Tag: internet

BGP hacking

This article will show how this hijacking works, and how China employs its conveniently distributed points of presence (PoPs) in western democracies’ telecommunications systems to redirect internet traffic through China for malicious use. It will show the actual routing paths, give a summary of how one hijacks parts of the internet by inserting these nodes, and outline the major security implications.

FB Wifi

In late 2015, we began testing Express Wifi, a program that enables local entrepreneurs, internet service providers, and mobile network operators to offer fast, affordable internet access in local communities around the world. We partner with licensed local internet service providers, mobile network operators, and others to provide Wifi services. Today, Express Wifi is available with 10 partners in 5 countries — India, Indonesia, Kenya, Nigeria, and Tanzania.

People typically access Express Wifi hotspots by signing up with a participating retailer and purchasing a prepaid data pack. Using Express Wifi hotspots, our partners can easily expand their services and provide faster, more affordable connectivity to rural and urban areas.

Suing trolls

When law enforcement won’t help, citizens always have another option: hit the bad guys in the wallet. But it’s not that easy. The forensic work of identifying anonymous online perpetrators is expensive, and many attorneys won’t take the cases because the individual trolls usually don’t have much money to cough up even if you can find them. It’s a powerful defense, invoking the First Amendment in a defamation case—and in this particular one, Gilmore’s opponents may hold additional firepower. Because he spoke to the media about the car attack, they say, the court should treat him not as a private citizen but as a “limited-purpose public figure.” That’s an important distinction because public figures face a much higher standard of proof. They must show not just that the statements about them were false and harmful but that the statements were made with “actual malice”—with full knowledge that they were false or with a reckless disregard for the truth. What would a ruling against Gilmore on this point mean? His lawyer worries that it would create a devastating precedent. “Every witness to a crime or a terrorist attack or anything else is a de facto public figure simply because they saw something horrible”. Just think about Gilmore’s fraught decision to tweet his video. “The consequences would be potentially dire because it would make people certainly think twice before sharing what they saw.”

Rural E-Commerce

Shang was from a family of peanut farmers in rural Henan, and found village life slow and constricting. Men married at 18 and became fathers at 20. “You can see the end of your life at its beginning”. As soon as he finished high school, he left to join the Army. One of his teachers had given him a valuable piece of advice: “The future belongs to those who know English, computers, and their way around a vehicle.” Shang knew that his English was hopeless and his computer skills average at best. That left driving, without which his new career would have been out of reach. On the sidewalk, Shang’s phone rang. Someone who had been planning to pay in cash had suddenly realized that he didn’t have enough on hand. Shang arranged to make the delivery another time. This wasn’t unusual with younger customers, adding that almost everyone he delivered to was under 40.

Biggest Digital Heist

Yet experts point out that even if Katana was the mastermind, he was just one guy in a crime that surely must have had many authors. Unlike the bank jobs of yore, digital heists are amoeba-like ventures that divide over and over again as the malware proliferates. “We’ve already seen the modification of Carbanak and multiple groups using it. Same case with Cobalt.” In recent weeks, employees at banks in the Russian-speaking world have been receiving emails that appear to be from Kaspersky, the security company that unearthed Carbanak. The messages warn recipients that their PCs have been flagged for possibly violating the law and they should download a complaint letter or face penalties. When they click on the attachment, a version of the Cobalt malware infects their networks. It turns out cyberheists may not die even when their suspected perpetrators are nabbed.

High altitude connectivity

Part of that investment has been in developing next-generation connectivity technologies like Aquila, a high altitude platform station (HAPS) system. This has involved a lot of trial and error. When we started the Aquila program back in 2014, very few companies were involved in this area — and they were all working independently of one other. In addition, the only spectrum available for these platforms wasn’t suitable for broadband due to technical and geographical limitations.

Citizen Virtual Patrol

Surveillance cameras monitored by the police have become a ubiquitous presence in many cities. In Newark, anyone with internet access is allowed to watch. The Citizen Virtual Patrol has been hailed by officials as a move toward transparency in a city where a mistrust of the police runs deep, rooted in long-running claims of aggressive enforcement and racial animosity. The cameras provide a way to recruit residents as Newark tries to shake a dogged reputation for violence and crime. Since the program started about 1 month ago, 1600 users have signed into the website, and residents have been lobbying the department to add more cameras in their neighborhoods.

War on Fake Reviews

An Amazon spokeswoman explained that when a product is hit with many reviews in a short period of time, the company’s systems will automatically suppress all but “verified” purchases. But this preventative measure, too, can be easily gamed. “People would buy our game, not play it, leave the terrible review, and instantly request a refund,. It’s a well-worn tactic.” In his estimation, user-review systems such as those used by Valve, Steam’s developer, are so vulnerable to exploitation that they require as much moderation as social-media platforms. “The ethics and utility of these systems boil down to this: if a platform is going to have it, they have to be able to manage it to protect people from abuse and harassment, or they become responsible for that abuse”

Tiny Instagram Shit-Talker

I’m not sure whether I’ve solved the mystery of Lil Tay. I’m not sure what answer there could have possibly been, besides the one that exists: She has a stage mom who wants to make money from her fame. There’s obviously a great deal of care and thought being put into Lil Tay’s persona. The question that matters is who exactly is taking care of her.