‘Cultlike’ Devotion: Apple Once Refused To Join Open Compute Project, So Their Entire Networking Team Quit

mattydread23 writes: Great story about the Open Compute Project from Business Insider’s Julie Bort here, including this fun tidbit: “‘OCP has a cultlike following, ‘ one person with knowledge of the situation told Business Insider. ‘The whole industry, internet companies, vendors, and enterprises are monitoring OCP.’ OCP aims to do for computer hardware what the Linux operating system did for software: make it ‘open source’ so anyone can take the designs for free and modify them, with contract manufacturers standing by to build them. In its six years, OCP has grown into a global entity, with board members from Facebook, Goldman Sachs, Intel, and Microsoft. In fact, there’s a well-known story among OCP insiders that demonstrates this cultlike phenom. It involves Apple’s networking team. This team was responsible for building a network at Apple that was so reliable, it never goes down. Not rarely — never. Building a 100% reliable network to meet Apple’s exacting standards was no easy task. So, instead of going it alone under Apple’s secrecy, the Apple networking team wanted to participate in the revolution, contributing and receiving help. But when the Apple team asked to join OCP, Apple said ‘no.’ ‘The whole team quit the same week, ‘ this person told us.” Read more of this story at Slashdot.

Visit site:
‘Cultlike’ Devotion: Apple Once Refused To Join Open Compute Project, So Their Entire Networking Team Quit

XG.fast DSL does 10Gbps over telephone lines

(credit: Bob Dormon / Ars Technica UK) Nokia has achieved a connection speed of 5Gbps—about 625MB/sec—over 70 metres of conventional twisted-pair copper telephone wire, and 8Gbps over 30 metres. The trial used a relatively new digital subscriber line (DSL) protocol called XG.fast (aka G.fast2). XG.fast is the probable successor of G.fast , which was successfully trialled in a few countries over the past couple of years and will soon begin to commercially roll out. (In an unusual turn of events,  the UK will probably be the first country with G.fast .) Fundamentally, both G.fast and XG.fast are best described as “VDSL on steroids.” Basically, while a VDSL2 signal frequency maxes out around 17MHz, G.fast starts at 106MHz (it can be doubled to 212MHz) and XG.fast uses between 350MHz and 500MHz. This means that there’s a lot more bandwidth (the original meaning of the word), which in turn can be used for transferring data at higher speeds. Read 10 remaining paragraphs | Comments

More:
XG.fast DSL does 10Gbps over telephone lines

California City Converts Its Street Lights Into A High-Speed IoT Backbone

Harvard Law professor Susan Crawford describes how the city of Santa Monica installed its own high-speed IoT backbone on its street lights and traffic signals — and why it’s important. Neutral “micro” cell sites can make very high-capacity wireless transmissions available, competitively, to everyone (and every sensor) nearby. This can and should cause an explosion of options and new opportunities for economic growth, innovation, and human flourishing in general… Very few American cities have carried out this transmogrification, but every single one will need to. Santa Monica…is a city that will be able to control its future digital destiny, because it is taking a comprehensive, competition-forcing approach to the transmission of data… Cities that get control of their streetlights and connect them to municipally overseen, reasonably priced dark fiber can chart their own Internet of Things futures, rather than leave their destinies in the hands of vendors whose priorities are driven (rationally) by the desire to control whole markets and keep share prices and dividends high rather than provide public benefits. Santa Monica’s CIO warns that now telecoms “are looking for exclusive rights to poles and saying they can’t co-locate [with their competitors]. They’re all hiring firms to lock up their permits and rights to as many poles as possible, as quickly as possible, before governments can organize.” Read more of this story at Slashdot.

See the original post:
California City Converts Its Street Lights Into A High-Speed IoT Backbone

IEEE Sets New Ethernet Standard That Brings 5X the Speed Without Cable Ripping

Reader coondoggie writes: As expected the IEEE has ratified a new Ethernet specification — IEEE P802.3bz — that defines 2.5GBASE-T and 5GBASE-T, boosting the current top speed of traditional Ethernet five-times without requiring the tearing out of current cabling. The Ethernet Alliance wrote that the IEEE 802.3bz Standard for Ethernet Amendment sets Media Access Control Parameters, Physical Layers and Management Parameters for 2.5G and 5Gbps Operation lets access layer bandwidth evolve incrementally beyond 1Gbps, it will help address emerging needs in a variety of settings and applications, including enterprise, wireless networks. Indeed, the wireless component may be the most significant implication of the standard as 2.5G and 5G Ethernet will allow connectivity to 802.11ac Wave 2 Access Points, considered by many to be the real driving force behind bringing up the speed of traditional NBase-T products. Read more of this story at Slashdot.

Taken from:
IEEE Sets New Ethernet Standard That Brings 5X the Speed Without Cable Ripping

Why the Silencing of KrebsOnSecurity Opens a Troubling Chapter For the Internet

An anonymous reader quotes a report from Ars Technica: For the better part of a day, KrebsOnSecurity, arguably the world’s most intrepid source of security news, has been silenced, presumably by a handful of individuals who didn’t like a recent series of exposes reporter Brian Krebs wrote. The incident, and the record-breaking data assault that brought it on, open a troubling new chapter in the short history of the Internet. The crippling distributed denial-of-service attacks started shortly after Krebs published stories stemming from the hack of a DDoS-for-hire service known as vDOS. The first article analyzed leaked data that identified some of the previously anonymous people closely tied to vDOS. It documented how they took in more than $600, 000 in two years by knocking other sites offline. A few days later, Krebs ran a follow-up piece detailing the arrests of two men who allegedly ran the service. A third post in the series is here. On Thursday morning, exactly two weeks after Krebs published his first post, he reported that a sustained attack was bombarding his site with as much as 620 gigabits per second of junk data. That staggering amount of data is among the biggest ever recorded. Krebs was able to stay online thanks to the generosity of Akamai, a network provider that supplied DDoS mitigation services to him for free. The attack showed no signs of waning as the day wore on. Some indications suggest it may have grown stronger. At 4 pm, Akamai gave Krebs two hours’ notice that it would no longer assume the considerable cost of defending KrebsOnSecurity. Krebs opted to shut down the site to prevent collateral damage hitting his service provider and its customers. The assault against KrebsOnSecurity represents a much greater threat for at least two reasons. First, it’s twice the size. Second and more significant, unlike the Spamhaus attacks, the staggering volume of bandwidth doesn’t rely on misconfigured domain name system servers which, in the big picture, can be remedied with relative ease. The attackers used Internet-of-things devices since they’re always-connected and easy to “remotely commandeer by people who turn them into digital cannons that spray the internet with shrapnel.” “The biggest threats as far as I’m concerned in terms of censorship come from these ginormous weapons these guys are building, ” Krebs said. “The idea that tools that used to be exclusively in the hands of nation states are now in the hands of individual actors, it’s kind of like the specter of a James Bond movie.” While Krebs could retain a DDoS mitigation service, it would cost him between $100, 000 and $200, 000 per year for the type of protection he needs, which is more than he can afford. What’s especially troubling is that this attack can happen to many other websites, not just KrebsOnSecurity. Read more of this story at Slashdot.

Visit link:
Why the Silencing of KrebsOnSecurity Opens a Troubling Chapter For the Internet

Quantum Teleportation Achieved Over 7km of Cable

An anonymous reader quotes a report from ScienceAlert: Quantum teleportation just moved out of the lab and into the real world, with two independent teams of scientists successfully sending quantum information across several kilometers of optical fiber networks in Calgary, Canada, and Hefei, China. Quantum teleportation relies on a strange phenomenon called quantum entanglement. Basically, quantum entanglement means that two particles are inextricably linked, so that measuring the state of one immediately affects the state of the other, no matter how far apart the two are — which led Einstein to call entanglement “spooky action at a distance.” In the latest experiments, both published in Nature Photonics (here and here), the teams had slightly different set-ups and results. But what they both had in common is the fact that they teleported their information across existing optical fiber networks — which is important if we ever want to build useable quantum communication systems. To understand the experiments, Anil Ananthaswamy over at New Scientist nicely breaks it down like this: picture three people involved — Alice, Bob, and Charlie. Alice and Bob want to share cryptographic keys, and to do that, they need Charlie’s help. Alice sends a particle to Charlie, while Bob entangles two particles and sends just one of them to Charlie. Charlie then measures the two particles he’s received from each of them, so that they can no longer be differentiated — and that results in the quantum state of Alice’s particle being transferred to Bob’s entangled particle. So basically, the quantum state of Alice’s particle eventually ends up in Bob’s particle, via a way station in the form of Charlie. The Canadian experiment followed this same process, and was able to send quantum information over 6.2 km of Calgary’s fiber optic network that’s not regularly in use. Read more of this story at Slashdot.

See the article here:
Quantum Teleportation Achieved Over 7km of Cable

T-Mobile To Boost Its LTE Speeds To 400 Mbps

An anonymous reader writes from a report via The Next Web: T-Mobile plans to boost its LTE speeds to up to 400 Mbps in the very near future. The Next Web reports: “The company is getting ready to boost its maximum theoretical internet speeds to become the faster carrier in the U.S. by a wide margin. The network will soon support theoretical speeds up to 400 Mbps — nearly half the speed of Google Fiber. There’s a two-pronged approach to the upgrade. First is incorporating 4×4 MIMO (multiple input, multiple output) technology, which will supposedly double the speed from the current 7-40 Mbps customers tend to experience with T-Mobile (about the same as Verizon with LTE-A). This upgrade is available now in 319 cities, although it’s a moot point because only the S7 and S7 Edge will be able to use the tech via a software update “later this month.” In October, the company will roll out 256 QAM support to the S7 and S7 Edge (and again, more phones later), which increases the amount of bits per transmission. T-Mobile says this will lead to theoretical maximum speeds of 400 Mbps.” The Next Web followed-up with T-Mobile to ask about what the real-world speeds would be after the upgrade. The company says “customers can expect to see real world peak speeds of 190 Mbps, ” which is over four times current peaks speeds, but also far below the theoretical 400 Mbps. Read more of this story at Slashdot.

More:
T-Mobile To Boost Its LTE Speeds To 400 Mbps

US Unveils Charges Against KickassTorrents, Names Two More Defendants

A total of three men are said to be operators of file-sharing site KickassTorrents (KAT), according to U.S. prosecutors. Last month, federal authorities arrested the 30-year-old Ukrainian mastermind of KAT, Artem Vaulin, and formally charged him with one count of conspiracy to commit criminal copyright infringement, one count of conspiracy to commit money laundering, and two counts of criminal copyright infringement. Two other Ukrainians were named in the new indictment (PDF): Levgen (Eugene) Kutsenko and Oleksander (Alex) Radostin. While only Vaulin has been arrested, bench warrants have been issue for the arrest of all three men. Ars Technica reports: “Prosecutors say the three men developed and maintained the site together and used it to ‘generate millions of dollars from the unlawful distribution of copyright-protected media, including movies, television shows, music, video games, computer software, and electronic books.’ They gave out ‘Reputation’ and ‘User Achievement’ awards to users who uploaded the most popular files, including a special award for users who had uploaded more than 1, 000 torrents. The indictment presents a selection of the evidence that the government intends to use to convict the men, and it isn’t just simple downloads of the copyrighted movies. The government combed through Vaulin’s e-mails and traced the bitcoins that were given to him via a ‘donation’ button.” Read more of this story at Slashdot.

Read More:
US Unveils Charges Against KickassTorrents, Names Two More Defendants

Password Sharing Is a Federal Crime, Appeals Court Rules

An anonymous reader writes from a report via Motherboard: An appeals court ruled Wednesday that sharing passwords can be a violation of the Computer Fraud and Abuse Act, a catch-all “hacking” law that has been widely used to prosecute behavior that bears no resemblance to hacking. Motherboard reports: “In this particular instance, the conviction of David Nosal, a former employee of Korn/Ferry International research firm, was upheld by the Ninth Circuit Court of Appeals, who said that Nosal’s use of a former coworker’s password to access one of the firm’s databases was an ‘unauthorized’ use of a computer system under the CFAA. In the majority opinion, Judge Margaret McKeown wrote that ‘Nosal and various amici spin hypotheticals about the dire consequences of criminalizing password sharing. But these warnings miss the mark in this case. This appeal is not about password sharing.’ She then went on to describe a thoroughly run-of-the-mill password sharing scenario — her argument focuses on the idea that Nosal wasn’t authorized by the company to access the database anymore, so he got a password from a friend — that happens millions of times daily in the United States, leaving little doubt about the thrust of the case. The argument McKeown made is that the employee who shared the password with Nosal ‘had no authority from Korn/Ferry to provide her password to former employees.’ At issue is language in the CFAA that makes it illegal to access a computer system ‘without authorization.’ McKeown said that ‘without authorization’ is ‘an unambiguous, non-technical term that, given its plain and ordinary meaning, means accessing a protected computer without permission.’ The question that legal scholars, groups such as the Electronic Frontier Foundation, and dissenting judge Stephen Reinhardt ask is an important one: Authorization from who?” Read more of this story at Slashdot.

See the original post:
Password Sharing Is a Federal Crime, Appeals Court Rules

‘Alarming’ Rise In Ransomware Tracked

An anonymous reader quotes a report from BBC: Cyber-thieves are adopting ransomware in “alarming” numbers, say security researchers. There are now more than 120 separate families of ransomware, said experts studying the malicious software. Other researchers have seen a 3, 500% increase in the criminal use of net infrastructure that helps run ransomware campaigns. The rise is driven by the money thieves make with ransomware and the increase in kits that help them snare victims. Ransomware was easy to use, low risk and offered a high reward, said Bart Parys, a security researcher who helps to maintain a list of the growing numbers of types of this kind of malware. Mr Parys and his colleagues have now logged 124 separate variants of ransomware. Some virulent strains, such as Locky and Cryptolocker, were controlled by individual gangs, he said, but others were being used by people buying the service from an underground market. A separate indicator of the growth of ransomware came from the amount of net infrastructure that gangs behind the malware had been seen using. The numbers of web domains used to host the information and payment systems had grown 35-fold, said Infoblox in its annual report which monitors these chunks of the net’s infrastructure. A lot of ransomware reached victims via spear-phishing campaigns or booby-trapped adverts, he said, but other gangs used specialized “crypters” and “packers” that made files look benign. Others relied on inserting malware into working memory so it never reached the parts of a computer on which most security software keeps an eye. Ars Technica reports that drive-by attacks that install the TeslaCrypt crypto ransomware are now able to bypass Microsoft’s EMET. Read more of this story at Slashdot.

Read More:
‘Alarming’ Rise In Ransomware Tracked