Berlin: Verkehrsbetriebe wollen Elektrobusse während der Fahrt laden

Oberleitungsbusse gibt es nur noch in wenigen Städten, doch die Technik könnte im Zeitalter der Elektromobilität zurückkommen. In Berlin ist ein Streckennetz geplant worden, das auf Busse setzt, die teilweise mit Oberleitung, aber auch batterieelektris…

Oberleitungsbusse gibt es nur noch in wenigen Städten, doch die Technik könnte im Zeitalter der Elektromobilität zurückkommen. In Berlin ist ein Streckennetz geplant worden, das auf Busse setzt, die teilweise mit Oberleitung, aber auch batterieelektrisch fahren können. (BVG, Technologie)

Nope, this isn’t the HTTPS-validated Stripe website you think it is

How extended validation certificates can be used to scam, not help, end users.

Enlarge (credit: Ian Carroll)

For a decade, some security professionals have held out extended validation certificates as an innovation in website authentication because they require the person applying for the credential to undergo legal vetting. That's a step up from less stringent domain validation that requires applicants to merely demonstrate control over the site's Internet name. Now, a researcher has shown how EV certificates can be used to trick people into trusting scam sites, particularly when targets are using Apple's Safari browser.

Researcher Ian Carroll filed the necessary paperwork to incorporate a business called Stripe Inc. He then used the legal entity to apply for an EV certificate to authenticate the Web page https://stripe.ian.sh/. When viewed in the address bar, the page looks eerily similar to https://stripe.com/, the online payments service that also authenticates itself using an EV certificate issued to Stripe Inc.

The demonstration is concerning because many security professionals counsel end users to look for EV certificates when trying to tell if a site such as https://www.paypal.com is an authentic Web property rather than a fly-by-night look-alike page that's out to steal passwords. But as Carroll's page shows, EV certs can also be used to trick end users into thinking a page has connections to a trusted service or business when in fact no such connection exists. The false impression can be especially convincing when end users use Apple's Safari browser because it often strips out the domain name in the address bar, leaving only the name of the legal entity that obtained the EV certificate.

Read 4 remaining paragraphs | Comments

Google’s “AR Stickers” app launches, puts Star Wars characters in your camera

Google’s first ARCore app launches, but you’ll need a Pixel phone and Android 8.1.

Google's push to bring Augmented Reality to the masses hit a big milestone today with the launch of the "AR Stickers" app. Google has been doing Augmented Reality for some time now with the hardware-packed Project Tango devices, but AR Stickers is the first app in Google's new AR strategy, which revolves around ARCore. ARCore is a reworked augmented reality framework that can do many of the Tango AR tricks but without all the extra hardware.

AR Stickers is out now in the Play Store for the Pixel 1 and Pixel 2. The app is a new mode in the Google Camera that allows you to drop various 3D characters into the camera feed. ARCore will map out the nearest horizontal plane, like a floor or table, and ground the characters in real life. You can move the camera around, take pictures, and record video.

Read 5 remaining paragraphs | Comments

Treasure Trove of AACS 2.0 UHD Blu-Ray Keys Leak Online

A massive list of 72 AACS 2.0 keys is circulating on the Internet, allowing people to rip previously well-protected UHD Blu-ray discs. The leak is a massive setback for Hollywood and the licensing company AACS LA, who have done everything in their power to keep UHD discs secure.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

Nowadays, movie buffs and videophiles find it hard to imagine a good viewing experience without UHD content, but disc rippers and pirates have remained on the sidelines for a long time.

Protected with strong AACS 2.0 encryption, UHD Blu-ray discs have long been one of the last bastions movie pirates had yet to breach.

This year there have been some major developments on this front, as full copies of UHD discs started to leak online. While it remained unclear how these were ripped, it was a definite milestone.

Just a few months ago another breakthrough came when a Russian company released a Windows tool called DeUHD that could rip UHD Blu-ray discs. Again, the method for obtaining the keys was not revealed.

Now there’s another setback for AACS LA, the licensing outfit founded by Warner Bros, Disney, Microsoft, Intel, and others. On various platforms around the Internet, copies of 72 AACS 2.0 keys are being shared.

The first mention we can find was posted a few days ago in a ten-year-old forum thread in the Doom9 forums. Since then it has been replicated a few times, without much fanfare.

The keys

The keys in question are confirmed to work and allow people to rip UHD Blu-ray discs of movies with freely available software such as MakeMKV. They are also different from the DeUHD list, so there are more people who know how to get them.

The full list of leaked keys includes movies such as Deadpool, Hancock, Passengers, Star Trek: Into Darkness, and The Martian. Some movies have multiple keys, likely as a result of different disc releases.

The leaked keys are also relevant for another reason. Ten years ago, a hacker leaked the AACS cryptographic key “09 F9” online which prompted the MPAA and AACS LA to issue DMCA takedown requests to sites where it surfaced.

This escalated into a censorship debate when Digg started removing articles that referenced the leak, triggering a massive backlash.

Thus fas the response to the AACS 2.0 leaks has been pretty tame, but it’s still early days. A user who posted the leaked keys on MyCe has already removed them due to possible copyright problems, so it’s definitely still a touchy subject.

The question that remains now is how the hacker managed to secure the keys, and if AACS 2.0 has been permanently breached.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

Voluntary net neutrality will protect consumers after repeal, FCC claims

Net neutrality will depend almost entirely on ISPs’ promises.

Enlarge / Federal Communications Commission Chairman Ajit Pai arrives for his confirmation hearing with the Senate Commerce Committee on July 19, 2017 in Washington, DC. (credit: Getty Images | Chip Somodevilla )

The Federal Communications Commission is still on track to eliminate net neutrality rules this Thursday, but said today that it has a new plan to protect consumers after the repeal.

The FCC and Federal Trade Commission released a draft memorandum of understanding (MOU) describing how the agencies will work together to make sure ISPs keep their net neutrality promises.

After the repeal, there won't be any rules preventing ISPs from blocking or throttling Internet traffic. ISPs will also be allowed to charge websites and online services for faster and more reliable network access.

Read 17 remaining paragraphs | Comments

President Trump says we’re going back to the Moon

“This is a giant step,” the president said during a ceremony.

Enlarge / President Trump making remarks Monday during a ceremony for signing Space Policy Directive-1. (credit: NASA TV)

NASA has had a big problem since the agency triumphantly landed humans on the Moon nearly half a century ago. Namely, after the Apollo landings delivered a solid US victory in the Cold War, human exploration has no longer aligned with the strategic national interest. In other words, sending humans into space has represented a nice projection of soft power, but it has not been essential to America's domestic and foreign policy aims.

As a result, NASA's share of the federal budget has declined from just shy of five percent at the height of the Apollo program to less than 0.5 percent today. At the same time, NASA's mandate has grown to encompass a broad array of Earth science, planetary science, and other missions that consume more than half of the agency's budget.

With less buying power for human exploration, NASA has had to scale back its ambitions; and as a result, astronauts have not ventured more than a few hundred miles from Earth since 1972. Twice before, presidents have attempted to break free of low-Earth orbit by proposing a human return to the Moon, with eventual missions to Mars. President George H.W. Bush did so with the Space Exploration Initiative in 1989, on the 20th anniversary of the Apollo 11 Moon landing. And George W. Bush did so in 2004, with the Vision for Space Exploration. Neither of these were bad concepts—indeed, both offered bold, ambitious goals for the space agency—but they died due to a lack of commitment and funding.

Read 9 remaining paragraphs | Comments

Hackers hit key ATM network in crime spree that clears $10 million

Previously undetected MoneyTaker gang is likely to strike again.

Enlarge / A timeline of MoneyTaker hacking group. (credit: Group-IB)

A previously undetected hacker group has netted around $10 million in heists on at least 20 companies, in some cases by targeting the transfer networks banks use to transfer money, a Moscow-based security firm said Monday.

Members of the MoneyTaker group, named after a piece of custom malware it uses, started its heist spree no later than May 2016. That's when it penetrated an unnamed US bank, according to researchers with Group-IB in a report titled MoneyTaker: 1.5 Years of Silent Operations. The hackers then used their unauthorized access to control a workstation the bank used to connect to the First Data STAR Network, which more than 5,000 banks use to transact payments involving debit cards.

MoneyTaker members also targeted an interbank network known as AWS CBR which interfaces with Russia's central bank. The hackers also stole internal documents related to the SWIFT banking system, although there's no evidence they have successfully carried out attacks over it.

Read 4 remaining paragraphs | Comments

Next-gen AMD Ryzen desktop chips coming in early 2018

2017 is the year AMD chips became viable alternatives to their Intel counterparts again, and not just cheaper options. The company’s new Ryzen chips based on Zen architecture offer huge performance gains over previous-generation AMD chips as well…

2017 is the year AMD chips became viable alternatives to their Intel counterparts again, and not just cheaper options. The company’s new Ryzen chips based on Zen architecture offer huge performance gains over previous-generation AMD chips as well as improved efficiency. So while Ryzen desktop and mobile chips aren’t always quite as fast as comparable […]

Next-gen AMD Ryzen desktop chips coming in early 2018 is a post from: Liliputing

Microsoft’s Q# quantum programming language out now in preview

It’s pronounced “Q sharp.”

Enlarge (credit: Microsoft)

Microsoft today launched a preview version of a new programming language for quantum computing called Q#. The industry giant also launched a quantum simulator that developers can use to test and debug their quantum algorithms.

The language and simulator were announced in September. The then-unnamed language was intended to bring traditional programming concepts—functions, variables, and branches, along with a syntax-highlighted development environment complete with quantum debugger—to quantum computing, a field that has hitherto built algorithms from wiring up logic gates. Microsoft's hope is that this selection of tools, along with the training material and documentation, will open up quantum computing to more than just physicists.

Given that quantum computers are still rare, Microsoft has built an as-yet-unnamed quantum simulator to run those quantum programs. The local version, released as part of the preview, can support programs using up to 32 quantum bits (qubits), using some 32GB of RAM. Microsoft is also offering an Azure version of the simulator, scaling up to 40 qubits.

Read 2 remaining paragraphs | Comments

Dealmaster: Get an Amazon Echo Dot for $30

Plus deals on Vizio TVs, the Nvidia Shield, the PlayStation 4 Pro, and more.

Greetings, Arsians! Courtesy of our friends at TechBargains, we have another round of deals to share. Our Dealmaster Calendar tells us that today is Green Monday, the kid brother of the made-up retail holiday family. The idea is to be a miniature Cyber Monday for late gift buyers in December; it's a bit forced, sure, but regardless of its legitimacy there are still a few discounts worth noting.

So, per usual, we've rounded up what we could. The discounts aren't as plentiful as they were on Black Friday, but there still may be a gadget or two that catches your eye, so have a look at the full list below.

(credit: TechBargains)

Note: Ars Technica may earn compensation for sales from links on this post through affiliate programs.

Read 16 remaining paragraphs | Comments