Rocketlabs: Neuseeländische Rakete erreicht den Weltraum

Der erste Testflug der neuen Electron-Rakete war noch kein voller Erfolg. Aber die neue Technologie funktioniert und ist wegweisend. Von Frank Wunderlich-Pfeiffer (Raumfahrt, Internet)

Der erste Testflug der neuen Electron-Rakete war noch kein voller Erfolg. Aber die neue Technologie funktioniert und ist wegweisend. Von Frank Wunderlich-Pfeiffer (Raumfahrt, Internet)

Prozessor: Intel wird Thunderbolt 3 in CPUs integrieren

Kein zusätzlicher Controller mehr nötig: Intel hat angekündigt, Thunderbolt 3 künftig direkt in den Prozessor zu integrieren. Obendrein sollen die Protokollspezifikationen kostenlos verfügbar werden. Thunderbolt 3 unterstützt USB 3.1 Gen2, das Laden von Notebooks, externe Displays und Grafikboxen. (Thunderbolt, Prozessor)

Kein zusätzlicher Controller mehr nötig: Intel hat angekündigt, Thunderbolt 3 künftig direkt in den Prozessor zu integrieren. Obendrein sollen die Protokollspezifikationen kostenlos verfügbar werden. Thunderbolt 3 unterstützt USB 3.1 Gen2, das Laden von Notebooks, externe Displays und Grafikboxen. (Thunderbolt, Prozessor)

Copyright Troll Piracy ‘Witness’ Went Back to the Future – and Lost

A witness for the world’s most notorious copyright trolls appears to have time-traveling abilities. Guardaley’s “expert” sent a declaration to the court claiming to have witnessed BitTorrent infringement more than a week before the offenses allegedly took place. Marty McFly’s colleagues subsequently dropped the case.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Since the early 2000s, copyright trolls have been attempting to squeeze cash from pirating Internet users and fifteen years later the practice is still going strong.

While there’s little doubt that trolls catch some genuine infringers in their nets, the claim that actions are all about protecting copyrights is a shallow one. The aim is to turn piracy into profit and history has shown us that the bigger the operation, the more likely it is they’ll cut corners to cut costs.

The notorious Guardaley trolling operation is a prime example. After snaring the IP addresses of hundreds of thousands of Internet users, the company extracts cash settlements in the United States, Europe and beyond. It’s a project of industrial scale based on intimidation of alleged infringers. But, when those people fight back, the scary trolls suddenly become less so.

The latest case of Guardaley running for the hills comes courtesy of SJD from troll-watching site FightCopyrightTrolls, who reports on an attempt by Guardaley partner Criminal Productions to extract settlement from Zach Bethke, an alleged downloader of the Ryan Reynolds movie, Criminal.

On May 12, Bethke’s lawyer, J. Christopher Lynch, informed Criminal Productions’ lawyer David A. Lowe that Bethke is entirely innocent.

“Neither Mr. Bethke nor his girlfriend copied your client’s movie and they do not know who, if anyone, may have done so,” Lynch wrote.

“Mr. Bethke does not use BitTorrent. Prior to this lawsuit, Mr. Bethke had never heard of your client’s movie and he has no interest in it. If he did have any interest in it, he could have rented it for no marginal cost using his Netflix or Amazon Prime accounts.”

Lynch went on to request that Criminal Productions drop the case. Failing that, he said, things would probably get more complicated. As reported last year, Lynch and Lowe have been regularly locking horns over these cases, with Lynch largely coming out on top.

Part of Lynch’s strategy has been to shine light on Guardaley’s often shadowy operations. He previously noted that its investigators were not properly licensed to operate in the U.S. and the company had been found to put forward a fictitious witness, among other things.

In the past, these efforts to bring Guardaley out into the open have resulted in its clients’, which include several film companies, dropping cases. Lynch, it appears, wants that to happen again in Bethke’s case, noting in his letter that it’s “long past due for a judge to question the qualifications” of the company’s so-called technical experts.

In doing so he calls Guardaley’s evidence into account once more, noting inconsistencies in the way alleged infringements were supposedly “observed” by “foreign investigator[s], with a direct financial interest in the matter.”

One of Lynch’s findings is that the “observations” of two piracy investigators overlap each others’ monitoring periods in separate cases, while reportedly monitoring the same torrent hash.

“Both declarations cover the same ‘hash number’ of the movie, i.e. the same soak. This overlap seems impossible if we stick with the fictions of the Complaint and Motion for Expedited Discovery that the declarant ‘observed’ the defendant ‘infringing’,” Lynch notes.

While these are interesting points, the quality of evidence presented by Guardaley and Criminal Productions is really called into question following another revelation. Daniel Macek, an ‘observing’ investigator used in numerous Guardaley cases, apparently has a unique talent.

As seen from the image below, the alleged infringements relating to Mr. Bethke’s case were carried out between June 25 and 28, 2016.

However, the declaration (pdf) filed with the Court on witness Macek’s behalf was signed and dated either June 14 or 16, more than a week before the infringements allegedly took place.

Time-traveler? Lynch thinks not.

“How can a witness sign a declaration that he observed something BEFORE it happened?” he writes.

“Criminal Productions submitted four such Declarations of Mr. Macek that were executed BEFORE the dates of the accompanying typed up list of observations that Mr. Macek swore that he made.

“Unless Daniel Macek is also Marty McFly, it is impossible to execute a declaration claiming to observe something that has yet to happen.”

So what could explain this strange phenomenon? Lynch believes he’s got to the bottom of that one too.

After comparing all four Macek declarations, he found that aside from the case numbers, the dates and signatures were identical. Instead of taking the issue of presenting evidence before the Court seriously, he believes Criminal Productions and partner Guardaley have been taking short cuts.

“From our review, it appears these metaphysical Macek declarations are not just temporally improper, they are also photocopies, including the signatures not separately executed,” he notes.

“We are astonished by your client’s foreign representatives’ apparent lack of respect for our federal judicial system. Use of duplicate signatures from a witness testifying to events that have yet to happen is on the same level of horror as the use of a fictitious witness and ‘his’ initials as a convenience to obtain subpoenas.”

Not entirely unexpectedly, five days later the case against Bethke and other defendants was voluntarily dismissed (pdf), indicating once again that like vampires, trolls do not like the light. Other lawyers defending similar cases globally should take note.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Debatte nach Wanna Cry: Sicherheitslücken veröffentlichen oder zurückhacken?

Wie nach einem schwerwiegenden IT-Sicherheitsvorfall üblich sollen die Probleme rund um Wanna Cry politisch bekämpft werden. In den USA soll dafür der Umgang der Geheimdienste mit Sicherheitslücken neu geregelt werden, andere Politiker fodern: Lasst Unternehmen hacken! Von Hauke Gierow (Security, Malware)

Wie nach einem schwerwiegenden IT-Sicherheitsvorfall üblich sollen die Probleme rund um Wanna Cry politisch bekämpft werden. In den USA soll dafür der Umgang der Geheimdienste mit Sicherheitslücken neu geregelt werden, andere Politiker fodern: Lasst Unternehmen hacken! Von Hauke Gierow (Security, Malware)

Drohne: DJI Spark ist ein winziger Spaßcopter mit Gestensteuerung

DJI hat mit Spark seinen bisher kleinsten Quadcopter vorgestellt, der kleiner als die DJI Mavic Pro ist. Die Drohne kann ohne Fernsteuerung allein mit Handbewegungen gelenkt werden. Wer will, kann auch das Smartphone oder einen Controller einsetzen. (D…

DJI hat mit Spark seinen bisher kleinsten Quadcopter vorgestellt, der kleiner als die DJI Mavic Pro ist. Die Drohne kann ohne Fernsteuerung allein mit Handbewegungen gelenkt werden. Wer will, kann auch das Smartphone oder einen Controller einsetzen. (DJI, Technologie)

Virb 360: Garmins erste 360-Grad-Kamera nimmt 5,7K-Videos auf

Garmin, Hersteller von GPS-Systemen und Sportuhren, hat auch Actionkameras im Sortiment. Die neue 360-Grad-Kamera Virb 360 nimmt sphärische Videos mit einer Auflösung von 5,7K auf. (Garmin, Digitalkamera)

Garmin, Hersteller von GPS-Systemen und Sportuhren, hat auch Actionkameras im Sortiment. Die neue 360-Grad-Kamera Virb 360 nimmt sphärische Videos mit einer Auflösung von 5,7K auf. (Garmin, Digitalkamera)

Digitalkamera: Ricoh WG-50 soll Fotos bei extremen Bedingungen ermöglichen

Mit der WG-50 stellt Ricoh eine neue Kompaktkamera mit 5fach-Zoom vor, die gegen Stürze, Wasser, Staub und Kälte geschützt ist. Sie übersteht beispielsweise einen Tauchgang bis 14 Meter Tiefe. (Digitalkamera, H.264)

Mit der WG-50 stellt Ricoh eine neue Kompaktkamera mit 5fach-Zoom vor, die gegen Stürze, Wasser, Staub und Kälte geschützt ist. Sie übersteht beispielsweise einen Tauchgang bis 14 Meter Tiefe. (Digitalkamera, H.264)

E-mails phished from Russian critic were “tainted” before being leaked

Campaign targeting more than 200 people also spread disinformation, report says.

Enlarge / This fraudulent e-mail was sent in a successful attempt to phish the Gmail password for reporter David Satter. (credit: Citizen Lab)

E-mails stolen in a phishing attack on a prominent critic of Russian President Vladimir Putin were manipulated before being published on the Internet. That's according to a report published Thursday, which also asserts that the e-mails were manipulated in order to discredit a steady stream of unfavorable articles.

The phishing attack on journalist David Satter's Gmail account was strikingly similar to the one that hit Hillary Clinton presidential campaign chairman John Podesta last year. The attack on Satter looked almost identical to the security warnings Google sends when attackers obtain a subscriber's password. Code embedded inside led Satter to a credential-harvesting site that was disguised to look like Google's password-reset page. With that, the site automatically downloaded all of Satter's private correspondence.

Thursday's report from the University of Toronto's Citizen Lab stopped short of saying Russia's government was behind the phishing attack and subsequent manipulation of Satter's e-mail. US intelligence officials, however, have determined that Russia was behind the attacks on Podesta and other Democratic officials. Thursday's report also said the same attack on Satter targeted 218 other individuals, including a former Russian Prime Minister, members of cabinets from Europe and Eurasia, ambassadors, high-ranking military officers, and CEOs of energy companies.

Read 4 remaining paragraphs | Comments

Florida GOP consultant admits he worked with Guccifer 2.0, analyzing hacked data

Voting models, other data were “worth millions,” consultant told Guccifer 2.0.

(credit: DonkeyHotey)

A Florida GOP campaign consultant who runs a blog under a pseudonym directly contacted the hackers behind the breach of the Democratic National Committee and the Democratic Congressional Campaign Committee, and he solicited material from them. The Wall Street Journal reports that Aaron Nevins set up a Dropbox account specifically for “Guccifer 2.0” to drop files into, and he received 2.5 GB of data from the Democratic Party breaches—including the “get out the vote” strategy for congressional candidates in Florida.

Nevins analyzed the data and posted his analysis on his blog, HelloFLA.com. Guccifer 2.0 sent a link to the blog to Trump backer Roger Stone, who was also in communication with the hackers, according to Stone. Nevins told the Journal that the hackers didn't understand what they had until he explained its value.

Some of the most valuable data, Nevins said, was the Democratic Party's voter turnout models. “Basically, if this was a war, this is the map to where all the troops are deployed,” Nevins told the person or persons behind the Guccifer 2.0 account. He also told them, “This is probably worth millions of dollars."

Read 2 remaining paragraphs | Comments

In a throwback to the ’90s, NTFS bug lets anyone hang or crash Windows 7, 8.1

It’s like the c:\con\con bug all over again.

Enlarge (credit: Robert)

Those of you with long memories might remember one of the more amusing (or perhaps annoying) bugs of the Windows 95 and 98 era. Certain specially crafted filenames could make the operating system crash. Malicious users could use this to attack other people's machines by using one of the special filenames as an image source; the browser would try to access the bad file, and Windows would promptly fall over.

It turns out that Windows 7 and 8.1 (and Windows Vista, but that's out of support anyway) have a similar kind of bug. They can be taken advantage of in the same kind of way: certain bad filenames make the system lock up or occasionally crash with a blue screen of death, and malicious webpages can embed those filenames by using them as image sources. If you visit such a page (in any browser), your PC will hang shortly after and possibly crash outright.

The Windows 9x-era bug was due to an error in the way that operating systems handled special filenames. Windows has a number of filenames that are "special" because they don't correspond to any actual file; instead, they represent hardware devices. These special filenames can be accessed from any location in the file system, even though they don't exist on-disk.

Read 5 remaining paragraphs | Comments