Corona-Pässe: Von der Leyen will Verordnung bis 1. Juni
Mit “Digitalen Grünen Zertifikaten” sollen Impfungen, Tests und überstandene Infektionen nachgewiesen werden
Just another news site
Mit “Digitalen Grünen Zertifikaten” sollen Impfungen, Tests und überstandene Infektionen nachgewiesen werden
DDoS-for-hire services adopt new technique that amplifies attacks 37 fold.
Enlarge (credit: Getty Images)
Criminals are upping the potency of distributed denial-of-service attacks with a technique that abuses a widely used Internet protocol that drastically increases the amount of junk traffic directed at targeted servers.
DDoSes are attacks that flood a website or server with more data than it can handle. The result is a denial of service to people trying to connect to the service. As DDoS-mitigation services develop protections that allow targets to withstand ever-larger torrents of traffic, the criminals respond with new ways to make the most of their limited bandwidth.
In so-called amplification attacks, DDoSers send requests of relatively small data sizes to certain types of intermediary servers. The intermediaries then send the targets responses that are tens, hundreds, or thousands of times bigger. The redirection works because the requests replace the IP address of the attacker with the address of the server being targeted.
Development has been moved to Donenfeld’s own zx2c4.com for the time being.
Enlarge / ♫ Pop goes the tunnel! ♫ (credit: Aurich Lawson)
Earlier this week, we covered progress integrating an implementation of the WireGuard VPN protocol into the FreeBSD kernel. Two days later, there's an update—kernel-mode WireGuard has been moved out of FreeBSD 13 development entirely for the time being.
The change only affects kernel-mode WireGuard. User-mode WireGuard has been available in FreeBSD since 2019 and remains, unaffected. If you pkg install wireguard
, you get user-mode WireGuard, better known as wireguard-go
. Wireguard-go is potentially less performant than kernel-mode, but it's stable and more than fast enough to keep up with most use cases.
The removal is actually good news for FreeBSD users and WireGuard users. Although the new kernel work done by WireGuard founder Jason Donenfeld, FreeBSD developer Kyle Evans, and OpenBSD developer Matt Dunwoodie represented a clear step forward, it was deemed too rushed to go out in a production kernel. This is a decision heartily endorsed by Donenfeld himself, who prefers a steadier development process with more code reviews and consensus.
COVID vaccines don’t prevent blood clots, which are common in the general population.
Enlarge / Vials in front of the AstraZeneca British biopharmaceutical company logo are seen in this creative photo taken on 18 November 2020. (credit: Getty| NurPhoto)
The World Health Organization is urging countries to continue using AstraZeneca’s COVID-19 vaccine as unfounded fears linking the shots to blood clots continue to spread wildly.
More than a dozen countries have recently suspended or curtailed use of the vaccine, including Germany, France, Italy, and Spain. Sweden and Luxembourg were among the latest to pause vaccinations on Tuesday.
The suspensions were prompted by a handful of reports that people developed blood clots sometime after receiving the vaccine. A few of the people later died.
“No one really games on a Mac.”
Intel's "Justin Gets Real: Touch Screens" ad.
Chipmaker Intel has produced a series of ads mocking Apple's M1 Macs, and it brought on actor Justin Long—famous for his role in Apple's 2000s "I'm a Mac" ads opposite comedian John Hodgman—to satirize Apple's own ad campaign.
In five video ads labeled "Justin Gets Real" that have been published to Intel's YouTube channel, Long begins by saying, "Hello, I'm a... Justin, just a real person doing a real comparison between Mac and PC," referencing the "Hello, I'm a Mac" and "I'm a PC" start to Apple's numerous ads.
Long briefly examines a Windows laptop with an Intel processor, then an Apple Silicon-equipped Mac. Eventually he comes to conclusions about how the Macs are too limited compared to what the Intel PCs can do.
In January, the Canadian Radio-television and Telecommunications Commission (CRTC) launched a consultation on a framework to address the harms caused by botnets – malware-infected computers under the control of malicious actors – and whether these should be blocked by telecoms providers. Super Channel owner Allarco Entertainment believes that piracy devices are part of the threat.
From: TF, for the latest news on copyright battles, piracy and more.
Online piracy and the Internet-based services and networks that they rely upon are inextricably linked. That being said, many copyright holders believe that pirate services shouldn’t have access to the Internet at all.
With this ultimate goal still a long way off, entertainment companies have been doing what they can to disrupt Internet access to pirate services, most commonly by preventing them from reaching their end-users through the use of ISP blocking injunctions.
At the same time, there are broad efforts to portray pirate services as propagators of malware, hoping that when services aren’t blocked by ISPs, users will make the decision to cut them off themselves. This ‘piracy device=malware’ argument has now taken an interesting turn as part of a process in Canada hoping to deal with botnets.
Back in January, the Canadian Radio-television and Telecommunications Commission (CRTC) launched a consultation on a framework to address the harms caused by botnets. The proposal envisions a network-level blocking system to limit the harm caused by botnets, which CRTC characterize as responsible for an increasingly large proportion of cyber threats.
“A botnet is a network of malware-infected computers (bots) that are under the control of a command and control (C2) server operated by a malicious actor. The malware infection is caused by a computer program installed without the computer owner’s knowledge or consent. Each bot is an Internet subscriber’s computer or other device that communicates through the subscriber’s service provider en route to an associated C2 server,” CRTC explained.
CRTC suggests that Internet service providers could introduce network-level blocking to counter the botnet threat, including domain blocking, IP address blocking, and blocking based on protocol. Interestingly, Super Channel owner Allarco sees this as an opportunity to address its own copyright-infringement problems, by painting pirate devices as part of Canada’s botnet problem.
As previously reported, Super Channel owner Allarco is currently engaged in legal action at Alberta’s superior court to prevent Staples, Best Buy, and other retailers from selling ‘pirate’ set-top boxes in their stores.
Along with allegations of mass copyright infringement, Allarco issued a warning that piracy-configured devices – largely Android-based and imported from China – are often pre-loaded with malware that targets consumers and puts their machines at risk. The company builds on this claim in its submission to the CRTC.
Allarco says that it hired an expert to examine some of the set-top boxes sold by the retailers and found that they “exhibited invasive and/or potentially malicious behaviors.” These behaviors included “secret network scanning and probing” of computers and other local network devices for files such as Word documents, databases, spreadsheets, PDFs, audio, video, and other files.
The entertainment company also claims that the devices reported to “unknown servers in China” returning information about the devices such as their location, software load, security level, installed software, and the structure of the network they were connected to.
Allarco acknowledges that CRTC’s request for submissions relates to botnets under the control of a command-and-control server but believes that the regulator should look at pirate set-top boxes too, as these “exhibit many of the same attributes.”
“[T]he key questions posed by the Commission, in reference to botnets, are relevant to the sale and deployment and operation of Pirate Devices,” Allarco writes.
“Not only are botnets used to steal and distribute pirated programming, piracy becomes a trojan horse and vector through which the botnets expand their illicit networks used to distribute malware, and carry out Denial of Service attacks and other nefarious purposes. The commercialization of piracy is greatly aided by botnets.”
Allarco says that if TSPs or ISPs blocked “pirate device communications”, two key goals could be achieved.
Firstly, it would help to curtail the “theft” of intellectual property in Canada. Second, it would stop the “malicious transmission” of personal data from set-top devices to servers located outside of Canada, allegedly China.
“The blocking of the Pirate Devices, and hence, blocking of spyware, malware, etc., is warranted, and would not undermine the overall precepts of network neutrality,” the company adds.
One of the questions posed by CRTC concerns the transparency of any blocking program to ensure accountability and help consumers make “informed decisions” when selecting an ISP or choosing whether to participate in a blocking program. Allarco firmly believes that consumers should not have the ability to “opt out” of a blocking program should they be using a pirate device.
“It has been Allarco’s experience that in many cases Canadian consumers who purchase the Pirate Devices from retail outlets are not informed that the devices intercept and thereby steal copyrighted content. Some Pirate Device sellers misinform Canadian consumers that using the devices to ‘steal’ programming is not illegal,” Allarco informs the CRTC.
“If due to implementation of a blocking framework, the Pirate Devices were unable to connect to servers containing the pirated intellectual property, members of the public would suffer no direct harm.”
With similar logic, Allarco says that there should be no “opt in” program either when it comes to the use of pirate devices. The company says that their primary purpose is to access pirated content so no user should have the right to avoid any blocking mechanism.
In its call for submissions, the CRTC raised the possibility that any blocking mechanism could block IP addresses or servers it should not, potentially preventing access to a legitimate service. Allarco is confident that if pirate devices were targeted, there would be no over-blocking.
The company says that it would provide independent expert evidence that the IP addresses to be blocked are transmitting malware or facilitating the distribution of pirated video content.
“Since the Pirate Devices, are generally single-purpose devices, we would not foresee situations where the consumer is precluded from carrying out lawful activities, on their other (lawful) streaming devices (e.g. Roku, AppleTV, Amazon FireTV) in their homes or offices, or impact their ability to use their computers, tablets or mobile phones for such purposes as web-surfing, email, video-conferences, etc,” Allarco adds.
The notion that pirate devices can be effectively blocked in their entirety, especially without any over-blocking whatsoever, seems more than a bit of a stretch from a technical perspective. Unfortunately, Allarco doesn’t have any solutions or ideas of its own as to how that could be achieved.
“Allarco has no definitive response at present. Allarco is neither an ISP nor a TSP, so we have no expertise in respect of blocking techniques which could be implemented by an ISP or TSP. Allarco reserves the right to comment on filings by TSPs and ISPs and other intervenors at the reply phase,” the company notes.
Finally, it’s worth highlighting ‘Exhibit 2’ of Allarco’s submission to the CRTC (pdf).
It relates to the connections made by some of the ‘pirate’ boxes to various IP addresses around the world and is titled “Incoming and outgoing connections to Locations in China and other countries.” While the emphasis is clearly placed on China (with the China IP addresses carefully highlighted in the list), the report reveals that Chinese IP addresses represent a tiny, tiny minority.
For example, one device – named as a NeonTek N11 – had dozens of incoming connections on its first connection to the web, the overwhelming majority from Google but also including Cloudflare and other US-based services. In fact, just four of these connections were to China-based IP addresses, three of which are owned by tech-giant Tencent.
Allarco’s submission can be found here (pdf), supporting documents here and here (pdf)
From: TF, for the latest news on copyright battles, piracy and more.
When warm and cold air masses collide, bad things can happen.
Enlarge / Severe weather outlook for Wednesday and Wednesday night. (credit: NOAA)
An extraordinarily severe weather outbreak is underway across the southern United States today, with several tornadoes already developing in Alabama. More are expected there and in nearby US states later during the day and overnight.
NOAA's Storm Prediction Center took the step of issuing a rare "high" alert for its severe weather outlook, which it has not issued since 2019. The last time NOAA issued a "high" alert in March was 2012. At the center of NOAA's warning area, there is an exceptionally high "45 percent" contour in which a given location has a 45 percent chance of a tornado passing within 40 km.
This event is being driven by a strong upper-level trough, with an attendant surface cold front advancing across the southern United States and colliding with a warm air mass, modified by the Gulf of Mexico. Where these air masses are meeting, there are violent upward currents of air, known as updrafts, that transport moist air high into the atmosphere.
Just under a month after releasing the first Android 12 Developer Preview, Google is back for round two. According to Google’s release announcement, new features include the ability to resize and manage picture-in-picture windows and new tools f…
Just under a month after releasing the first Android 12 Developer Preview, Google is back for round two. According to Google’s release announcement, new features include the ability to resize and manage picture-in-picture windows and new tools for developers to ensure their apps play on phones with displays featuring rounded corners. But Android bloggers have […]
The post Lilbits: Android 12 Developer Preview 2 brings new goodies appeared first on Liliputing.
Rocket Lake-S looks like a solid gen-on-gen improvement—but not a Ryzen-killer.
19% gen-on-gen IPC vs 10th gen desktop CPUs sounds great—but the verdict is out on the importance of the "up to" hedge, or the impact of reduced core count in the i9 CPUs. [credit: Intel ]
This week, Intel announced its 11th generation S-series desktop CPUs, codenamed Rocket Lake-S. These are gaming-oriented processors optimized for high clock rates and performance, coming in 19 SKUs ranging from i5-11400T through 19-11900K.
The new chips, based on Intel's Cypress Cove architecture, claim up to a 19% increase in Instructions per Clock cycle—a very familiar figure, since it's the same number AMD claimed for gen-on-gen IPC uplift between its Zen 2 and Zen 3 architectures. We'll do some hands-on benchmarking in the near future to determine how important the "up to" hedge on that claim matters.
In the meantime, we're cautiously optimistic about the "up to 19% IPC" and "up to 50% iGPU" performance Intel is claiming. As usual, the really big numbers Intel shows for the new generation of processors don't have much to do with general purpose CPU performance—they're tied pretty directly to finding AVX-512 optimized workloads. But the 19% isn't tied to AVX-512, and it has not come at the price of reduced clock speeds or higher rated TDP either.
Audacity is a popular free and open-source audio editing utility available for Windows, Mac, and Linux computers. Under development for more than two decades, the software now has a robust and powerful set of tools that you can use to record, edit, an…
Audacity is a popular free and open-source audio editing utility available for Windows, Mac, and Linux computers. Under development for more than two decades, the software now has a robust and powerful set of tools that you can use to record, edit, and apply post-processing effects to music, podcasts, or any other type of audio. […]
The post Audacity 3.0 released with new project file format (Open source, cross-platform audio editor) appeared first on Liliputing.
You must be logged in to post a comment.