Happy Birthday To Us, TorrentFreak Turns 15

On November 12, 2015, the first article appeared on TorrentFreak. Since then we have published 12,775 more, covering copyright news and piracy developments from all angles. It’s been a great ride so far, and we’re not done yet.

From: TF, for the latest news on copyright battles, piracy and more.

torrentfreakFifteen years ago, the web was a breeding ground for new services and sites.

An ambitious streaming site called YouTube launched early 2005, Google Maps followed soon after, as did Reddit, Etsy, and WordPress.

The latter promoted itself as easy-to-use blogging software that, for its part, facilitated the creation of tens of thousands of new sites. Today, many of the early WordPress-based sites have long gone but some have survived.

TorrentFreak was one of those early WordPress adopters. Late 2005, it started as a small weblog sharing news and information about file-sharing and torrents, which were still relatively unknown at the time.

Today, 15 years later, we still write about BitTorrent but the site has evolved. We now cover file-sharing, piracy and copyright issues from several angles. Our goal remains the same, however, to highlight news and details that are overlooked in other media.

Every week we trawl through thousands of webpages, RSS feeds, court dockets, and policy filings, to share our findings with the world. And while we operate in a small niche, there are constantly new developments.

Our news reporting is always rooted in facts. While the choice of topics may in part be driven by personal interests, we don’t take sides. That said, we don’t hesitate to highlight bias when we see it, no matter which ‘side’ it comes from.

As for the future, we plan to keep going down the same road, wherever that may lead. Thanks to everyone who helped us out over the past 15 years, and to everyone who reads what we have to write.

birthday

From: TF, for the latest news on copyright battles, piracy and more.

Samsung’s first 5nm chip is the Exynos 1080 for mid-range phones

The new Samsung Exynos 1080 processor is an octa-core processor deigned for upper mid-range smartphones, but Samsung says it will bring a 50-percent boost in single-core performance and up to a 2X improvement in multi-core performance, which could mak…

The new Samsung Exynos 1080 processor is an octa-core processor deigned for upper mid-range smartphones, but Samsung says it will bring a 50-percent boost in single-core performance and up to a 2X improvement in multi-core performance, which could make this mid-range chip competitive with some processors designed for high-end phones and tablets. Samsung’s new chip […]

The post Samsung’s first 5nm chip is the Exynos 1080 for mid-range phones appeared first on Liliputing.

HMD Global: Nokia 6300 wird neu aufgelegt

Das Nokia 6300 war Nokias Verkaufsschlager im Jahr 2007 – jetzt bringt HMD Global das Feature Phone in einer Neuauflage zurück. Ebenfalls neu: das Nokia 8000 4G. (Nokia, Handy)

Das Nokia 6300 war Nokias Verkaufsschlager im Jahr 2007 - jetzt bringt HMD Global das Feature Phone in einer Neuauflage zurück. Ebenfalls neu: das Nokia 8000 4G. (Nokia, Handy)

Crypto Wars: Die Quadratur des Verschlüsselungskreises

Die Regierung will Messengerdienste selbst über den Zugriff auf verschlüsselte Inhalte entscheiden lassen. Doch die Anbieter stehen vor unlösbaren Problemen. Eine Analyse von Friedhelm Greis und Moritz Tremmel (Ende-zu-Ende-Verschlüsselung, Instant Mes…

Die Regierung will Messengerdienste selbst über den Zugriff auf verschlüsselte Inhalte entscheiden lassen. Doch die Anbieter stehen vor unlösbaren Problemen. Eine Analyse von Friedhelm Greis und Moritz Tremmel (Ende-zu-Ende-Verschlüsselung, Instant Messenger)

DNS cache poisoning, the Internet attack from 2008, is back from the dead

A newly found side channel in a widely used protocol lets attackers spoof domains.

Extreme close-up photograph of Web browser window.

Enlarge (credit: Henrik 5000 / Getty Images)

In 2008, researcher Dan Kaminsky revealed one of the more severe Internet security threats ever: a weakness in the domain name system that made it possible for attackers to send users en masse to imposter sites instead of the real ones belonging to Google, Bank of America, or anyone else. With industrywide coordination, thousands of DNS providers around the world installed a fix that averted this doomsday scenario.

Now, Kaminsky’s DNS cache poisoning attack is back. Researchers on Wednesday presented a new technique that can once again cause DNS resolvers to return maliciously spoofed IP addresses instead of the site that rightfully corresponds to a domain name.

“This is a pretty big advancement that is similar to Kaminsky’s attack for some resolvers, depending on how [they’re] actually run,” said Nick Sullivan, head of research at Cloudflare, a content-delivery network that operates the 1.1.1.1 DNS service. “This is amongst the most effective DNS cache poisoning attacks we’ve seen since Kaminsky’s attack. It’s something that, if you do run a DNS resolver, you should take seriously.”

Read 15 remaining paragraphs | Comments