
OMG, The Register...
Someone who doesn’t know who Schrems is, and calls “Austrian citizen” the lawyer who single-handed brought down the Safe Harbor agreement - should simply not write articles about privacy. Or maybe use Wikipedia?
What a shame.
23 publicly visible posts • joined 9 Dec 2011
The non-existent real difference in security is more than compensated by the discomfort of using such obsolete OS such as OpenBSD and having to boot by insecure USB. LOL :-)
It reminds me of those people who blame problems on immigrants, confusing perception of security with reality...
Not "Minicatz". It is a Windows Kerberos hacking tool.
Also, creating C:\Windows\perfc.dat may not be useful. According to McAfee (https://securingtomorrow.mcafee.com/mcafee-labs/new-variant-petya-ransomware-spreading-like-wildfire/) the file name can be different, and the victim's machine will reuse the same name as the source one, but the exact file name cannot be foreseen.
Actually, the fact that only 450 people are legally resident in Vatican does not mean that only 450 people live there.
Italy - and their two "embedded" states - has the concept of "residency" being legally different from "domicile". If you are resident in Vatican, you have tax and other advantages, which are not granted to everyone.
It is most likely the same situation of Monaco: only a few people are resident there, but many more live and work there every day.
It is a very complex topic, however there is a report on the Imperva web site detailing how they blocked this attack. You may want to have a look at that.
It has been *a bit* more complicated that just using compromised machines to launch a blind DOS. The attack was sophisticate.
Hope it helps.
The encryption algorithm has very little to do with the kind of service - 2G, 3G or 4G - you are able to receive on your mobile.
The most common encryption algorithm found today - and the one the CCC has "cracked" - is A5/1. A5/3 upgrade is available for 2G networks as well, and AFAIK it has not been challenged yet.
The problem is that old BTSes may require expensive upgrades to support A5/3. This is where the problem lies.
This is not how botnets generally work.
Although some may use hardcoded IPs, the majority now keeps kind of regular expression of domain names (like bot*.net) and will more or less randomly try to resolve the names until they find one that works (like botnet1.net, botnet2.net, or botbot.net, etc.).
If the malware can resolve the name longer after it has been de-registered, we clearly have a problem.
Cheers