- Page 6

  • maybe Belgium needs some floating powerstations like this

    we won't have enough electricity during the winter

  • australian secret service wants the right to tap and hack any computer on the whole internet

    "New national security legislation designed to make it easy for the Australian Security Intelligence Organisation (ASIO) to tap, access, and disrupt target and third-party computers and networks is so broad that it could in effect give ASIO access to every computer on the internet, according to legal experts.


    Attorney-General George Brandis introduced legislation into the parliament last month that would expand the powers of ASIO, and its ability to access computers or computer networks under warrant as part of intelligence gathering, including the ability to access third party computers in order to gain access to a target computer under a warrant.


    Two legal experts appearing before the parliamentary joint committee on intelligence and security investigating the legislation yesterday warned that the drafting of the legislation could potentially mean that almost any computer in the world could be accessed.

    if it is written in the texts that are proposed to parliament it is that they have asked for such powers and they don't have to say that they didn't - this is how the system works

  • since several days a DDOS is disturbing Playstation Network

    well, guys go outside or read a book

    source http://downdetector.com/status/playstation-network

  • put all your securitypersonnel in the DHS and than get hacked and lose big time

    the US department of Homeland Security is in fact the most important national security administration which englobes some intelligence, police, emergency workers and so on

    so when you want to hack something central and have a lot of data after one attack you shouldn't look any further

    and by the way, it is not because one say that it is an advanced attack that one shouldn't have taken all the precautions

    for article source http://www.reuters.com/article/2014/08/22/us-usa-security-contractor-cyberattack-idUSKBN0GM1TZ20140822

  • #isis I don't think ISIS approves of this ISIS named underwear

    source http://www.dailymail.co.uk/news/article-2732768/Ann-Summers-apologises-launching-range-underwear-terrorist-group-ISIS.html

  • #isis this is how the UK and its partners are hunting the killer of James

    with all they get

    they could say like Churchill, we will search for him on the ground, we will search for him in Britain, we will look for him from the air and we will look for him on the air and the internet, we will never surrender untill he is found

    source http://www.dailymail.co.uk/home/index.html


  • #russia Roubles with balls on it (pornographic male notes)

    source http://www.telegraph.co.uk/news/worldnews/europe/russia/11051282/Russia-rejects-appeal-to-ban-pornographic-bank-note.html

    Russian politicians are trying to outdo each other in stupidity

  • #ukraine and the invasionfever of the weekend is here again ....

    the day before the festivities of the national independence day of Ukraine with a full military parade in Kiev - maybe those troops need now to be resend to the borders ......

    the white Russian trucks have passed the border without the inspection by the Red Cross and without the consent of Ukraine but Ukraine can't stop the convoys or shoot at them because that could be the provocation the Russians were waiting for

    meanwhile more tanks and military hardware is arriving at Rostov at around 20km of the border with Ukraine


    They had to arrive this weekend in Lugansk because in this last real important city hold by the rebels (as the situation in Donetsk has detoriated heavily for the rebels) small groups of Ukraine soldiers are penetrating through the suburbs fighting their way through the city street by street from different sides (without having accomplished a full encirclement). ALthough there are already Russian paratroopers in the city (which is known because some are captured and more were delivered in critical condition to a local hospital) Putin had to invade today and deliver food but also one of the things that is most essential in war and that is FUEL

  • even an exploit on code of a motherboard can now lead to a 300GBPS DDOS

    and this on central infrastructure of the internet (CDN or Content distribution Network) that was in fact put into place after the big DDOS attacks in the years 2000 on Yahoo and Microsoft that led to a panic that if there was no system to distribute the same or localised content so that there was never again a single point of total failure)

    now it seems that the central infrastructure of this CDN had itself some exploitable vulnerabilities and was under an enormous heavy DDOS attack

    "The DDoS attack documented by VeriSign called its enormous strength from a botnet comprised of up to 100,000 servers susceptible to the ‘Supermicro IPMI [Intelligent Platform Management Interface]’ flaw, published by researcher Zachary Wikholm on 19 June. This motherboard-level issue permitted hackers to get into an unencrypted password file for a system by connecting via software port 49152. The attackers knew what they were doing. An additional noticeable method was to sneak malformed packets past mitigation by placing them within GRE (Generic Routing Encapsulation) tunnels. http://zerosecurity.org/2014/08/300gbps-ddos-attack-firm-exploits-server-flaw

    this is also the reason why many central services of the internet like Facebook and others were going much more slowly the last week

    and we probably didn't see the last of it

  • the US regulator of the US nuclear power industry under permanent cyberattacks

    As the overseer of the U.S. nuclear power industry, NRC maintains records of value to overseas aggressors, including databases detailing the location and condition of nuclear reactors. Plants that handle weapons-grade materials submit information about their inventories to one such system, according to a 2000 IG report on efforts to protect critical infrastructure systems.

    there are several attacks documented and some had some effect with some leakage of information but it doesn't seem from the reports that they could steal much critical information and it seems they had a computer or mailbox here and there but probably no access to the really important databases who probably were somewhere better secured

    I don't understand the headline because it is normal that they were atacked and they should expect to be attacked by every new and old means by the most experienced and amateuristic hackers every second of the day from all over the world

    so normally in this environment with this kind of critical functions and information

    you don't go online and you don't have online content and so on

  • will Facebook now be sued all over the world for data from underage users

    Normally you have to be 13 years old to be able to be part of the network. Now in Northern Ireland a father asked through court for the data about and from his child and the judge went even further than that

    "Facebook must reveal the records it has on underage children with accounts in Northern Ireland, due to a High Court ruling.The ruling was made in relation to legal action being taken against Facebook, which alleged that the registration system was too easy for underage children to set up profiles and made them vulnerable to paedophiles.


    The Belfast Telegraph revealed that the legal action comes from the father of a girl who, from the age of 11, contacted men and posted photos on Facebook. Under Facebook's own policy no one under the age of 13 should be allowed to set up an account.

    this is for every privacy commissioner in Europe now a very interesting precedent

  • the fragmentisation of the *coin market makes it easier to manipulate it (NSA)

    the first idea was that only bitcoin would be developed and in that idea there would be so many users - even if they are mathematically limited at some time - that no group would have so many sources (called mining) that  nobody could manipulate it course or discover who were the other people.

    but that idea is blown away by the arrival of so many new small *coin exchange markets that it would only take a few millions to have enormous control over the currency and its users

    the second idea was that every individual would only look after itself (it is a very libertarian ideology that is the very basis of this virtual currency) and that no groups would be formed in which people would have together the same interest and the same strategy and goals

    well, rumours are that the NSA has bought itself (or developed the currency itself) the Ghash currency and has a controlling 51% of it

    naturally like any intelligence service with worldwide operations there is nothing as interesting as a virtual currency to transfer funds and pay people and when you can controll the price of the currency you hold them also hostage because they depend on you to have some real value out of it - the fact that it is anonymous is a bigger advantage


  • wikipedia moves from content to free datasets

    How does Wikidata work?


    This wiki is the Wikidata repository. The repository is the central storage for the data that may be accessed by the client Wikis connected to the repository. By maintaining the data in the repository, content loaded dynamically from Wikidata does not need to be translated nor has to be kept up to date in each individual client Wiki. In addition, Wikidata has centralized all Wikipedia interlanguage links.



    The Wikidata repository consists mainly of items, each outlined by a label, a description and likely one or more aliases. Sitelinks connect the articles of all client wikis while statements describe detailed characteristics of each Item. Each statement consists of a property and a value: You can link items of people to their place of birth, to their occupation or to its number of an authority control database, link a politician to his or her political party. You can give mountain peaks, places or buildings geographic coordinates, link an Item about a township to its next higher administrative unit, link a country to its highest representative, to its national anthem and so on. All this informations can be used in any language to display it in their own language even if all the information is taken from a different language. Even more, with accessing these values client wikis will always embed the most up-to-date data.

  • if wikipedia can have bots write a million articles, wait for the propagandabots

    "The one milionth article was not manually created by a human, but written by a piece of software (a “bot”). The bot, in this case, Lsjbot, collects data from different sources, and then compiles the information into a format that fits Wikipedia. Lsjbot has to date created about 454,000 articles, almost half of the articles on Swedish Wikipedia.

    Bot-created articles have led to some debate, both before Lsjbot started its run, and currently. First, there was a lengthy discussion on Swedish Wikipedia after the initial proposal by Lsjbot’s operator, science teacher The Swedish Wikipedia community was wary, having learned the lessons from previous conflicts about article-creating bots, including rambot in 2002. But there was also curiosity, so a series of test runs was made to make sure that the articles were acceptable.

    so if wikipedia can do that, than instead of paying hundreds of trolls to scan and scam the internet with propaganda you can write the same software to write your propaganda where-ever whenever

  • wholesale stealing of legobricks to put them on ebay

    source http://www.vocativ.com/underworld/crime/lego-heists/#!bGWmlN

    and it brings in more than breaking in some shop

    maybe Lego will start to certifie or ID their boxes so that stolen products can be traced

  • when time is like money we need timebanks (and what it could do for open source)

    "TimeBanks are simply banks that keep track of hours a member earns helping others and hours he or she spends getting help from someone else. All hours are equal, regardless of whether the service is highly skilled professional help or one neighbor driving another to a doctor’s appointment. You give an hour of help. You earn one “time dollar” or “time credit.” The person receiving the help owes one time dollar that can be paid back by helping someone else.


     Members list what they are willing to do and when they can do it. When somebody calls in for help, the need is matched to available members. Computer technology enables the coordinator or “match-maker” of a TimeBank to identify, store, and access resources that people offer one another and keeps track of what has been earned and spent.

    but think of what it could do for open source, it could in fact give people who work and do stuff advantages or credits that they could cash in with other services or products and so it can maybe become worthwhile for some people who are important but need some incentives other than the ideals (doing his garden for example while he is checking code)

  • as bitcoin becomes another currency, stellar becomes an global intercurrency currency

    "Unveiled last week by a not-for-profit foundation bootstrapped by one of the most important developers in the world of digital currency, Jed McCaleb, and one of the hottest startups in the rapidly evolving realm of online payments, Stripe, this new project aims to bring digital currencies to a much wider audience and provide a much smoother way of moving all sorts of money over the internet. Stellar is many things, but it’s best to think of it as an effort to create a worldwide network that lets anyone send any currency and have it arrive as any other currency. You can send bitcoin and have them arrive as dollars. You can pay someone in euros, and he can receive them as litecoin.

    it is the link between the digital currencies - whatever their name - and the real currencies that is interesting

  • the openfoodnetwork brings healthy food directly to the consumer or the shop

    "After much careful research and strategic networking, the Victoria-based pair created a revolutionary piece of software which will provide producers and consumers a way to bypass the supermarkets altogether: the Open Food Network.


    The Open Food Network is an online platform where farmers can sell their produce to consumers, either directly or through local food distribution enterprises such as community hubs and independent retailers. Co-founder Serenity Hill summarises their mission as “supporting a distributed system that can scale – to help people/independent businesses doing great stuff producing and distributing food to find each other, connect, and collaborate to make a bigger collective impact”.  The website connects farmers with local distributors and customers, and streamlines the administrative aspects of tracking inventory and managing orders. Without this software the administrative barriers to both farmers and distribution hubs can be crippling to any local food enterprise.