The Feds’ Battle With Apple Isn’t Over—It Just Moved to New York
April 8, 2016 22:01
The government backed down last month on its attempt to force Apple to unlock the San Bernardino iPhone, but it’s not giving up its fight to compel the tech giant to cooperate in other cases, specifically a case in New York. On Friday, the government filed an appeal in the New York case—which involves a routine drug case, rather than a terrorism investigation, and a suspect who has already pleaded guilty.
Apple says the appeal is just another attempt by the government to continue its fight to establish a precedent for forcing companies like this to assist in bypassing encryption.
In late March, after a much-publicized court battle, the government pulled a Hail Mary and withdrew its demand for Apple to create a software tool that would help it gain access to a locked iPhone belonging to one of the alleged San Bernardino shooters. After insisting for weeks that only Apple had the ability to help it unlock the phone, the day before a scheduled court hearing in that case, the government announced that an unnamed third party had provided it with a method for unlocking the phone without Apple’s help. The government refuses to disclose the method.
The New York device is an iPhone 5s running iOS 7, as opposed to the San Bernardino phone, which is a 5c running iOS 9 software. The government is claiming in the New York case, as it did in San Bernardino, that it cannot extract data from the phone on its own and requires Apple’s help to do so. FBI Director James Comey mentioned this week that the method the feds used to access the San Bernardino phone won’t work on newer models like the iPhone 5s.
But an Apple attorney told reporters in a phone call this morning, on condition of anonymity, that the company plans to fight the government’s appeal by challenging its claim that it’s exhausted all possible methods to extract data from the phone on its own. If the government could, at the last minute, produce a solution to unlock the San Bernardino phone, it’s reasonable to conclude that it can also uncover a method to extract data from the New York phone, the attorney said.
Apple does not know the solution the government says it used to unlock the San Bernardino phone. But the company’s attorney noted that Apple is confident the unlocking method will have a short shelf life, since the company continues to improve security for its operating systems. At some point, he said, Apple will develop and implement a fix for whatever vulnerability the government may be using to get into that phone.
Like it did in the San Bernardino case, the government is invoking the All Writs Act to make its case to compel Apple to extract data in the New York phone. But unlike the California case, the government isn’t asking Apple to create a new tool to undermine its security in order to help crack the password on the phone. It’s simply asking Apple to extract data from the phone, something Apple has done in other cases in the past.
Earlier this year, Magistrate Judge James Orenstein in the Eastern District of New York ruled in favor of Apple, arguing that the government’s reading of the All Writs Act was “so expansive—and in particular, in such tension with the doctrine of separation of powers—as to cast doubt on the AWA’s constitutionality if adopted.”
Orenstein argued that the All Writs act cannot be used as a “gap filler” that gives law enforcement powers that Congress never granted it or explicitly denied. “In particular, unlike the government, Apple contends that a court order that accomplishes something Congress has considered but declined to adopt—albeit without explicitly or implicitly prohibiting it—is not agreeable to the usages and principles of law,” he wrote in his ruling, referring to the fact that Congress had previously passed on the opportunity to force companies to undermine encryption when it doesn’t possess a key to do so.
Apple’s attorney also highlighted the fact that the New York case is a routine law enforcement matter, not a terrorism case involving a desperate attempt to prevent massacres. This undermines Comey’s assertions in a recent letter to the Wall Street Journal that the San Bernardino case was simply about a single iPhone and the government’s fight against terrorism, and not about setting a precedent. Apple’s attorney said the New York case is simply another attempt by the government to establish a precedent for compelling companies to assist the government under the All Writs Act.
But application of the Act requires the government to show that it has no other method of extracting data from the phones, and according to experts who spoke with WIRED previously, that’s not necessarily the case with the New York phone, and about a dozen other iPhones the government is trying to force Apple to unlock in other cases. These experts say there are ways the government can extract data on phones without Apple’s help, using outside contractors or the NSA—methods that it has already used in the past.
As WIRED previously reported, the FBI has a sole-source contract with a mobile forensic firm founded in Israel called Cellebrite, which offers data-extraction services and tools for iPhones, Android, and Windows phones and Blackberries. According to that company’s web site, these tools can extract data from locked iPhones that are using any version of operating system up to 8.4.1, the last version of iOS 8 that Apple released.
The government has asserted in the New York case that “examining the iOS device further without Apple’s assistance, if it is possible at all, would require significant resources and may harm the iOS device.” But Cellebrite uses what’s called a boot-loader extraction method with phones that involves loading a custom operating system into the device’s memory during the boot sequence and making the user-data partition read-only so that data on the phone is not harmed.
It’s not known if Cellebrite’s methods will work on the New York phone.
But Apple’s attorney said during the phone call today that it plans to challenge the government on whether it has done everything it can do, and sought all help available to it, to unlock the New York phone.
Source link
Your Netflix Subscription Price Might Go Up Next Month
April 8, 2016 18:38
Millions of Netflix users will soon need to pay more to stream their favorite TV shows and movies. Starting in May, Netflix will raise the price of its standard, two-stream plan to $10/month for subscribers who were previously “grandfathered” in to a lower rate.

According to Business Insider, UBS analysts claim the change will impact 37 percent of US grandfathered subscribers, which comes out to around 17 million people. These people are currently paying $8/month and got to keep that rate when the price went up to $9/month and then again to $10/month.
This change is expected to catch millions by surprise. A JPMorgan survey cited by Business Insider says 80 percent of the 17 million subscribers affected by the update are not aware of the forthcoming change.
The price hike will go into effect for the grandfathered subscribers on May 10. You can visit your Netflix account page on Netflix.com to see if you are impacted.
As it does every month, Netflix added and removed a lot of new content in April. You can check out this roundup to see everything new for the month.
Source link
A Adobe publicou um update urgente para o seu Flash…
April 8, 2016 18:31Toda vida que escuto falar no plugin Flash, já sei que ocorreu algo errado, dessa vez, um update urgente foi lançado devido a uma vulnerabilidade que tem sido usada em ataques de ransomware. O update engloba Windows, Mac, Linux e Chrome OS.
A vulnerabilidade existe no Adobe Flash Player 21.0.0.197 e versões anteriores.
A exploração bem sucedida pode causar um crash e potencialmente permitir ao atacante tomar o controle do sistema afetado, diz a empresa.
A teimosa Adobe (porque não acaba definitivamente com esse Flash?) lembra ainda que, se o usuário costuma navegar usando mais que um browser, os updates têm de ser instalados um a um. Para verificar qual é a versão que tem instalada, o usuário pode acessar à página About Flash Player e verificar sua versão.
Mas… que merda, hein? Imagina os usuários que não tem esse “costume” de verificar as atualizações, etc…
Redes de computadores
April 8, 2016 17:37Este clássico best-seller foi totalmente atualizado e passa a abordar as redes desenvolvidas a partir de 1990. Entretanto, há partir do ano 2000 também há uma grande quantidade de novos desenvolvimentos. O mais importante é o enorme crescimento das redes sem fio, incluindo 802.11, loops locais sem fio, redes celulares 2G e 3G, Bluetooth, WAP, i-mode e outras. Acompanhando essa tendência, incluímos neste volume uma grande quantidade de material sobre redes sem fio. Outro tópico que se tornou importante recentemente é a segurança; assim, foi acrescentado um capítulo inteiro sobre esse assunto.
Nunca vai acontecer no Brasil, podem ter certeza…
April 8, 2016 17:20(Maravilhosa) Justiça europeia diz que fazer link para conteúdo pirata não é ilegal
O advogado-geral da Corte de Justiça Europeia afirmou recentemente que, mesmo que atos de transmissão de conteúdo protegido tenham de ser autorizados pelos autores, a estrutura da internet permite que os hiperlinks fiquem abaixo das regras.
Hiperlinks que levem, mesmo diretamente, a trabalhos protegidos não estão tornando-os disponíveis ao público quando eles já estão livremente acessíveis em outro site, afirmou o órgão, que classifica o ato como apenas um meio de facilitar o descobrimento do conteúdo.
Sem mais delongas, meu comentário (todos já sabem): Concordo.
The Senate’s Draft Encryption Bill Is ‘Ludicrous, Dangerous, Technically Illiterate’
April 8, 2016 16:00
As Apple battled the FBI for the last two months over the agency’s demands that Apple help crack its own encryption, both the tech community and law enforcement hoped that Congress would weigh in with some sort of compromise solution. Now Congress has spoken on crypto, and privacy advocates say its “solution” is the most extreme stance on encryption yet.
On Thursday evening, the draft text of a bill called the “Compliance with Court Orders Act of 2016” appeared online in an apparent leak1 from the offices of Senators Diane Feinstein and Richard Burr. It’s a nine-page piece of legislation that would require people to comply with any authorized court order for data—and if that data is “unintelligible,” the legislation would demand that it be rendered “intelligible.” In other words, the bill would make illegal the sort of user-controlled encryption that’s in every modern iPhone, in all billion devices that run Whatsapp’s messaging service, and in dozens of other tech products. “This basically outlaws end-to-end encryption,” says Joseph Lorenzo Hall, chief technologist at the Center for Democracy and Technology. “It’s effectively the most anti-crypto bill of all anti-crypto bills.”
It’s effectively the most anti-crypto bill of all anti-crypto bills. Technologist Joseph Lorenzo Hall
Kevin Bankston, the director of the New America Foundation’s Open Technology Institute, goes even further: “I gotta say in my nearly 20 years of work in tech policy this is easily the most ludicrous, dangerous, technically illiterate proposal I’ve ever seen,” he says.
The bill, Hall and Bankston point out, doesn’t specifically suggest any sort of backdoored encryption or other means to even attempt to balance privacy and encryption, and actually claims to not require any particular design limitations on products. Instead, it states only that communications firms must provide unencrypted data to law enforcement or the means for law enforcement to grab that data themselves. “To uphold the rule of law and protect the security and interests of the United States, all persons receiving an authorized judicial order for information or data must provide, in a timely manner, responsive and intelligible information or data, or appropriate technical assistance to obtain such information or data.”
Hall describes that as a “performance standard. You have to provide this stuff, and we’re not going to tell you how to do it,” he says. George Washington Law School professor Orin Kerr points out on Twitter that the text doesn’t even limit tech firms’ obligations to “reasonable assistance” but rather “assistance as is necessary,” a term that means the bill goes beyond current laws that the government has used to try to compel tech firms to help with data access such as the All Writs Act.
Even more extreme, the draft bill also includes the requirement that “license distributors” ensure all “products, services, applications or software” they distribute provide that same easy access for law enforcement. “Apple’s app store, Google’s play store, any platform for software applications somehow has to vet every app to ensure they have backdoored or little enough security to comply,” says Bankston. That means, he says, that this would “seem to also be a massive internet censorship bill.”
I could spend all night listing the various ways that Feinstein-Burr is flawed & dangerous. But let’s just say, “in every way possible.”
— matt blaze (@mattblaze) April 8, 2016
If Grandpa Simpson was a Senator who was afraid of and confused by encryption, I think he’d write something like the Feinstein/Burr bill.
— Kevin Bankston (@KevinBankston) April 8, 2016
It’s not hard to see why the White House declined to endorse Feinstein-Burr. They took a complex issue, arrived at the most naive solution.
— Matthew Green (@matthew_d_green) April 8, 2016
Burr and Feinstein’s bill disappoints its privacy critics in part because it seems to entirely ignore the points already made in a debate that’s raged for well over a year, and has its roots in the crytpo wars of the 1990s. Last summer, for instance, more than a dozen of the world’s top cryptographers published a paper warning of the dangers of weakening encryption on behalf of law enforcement. They cautioned that any backdoor created to give law enforcement access to encrypted communications would inevitably be used by sophisticated hackers and foreign cyberspies. And privacy advocates have also pointed out that any attempt to ban strong encryption in American products would only force people seeking law-enforcement-proof data protection to use encryption software created outside the U.S., of which there is plenty to choose from. Apple, in its lengthy, detailed arguments with the FBI in front of Congress and in legal filings, has called that weakening of Americans’ security a “unilateral disarmament” in its endless war with hackers to protect its users’ privacy.
Tom Mentzer, a spokesman for Senator Feinstein, told WIRED in a statement on behalf of both bill sponsors that “we’re still working on finalizing a discussion draft and as a result can’t comment on language in specific versions of the bill. However, the underlying goal is simple: when there’s a court order to render technical assistance to law enforcement or provide decrypted information, that court order is carried out. No individual or company is above the law. We’re still in the process of soliciting input from stakeholders and hope to have final language ready soon.”
The Burr/Feinstein draft text may in fact be so bad for privacy that it’s good for privacy: Privacy advocates point out that it has almost zero likelihood of making it into law in its current form. The White House has already declined to publicly support the bill. And Adam Schiff, the top Democratic congressman on the House of Representatives’ intelligence committee, gave WIRED a similarly ambivalent comment on the upcoming legislation yesterday. “I don’t think Congress is anywhere near a consensus on the issue,” Schiff said, “given how difficult it was to legislate the relatively easy [Cyber Information Sharing Act], and this is comparatively far more difficult and consequential.”
Bankston puts it more simply. “The CCOA is DOA,” he says, coining an acronym for the draft bill. But he warns that privacy activists and tech firms should be careful nonetheless not to underestimate the threat it represents. “We have to take this seriously,” he says. “If this is the level of nuance and understanding with which our policymakers are viewing technical issues we’re in a profoundly worrisome place.”
1Correction 4/8/2016 1:00pm EST: A previous version of this story stated that the draft bill text had been released by the senators, which a spokesperson for Senator Burr has since said in a statement to WIRED she didn’t “believe was consistent with the facts.”
Source link
If we could, this is where we’d shop for gaming hardware
April 8, 2016 14:37
If you live somewhere in Asia, the process of buying your gaming goods is going to be considerably different than if you live in the US or UK. Where I live in California, I can easily purchase hardware from a number of different online shops such as Amazon or Newegg and get it a couple days later, often at better prices than buying in person. That’s not to say that living in Asia is entirely different, but it’s a more retail-oriented experience than anywhere else.
A year ago, we wrote about Taipei’s shopping malls being a mecca for PC gamers. I wanted to see it for myself, so I took a trip to the “3C” area in Taipei to check out what being a gamer and hardware enthusiast is like in Taiwan.
The 3C area is essentially a digital area in Taipei, where endless shops along the streets and inside buildings, are all selling computer gear and electronics. You can literally get lost in this place.
Compared to the west, it’s surprising how strong a presence physical media still has here. One store sold nothing but blank discs. PC games still come on DVDs. And big brands like Intel and Razer have their own dedicated stores, instead of just selling online. Not only are there many shops to choose from, there are also deals that you can make along the way. If you’re not careful, though, you can end up being swindled into paying more than you should have.
Source link
GameTrailers.com: World of Assassination – Trailer
April 8, 2016 10:36
Please note that any reproduction of this video without the express written consent of GameTrailers is expressly forbidden.
Source link
Hacking com Kali Linux
April 8, 2016 9:35
Compre agora!
R$ 56,71
Hacking com Kali Linux apresenta a distribuição mais recente da ferramenta que é o padrão de fato para testes de invasão Linux. Começando pelo uso do live CD do Kali Linux e prosseguindo para a instalação em discos rígidos, pen drives e cartões SD, os autores James Broad e Andrew Bindner conduzem você no processo de criação de uma versão personalizada da distribuição live do Kali Linux. Você aprenderá a configurar os componentes de rede, os dispositivos de armazenamento e os serviços de sistema como o DHCP e os web services. Após ter se familiarizado com os componentes básicos do software, você aprenderá a usar o Kali Linux durante as fases do ciclo de vida do teste de invasão; uma ferramenta principal para cada fase será explicada. Este livro trará benefícios aos profissionais de todos os níveis da área de segurança de informações, aos hackers, aos administradores de sistemas, aos administradores de rede, aos pentesters profissionais, sejam iniciantes ou de nível intermediário, assim como aos estudantes em busca de uma formação acadêmica na área de segurança de informações. – Explicações detalhadas sobre o ciclo de vida completo dos testes de invasão; – Visão geral completa das informações sobre o Kali Linux, seus recursos e os downloads da distribuição; – Exercícios práticos para reforçar os tópicos abordados.
X-Mirage 2.0.2
April 8, 2016 7:53

Next FlipBook Maker for Windows, a feature rich flipbook software application on Windows, that helps you to convert PDF/images to stunning Flash&HTML5 flipbooks with a truly immersive page turning experience. It provides a variety of customizable flipbook templates and animated swf scenes.

Next FlipBook Maker Pro for Windows is a professional flipbook software for both professionals and novices to create rich interactive Flash&HTML5 flipbooks. It also provides an easy way for you to embed multimedia to flipbook pages. Add buttons, links, images, local video, YouTube video, music, chart etc. to your flipbook to add interactivity in seconds. Publish flipbooks to HTML5 for mobile browsers, Flash for desktops and laptops.
Source link