Why NSA spied on inexplicably unencrypted Windows crash reports

The National Security Agency’s X-KEYSCORE program gives the spy agency access to a wide range of Internet traffic. Any information that isn’t encrypted is, naturally, visible to passive Internet wiretaps of the kind the NSA and other intelligence agencies use. This in turn will typically expose such things as e-mails, online chats, and general browsing behavior. And, according to slides published this weekend by Der Spiegel , this information also includes crash reports from Microsoft’s Windows Error Reporting facility built in to Windows. These reports will tell eavesdroppers what versions of what software someone is running, what operating system they use, and whenever that software has crashed. Windows also sends messages in the clear whenever a USB or PCI device is plugged in as part of its hunt for suitable drivers. Read 3 remaining paragraphs | Comments

Read the original:
Why NSA spied on inexplicably unencrypted Windows crash reports

Wii U gamepad hacked, reverse engineered to stream from a PC

Reverse engineering the Wii U gamepad was non-trivial. libdrc The Wii U’s tablet controller isn’t moving as many consoles as Nintendo might like, but the technology itself is still interesting enough to draw the attention of the hacker community. Engadget reports that the libdrc team gave a presentation at the Chaos Communication Congress explaining how it managed to hack the Wii U’s gamepad to communicate with and stream content from a standard Linux PC. The full talk is available in video form here . The 64-slide deck describes the many, many hoops the team had to jump through to get the gamepad working—dumping the gamepad’s firmware helped the team reverse-engineer the Wi-Fi encryption system, at which point the team also needed to reverse-engineer the protocols Nintendo is using to stream video, audio, and input data. The team included a screenshot of an emulated  Final Fantasy VII  in its deck to prove that the software works and was also able to get the GameCube version of The Legend of Zelda:  Wind Waker working live onstage. While the project is, at this point, “very buggy” and “not meant for end users,” the team thinks that the project is “a good prototype that can be improved on.” The team also wants to add the ability to pair other tablets with the Wii U, to port the project to Windows and to OS X, and to make it possible to stream things to the gamepad over the Internet. It may be some time before the layperson can take advantage of the libdrc team’s work, but even as an early alpha the project is an interesting proof-of-concept. Read on Ars Technica | Comments

View article:
Wii U gamepad hacked, reverse engineered to stream from a PC

Apple’s incremental 2013—and what to expect in 2014

The trouble with the Apple beat is that everyone wants it to be as exciting and newsworthy as it was in 2007 when Apple announced the iPhone, or in 2010 when the original iPad dropped. Among both the tech press and enthusiasts, Apple is a victim of its own success—every year that the company doesn’t redefine a product category, the pundits get a bit more bored. In 2013, almost every one of Apple’s new hardware and software releases refined something that came before. While that might seem boring to early adopters, Apple continues to be a master of iteration, improving its products in noticeable and useful ways every single year. Here, we’ll look back at everything Apple has put out this year—and what we might expect in 2014. The iPhone Apple put a whole lot of marketing muscle behind the iPhone 5C, which is essentially a year-old phone. Andrew Cunningham In the strictest sense, Apple actually delivered two new iPhones this year: the iPhone 5S and the  iPhone 5C . The 5S was the only truly new one, though—it delivered the expected improvements to the SoC and the camera while introducing a new hardware feature in the form of the TouchID fingerprint sensor. In contrast, the 5C is just an iPhone 5 with slightly upgraded cellular hardware and some colorful plastic. Read 21 remaining paragraphs | Comments

More:
Apple’s incremental 2013—and what to expect in 2014

Efficient set-top boxes to save $1 billion on energy annually by 2017

Today, the US Department of Energy announced an agreement with a diverse group of NGOs that would see significant improvements to a poorly recognized energy sink: the set-top box that receives and controls TV programming. The agreement, while voluntary, commits service providers to using more efficient hardware through to 2017. Although the individual savings will be small, the cumulative impact is massive: a billion dollars in electricity saved by consumers and five million fewer metric tons of carbon dioxide emissions in the atmosphere. The agreement, brokered by the EPA, brings together a diverse coalition of groups. On the environmental side, we have the Natural Resources Defense Council and the Appliance Standards Awareness Project. Representing industry are the Consumer Electronics Association and the National Cable & Telecommunications Association. The American Council for an Energy-Efficient Economy, which gets its funding from a variety of sources (including utilities), was also at the party. The standards they’ve developed will cover all existing delivery methods: telecom, cable, and satellite. It won’t be written into legislation, but an independent third party will verify that hardware meets the agreement’s specifications each year between now and 2017. The exact details of the energy-saving changes aren’t specified in the announcement , but the electronics in the devices can get quite hot, and statements made by Senator Dianne Feinstein (D-CA) suggest that they often remain active even when the television is off. Read 1 remaining paragraphs | Comments        

See more here:
Efficient set-top boxes to save $1 billion on energy annually by 2017

Scientists make exotic chemicals with high-pressure salt

Everything around you is made of elements that scientists have studied in quite some detail over the last 200 years. But all that understanding breaks down when these elements are subjected to high pressure and temperature. Now, using an advanced theoretical understanding and extreme conditions, researchers have converted table salt into exotic chemicals. Salt is made from one part sodium (Na) and one part chlorine (Cl). If somehow salt were transported to the center of the Earth, where the pressure is three million times that on the surface, its crystalline structure would change but the ratio of those two elements would remain the same. Vitali Prakapenka at the University of Chicago and his colleagues wanted to find out what would happen if there were an excess of either sodium or chlorine at such high pressures. Would the ratio between the elements change? “It might,” said Prakapenka, “because chemistry completely changes in such conditions.” If it did, the result would not just be formation of a new compound, but a serious revision of what we think about chemistry. Read 11 remaining paragraphs | Comments        

Excerpt from:
Scientists make exotic chemicals with high-pressure salt

After sailing the domain name seas, Pirate Bay returns to Sweden

Aurich Lawson After nearly two weeks of bouncing its domain name around the globe, The Pirate Bay has returned to its home port. The notorious BitTorrent site originally went from .se to .sx (Sint Maarten), but it didn’t stop there—in recent days, it has shifted from .ac (Ascension Island) to .pe (Peru) to .gy (Guyana). Now, as of Thursday, it’s back to the comforts of .se (Sweden). Neither The Pirate Bay blog nor its Twitter feed offered any explanation. The move to .sx originally took place back in April 2013 when a Swedish prosecutor filed a motion to seize thepiratebay.se, piratebay.se, and thepiratebay.is. The registrar, the Internet Infrastructure Foundation, has said previously that it would only do so after being served by a Swedish court. “Our actions would largely be determined by the contents of the order and the issuing party,” the agency wrote in June 2012. “Accordingly, we will assess the situation on a case-by-case basis if such an order is issued.” Read 3 remaining paragraphs | Comments        

Visit link:
After sailing the domain name seas, Pirate Bay returns to Sweden

Exponential algorithm making Windows XP miserable could be fixed

Tom Carden Windows XP is really old, and we would suggest that you don’t use it unless you really have no option. For the most part, however, that age doesn’t really manifest itself. Sure, the operating system is missing the security features, hardware acceleration, and built-in support for things like USB 3 that newer versions of Windows have, but old software doesn’t have the same issues as, say, old cars. Old software generally runs as well today as it did when it was brand new. But Windows XP users have noticed that this isn’t entirely true. A bunch of them have found that the old operating system is working considerably worse than when it was released in 2001. The problem is that—especially among those who are still using Internet Explorer 6 or 7—each time you boot your Windows XP machine, it slows to a crawl. There’s a built-in process, svchost.exe, chewing up the entire processor, sometimes for an hour or more at a time. Wait long enough after booting and the machine will eventually return to normalcy. But an hour can be a long time to wait. Loss of horsepower and trouble starting up are common enough problems in old cars, but we don’t really expect the same things to happen on old PCs. Read 6 remaining paragraphs | Comments        

Read More:
Exponential algorithm making Windows XP miserable could be fixed

Botnet forces infected Firefox users to hack the sites they visit

Sites browsed by hacked PCs (left) and SQL injection flaws found by the botnet (masked, right). KrebsonSecurity Investigative journalist Brian Krebs has uncovered an unusual botnet that forces infected PCs to scour websites for security vulnerabilities that can cough up proprietary data or be exploited in drive-by malware attacks. The botnet, dubbed “Advanced Power” by its operators, has discovered at least 1,800 webpages vulnerable to SQL injection attacks since May, Krebs reported in a post published Monday . SQL injection vulnerabilities exploit weaknesses in Web applications that allow attackers to send powerful commands to a website’s backend databases. From there, attackers can download login credentials or other database contents or cause sites to post links that silently redirect visitors to malicious websites. Advanced Power masquerades as a legitimate add-on for Mozilla’s Firefox browser. Once installed, it looks for vulnerabilities on sites visited by the infected machine. Krebs wrote: Read 1 remaining paragraphs | Comments        

Continue Reading:
Botnet forces infected Firefox users to hack the sites they visit

Sprint wants to buy T-Mobile and leave US with just three major carriers

Masayoshi Son (left), poses with a Storm Trooper at Sprint owner SoftBank’s launch of the iPhone 3GS in 2009. Danny Choo Sprint is “working toward a possible bid for rival T-Mobile” but is first examining regulatory concerns that could prevent such a merger, the  Wall Street Journal reported today . A merger would leave the US cellular market with only three major carriers, although a combined Sprint/T-Mobile would perhaps be a more formidable opponent to market leaders AT&T and Verizon Wireless. AT&T attempted to buy T-Mobile, but it  dropped those plans in December 2011 after opposition from the Justice Department and Federal Communications Commission (FCC). Sprint hasn’t made a final decision on a bid, but it could happen in the first half of 2014 and be worth more than $20 billion “depending on the size of any stake in T-Mobile that Sprint tries to buy,” the  Journal reported. “But it would likely face tough opposition from antitrust authorities, who worry consumers could suffer without a fourth national competitor to keep a check on prices,” the report said. AT&T’s takeover bid for T-Mobile would have been $39 billion.The  Journal ‘s   sources indicate that Sprint is wary of wasting time on a deal that might not come to fruition, but the company’s owner is leading the charge. “Driving the current effort is SoftBank Chief Executive Masayoshi Son, an aggressive acquirer who bought control of Sprint earlier this year and has made no secret of his desire to grow in the US via further deals,” the  Journal wrote. Read 7 remaining paragraphs | Comments        

Read More:
Sprint wants to buy T-Mobile and leave US with just three major carriers

British Library sticks 1 million pics on Flickr, asks for help making them useful

In 2008, the British Library, in partnership with Microsoft, embarked on a project to digitize thousands of out-of-copyright books from the 17 th , 18 th , and 19 th centuries. Included within those books were maps, diagrams, illustrations, photographs, and more. The Library has uploaded more than a million of them onto Flickr and released them into the public domain. It’s now asking for help. Though the library knows which book each image is taken from, its knowledge largely ends there. While some images have useful titles, many do not, so the majority of the million picture collection is uncatalogued, its subject matter unknown. Next year, it plans to launch a crowdsourced application to fill the gap, to enable humans to describe the images. This information will then be used to train an automated classifier that will be run against the entire corpus. Read 1 remaining paragraphs | Comments        

See more here:
British Library sticks 1 million pics on Flickr, asks for help making them useful