Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services

An anonymous reader writes from a report via Schneier on Security: Two researchers have discovered over 100 Tor nodes that are spying on hidden services. Cory Doctorow from Boing Boing reports: “These nodes — ordinary nodes, not exit nodes — sorted through all the traffic that passed through them, looking for anything bound for a hidden service, which allowed them to discover hidden services that had not been advertised. These nodes then attacked the hidden services by making connections to them and trying common exploits against the server-software running on them, seeking to compromise and take them over. The researchers used ‘honeypot’ .onion servers to find the spying computers: these honeypots were .onion sites that the researchers set up in their own lab and then connected to repeatedly over the Tor network, thus seeding many Tor nodes with the information of the honions’ existence. They didn’t advertise the honions’ existence in any other way and there was nothing of interest at these sites, and so when the sites logged new connections, the researchers could infer that they were being contacted by a system that had spied on one of their Tor network circuits. No one knows who is running the spying nodes: they could be run by criminals, governments, private suppliers of ‘infowar’ weapons to governments, independent researchers, or other scholars (though scholarly research would not normally include attempts to hack the servers once they were discovered).” The Tor project is aware of the attack and is working to redesign its system to try and block it. Security firm Bitdefender has issued an alert about a malicious app called EasyDoc that hands over control of Macs to criminals via Tor. Read more of this story at Slashdot.

Read this article:
Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services

Password Sharing Is a Federal Crime, Appeals Court Rules

An anonymous reader writes from a report via Motherboard: An appeals court ruled Wednesday that sharing passwords can be a violation of the Computer Fraud and Abuse Act, a catch-all “hacking” law that has been widely used to prosecute behavior that bears no resemblance to hacking. Motherboard reports: “In this particular instance, the conviction of David Nosal, a former employee of Korn/Ferry International research firm, was upheld by the Ninth Circuit Court of Appeals, who said that Nosal’s use of a former coworker’s password to access one of the firm’s databases was an ‘unauthorized’ use of a computer system under the CFAA. In the majority opinion, Judge Margaret McKeown wrote that ‘Nosal and various amici spin hypotheticals about the dire consequences of criminalizing password sharing. But these warnings miss the mark in this case. This appeal is not about password sharing.’ She then went on to describe a thoroughly run-of-the-mill password sharing scenario — her argument focuses on the idea that Nosal wasn’t authorized by the company to access the database anymore, so he got a password from a friend — that happens millions of times daily in the United States, leaving little doubt about the thrust of the case. The argument McKeown made is that the employee who shared the password with Nosal ‘had no authority from Korn/Ferry to provide her password to former employees.’ At issue is language in the CFAA that makes it illegal to access a computer system ‘without authorization.’ McKeown said that ‘without authorization’ is ‘an unambiguous, non-technical term that, given its plain and ordinary meaning, means accessing a protected computer without permission.’ The question that legal scholars, groups such as the Electronic Frontier Foundation, and dissenting judge Stephen Reinhardt ask is an important one: Authorization from who?” Read more of this story at Slashdot.

See the original post:
Password Sharing Is a Federal Crime, Appeals Court Rules

American Cities Are Installing DHS-Funded Audio Surveillance

“Audio surveillance is increasingly being used on parts of urban mass transit systems, ” reports the Christian Science Monitor. Slashdot reader itwbennett writes “It was first reported in April that New Jersey had been using audio surveillance on some of its light rail lines, raising questions of privacy. This week, New Jersey Transit ended the program following revelations that the agency ‘didn’t have policies governing storage and who had access to data.'” From the article: New Jersey isn’t the only state where you now have even more reason to want to ride in the quiet car. The Baltimore Sun reported in March that the Maryland Transit Administration has used audio recording on some of its mass transit vehicles since 2012. It is now used on 65 percent of buses, and 82 percent of subway trains have audio recording capability, but don’t use it yet, according to the Sun. And cities in New Hampshire, Connecticut, Michigan, Ohio, Nevada, Oregon and California have either installed systems or moved to procure them, in many cases with funding from the federal Department of Homeland Security. Read more of this story at Slashdot.

See original article:
American Cities Are Installing DHS-Funded Audio Surveillance

Apple Is Suing A Man That Teaches People To Repair Their MacBooks

New submitter alzoron writes: After the failure of New York’s Fair Repair Act, independent third-party unauthorized Apple repair shops seem to be under attack. Louis Rossmann, owner of Rossman Repair Group, INC has uploaded a somewhat vague video alluding to his Youtube site, where he posts videos about repairing out of warranty repairs, possibly being shut down. Several sources (Reddit, Mac Kung Fu, 9to5Mac) have been speculating about this and whether or not Apple is behind this. Game Revolution reported on the video (Link is to cache version of the site since the report has since been removed), breaking down each section of the video. 6:52: Louis informs viewers that they can download YouTube videos. 7:41: Louis mentions that YouTube channels have a “finite lifespan, ” often because a large corporation has the power and money to shut them down. 8:42: Louis shares that he’s happy when he’s lived a difficult life so that he can be strong for the immense challenge that is ahead. 10:06: Louis shares that he is going to have to fight from his point onward. 11:22: Louis states that all his videos may soon be gone. 11:32: Louis mentions that his business may disappear. Given what Louis has mentioned, it’s apparent that Louis has been threatened by Apple likely for condemning its policies to a growing subscriber base, but also for showing users how to repair its hardware without going through Apple support. Read more of this story at Slashdot.

Read this article:
Apple Is Suing A Man That Teaches People To Repair Their MacBooks

DMCA Notices Remove 8,268 Projects On Github In 2015

An anonymous reader writes: Github’s transparency report for 2015 shows that the site received many DMCA notices that removed more than 8, 200 projects. “In 2015, we received significantly more takedown notices, and took down significantly more content, than we did in 2014, ” Github reports. For comparison, the company received only 258 DMCA notices in 2014, 17 of which responded with a counter-notice or retraction. In 2015, they received 505 takedown notices, 62 of which were the subject of counters or withdrawals. TorrentFreak reports: “Copyright holders are not limited to reporting one URL or location per DMCA notice. In fact, each notice filed can target tens, hundreds, or even thousands of allegedly infringing locations.” September was a particularly active month as it took down nearly 5, 834 projects. “Usually, the DMCA reports we receive are from people or organizations reporting a single potentially infringing repository. However, every now and then we receive a single notice asking us to take down many repositories, ” Github explains. They are called ‘Mass Removals’ when more than 100 repositories are asked to be removed. “In all, fewer than twenty individual notice senders requested removal of over 90% of the content GitHub took down in 2015.” Read more of this story at Slashdot.

View the original here:
DMCA Notices Remove 8,268 Projects On Github In 2015

Austin Is Conducting Sting Operations Against Ride-Sharing Drivers

Since the Uber and Lyft ride-sharing apps stopped service in Austin, drunk driving has increased, riders are hunting for alternatives, and the police are conducting undercover sting operations against unauthorized ride-sharing drivers. With Chicago also considering new restrictions on ride-sharing apps, Slashdot reader MarkWhittington shares this report from Austin: With thousands of drivers and tens of thousands of riders who once depended on ride-sharing services in a lurch, a group called Arcade City has tried to fill the void with a person-to-person site to link up drivers and riders who then negotiate a fare. Of course, according to a story on KVUE, the Austin city government, and the police are on the case. The Austin Police Department has diverted detectives and resources to conduct sting operations on ride-sharing drivers who attempt to operate without official sanction. Undercover operatives will arrange for a ride with an Arcade City driver and then bust them, impounding their vehicle and imposing a fine. “The first Friday and Saturday after Uber was gone, we were joking that it was like the zombie apocalypse of drunk people, ” one former ride-sharing driver told Vocative.com. Earlier this month the site compared this year’s drunk driving arrests to last years — and discovered that in the three weeks since Uber and Lyft left Austin, 7.5% more people have been arrested for drunk driving. Read more of this story at Slashdot.

Read More:
Austin Is Conducting Sting Operations Against Ride-Sharing Drivers

Federal Court: The Fourth Amendment Does Not Protect Your Home Computer

An anonymous reader writes: The EFF reports that a federal court in Virginia today ruled that a criminal defendant has no “reasonable expectation of privacy” in his personal computer (PDF), located inside his home. The court says the federal government does not need a warrant to hack into an individual’s computer. EFF reports: “The implications for the decision, if upheld, are staggering: law enforcement would be free to remotely search and seize information from your computer, without a warrant, without probable cause, or without any suspicion at all. To say the least, the decision is bad news for privacy. But it’s also incorrect as a matter of law, and we expect there is little chance it would hold up on appeal. (It also was not the central component of the judge’s decision, which also diminishes the likelihood that it will become reliable precedent.) But the decision underscores a broader trend in these cases: courts across the country, faced with unfamiliar technology and unsympathetic defendants, are issuing decisions that threaten everyone’s rights. Read more of this story at Slashdot.

View article:
Federal Court: The Fourth Amendment Does Not Protect Your Home Computer

Japan is deploying pirated anime-hunting human personnel

Japan’s automated bootleg-hunting software isn’t quite as effective as its government would like. So, it’s boosting its anti-piracy campaign by hiring human employees to manually scour forums, torrents and video-streaming websites for illegally distributed anime and live video content. See, it’s pretty easy to slip through the clutches of an automated system — all people have to do is change the video a bit to make sure it’s not an exact match to what Japan’s computers are looking for. That tactic obviously won’t work on human personnel. As Motherboard noted, Japan is betting on anime and manga to boost its economy. Animation studios have recently made their creations more available to audiences outside the country, but they’re still not as easy to access as Western media. Hulu, for instance, dropped a ton of titles from its anime catalogue in May. As such, illegal distribution of anime is still so widespread that its estimated cost of damage is a whopping $20 billion. According to RocketNews24 , the government will start this new project next week with one hire, perhaps to test things out. The employee will have to determine whether the pirated video he finds affects the copyright holder financially. If it does, the government will assess the legal actions it can take. Via: Motherboard Source: Yahoo Japan

View article:
Japan is deploying pirated anime-hunting human personnel

New ‘Hardened’ Tor Browser Protects Users From FBI Hacking

An anonymous reader quotes an article from Motherboard: According to a new paper, security researchers are now working closely with the Tor Project to create a “hardened” version of the Tor Browser, implementing new anti-hacking techniques which could dramatically improve the anonymity of users and further frustrate the efforts of law enforcement… “Our solution significantly improves security over standard address space layout randomization (ASLR) techniques currently used by Firefox and other mainstream browsers, ” the researchers write in their paper, whose findings will be presented in July at the Privacy Enhancing Technologies Symposium in Darmstadt, Germany. The researchers say Tor is currently field-testing their solution for an upcoming “hardened” release, making it harder for agencies like the FBI to crack the browser’s security, according to Motherboard. “[W]hile that defensive advantage may not last for too long, it shows that some in the academic research community are still intent on patching the holes that their peers are helping government hackers exploit.” Read more of this story at Slashdot.

Follow this link:
New ‘Hardened’ Tor Browser Protects Users From FBI Hacking

North Korea Restarts Plutonium Production For Nuclear Bombs

New submitter ReginaldBryan45 quotes a report from Reuters: North Korea has restarted production of plutonium fuel, a senior State Department official said on Tuesday, showing that it plans to pursue its nuclear weapons program in defiance of international sanctions. The International Atomic Energy Agency (IAE) said on Monday that it had seen signs based on satellite imagery that show that the secretive country had re-activated the nuclear fuel production reactor at Yongbyon. The analysis by the IAEA pointed to “resumption of the activities of the five megawatt reactor, the expansion of centrifuge-related facility, [and] reprocessing — these are some of the examples of the areas [of activity indicated at Yongbyon].” U.S. Intelligence tried to infect the Yongbyon site with a variant of the Stuxnet malware last year but ultimately failed. Experts at the U.S.-Korea Institute at John Hopkins University’s School of Advanced International Studies in Washington predicted last year that the country’s nuclear arsenal could grow to as many as 100 bombs within five years, from an estimated 10 to 16. Naturally, this news is a cause for concern as North Korea had four (failed) test launches in the last two months. Read more of this story at Slashdot.

See the article here:
North Korea Restarts Plutonium Production For Nuclear Bombs