Newer Super Mario Bros.: 80 neue Levels mit Mod-Mario

In monatelanger Arbeit haben Fans eine riesige Mod für den DS-Klassiker New Super Mario Bros. programmiert. Jetzt wird es spannend: Wie schnell reagiert Nintendo mit rechtlichen Schritten? (Super Mario, Urheberrecht)

In monatelanger Arbeit haben Fans eine riesige Mod für den DS-Klassiker New Super Mario Bros. programmiert. Jetzt wird es spannend: Wie schnell reagiert Nintendo mit rechtlichen Schritten? (Super Mario, Urheberrecht)

Elektroauto: Der übernächste Tesla wird ein Pick-up

Groß, schwer, mit Ladefläche: Pick-ups sind in den USA eine beliebte Fahrzeugklasse. Das geht bestimmt auch als Elektroauto. Tesla plant einen Pick-up – und der soll laut Elon Musk ein besonderes Merkmal haben. (Tesla, Technologie)

Groß, schwer, mit Ladefläche: Pick-ups sind in den USA eine beliebte Fahrzeugklasse. Das geht bestimmt auch als Elektroauto. Tesla plant einen Pick-up - und der soll laut Elon Musk ein besonderes Merkmal haben. (Tesla, Technologie)

Popular Danish Torrent Tracker Shuts Down After Hack

The popular Danish torrent tracker Hounddawgs has shut down following a breach of its server. The operators confirmed that outsiders exploited a vulnerability, but initially denied that the entire database had been compromised. However, the alleged hacker countered this and posted more than 20 gigabytes of data online.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

Torrent sites come in all shapes and sizes, but generally speaking there’s a clear divide netween private and public sites.

The latter includes the likes of The Pirate Bay and are open to anyone, while private trackers require an account to gain access.

Because many of these close communities also enforce ratio requirements and other rules, they can log quite a bit of data. This generally isn’t the type of information users would like to see out on the streets, but such leaks are no rarity.

In recent days the Danish torrent tracker Hounddawgs.org also ran into some issues. Out of the blue, the site’s 40,000 users received a message signed by ‘Anonymous’ stating that it had been hacked.

Hacked?

The hacker also noted that everyone had been promoted to “staff” but soon after the site went dark. It eventually returned with a message from the operator, accusing another private torrent site of ‘messing around.’

“We’re sorry, but due to server maintenance, we’ll be offline for a little while. Some kiddies from another Danish torrent site don’t like to share users so they found a way to mess a little with the site,” the notice read.

“No harm has been done, and we will be back up as soon as we have found the error and corrected it.”

The message seemed reassuring, but at the same time, a partially redacted file with usernames, emails, and IP-addresses started to circulate.

As a result, the rumor mill went into full swing, and people reported that other accounts where they used the same information, were being compromised. The Hounddawgs operators maintained, however, that allegations of a full database breach were false.

The site’s staff posted a new message refuting the hacking claims. At the same time, they also announced that the site would remain offline indefinitely.

Hounddawgs’ operators say they started the site as a counter-movement to the “tyranny” of other Danish trackers. However, these other trackers allegedly didn’t like the newcomer and fought back, up to a point where Hounddawgs decided to throw in the towel.

Hounddawgs’message (translated)

Private tracker feats are by no means new. They’re as old as private trackers. And while there are plenty opinions, since most of it takes place behind closed doors, the truth is often hard to find.

After the site’s operators said their goodbyes, pointing users to the new infinity-t.org tracker, the alleged hacker responded once more. This time posting over 20 gigabytes of data, said to be the full database and the site’s code.

“But how is that possible? The superheroes of the world, the people behind Hounddawgs, clearly stated on their frontpage that no database was leaked, so how could I possibly have it?” the hacker posted.

“They are lying! Like they have done for years, they don’t care one bit for their users,” the message adds, noting that the server was minimally secured.

The leaked files do indeed include site code and a database, which several people claim to be legitimate. The operators of Hounddawgs also changed their earlier tune. In a message posted on the site yesterday. They now apologize for not dealing with the security issues.

“It has NEVER been our intention to hurt any of you, and we were very happy with all the good users we had. We chose to close the site as a precaution, but unfortunately too late,” they write.

The site was running on the Gazelle script which logs quite a bit of data by default, including users’ IP-addresses. With this info out in the open, many users fear that anti-piracy groups may use the logs to identify individual pirates.

While it’s unlikely that copyright holders will pursue casual sharers based on leaked files, it’s never a pleasant thought to have one’s IP-addresses and other information leaked.

Although the local anti-piracy group, RettighedsAlliancen, might not spring into action right away, it won’t mind seeing the second largest tracker in Denmark go offline.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

Kartellamt: Facebook drohen Sanktionen wegen Datensammlung

Hier ein paar Daten von Whatsapp, dort ein paar Daten von Instagram: Facebook sammelt Informationen über seine Mitglieder, ohne diese ausdrücklich gefragt zu haben. Das Kartellamt ist der Auffassung, dass das Netzwerk damit seine Marktstellung ausnutzt…

Hier ein paar Daten von Whatsapp, dort ein paar Daten von Instagram: Facebook sammelt Informationen über seine Mitglieder, ohne diese ausdrücklich gefragt zu haben. Das Kartellamt ist der Auffassung, dass das Netzwerk damit seine Marktstellung ausnutzt. (Facebook, Soziales Netz)

IT-Sicherheit: Der Angriff kommt – auch ohne eigene Fehler

Das Jahr 2017 brachte vielen Unternehmen Millionenschäden durch Malware ein, ohne dass diese aktiv Fehler gemacht hatten. Wanna Cry, NotPetya und auch der CCleaner-Vorfall zeigen, dass die Frage der eingesetzten Software deutlich wichtiger ist als verw…

Das Jahr 2017 brachte vielen Unternehmen Millionenschäden durch Malware ein, ohne dass diese aktiv Fehler gemacht hatten. Wanna Cry, NotPetya und auch der CCleaner-Vorfall zeigen, dass die Frage der eingesetzten Software deutlich wichtiger ist als verwendete Virenscanner oder Firewall-Appliances. Von Hauke Gierow (Security, Virus)

Blackberry Motion im Test: Langläufer ohne Glanz

Blackberrys neues Motion kommt mit guter Verarbeitung, schönem Design und einem ausreichend schnellen Prozessor. Im Test zeigt sich allerdings, dass es dem Smartphone an Besonderheiten fehlt – zusammen mit dem recht hohen Preis ist das ein Problem. Ein…

Blackberrys neues Motion kommt mit guter Verarbeitung, schönem Design und einem ausreichend schnellen Prozessor. Im Test zeigt sich allerdings, dass es dem Smartphone an Besonderheiten fehlt - zusammen mit dem recht hohen Preis ist das ein Problem. Ein Test von Tobias Czullay (Blackberry, Smartphone)

Core i7-8809G: Intel listet Kaby Lake G mit Vega-Grafik

Ungewollt hat Intel technische Daten zum Core i7-8809G alias Kaby Lake G veröffentlicht. Der Notebook-Chip integriert vier Kerne, eine Vega-Grafikeinheit und 4 GByte HBM2-Videospeicher. Interessant: Der KBL-G eignet sich sogar für Overclocking. (Kaby …

Ungewollt hat Intel technische Daten zum Core i7-8809G alias Kaby Lake G veröffentlicht. Der Notebook-Chip integriert vier Kerne, eine Vega-Grafikeinheit und 4 GByte HBM2-Videospeicher. Interessant: Der KBL-G eignet sich sogar für Overclocking. (Kaby Lake, Prozessor)

Is Your Kodi Setup Being Spied On?

Large numbers of people are running Kodi with a poorly-protected remote access interface, which enables third-parties to view their addons and other sensitive information. In some cases, people’s private videos are also vulnerable to being viewed remotely by anyone with a browser. Worst still, attackers can change Kodi users’ settings, which can cause chaos to the unexpecting.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

As quite possibly the most people media player on earth, Kodi is installed on millions of machines – around 38 million according to the MPAA. The software has a seriously impressive range of features but one, if not configured properly, raises security issues for Kodi users.

For many years, Kodi has had a remote control feature, whereby the software can be remotely managed via a web interface.

This means that you’re able to control your Kodi setup installed on a computer or set-top box using a convenient browser-based interface on another device, from the same room or indeed anywhere in the world. Earlier versions of the web interface look like the one in the image below.

The old Kodi web-interface – functional but basic

But while this is a great feature, people don’t always password-protect the web-interface, meaning that outsiders can access their Kodi setups, if they have that person’s IP address and a web-browser. In fact, the image shown above is from a UK Kodi user’s setup that was found in seconds using a specialist search engine.

While the old web-interface for Kodi was basically a remote control, things got more interesting in late 2016 when the much more functional Chorus2 interface was included in Kodi by default. It’s shown in the image below.

Chorus 2 Kodi Web-Interface

Again, the screenshot above was taken from the setup of a Kodi user whose setup was directly open to the Internet. In every way the web-interface of Kodi acts as a web page, allowing anyone with the user’s IP address (with :8080 appended to the end) to access the user’s setup. It’s no different than accessing Google with an IP address (216.58.216.142), instead of Google.com.

However, Chorus 2 is much more comprehensive that its predecessors which means that it’s possible for outsiders to browse potentially sensitive items, including their addons if a password hasn’t been enabled in the appropriate section in Kodi.

Kodi users probably don’t want this seen in public

While browsing someone’s addons isn’t the most engaging thing in the world, things get decidedly spicier when one learns that the Chorus 2 interface allows both authorized and unauthorized users to go much further.

For example, it’s possible to change Kodi’s system settings from the interface, including mischievous things such as disabling keyboards and mice. As seen (or not seen) in the redacted section in the image below, it can also give away system usernames, for example.

Access to Kodi settings – and more

But aside from screwing with people’s settings (which is both pointless and malicious), the Chorus 2 interface has a trick up its sleeve. If people’s Kodi setups contain video or music files (which is what Kodi was originally designed for), in many cases it’s possible to play these over the web interface.

In basic terms, someone with your IP address can view the contents of your video library on the other side of the world, with just a couple of clicks.

The image below shows that a Kodi setup has been granted access to some kind of storage (network or local disk, for example) and it can be browsed, revealing movies. (To protect the user, redactions have been made to remove home video titles, network, and drive names)

Network storage accessed via Chorus 2

The big question is, however, whether someone accessing a Kodi setup remotely can view these videos via a web browser. Answer: Absolutely.

Clicking through on each piece of media reveals a button to the right of its title. Clicking that reveals two options – ‘Queue in Kodi’ (to play on the installation itself) or ‘Download’, which plays/stores the content via a remote browser located anywhere in the world. Chrome works like a charm.

Queue to Kodi or watch remotely in a browser

While this is ‘fun’ and potentially useful for outsiders looking for content, it’s not great if it’s your system that’s open to the world. The good news is that something can be done about it.

In their description for Chorus 2, the Kodi team explain all of its benefits of the interface but it appears many people don’t take their advice to introduce a new password. The default password and username are both ‘kodi’ which is terrible for security if people leave things the way they are.

If you run Kodi, now is probably the time to fix the settings, disable the web interface if you don’t use it, or enable stronger password protection if you do.

Change that password – now

Just recently, Kodi addon repository TVAddons issued a warning to people using jailbroken Apple TV 2 devices. That too was a default password issue and one that can be solved relatively easily.

“People need to realize that their Kodi boxes are actually mini computers and need to be treated as such,” a TVAddons spokesperson told TF.

“When you install a build, or follow a guide from an unreputable source, you’re opening yourself up to potential risk. Since Kodi boxes aren’t normally used to handle sensitive data, people seem to disregard the potential risks that are posed to their network.”

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

Inside Microsoft HQ’s weird, wonderful swag store

Plus, the company’s Visitor Center shows us where all the Kinects went.

REDMOND, Wash.—Microsoft doesn't generally let its customers and fans show up and see where the Windows and Xbox sausage gets made. Should you wish to visit most of Microsoft's campus buildings a few miles east of Seattle, you'll need to arrange an official tour in advance, which typically requires being invited in a professional capacity.

But one of the company's buildings has no such requirement: Building 92, which houses the company's official Visitor Center and Company Store.

Every time I've driven across the region's 520 toll bridge to visit Building 92, it's been to see a press demo of new games or some tech in roped-off, invite-only meeting rooms. I've dipped into the store just briefly, marveled at some of its merch, and moved along. But this holiday season, I decided to finally carve out a few hours to take a closer look—and to confirm just how strange this capital-O "Official store" really is.

Read 6 remaining paragraphs | Comments

Microsoft, DOJ set to go head to head at Supreme Court in 2018

Meanwhile, NSA spy suspect, KickassTorrents cases didn’t advance very much in 2017.

Enlarge / Microsoft President and Chief Legal Officer Brad Smith speaks during the annual Microsoft shareholders meeting in Bellevue, Washington, on November 29, 2017. (credit: JASON REDMOND/AFP/Getty Images)

2017 brought us a number of new cases concerning technology and law. One of the most memorable may have been the defamation lawsuit filed against Techdirt by Shiva Ayyadurai, a man who—highly controversially—claims that he invented email. After having been dismissed in favor of Techdirt, that case is now on appeal.

We also saw the epic Waymo v. Uber lawsuit unfold, which could determine the future of autonomous driving. That case is now set to go to trial in February 2018 in San Francisco.

There’s also the ongoing lawsuit trying to get at the heart of what seems like a basic question: why the sudden uptick in digital device searches at the border? We might get closer to an answer in 2018.

Read 41 remaining paragraphs | Comments