regular basis, probably not. Can barely investigate an incident from 40 years ago, let alone one that happened yesterday. No one likes being shot at apparently.

Palestinians would likely like their own state, akin to Jews wanting a state of their own once. That didn’t happen too long ago but the Israeli government seems to have forgotten.

I seem to remember them taking a lot more care to whack former SS murders. Made sure they got the right person, used eye witnesses and victims to identify them, and were very careful not to harm innocent civilians. “Never Again.”

Some of those old SS officers did kill themselves first though once discovered. They still had their collection of mementos on display in their homes from their killing time.

Last time there was all this foolish nationalism it started the fascist movement and two world wars. And then everyone promised they wouldn’t do it again.

Politicians don’t actually bother to read the intelligence they are provided with, and many rarely listen to the advice they are given, so anything is possible. Like Oct 7th.

Iran did say it would settle the score.

Fingerprinting via push notifications.

‘https://www.youtube.com/watch?v=4ZPTjGG9t7s

“For example, the tests showed that when you interact with a notification from Facebook, the app collects IP addresses, the number of milliseconds since your phone was restarted, the amount of free memory space on your phone, and a host of other details. Combining data like these is enough to identify a person with a high level of accuracy. The other apps in the test collected similar information.”

If a company like TikTok or X/Twitter wanted a quick update on the IP addresses of 100,000 people who have their apps closed, one quick notification is all it would take.

‘https://gizmodo.com/iphone-apps-can-harvest-data-from-notifications-1851194537

“NSA does buy and use commercially available netflow data related to wholly domestic internet communications and internet communications where one side of the communication is a U.S. Internet Protocol address and the other is located abroad.”

“…Enhanced safeguards include stringent, prophylactic privacy protections that, as the term suggests, exceed the baseline handling requirements in DoD Manual 5240.01.”

‘https://www.nytimes.com/2024/01/25/us/politics/nsa-internet-privacy-warrant.html

A little video of how it works:

‘https://www.youtube.com/watch?v=LVT-sKAULmg

(prophylactics are not constitutional rights in themselves, but are instead merely preventative measures taken by the Court to ensure a constitutional right will not be violated)

‘https://berthub.eu/articles/posts/resignation-as-intelligence-regulator/

ResearcherZero January 26, 2024 4:27 AM

This recent spate of politicians pretending to be “tough guys,” just like the “tough-on-crime” nonsense (coming from both major parties), is all a load of rubbish.

This link is broken

Just like many leaders’ promises to fix a corrupt system.
https://www.transparency.org/en/cpi/2023

The police and their unions have very large media units. It’s all about politics.

‘https://time.com/6227704/politicians-crime-messaging-mass-incarceration/

“It’s very important for powerful people, especially in moments of uprising and moments of social unrest, to attempt to create a moral panic around crime,” says Karakatsanis.

People were 80% less likely to be a victim of violent crime in 2021 compared to 1993

“We know from the actual evidence the things that determine the level of crime or violence or harm in a society are bigger structural factors.” He lists off some examples — poverty and inequality, early childhood education, and access to mental health care.

“There’s absolutely no systemic or scientifically informed way of thinking about crime trends.”

…our understanding of crime is constructed by choices – choices to not include white collar crime, choices to target poor people of color – made by those in power.

https://www.npr.org/2022/11/08/1134550280/stories-about-crime-are-rife-with-misinformation-and-racism-critics-say

Overzealous policing, racism, police and prosecutorial misconduct, the use of lies and deception in the interrogations of minors, false confessions, all play a part.

“those who turned 20 in 1990 and got locked up would be 50 today — and likely still in prison. Whereas those who turned 20 in 2020 had less than half the rate of incarceration as their previous generation.”

Even though the national crime rate has dropped to the lowest levels last seen since the 1960s, the experts said the incarceration rate for the U.S. still remained about four times the level of that in the 1960s.

https://www.prisonlegalnews.org/news/2020/oct/1/new-study-shows-tough-crime-generation-spent-more-time-prison-despite-falling-crime-rate/

Nationalism is all cowardice and fear. It’s the same kind of rubbish. Hence:

“History could well identify this as the starting point of the next major arms race, one that has the potential to be humanity’s final one.”

https://www.transparency.org/en/cpi/2022

lurker January 26, 2024 2:45 PM

A study shows decline in student test scores following the introduction of 3G and internet on handheld devices.

We study the impact of global expansions in mobile internet access between 2000 and 2018
on student outcomes. We link geospatial data on the rollout of 3G mobile technology with over
2 million student test scores from 82 countries. Our findings indicate that the introduction of
3G coverage leads to substantial increases in smartphone ownership and internet usage among
adolescents. Moreover, changes in 3G coverage are associated with significant declines in test
scores across all subjects, with magnitudes roughly equivalent to the loss of one-quarter of a
year of learning. We find suggestive evidence that a reduction in feelings of belonging, ease of
making friends, and self-efficacy may explain these impacts.

‘https://www.auckland.ac.nz/en/news/2024/01/26/study-reveals-impact-of-internet-use-on-student-test-scores.html

echo January 27, 2024 1:12 PM

The comments about “tough on crime” BS and problems with smartphones are pretty spot on. The thing about authoritarian-theocratic-nationationalistic nonsense is spot on too.

In the UK and US at least a major reason is right wing parties not being able to keep a lid on themselves and entryism which has kept the brand name but turned them into monsters. The US looks tough and go at the moment. In the UK there’s a potential for the Tories to experience a Canada moment. Projections based on some polls leave them with only 12 seats after the next general election. FPTP voting systems produce wild results so that might not happen but it could.

Leave a comment

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.