* Posts by x 7

3849 publicly visible posts • joined 10 Nov 2014

ACLU: Here's a secret – cops are using the FBI's fake cell-tower tech to track crims' phones

x 7

Re: Air-mounted Stingray

G-BWLF belongs to RVL Group

See http://www.rvl-group.com/about-us/

"Our range of services includes aerial survey and surveillance, ad hoc and scheduled passenger and cargo flights, specialist aircraft modifications for survey work, full aircraft maintenance and the ability, unique among UK airlines, to offer an aerial dispersant spraying solution for the tackling of pollution at sea. "

and from http://www.bloomberg.com/research/stocks/private/snapshot.asp?privcapId=117016865

"Reconnaissance Ventures Limited Group owns and operates a fleet of 20 aircrafts and offers crewed aircraft services to government agencies and commercial companies. The company offers modification, maintenance, flight operation, flight crew training, advanced aerial survey techniques, scheduled services, and ad hoc charter services. It clientele includes maritime and coastguard agency, environment agency, ordnance survey, blom aerofilms, oil spill response, various high technology military defense, and research companies."

keep wearing the tinfoil, what you saw may well have been a government surveillance

x 7

"The TVs aren't transmitting anything"

yes they are.....theres a heterodyne tuner in there pumping out RF frequencies which can leak through the antenna and be used to indicate which channel is being used

of course on a CRT based TV you can pick up leakage from the tube, which will give away whats being viewed, while there are rumours around that a similar trick can be played on SOME flat screens

and of course a laser played onto a window can be used to capture audio and so prove use that way

x 7

It may well be that the reason for the sentence bargain was not to hide the (assumed) illegality of the evidence gathering, but rather to disguise the technical details behind it.

I believe I am correct in saying that in the UK no-one has ever been prosecuted for failure to purchase a TV licence based on the evidence of detector vans.....because the authorities are not prepared to reveal in court how the detectors work. They prefer to keep the technology secret

Once an address with a working unlicensed TV has been identified by a detector set, then evidence is gathered manually (i.e. a witness seeing / hearing a broadcast) or else via self-incrimination following a bullying interview under caution.

Similarly the FBI won't be keen for the public to know just how their mobile phone spoofing works.

This could be for matters of national security.......or it could be because it doesn't actually work very well and is invalid if presented on its own

x 7

the RAF is believed to use the same equipment in their UK-based Islander / Defender aircraft (in support of the Police / Security Services)

Not even GCHQ and NSA can crack our SIM key database, claims Gemalto

x 7

Or maybe Snowden is earning money for hiimself......

All he has to do is post a scare story about a tech company and its share price crashes. What chance he was paid to do so by a competitor or hostile purchaser? How long before we see a stock market bid for Gemalto?

Snowden - and his utterings - have become a very valuable commercial commoditty

Gemalto: NSA, GCHQ hacked us – but didn't snatch crucial SIM keys

x 7

"Gemalto are in a difficult situation. "We didn't find an intrusion" either means"

or (4) - They've been instructed what to say by the security forces

'Lenovo, Superfish put smut on my system' – class-action lawsuit

x 7

"saw the same block of ads in her web browser – featuring "scantily clad women" "

presumably triggered by advertising cookies on her PC - after all these were supposed to be targeted adverts. So who in her family had previously been using her laptop to view smut?

German music moguls slammed for 'wurst ever DMCA takedown spam'

x 7

"wurst ever DMCA takedown spam'"

acting like a bunch of bullying brats...

I'm the wire starter: ARM, IBM tout plug 'n' play Internet of Stuff kit

x 7

But how do I connect it to a lightbulb?

Lenovo shipped lappies with man-in-the-middle ad/mal/bloatware

x 7

Re: I recently found a company nearby

I don't know who he's thinking of, but these guys are worth a look if you want a custom built laptop

http://www.dvc.uk.com/acatalog/Laptop_PCs.html

they specialise in high spec machines (mainly for real-time video editing), and assemble them from kits mainly provided by Clevo - arguably the most bullet-proof of all the Chinese ODM suppliers

x 7

my E540 is clean

My E540 appears to not be affected - no sign of the cert

It was a recent purchase and had Win7 installed though manufacture date was around Sept last year. Anyone know the active dates for this infection?

Lenovo to customers: We only just found out about this Superfish vuln – remove it NOW

x 7

"Lavasoft? Ad-Aware?"

Historically the Ad-Aware program was a rebranded version of Norman Antivirus, with Lavasoft generating their own malware signatures (my understanding was that the contract prevented Lavasoft offering a full AV solution)

A few years ago Norman pulled the plug on the deal so Lavasoft had to come up with a new program quickly, this new version of Ad-Aware becoming closer to a full AV program. It wouldn't surprise me if they simply licenced off-the-shelf technology from others and bundled it all together as their in-house software expertise wasn't great. So, no surprise if the current version of Ad-Aware is compromised.

x 7

Re: Karma?

Karma?

No........cookies

or hijacked........

x 7

The ironic thing in all this is that the same Komodia software is being used both as scamware / hijack software, and as website protection software. Hows that for amazing marketing???

We now know that the following scamware uses it

CartCrunch Israel LTD

WiredTools LTD

Say Media Group LTD

Over the Rainbow Tech

System Alerts

ArcadeGiant

Objectify Media Inc

Catalytix Web Services

OptimizerMonitor

While the following supposed security filters use it

Atom Security, Inc

Infoweise

KeepMyFamilySecure

Komodia

Kurupira

Lavasoft

Lenovo

Qustodio

Superfish

Websecure Ltd

I've also picked up hints from elsewhere that a number of toolbar programs also use it

Until we have a definitive list of just who else licenced the Komodia software we have to assume that ANY web-filtering security software is suspect unless otherwise proven

x 7

"I didn't investigate how Avast avoids certificate"

that explains how a few months back IE9/10 crashed if a Google Search was carried out with Avast's web protection plugin enabled

its been fixed now but it caused a lot of problems at the time and Avast totally refused to publicly acknowledge the problem

x 7

"ex" -spooks???????

once a spook always a spook

x 7

cert advisory re Komodia

cert advisory re Komodia is at http://www.kb.cert.org/vuls/id/529496

Also lists the following products as affected

Atom Security, Inc

Infoweise

KeepMyFamilySecure

Komodia

Kurupira

Lavasoft

Lenovo

Qustodio

Superfish

Websecure Ltd

may well be others

this guy managed to get shots of the Komodia website before it went offline

http://borncity.com/win/2015/02/20/komodia-ssl-certificates-and-hijacking-tech-are-widely-spread/

you can see from there how it works

x 7

more from Forbes

first from that earlier link

"As security expert Matt Suiche pointed out to me on Twitter, the password used to get the encryption key for the Superfish certificate authority (you can find more details on that in my previous article here) is “Komodia”. There’s a company called Komodia, which also does ad injection and “global proxy interception” – some very aggressive techniques. According to the company’s website (which is currently down because of an attack on the site), the founder, Barak Weichselbaum, was also part of the surveillance industrial complex in Israel, having carried out “military service as a programmer in the IDF’s Intelligence Core”. Komodia offers one service called SSL Digestor that carries out ad injects and effectively breaks encryption, just as Superfish was doing on Lenovo PCs.Suiche and Robert Graham of Errata Security are convinced that product was used by Superfish in the Lenovo case.

So ex-surveillance agents, operating in both the private and public spheres, have ostensibly combined their powers to force ads onto people’s computers, leaving web users open to other forms of attack. That’s startling and frightening for anyone who cares about privacy or security."

and from http://www.forbes.com/sites/thomasbrewster/2015/02/20/komodia-lenovo-superfish-ddos/

"It’s becoming apparent that the Lenovo Superfish omnishambles affects far more people than initially thought. Whilst it’s likely millions of PCs have Superfish running on their systems, intercepting their traffic, throwing adware on their computers and leaving users in danger of being hacked, many more will be running the technology believed to underpin the Superfish ad injection service.

The company behind that highly intrusive technology, known as SSL Digestor, is called Komodia. But anyone who wants to learn more about what it does won’t find out anything by visiting komodia.com today (which, ironically, doesn’t run over encrypted HTTPS connections). That’s because those visiting the site will find a brief, startling claim: it’s been hit with a Distributed Denial of Service (DDoS) attack due to “recent media attention”.

What’s confusing here is that DDoS attacks usually swamp a server with traffic and take it offline, making the site completely inaccessible. But it’s still possible to reach komodia.com. Is the company simply claiming DDoS and hiding? That’s unlikely. Darren Anstee, from DDoS expert Arbor Networks, said that sometimes, when sites are under attack, the organisations running them move to using a more simplified page to reduce the load on the server. This might see a site’s graphic content removed or reduced.

In a brief email conversation with Barak Weichselbaum, Komodia’s founder who was once a programmer in Israel’s IDF’s Intelligence Core, he said the company was not hiding behind DDoS claims and that the attack was real. “We had to decide if we focus on it, or on other things, we are busy as you can imagine. I saw on forums people say we’re hiding, the site can be seen from the internet archive, so no point trying to hide anything. Regarding the Lenovo Superfish story I’m unable to comment because of contractual reasons,” he told Forbes.

He said the DDoS saw reams of requests hit the HTTP server, which made the PHP backend code processes “consume all the CPU”. “The static page doesn’t consume CPU with the level of this attack.” He hadn’t responded to further questions on the security implications of his technology.

"Why is Komodia now getting so much attention anyway? Because its hugely intrusive and poorly protected technology is found in many places on the web, according to Marc Rogers, principal security researcher at content delivery network CloudFlare. The technology can be found in various parental control software, including those made by Qustodio and the Israeli firm’s own “Keep My Family Secure” product, and in web filter products across the world. On Weichselbaum’s LinkedIn page, he says: “My biggest vision is to create a world where children can surf the internet safely, and I’m working to see this vision realized.”

Worryingly, it’s very easy to extract and use the encryption key run by Komodia, largely because the password to access all different versions of the certificate is “komodia”. That means malicious hackers can craft their own SSL certificates, which are supposed to guarantee trust, with the Komodia key. They can then intercept people’s internet connections, create fake versions of certain websites and steal their data, as long as targets’ computers trust the Komodia certificates.

“This means that those dodgy certificates aren’t limited to Lenovo laptops sold over a specific date range. It means that anyone who has come into contact with a Komodia product, or who has had some sort of Parental Control software installed on their computer should probably check to see if they are affected,” said Rogers.

“This problem is much bigger than we thought it was.”

x 7

this forbes article is worth a read

http://www.forbes.com/sites/thomasbrewster/2015/02/19/superfish-history-of-malware-and-surveillance/

turns out that the CEO of Superfish has quite a long history in the surveillance industry

to quote

"Pinhas, the co-founder, has an interesting history, especially from a privacy perspective. According to his LinkedIn profile, in 1999 he co-founded a company called Vigilant Technology, which “invented digital video recording for the surveillance market”. That company is still thriving today, boasting contracts with a diverse range of big-name clients, including the US military’s White Sands Missile Range, Paradise Casinos in California and Arizona, and a number of Israeli government organisations.

"Prior to that, former Tel Aviv resident Pinhas worked at Verint, an intelligence company with a tumultuous history, where he carried out “signal processing research” in which he’d recognise and analyse anything going over a telephone line. Verint was founded by members of the elite military intelligence agency Unit 8200. It was featured in a Wired article in 2012, in which it was alleged Verint tapped Verizon’s communications lines and was supposedly working with the National Security Agency in doing so. Just a year later, Edward Snowden would reveal Verizon had let the NSA tap all customers’ communications. One wonders if Pinhas was ever involved in those shady operations. Did that lead to his move to the West Coast?"

and theres more, which I won't copy for fear of copyright problems

x 7

Just checked the Superfish website - looks like they are keeping their heads down. Last press release was 11th Feb http://www.home.superfish.com/#!news/c1w2u

Someone asked who else used Superfish - this gives an idea (http://www.xenia.co.il/Superfish)

"Superfish sells its search capabilities to several major customers in the eCommerce space; in Q10 Superfish launched its consumer application, a browser add-on that uses visual search technology to help consumers find deals and other visually-similar items instantly while shopping. The product works on almost any product and on hundreds of shopping sites including Amazon.com, Best Buy, eBay, Macy's, and Overstock.com. Current index covers over 60 million products".

Meanwhile http://trends.builtwith.com/websitelist/SuperFish reckons there are currently "2,881,734 active sites using SuperFish" - you can buy a list of them there if you want

x 7

1) "It added that it was working with Microsoft and McAfee to help the firm kill or, at least, quarantine the crapware." Well, that will be the first time McAfee removes crapware: most of it McAfee doesn't touch

2) Assuming its a Windows 8 machine, then using F8 at startup and doing a "system refresh" should give you a clean install - sans crapware and drivers. You should then be able to install those one by one as desired from the on-disk repository

Leaky battery attack reveals the paths you walk in life

x 7

can you write an app to do that?

x 7

"Firstly it would mean that the attacker has compiled a detailed power profile of every location inside an area covering everywhere the target is likely"

Easy for the Israelis in the West Bank or Gaza

especially after most sources of interference have been removed by bombing the power stations and grid out of existence

Don't forget whose technology this is...

x 7

Strange that within a week we should get another expose of an Israeli snooping technique.

Is there a Jewish equivalent to Snowden out there leaking this stuff secretly?

Mozilla mulls Superfish torpedo

x 7

Re: Comodo has a bit of a problem too: PrivDog bundleware

Ironic considering Comodo are/were one of the biggest provider of certs.......and the rationale of much of their security software was based on that fact and the resulting easy internal access allowing simple verification. Do we now have to assume all Comodo-issued certs are in fact valueless?

x 7

Re: Deeper problem

"Komodia firewall "

I suspect you are getting confused there with the Comodo Firewall

two completely different companies with unfortunately similar sounding names

nothing negative against Comodo - except in my experience their software is clunky and the AV signatures not very comprehensive, but thats nothing to do with this current problem. Don't confuse the two companies

Norton Internet Security antivirus update 'borked Internet Explorer'

x 7

Re: Have an upvote!

My comment was based on the simple fact that anyone who believes Webroot security products are actual real security products is either stupid, deluded, or else taking the piss either for fun, or for commercial misrepresentation.

I can't believe you're stupid, but which of the latter three is correct I don't know.

If you had had to clean as many machines as I have over the years you'd know why I say what I do. The Webroot AV signatures are useless, it doesn't remove spyware, and in the past has come bundled with multiple scamwares. In its own way its as bad as Norton or McAfee - possibly worse as Norton's AV signatures are generally more capable.

If in your first essay you'd settled on a AV product which has signatures which work, then maybe I could have taken what you said seriously.

x 7

Re: Yes it is kind of quaint using any AV these days

I was beginning to think you were on to something and then you went a spoilt it all by saying you use Webroot....

thats a useless piece of junk which spills scamware all over the machine. And more importantly it doesn't carry out its principal role of spyware removal.

Your post reads as nothing more but a clever piece of trolling / advertising on behalf of Webfoot

x 7

its a Norton security product

so basically standard behavior for it

HOLY SEA SNAILS! Their TEETH are strong enough to build a plane

x 7

Re: Not the strongest by far!

"dogs danglies"??

I'm sure thats bollox

x 7

not news......

I hate to decry peoples efforts, but I don't believe this is "new" news. I can remember reading 40+ years ago that limpet teeth were supposed to be harder/stronger than diamond. Can't remember where though - New Scientist maybe???

But when you get down to it, it should hardly be a surprise for an animal that crunches rock, both to access food, and to create a better low-tide anchorage site to prevent drying out. They chew the rock to better match the profile of the shell, creating a tighter fit

Man the HARPOONS: YOU can EASILY SLAY ad-scumware Superfish

x 7

Apologies, this is a crosspost from one of the other threads but it seemed worth it

The ironic thing in all this is that the same Komodia software is being used both as scamware / hijack software, and as website protection software. Hows that for amazing marketing???

We now know that the following scamware uses it

CartCrunch Israel LTD

WiredTools LTD

Say Media Group LTD

Over the Rainbow Tech

System Alerts

ArcadeGiant

Objectify Media Inc

Catalytix Web Services

OptimizerMonitor

While the following supposed security filters use it

Atom Security, Inc

Infoweise

KeepMyFamilySecure

Komodia

Kurupira

Lavasoft

Lenovo

Qustodio

Superfish

Websecure Ltd

I've also picked up hints from elsewhere that a number of toolbar programs also use it

Until we have a definitive list of just who else licenced the Komodia software we have to assume that ANY web-filtering security software is suspect unless otherwise proven

x 7

Naive question.......

OK..is there any way to bypass this by forcing a browser to authenticate certificates against a KNOWN specific single trusted authority?

Nvidia U-turns on GTX 900M overclocking after gamer outrage

x 7

Re: Laptops

"ample".........easy mistake to make

x 7

"As long as people accept the risks of running it above spec...."

thats the problem - people want to overclock without accepting the risks

x 7

People have such short memories.........its not many years since Nvidia (and to a lesser extent ATi) had all those problems with graphics chips becoming unstuck due to low-lead / low-temperature solders. Some laptop models had close to 100% return rates. They're obviously worried about a repeat of that expensive problem.

When you get down to it, laptops are hardly designed for gaming. Why should Nvidia provide a facility that can only significantly increase failure rates and - undeserved - warranty returns?

The Extreme Centre, Rise of the Super Furry Animals and The Kind Worth Killing

x 7

by publishing this review of Ali you give the marxist fool a false aura of validity. He's an out of date extremist irrelevant dinosaur who needs to be dumped in the shitpan of history along with all his false ideologies. To paraphrase Thatcher, such people should be denied the oxygen of respectability.

By even reminding us of his continued existence you do the world a disservice.

Inside GOV.UK: 'Chaos' and 'nightmare' as trendy Cabinet Office wrecked govt websites

x 7

and to quote her from https://userresearch.blog.gov.uk/2014/09/16/sample-size-and-confidence/

"If you’re doing qualitative design research, don’t worry about sample size. Sample size and statistical significance don’t matter

The only thing that matters is how confident your team is about the next decision they need to make"

= ignore your user base and make your own arrogant arbitrary decisions

x 7

"Leisa Reichelt, the GDS "head of research""

She sounds German to me. There you go, explains it all - bloody europeans still trying to drag us down

More seriously, read her bollox bullshit comments here

https://gds.blog.gov.uk/2013/08/30/how-we-do-user-research-in-agile-teams/#comments

you'll have to expand the comments section........multicoloured friggin post it notes to record user responses....no wonder complaints get lost

x 7

Martha Lane Fox????

I totally fail to understand the involvement of Martha Lane Fox and similar others? What are her past achievements which suit her for the role? Does launching a dot.com bubble company that soaked up a lot of cash to create a customer facing website with minimal content count???? I guess there are similarities.....I hope that uk.gov can't go bust though, unlike her previous fuckups.

"lasttravel.com"???? now we have "lastgov.com" about to implode in the same way.....

Something Coming Through – aliens, LA noir, techno-thriller, dystopia ALL in the mix

x 7

jackaroo???

so the first aliens we meet are going to be a bunch of trainee "sheep" herders ?

so who are the "sheep" and who gets to eat them?

Did NSA, GCHQ steal the secret key in YOUR phone SIM? It's LIKELY

x 7

Gemalto ID cards as well????

While they were at it did they also hack Gemalto's ID cards as well? For instance the British NHS use those to access the NHS spine network......and all the associated patient records

El Reg chefs whip up Post-Pub Noshographic

x 7

I don't give a monkey's about the food, but where can I get the phone number of the girl in the photo? I really fancy her.

Raspberry Pi, meet face: You're probably NOT Blighty's biggest PC maker!

x 7

I think you'll find Time Computers shifted more boxes than either Amstrad or Raspberry have (so far)

At the height of production the assembly plant at Simonstone was claimed to be capable of 5 million PCs per year, though actual production was short of that. However if you average a million a year over ten years, then thats a fair sized total number. With 7 production lines working 7 day weeks thats only 391 machines / line / day - easily doable with the facilities on site

Of course none of it was UK sourced - it was all imported, unlike either Amstrad or R Pi. It was just simple screwdriver assembly work

Help! DYING Google Helpouts YELPS out the door

x 7

I've never heard of it. I suspect very few people have........hence the lack of use

Worst … commute … EVER – Surrey to Sydney

x 7

I'd guess he's no longer married

Jaguar F-Type: A beautiful British thoroughbred

x 7

1) How easy is it to change the spark plugs and how much do they cost?

2) "the F-Type Coupé's structure is exclusively riveted and bonded ....." sounds like a recipe for future problems. Rivets wear and rattle. And I'll bet post-crash damage repair is going to be close to impossible unless the body shell is replaced each time - or is sent back to the factory for repair. Few - if any body shops will have the skills or equipment to fix even minor dents

Free WiFi coming to UK trains ... in two years

x 7

this is worth a quick glance http://bit.ly/1CqHJfg

OK its marketing blurb, but it makes it clear that for a new trainset with all the modern contrivances such as passenger announcements, destination boards, seat reservation signs, on board ticketing, fault identification........adding broadband for customers is a trivial bolt-on just requiring an interface between the rail comms network and the internet. The data network is already there on the train, its just a case of allowing the public to use it. Safely. Last thing you want is someone hacking into the drivers controls and overriding a braking action...................

where you're going to have problems is if the powers that be insist on broadband in older stock such as the Pacers........the cost of wiring and fitting is probably greater than the residual scrap value of those clapped out bus-bodied boneshakers

Acer: We're still a thing! We're still alive. And we are touting 300M shares

x 7

doesn't matter what they make (or try to make) it'll still be crap

Like working at IBM? Let Big Blue do the matchmaking

x 7

" IT engineers are often seen as attractive partners"

I take it the Chinese regard cold pizza as gourmet food, beer bellies as a sign of superfit bodies, and t-shirt, fleece and jesus boots as hote couture?