WikiLeaks Reveals How the CIA Could Hack Your Router – WIRED

vF wYZYJA"$Vrd8H=Z P$aL:kC?s7'{ _d8G:2 jWki?wW[egGMO'^|7s^X$gOypsvQLvE|Cv@hMRx9[:5;; v'6nH PO=7dgF;&Yo/k5;uogn'~tyhLy{ri#M[O'A;R/ 6YG yswy5{iK'riOZ1}oS-[;sA9?Lxuw~YpCxf,kOYi+x+G}T;_r`.UHOONm0'U r6cN'O13Nd K J3Y cXt;t'a24h!DZtd:rAW?tKq]Vl<9tbmSM|vu&V=f$)9XBix0MaxK Vh" %TqGA%uq">Sq. zbU ]$S9M>:MsdLiS8vk5Q"E]{rlUi$EsybSE_Ir`GN*Ch9lByaNmn3SnVWz$:WH;_I?$JnJX.Q [Gf+2 i3qtXLwypA~Le8GuO<"9}hz. #Ufb"O_3| N&t=lz~-<"{p~9WFH3oqhq'h L.}rl?(c0Svt1aw)6'i90Ff0P) Vg*H%:XM@ b`^ 47?Wb/y+_~hygA${q_}'K_G@fIeO}+ltLF c:_"f+N`9G)[if'o./=J?_SP?ON?JADk Z=C'g_s:?BcQ?@ppv/4+7yz=[=BH}rS+qpc4$UoGr8aM9 /0~>wR2XR"`[{}rtdJaZJ}xE~@XOJoaC} Xr&PwKnD _x_ZnL@`P)z$kG;mcd7UV>^?vO.eL6# Hqdr*oe5'x0;A 8}$#8-2||ii >AfdB- yiO~p> d|EDK7P_ti;lA> t"E8!8bt@0|}v093fb:`N4>b/C"4=qz{t]3aM;M[OO=Wt%;M9$tw%1Y!Y)n7O-DRR >M~j,#6Z] p(^.?:Q./ m'Cw&==~ qAJogGa>") P*L(bkTB!8!+cQ|xq /*l+Jw}wXu{dU07j8}! Icj]oQM9: U,*8IR %nDh;}8;!;*g5 V],.e7 jzvbfm5F[#"q.6fPk7Uv} tZ@ag(-tXl[%X 49' -gZa P0n0 7n?uY2 6AR/`Vu,Pe}R]H]| B ;K(EZQ}xTRm aBmTN70*BM]/]1U:ViOP{`,oh-f<.EKx u96Ehk64[b%#,tA.vw%pB?eY7mmLdP#[Q+5mrH;@FSAm<|d7n49xW k@-D ~LPy5=Mvd;wSAve[-+^kNS6SU04c4f&vN=/RiWg|4sNP=S*|43Yc6s.m&Li)G01d0LlD u%Lu2i)2 H'{DdZAK[iST-#NV?V;l.TiSP#Q?Vo:6% 5C+Y23 rX3U,gMcx5;6vs4|7iPi:s*N{a6T[2z Y"k._fq1o]`Ctc?m> 7h}~!Sd4["vN/wZ>-^&umKI] _WqZsy *|uV}| X{R SkZ,Gy$63'RVo| Bn u}$TGq?@r; }cCKtMoX}'I;mFO]bwX =yCmcZwBh>'6KL!GB;PU jjyDbqavcd1w|/UcOmz}])[]g,y"fbflASj8MsSK5$GQA+;}?u|Qn*N*/ "(E z;BNu{4m>;Esyo2 /0u=t#L?y *^0 NDSyL);tO53m)'_sMr3zM& J{]ie{^v39: /;c1YXlXVqX`N#{KX04oC{:Satfs>:FL0r~2AhXfy<#'}d1M&}xy2/O>8ta1FnL=^h4Y^ IX!`M0pcNQa#fm6iB>4?gfFCah~6AhX=h F{eh4>)aSf>4?fO%~ [ V@3{Z/Lai`l5Y/Lf@m}@zPl5q[[ 2nFcO 0> Z 7aHbaQ K6RrO[ &Qm GXW5LaJV@$ZuZ>l5^>@9xK*[Ie2>49H^s3[/{r<=9es{Z~V@za}600fhr6MJr3r~Ih5^'O@6SSONONzqd K&%^~d ?W1P1dJ}3}~XAjh$t|@>Baq8^T2l5>IHj h}Wh5^Hi/{r:=9MfvfzEzgEzgrfzEzgEzg\^:`6^gYkkY8l8WWcWcTZkm6al54W9P1h9'[ C*ca*4P9dM{%jh22>mF[ OCaaf1W6i[ _9}jhPIuV@UnPWF9PFiKaEl5^HrY}lel5>{jh@KXzvh~N5{6|xyn=t9|O|HSO =WZCbSG.Eou_IB]enU6E,KyD7kj{KU'r0/ml">~ X_D|5o;*pFwFy<9)`c:G1?-OGM.+R5:AbB+,W)ajx/ZxsjCK'^s}PJFH5XmyVCAU]^^5ozzk_b/Pn}L{oM(ByWZ2Ve~uL"B%Zv2+;K[/;^G!LZ*|?x3G`]_&[j3oT]7{Wg!gsdR2^=f>J0Lkz'9Rl;L) wIFc$foqi7t{owUwYAL=fzi3=fvi3m13=f@f{L=f3{i3sYy131WOa2d+UiX=fpa=c6{zlX=fp17{ `=cvX=fp1?{`=cvoX=cv;{1 =fp=fC{=cp1{Vh=c=f{np=fC{=cp1{{1=fp=fB{[=cpYh=cv;{1{np=fC{[=cp1{{>=f5=fu{Z~}3 L ZjW)X=wcMU} m,EN[:8sdx]DTo%-^h;~z^Cy Ny+]@`D[6=6I|,fDk8&31tTX{yaCG%N$Ele~}>M'(E*OR)6 g}heeW6GddUPug7zRIrm7 lV8$F *_@V/JzL[Q,:0|na8x O4}m >:44LUCL[$Zl' /|SmSM+A:X``A&d< /0S/SGDx*1}brvp[ 7Xsw4K=byR1LQ-DEv=u!QgW2?n6WIu&^W^St[_` QxA z`z`{Q0"k`fZEOP 3u>:Yu]? k3~K:SAy74{*@(/l V/g@weKW}OzK!/I'$.:/XrVAl2$M~`.3,M* e/o.Vb`[w[!]r(*=c%~y& 6MiO~x&;m*-0 s/vj*I`7L v3r,$6qk[u?W(?BfSs;v? 5d8?fW u NEY]1ve>YG;A y=(a?)Je&$^pKR>)Gq ?CC[.|h. C8H AN[F370JxE):;%Ub]Muj X-,qtKLl[)ckdmd+tD8EqB<[:8WQ,v)-t[2 aA&q1%]x!P:GZUv1/dq/TKVNGH16L&Y| `"~'i8U%le Ck(OW[3" Re}*x7,7HAwZodQ8G-'~q#t(?b&b5$8Ur'z,L#%]GfK`E$Avcms"bOB@;,nv"# DB,aRLx]T} PPvp|sfC /Ck[ WxajJ;$0 | "ElF ;X'j|Q0,,l,f)GJ>H4kGC.66G4$dw5L%7(`: hR2 Rh#-a`q/J;V"BE+M`C<$M' Ra|XB_<`[~`){hB8{}`&FXIxY(0_vDQQa`qTJmqB<}~ XcODQ#sx(~O )^+f=5FEsE+oN |hCH[Nw'nSQpC7/Eo1ZFLjWWYmnmQU}Bxq1c-xwW5s)0rABvx-J0^j 5~us4K&5JmQ21RWvL umT*v[t& i';P sd:%:m!=Ati?n:u #M`{%#M`g]B=M=)mN,LM;ZS,hLv#B>^=:>Ve@^4)5U&Hs |0&/E-9si|$c;;oZb0aQ 7IR51gwOE$=IrQf`r7,=njS-RH5P&k!tZV!0!S ),R|++wS))q2;(B5t>rfwV<*As@ CU3;+MUo=uLxe|5%MaXO~ VyaKN=!f }_bb%!is &I &Z<)nRpJ7 Xul+]nQTB(lyZ5nQFtYNwMGos-@b%HOM:s*Es/)E`=/ENUL<8N ;E:>}JRo{m7MKc'`|wH :vM_cw1sg3}c3_Mug^k"Wi05}=k0"(oDF9ADk55id_xr[w@IN3S `N-:2t6Nt9q'ML}&51}8upYZ8S]@%'USkpte(}}rp$fZ[ff=OaOVQ/B'I`V6Th&?}mKv>J9 ,t"3|bJ4Qn={~mKe?R p?2}`LZR^5hy+Xl2DcZ!ycy65n>h1HA}RkNw[b6nw?oQo.ywzv^|OO%7] KHuQl)&;AvnM3AVohaBi$g5s*gn7_:< aqC3gG-ARZsq&Z+4~pC'Zb=)=6gc=]GM|{ +&{3(>Bss*mtJ$~KYZn?9%]e%;Q{Z-c4ot@$[k9qmxQq} aZzn1=yfe(/ k|^5{3dTS?h:QE%8 ;0I'$)FyzG/eavWavj]KT)h< ^}Yqk]&!7D"?TZ%{Na' W'T]G_gcX|gz&sSxg_hkbgkOg9]Gom/& kVP=UZ9+;}dIhyl@'7Ys)+(nF'x=uikNu(HE(cm~I % pWa1Q!ZM?_w|#V^UV.K0i~ @nUK!^Qudw(xtW`UhUWnC ,m 4$a vK'('nbJ#KZ;5{ &Y,ajUO'^(zJ5zK9RH"UKV.dHqV 3#teDt)iUQ{' w,ngN^Rto:o2_^[VCLOsZn,UQejnvNjDAnl)!^xB*cP9nJ:*nY@ u4496N|;PvtZH3.,Ne8mS 8kAbLHyn!~qY ar*Xf[PHA_*xg:?4_+qan1L3?0^&$)AA ^SrUPA=D(cv6~ku[9 K m`Nhpc +1p0M~u7c:.fbunREtLci,[Fkmd*rTSuN@|5X^o@6]C&(?F<*~x2~Gc9?yi]{/*ung*([8Kwe~z?[.3IA6FNll:_@$as_$.@ {vKYrxX(Qzuju gJ>]Op j~h 8CK|@yfk 2s[s0Ko*i+dK7H)F0"X16m0xg+MFYs^81_s]U'qnSz|Qn S=7qWTwxQzMaFN@kwEqz&c$/DsVHho*> h [!6&bg8[dI@dZ$/Mjo(SW_Jji@LvX[[L9g&wW )|'b.]jO0EVqw/WB1X~I1L|3&(}Dc?Mw_psOu4 OV_|?d'Zrd"b><~t}p~T]V5?)Q?1fn6!sy*LoJ GoQa1o_yuk_.{sL}3)N&F|2-=J|)N5PLNM_y 8Rs,,}w6] z*NjRL4b5*$glsIT#N[ AFb)]1RGb1slmv#9q:/^|fcg4.[`@Yw6)wN*CsC_HghAEx|F;*Fh#uo9RXGgyV>.Bwr @J)/ Hs ^1 :b|EQ0ka3j%fv~j'[jw|Y) 0-NHJd1/b]2AFMHxTO%W4Wr5;FeO7+=uw^$5U1Fx9~61=>C@lRX~g&:" Xp,Bz|@KedD^p4|B=_+_ =E9.Y{a'X>!ah[h BIBUf}'-xK8Mr#$.{WL7G:Jh@.qy@h@i8BJa|T%bgH!zs^cDtTTiKYbTEc-d+o6|HV;R?]W^`9y /D3c_D:ch-m=FP-54?b |[xdac;'d6[Bg+!ED&5HpVgZb]k(~s`-g>ik3c<>3?vNrP/]U@PVRK?|j;UBTQVUj+ *u4)W-:=DZ?; Ca[n5DVyYY`o6 '3a]wk^r]HOiDyn5ir>/s; [@,!lm7S#zn>oWL/(H0gLlp|VtzQzWxsp::R9u@D/8Q)>t[>vaA D 1aho]kh8y@J@S`,.+jiT>)Y0_&I* ~o _W(K0'7LcBh4?.4fAM%6EdA`F[1$fu~~}u.XS$69I1^b+/g$^h _2p'Lo8;!T7o[e$7FC1: bK=b5EF]+P4:qNgTbz@Jq7s#~g!J@}iT,/e|U.Rh C;G>THH&ANQnBSGxq #b#`JI5~b a-!^=!;~Hd}v~qQiT=~X@N/EC/%fnAZS~NK<xVi5]94]rRFShJ]33w2Ot2a J$xI6|ou%*sYsosMscbz']*TpI)+Ym7ik(<{@},UGg/c915O8;p?7D(_yq9{"W!&G(!?3:7D|m<:R?|a1OEUI > 1E*}e[8d3oF+aMAWpem,F:cgaM[X&TjxHBCQ@(<+fu%.(BEQ]}k-7`nyR&f`cBcSdl2qF{pJ.qVEA'")[&Ur,78?O(>kb=, 8BS]?MgKQ@E*/XtWkr:}ue/zK_r>+T<4CfS C/sbbsz?$skaHVz{vh[vRII|Cx$E:Zq?r[eBw@e6s!"P}K5yOIhfwTfK/E@rw"3cG;$YWchti5|"l''ckdzH;5t?ROnv=OGkK6O]m^E&K|gWEuo^9;2Az}!ep["19:_.-uiC^r*^+'dLJul {jeE)NsVEM_z:@ybEu,0F#LD8XD(z_h{ ZjhTc$bH/NCp)JzXz4u(A1^ /HN:(X<,L/0@BW+:nw

$>F/dV~xS |#?[;7P &,mMP7ZUcR N@r -BWjW.l$aWP7e(_sh2Y3K|@ @qX!@.#_qiIUhqGW*+w( 1/MBEH=sg?Gy 8p}#j4GF?{_64[W`'/;,!m@!q4U' $!Y}=<^w2SIs`4^efH5*V1Ss{a/[LtyY"'"Wd|eO8]m6BGn-,sf'$0~oy]VH5"h`sg}JmTEQk(S.n 9qyha/<[XB)#%$Y>]BBuzSM_>r>(R;<*{Th>_j:>3J.,z:NzD uhd?,#ojxbp2b-} i|H=sXn D}>Iiaz5qXG?ND)C}y? D*7-CK" b:[k6c1)|^O.(&{czpZBeS=o27P7sH!xs`jz3'Dtm#Q*AH[|uqjpsTN&Skui lK9y?>aP>gI(i>H_} %^!]yeC'*/QEu/9]~5o-K-Nq3I@5q%4)(> E+r/T _ 3*p 9["/Neg6Q6YG.>PBUqoM)a[tCp%ot;u@-ro-5?Z6-fs[.z[Z*R4z9edKx~.K?78~drK<_T,-Y]*9YMKiKil?K%K%oW n{4q?n0}| XCYW4wN/lquCPX*RFVvvgZMF? x*U Z+~>uS83=:;|yF,8CMQ2/8ub%vS%#zbe+.{h8*h. i]rMlSCx`N8,l4vt$7F',;6Xf9=X(hy$~{A"AF%HdUF!z*PuTi_OcMyDXaOp^U{?{d2g| &,cPm^ZbQ4#bo'X'/B[FXrmx2V6?pDtg[Z$55Yy{x_+ v>7 YpV9 Np[6K' ;GcF ot'VG.H7&#[x 5p]#QrJR(gSjPwpQu$TtQ|`WGATRaNo#X#Cda#?/6'Z!jV _?7#" ` `=p%Sd"l#*jp? '"/r!<8d5VXbPW-&@iM6B6WQrz9+Y,Hr''%-lk2)NS>B<{YojW/!]%RWk*MI[K ":"' G` =M^XUy[+(FI/B~&op!73*9%ux:%^C/XbF|DR%&mR'172Q8u`_&jbzFW6/93g[s6Wu:vlq8O,Jeflpz*W]UD{HDP(v['%w(%|&.+:%{f; !4pbu>,hu%2z2~P>1M'B!wz*snR&_:NL>x/ms;n8/j=.[ZdKm0.eE5KJ]$ASIP";??uq?>4CK}4+&Rf5p1Y5mJshW6{O'{.s hGf+jEzUe3&+FY KK`v{>_&R}^~E`u4TFY]m$iY}Kn!WDL}2yJD*mT]"V{ipF335;9{%[/Kaz?a'oRXRXVX_K4&K%Ifnsw`gmQ9FE.=O-;h>%6-6d*IZ;R5%>#tbyhH^^Z!kE@/0,"SUoh%#O 0tg$n8=i+0Pk.^OKxv[Z)BAX4rqVE#{jG8983sVKe^Rz- p|u]pcSx9M6;z w5~W}Q7]!MR<<@XBVOF-K128(BYFL:qo6j/ov84)t *g?ueu7w#Y:+t0yk=+$kVrno?x9t:q1bc@pE'b&.:@+B@!O0]Q5$@dMe7%.!,b$#o%x";ZI rd|:C.8jRZ" 8q4NU"[]M9G!i) -wn1m=TW|3t `zpY$ poht:"FhbgcM< ?/hh#)x3Oe?a/Q3a&PgNUPWBP/-oMl..~A8Fns(+@# yu"fb>gCtF%u:S!APJLA02Dp[LKU2*!{gxE :V|z@x#YgD(g9JH3U`(U-0* d Rt.6#UpQ E`FHO9_3/%C V1TDP.N;b1q.Pv+]apy0t| CHbE'f'Rv]yR;c.&?Vj4[ F/PwU%;`W>N:'G"2hYqDxPlCx_t?R-U(LI!%3=_V-l>#XDYl ov8pHl#b"q$DxUewdd"a$L$^s)=<]u2' EwwRPXx){ q1bF:DvC RA@lOW 3-B! yL2 lNPjP)"U=$BQdvTILlA+xU&j|mK/J_dMr#qzhik;)@D3EgFrYC- ya{JKy2^@F&xgq[~,iT%(+#iv7Aj4)Np%*/0Z{N4U8FpX&["2k/Y`2C#VOQjoe NA$X%Fb'@PnOD-QHe"OYOhFhMH$@t`F.* ig@+yG4 zbl,z^ox;@Tj@$lpYBv-8mD'?aFG^'H7WM&H}vV9YQ4p"@':|R@hEACqq V}Wq0]Vl|K27>/v`514fmsEI:H.63[6*IEtJL0"43fh @i Bu~(B7i-0['5ET0p$`6-CWZi0rW)y 80sv? tK2vb>;[`(<0co5*s&qSm&nHFzh;;2?_yfzCVGt:q)l8q'`oWRO-pXD^G-PBOnN#t&_c&Yg(,|WM<[2NB*i,8$rh6j`x}"N+lf2%)Vg aj9&Xr[|}`t)f6b.|-Z~9w~z7}_ps-Iq/n[oz 5[Fm[25LYVEK> u=tp??P~9yr0!>~ )P ^>)dNc;F-bMe;M!ZY}s77'tL}_fi-EL$5qntDcPmnrz8!3[GzaGOg<*(4HMc:jGn+@lG]4j^w1.Wtf>[im!`Io3]zhEjzh3>ZG7rJs2~nrZ5hUu6cQs9VilU Mcns*5:+k/9VT^bVPX UwU}!QQ'pRQ^Z`|0/'#{A's p^],LY*vb38"o[g[M4D&;_x{W*,]cCd8|ObLZ{Ne!4TLMn 1O`cWPe|VL xNHIDL)TW7Gej2rr93 1[->3cu=''=(m]fa];Y2e}%XfM wQ N6<)1qU5w3wN4 xn_3q)M&>o!vE$V(-pA:0 *GlBG;BgZ.(xx)+WE#5i3d*Tmgr.;n5 h,kelpy++>CEV0>w9B#Z$'PS8tr_Xp6!9IK]s-/W2r 'JfVo^5NQm r2WK=vAfy&?7^Wo-IIEl5F5V2xl^2Mv~6P^8v9~EEm)/??[ 'k;lv|YA:5p g5//:_qeD?_/[={>97Rw7'a9t2pet:;Cw+>!T{-H<5@Gi`7 &-o/^hjm/Rgj&/PG}]Tnl/hXt|?g!%V&sH=yv57B5P|EOz3Fp*V`?aOzTnwlq 5P!#^cffp+{8Cg1 qbIv7.1:4b_/J$@[^[TF-K8}8rAu(CD)0{o#[[&s4 s;~n.ad,XqbMdx]63IB/GLn e[~X :L5xA^,)VO`n^O]Fat9Z uD6 G|DyPJg//er*I:_}" lw_Cp?t8Y3)Y|sr,=_DEf([txR=&vxqnH:|'v8=v; LeD]F}f~9Jb>*f5Kd8TSKGy mzKk2@3$,@gi%taMGv&~B_z*ViSy|5g>[ZVs*8G 7474]F+&d3tl?2icA9yeSPmepf7"g'vl/9:7Uy9:9 9V"loG^{RpzF =fA3#;I?o~^E5$v[K~w83m?5N%X2F5/gdVtugMivwB1N'36/gpX`KDU. P 7B$2pj[} @M>MWrBkTj`,lpR ;:1CI{a&d$kB,kI -af YB3_uQWuAK*R[6amj%UI 8#{'PAr!u0IeW L-bppU>kq gTNj|iXjiQyS-Zftrz&m};Xphht q2;8uYF6&q3_LC,q[O^lUKleS{c % *cQin+l.!gT+N"*sm =M.fSFW3mFvVj3%SP-a:Xc5$y}j3lOP/yp:l8u6N^a'%,2cjB~j;q336=}gi*DJkNr<~%#]axT2Qi0epP{* >t$c_]jOrd?gqa~R.Vu"M=Io/ ?3zzE^;Cd^yTBGoCF"J:C"JNHD9$OpD<-[BRl8WI trvX& &UY!yB`xLI &m#9L.wx mz & ,OnPjK!`";]9Z=Z|lZGKz)'qN5/&Tm>v Cmn4ujs9kjsjf 6H:Crx8L. :";@q*854i7[8-DOq"H(2 *2 ?u0 4{c ,pQ2W.".%X76=NAe7]'WB.DfG(VUe"# _h&F}Ur-"GglLG &Z11-/SP[t"_ [edkp>QqoysB)Zz$DQZ]<6OZ8P2mFl^)lx!)AoACD]N%NX`4i:C-g[#Sw^L=Xr$y(^!X&2Z+U4%<8 !`kB2>eTLKbzR Nv1WGKK8tI*,DR*RwJhCb H8c.U~(bS"`0E/49k=C#IMy]3aW1]c.r|K<>S0VHHf (n.P{=>>f(OFJ`Co%3X{k'go(`Z4k|))%( Tg8ppqkH.O(*Y"k4*F*."KU~>1vJ#3n)zp8 YoI-AFHM2ldmuk9jd%UCyGN YP0tm0@`V@G|(A@ (|P6Sk7B!$ZqHMSSq:T,`7(L5* 9$DRR6?:z9iG%.!WmmAYJ;n%(3<(j{/=KFB}v3~/2>Y8U&s1viMP'.'XeHD|-XbsEA[2j>, 6"Pbi@8.5iA|PW"!7 Ij[[~6RCSOe'a|tL%0(-9f)DJ5gs]'xYS+I xZ##:,]3 Jg'Eq8hb<0JLK GJ!}{*S_7 NziX0!~R O=NcfJ;Bn4!z(!>]s!t%8um f53a`sw0P77H]>Q5qI o&#c F&|MO_/AUMUXz C>X=SQRv3F?HyY+^ep7,Z)!PqnmX'H&P{4J'?q1SSB%f>76E';>(No_yiDNqIg.pELM.Be"{-~7?>hffgadOJoPW*3|+k(R+u6 jl+27GMkmn/i)<:ed ku$s1rDW:hPe_OG=yBz1_zY~r[i2(~7w:$TX^nex*O`@*4-bL;#r&6V80VV9,'OT{-13 1[rNMCN5&hSkT9>Ss:<:/>

See original here:
WikiLeaks Reveals How the CIA Could Hack Your Router - WIRED

Step into Julian Assange’s office — and into his head? – CNET

I'm sitting at Julian Assange's desk, surrounded by WikiLeaks papers and blinking servers. Assange's black leather shoes rest on the floor. There's a glass of whiskey nearby and snacks scattered across the table.

The only thing missing is the WikiLeaks founder himself.

WikiLeaks founder Julian Assange has been hidden away in the Ecuadorian Embassy in London since June 2012.

On June 19, it will be five years since Assange placed himself under self-imposed house arrest in the Ecuadorian Embassy in London. Sitting in his office, I want to know what it's like being confined the way he is. And I want to know what it means for someone living under the strain of isolation to hold such influence over a world spinning on outside his window.

The thing is, I'm not in Assange's actual office. I'm in rainy Liverpool, England, some 200 miles from London where Assange is famously holed up. Here, at theFACT art centre, two artists have erected what they say is a perfect scale re-creation of the tiny room where the WikiLeaks founder has lived, worked and conspired to shape world events since 2012.

Seeing Assange hiding out in the embassy, artists Carmen Weisskopf and Domagoj Smoljo, collectively known as Mediengruppe Bitnik, decided to slip him a message. In January 2013 they sent a parcel to the embassy containing a hidden camera, which snapped pictures of its journey and automatically posted them to Twitter. When Assange opened the package, he obligingly posed for the camera.

Contact established, the artists visited the embassy and met with Assange throughout 2013. They weren't allowed to photograph anything, but they claim to have meticulously recorded and reconstructed every detail of Assange's 43-square-foot sanctuary. Exhibited in Liverpool earlier this year, where visitors could explore the fake office for free, their re-creation will next be displayed atEcole Polytechnique Federale de Lausannein Switzerland.

I went to Liverpool to get a better sense of a man some call a champion of free speech and transparency, and others denounce as a renegade -- or even a puppet of Russia -- who enables traitors and spies to serve his own political agenda.

Assange entered the Ecuadorian embassy, a modest red brick building tucked away behind posh department store Harrods, in June 2012. The Australia-born WikiLeaks founder claimed diplomatic asylum to avoid an international arrest warrant issued in Sweden two years earlier over alleged sexual offenses.

He refused to submit to questioning about the allegations, saying that if he was extradited to Sweden he might subsequently be turned over to the United States, where he faces the more daunting prospect of prosecution for publishing classified documents and even espionage, charges that could lead to decades in prison.

A police officer stands outside the Ecuadorian Embassy in London, where WikiLeaks founder Julian Assange has lived for almost five years. The embassy takes up just the ground floor and has no outdoor space.

The 45-year-old computer programmer has remained ever since in this strange sanctum somewhere between the White House and the Kremlin, cut off from his children and the wider world. During his self-imposed exile, Wikileaks has revealed a US intelligence agency wiretapped German leader Angela Merkel, published thousands of behind-the-scenes emails from Hillary Clinton's 2016 presidential election campaignand revealed CIA secrets in the recent Vault 7 leak.

Then last month, something huge happened: Swedish prosecutors dropped the sexual assault investigation that prompted Assange's flight from authorities. Yet he remains in his bolthole. If he steps outside he'll be collared by law enforcement on a lesser charge of jumping bail. British police officers have stood watch outside his doorat a cost to UK taxpayers estimated at 13 million between 2012 and 2015 alone ($16.8 million or AU$22.3 million).

If he's nicked by British bobbies, extradition to the US becomes a real possibility. So paradoxically, now that the original charges have been dropped, Assange's position is even more uncertain. His life in limbo continues.

I didn't know what to expect when I walked into Julian Assange's office.

Broadcasts from the embassy, as well as photos, YouTube videos and even aTV series, offer a look over his shoulder and a rough idea of what his inner sanctum looks like. But now, standing in this replica, it becomes real. The Ecuadorian Embassy takes up just about 2,153 square feet on one floor, with no outdoor space and no direct sunlight.

I trail my finger over the jumble of papers stacked on the table.

The first thing that strikes me is just how unstriking the office is. A desk juts out from the wall, strewn with snacks and cables and a venerable silver Apple laptop. A round table crowds the middle of the room, with a ThinkPad laptop, Olympus dictaphone and various papers on it. Shelves filled with books, folders and bits of stationery line the cream-colored walls. It's just an office. Ordinary, mundane.

It's exactly like the type of space many of us are confined in for eight hours a day -- except we get to walk out every night.

25

Inside Julian Assange's office

Entering the replica, you know you're stepping inside a copy, a portrait, an artist's impression. The question is -- do these details accurately represent Assange's life?

The artists say they re-created the office from memory. I tried to ask Assange himself how accurate it is, but whoever manages the WikiLeaks Twitter account replied to my direct messages only to ask for more information about the exhibition and then stopped answering.

So I asked exhibition curator David Garcia. According to Garcia, in a "post-truth" world offake news, artistic hoaxes and creative interpretations of reality turn the tables on those who lie to achieve power. "The artist can be a researcher," he says, "using the tools and traditions of art not only to produce beautiful art but also to investigate, to pull back the curtain and expose how power operates."

Sitting at a desk that looks like Assange's, I decide to trust the artists' details to project myself into Assange's room, and by extension, into his head.

A jumble of virtually prehistoric Nokia and Samsung phones are piled on the mantlepiece, presumably burners. A cinema ticket is a reminder of the places Assange can't go. Two photos are stuck in the glass door of a wooden cabinet: a picture of Assange and another of Pirate Bay co-founderGottfrid Svartholm, who has been in actual prison in Sweden and Denmark on hacking and fraud charges. In the photos, each holds handwritten signs calling for the other's freedom.

A Vivienne Westwood bag perches atop the bookshelf. Perhaps it was left by the outspoken fashion designer herself -- she's just one of the famous people who've visited the embassy. Yoko Ono, John Cusack, Pamela Anderson, Nigel Farage andLady Gaga have all hung out with Assange there. He's certainly not without human interaction.

Actor Pamela Anderson on one of her trips to bring lunch to Julian Assange at the Ecuadorian Embassy, clutching a book by another of his celebrity visitors, Vivienne Westwood.

Looking up, I spy an Anonymous mask eyeing the room from within a cabinet. And half-hidden on the floor behind the desk, resting incongruously, a gas mask and oxygen tank. Assange isn't going scuba diving any time soon: according to the artists, the embassy supplied him a mask in case of a gas or bomb attack.

I take a closer look and see a laptop labeled "Twitter." Printed emails from the US State Department. A Freedom of Information Act request. Folders labeled "Intelligence Iraq," "Scientology," "Snowden," "Sweden."

From these details, it's tempting to imagine how Assange sees himself. Prominently displayed on the mantlepiece are a DVD of the 1969 satire "Putney Swope" and a copy of Neal Stevenson's "Zodiac," both stories of lone heroes standing up to corrupt corporations. Among the authors on the bookshelves are assorted iconoclasts and literary bad boys: James Joyce, Will Self, Irvine Welsh, Slavoj iek, Quentin Tarantino.

There are several Douglas Adams books as well -- there's certainly something darkly absurd about Assange's situation.

Other items have delicious double meaning: a Kubrick DVD boxset includes "The Shining," in which Jack Nicholson plays a man slowly going mad in an isolated hotel. And among the only women on the bookshelf is Virginia Woolf with "A Room of One's Own."

I've been in this ersatz office for a couple of hours, poking about, taking pictures and notes, and I'm growing bored and fidgety. I try to picture a day in this room turning into hundreds upon hundreds of days.

Confinement took its toll on Assange almost from the start. A medical and psychological evaluation released by Wikileaks claims he suffers from dental problems and chronic pain in his right shoulder, and frequently loses track of time as his sleep is disrupted.

In September 2012, just three months after entering the embassy, Assangescuffled with an embassy security guard. A few months later, he apparently trashed his room. In response, embassy staff suggested controlling his access to alcohol. Last year, another contretemps saw embassy staff cut off Assange's internet access.

Psychologist Lesley Perman-Kerr, an associate fellow and chartered member of the British Psychological Society, points out Assange is technically free both to leave and to live -- even while confined, he can work and interact with people.

But when isolation stretches into years, Perman-Kerr suggests depression can set in, leading to what she calls "a mental shutdown where the person in effect gives up."

Assange hasn't given up interacting with the outside world, even if it is through the computer on his desk. But in this case, Perman-Kerr calls technology that enables communication "a double-edged sword," functioning as both lifeline and tormenter that starkly underscores a world in which Assange isn't fully participating.

"It's like seeing someone prepare a mouthwatering meal but you are unable to smell or taste it," she says.

Parman-Kerr identifies the isolation and disconnection people often feel the longer they're cut off from the world. As they experience growing physical and mental stress, their actions could "become more bizarre and desperate," she says.

Sitting in the fake office, I hear music drifting through the window from the FACT lobby outside. "Thorn In My Side" by the Eurythmics is playing. And then, with perfect comic timing, the twang of "Freebird" by Lynyrd Skynyrd. I decide to take that as a sign.

I walk out the door and feel the rain on my face.

Batteries Not Included: The CNET team shares experiences that remind us why tech stuff is cool.

CNET Magazine: Check out a sampling of the stories you'll find in CNET's newsstand edition.

See more here:
Step into Julian Assange's office -- and into his head? - CNET

Vladimir Putin Invites James Comey to Follow Edward Snowden and Seek Asylum in Russia – Newsweek

Russian President Vladimir Putin has compared ex-FBI director James Comey to fugitive Edward Snowden and joked he would offer him political asylum.

Speaking on his annual Direct Line program, in which he answers screened questions from viewers all over Russia live on all major state TV channels, Putin weighed in on the rift between Comey and U.S. President Donald Trump.

I do not know the details of Comeys testimony but some things are clear to me, Putin said, referring to the ex-FBI directors address to the U.S. Senate in which he spoke of awkward encounters with Trump. Among those mentioned by Comey included Trump demanding loyalty from the FBI director and expressing hope Comey would stop investigating compromising links between the presidents appointees and the Russian government.

Daily Emails and Alerts- Get the best of Newsweek delivered to your inbox

Read More: Putin gets trolled by Russians calling for his resignation live on air

Comey was fired because Trump was not happy with the ongoing investigation, which he has called a made up story even as his former national security adviser Michael Flynn admitted to misleading the White House about past contacts with the Russian ambassador. Attorney General Jeff Sessions had to recuse himself from the investigation for a similar reason.

Putin has argued the Russian ambassador did nothing wrong as it is his job to meet with people. Perhaps in a show of good faith on Thursday he said Comey could find shelter in Russia if ever he needed, just like Snowden, a former U.S. intelligence contractor-turned-whistleblower.

Comey said he kept record of a conversation with the president and then gave it to the press. Well this already is odd. How then is the FBI director different from Snowden, he added, referring to the huge leak of classified information by Snowden. Then he is a rights defender.

The legal difference that Putin, a former spy himself, did not mention is that Comey leaked the memo after being dismissed from his role and a private citizen and the information was about a conversation he had personally, and was not classified. Snowden had leaked classified information about U.S. intelligence and surveillance activities.

Regardless, Putins arms, at least rhetorically, are wide open as he said if Comey were to face political persecution, Russia is ready to accept him too.

Russian Senator Alexey Pushkov was quick to congratulate Putin on his brilliant trolling. I can imagine former FBI director Comeys face, when he learned that Moscow was ready to grant him asylum as it did to Snowden.

View original post here:
Vladimir Putin Invites James Comey to Follow Edward Snowden and Seek Asylum in Russia - Newsweek

What Is Data Encryption? | Digital Guardian

Nate Lord Last Updated: Friday January 27, 2017

Data encryption defined in Data Protection 101, our series on the fundamentals of data security.

A Definition of Data Encryption

Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data iscommonlyreferred to as ciphertext, while unencrypted data is called plaintext. Currently, encryption is one of the most popular and effective data security methods used by organizations. Two main types of data encryption exist - asymmetric encryption, also known as public-key encryption, and symmetric encryption.

The Primary Function of Data Encryption

The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. The outdated data encryption standard (DES) has been replaced by modern encryption algorithms that play a critical role in the security of IT systems and communications.

These algorithms provide confidentiality and drive key security initiatives including authentication, integrity, and non-repudiation. Authentication allows for the verification of a messages origin, and integrity provides proof that a messages contents have not changed since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny sending the message.

The Process of Data Encryption

Data, or plaintext, is encrypted with an encryption algorithm and an encryption key. The process results in ciphertext, which only can be viewed in its original form if it is decrypted with the correct key.

Symmetric-key ciphers use the same secret key for encrypting and decrypting a message or file. While symmetric-key encryption is much faster than asymmetric encryption, the sender must exchange the encryption key with the recipient before he can decrypt it. As companies find themselves needing to securely distribute and manage huge quantities of keys, most data encryption services have adapted and use an asymmetric algorithm to exchange the secret key after using a symmetric algorithm to encrypt data.

On the other hand, asymmetric cryptography, sometimes referred to as public-key cryptography, uses two different keys, one public and one private. The public key, as it is named, may be shared with everyone, but the private key must be protected. The Rivest-Sharmir-Adleman (RSA) algorithm is a cryptosystem for public-key encryption that is widely used to secure sensitive data, especially when it is sent over an insecure network like the internet. The RSA algorithms popularity comes from the fact that both the public and private keys can encrypt a message to assure the confidentiality, integrity, authenticity, and non-repudiability of electronic communications and data through the use of digital signatures.

Challenges to Contemporary Encryption

The most basic method of attack on encryption today is brute force, or trying random keys until the right one is found. Of course, the length of the key determines the possible number of keys and affects the plausibility of this type of attack. It is important to keep in mind that encryption strength is directly proportional to key size, but as the key size increases so do the number of resources required to perform the computation.

Alternative methods of breaking a cipher include side-channel attacks and cryptanalysis. Side-channel attacks go after the implementation of the cipher, rather than the actual cipher itself. These attacks tend to succeed if there is an error in system design or execution. Likewise, cryptanalysis means finding a weakness in the cipher and exploiting it. Cryptanalysis is more likely to occur when there is a flaw in the cipher itself.

Data Encryption Solutions

Data protection solutions for data encryption can provide encryption of devices, email, and data itself. In many cases, these encryption functionalities are also met with control capabilities for devices, email, and data. Companies and organizations face the challenge of protecting data and preventing data loss as employees use external devices, removable media, and web applications more often as a part of their daily business procedures. Sensitive data may no longer be under the companys control and protection as employees copy data to removable devices or upload it to the cloud. As a result, the best data loss prevention solutions prevent data theft and the introduction of malware from removable and external devices as well as web and cloud applications. In order to do so, they must also ensure that devices and applications are used properly and that data is secured by auto-encryption even after it leaves the organization.

As we mentioned, email control and encryption is another critical component of a data loss prevention solution. Secure, encrypted email is the only answer for regulatory compliance, a remote workforce, BYOD, and project outsourcing. Premier data loss prevention solutions allow your employees to continue to work and collaborate through email while the software and tools proactively tag, classify, and encrypt sensitive data in emails and attachments. The best data loss prevention solutions automatically warn, block, and encrypt sensitive information based on message content and context, such as user, data class, and recipient.

While data encryption may seem like a daunting, complicated process, data loss prevention software handles it reliably every day. Data encryption does not have to be something your organization tries to solve on its own. Choose a top data loss prevention software that offers data encryption with device, email, and application control and rest assured that your data is safe.

See more here:
What Is Data Encryption? | Digital Guardian

Look who’s joined the anti-encryption posse: Germany, come on down – The Register

Germany has joined an increasing number of countries looking to introduce anti-encryption laws.

Speaking on Wednesday, German interior minister Thomas de Maizire said the government was preparing a new law that would give the authorities the right to decipher and read private encrypted messages, specifically citing encrypted messaging apps such as WhatsApp and Signal.

Such services were allowing criminals and terrorists to evade surveillance, de Maizire said, adding: "We can't allow there to be areas that are practically outside the law."

He did not specify how the encryption breaking would be achieved, but did note that among the options under consideration was forcing phone operators to install software on phones that would effectively bypass encrypted apps by granting access to the phone itself.

That stance reflects a very similar one taken earlier this week by Australian prime minister Malcolm Turnbull, who told Parliament: "The privacy of a terrorist can never be more important than public safety never."

Turnbull revealed that the Five Eyes nations would be meeting next month to discuss how to prevent "terrorists and organized criminals" from "operating with impunity ungoverned digital spaces online" the exact same line pushed by the German interior minister.

In addition, earlier this month, German chancellor Angela Merkel argued in Mexico City for global restrictions and "sensible rules" to deal with online content, stating that Germany would use its presidency of the G20 to develop a concrete set of digital policies at the forthcoming summit in Hamburg next month.

When it comes to encryption issues, much of the focus has been on the UK's Investigatory Powers Act, which introduced a placeholder for a subsequent "technical capability notices paper" that would oblige telecom operators and ISPs to provide content access to law enforcement and require them to unencrypt content wherever possible.

A draft of the paper that was provided only to the telecom industry was leaked, and it revealed that the UK government wants real-time access to the full content of any named individual within one working day, as well as any "secondary data" relating to that person.

The system would oblige operators to provide real-time interception of 1 in 10,000 of its customers: in other words, the government would be able to simultaneously spy on 6,500 folks at any given moment.

That law has been spoken of favorably by the Australian government and it is reportedly considering introducing a similar version.

This rash of anti-encryption legislation comes in the wake of new terrorist attacks in Europe and a determined push by the security services to be able to maintain their current spying capabilities into modern smartphone technologies.

In Germany's case there is also the added factor of an election in September, and the expectation that the country will become a target of terrorist activity as a result of that.

There is a big problem at the heart of the issue however, and that comes in two parts: first, the apps that offer hard-to-crack, end-to-end encryption to users are almost all based in the United States and so outside the legislative reach of Europe and Australasia; and second, encryption is a mathematical process, so introducing a backdoor into any system also leaves that door open for others.

Broadly speaking there are three ways to read people's private, encrypted messages:

It is clear from the German interior minister's comments that it is focusing on the third, most pragmatic solution: gaining access to someone's phone or other device.

No doubt someone in the NSA is currently putting together a PowerPoint presentation that outlines how it has been able to hack into people's phones and bypass protections (including the Russian ambassador to the US?).

We'll have to wait until the next Snowden to find out exactly how it does that, but in the meantime, you can expect new legislation built around successful phone hacks to find its way in the capitals of most Western nations.

PS: A German court has ordered Google to stop linking to Lumen Database, formerly the Chilling Effects website.

Read the rest here:
Look who's joined the anti-encryption posse: Germany, come on down - The Register

Telegram founder: US intelligence agencies tried to bribe us to weaken encryption – Fast Company

Facebook is unquestionably the largest social network the world has ever seen. Every month, 1.94 billion people use the service. Every day, 1.28 billion peopleabout one in seven on the entire planetuse it. With that scale comes all kinds of responsibilities.

That's why Facebook has decided to formally address what it calls the "hard questions," the things that it feels will most govern what it does, and how it should be governed, going forward.

In a blog post, Elliot Schrage, Facebook's vice president for public policy and communications, wrote that the company wants to talk "openly" about these "complex subjects:"

* How should platforms approach keeping terrorists from spreading propaganda online?

* After a person dies, what should happen to their online identity?

* How aggressively should social media companies monitor and remove controversial posts and images from their platforms? Who gets to decide what's controversial, especially in a global community with a multitude of cultural norms?

* Who gets to define what's false news and what's simply controversial political speech?

* Is social media good for democracy?

* How can we use data for everyone's benefit, without undermining people's trust?

* How should young internet users be introduced to new ways to express themselves in a safe environment?

Facebook recognizes that not everyone will be in lock-step with it on how it addresses those questions, and it knows people will think there are other hard questions that need to be looked at as well. So the company is inviting users to suggest additional questions at hardquestions@fb.com.

Meanwhile, the folks at TechCrunch have annotated Facebook's list with their thoughts on the context behind each of the seven initial questions. DT

See original here:
Telegram founder: US intelligence agencies tried to bribe us to weaken encryption - Fast Company

Backdoors, encryption and internet surveillance: Which way now? – ZDNet

Theresa May wants the UK government to get a backdoor into devices.

The UK government has once again raised the issue of online surveillance and internet regulation. But it's unclear exactly what the Conservatives want to do, while cybersecurity experts accuse the government of naivety in its current approach.

"We cannot allow this ideology the safe space it needs to breed -- yet that is precisely what the internet, and the big companies that provide internet-based services provide," said Prime Minister Theresa May, following the recent terrorist attacks in Manchester and London.

"We need to work with allied democratic governments to reach international agreements to regulate cyberspace to prevent the spread of extremist and terrorism planning," May added.

A similar statement appeared in a section of the Conservative Party manifesto for the recent election, which resulted in a hung parliament: "Some people say that it is not for government to regulate when it comes to technology and the internet. We disagree," it read.

However, there's little clarity on what the new minority government intends to do: that will have to wait for the Queen's Speech, which is due next week. Another factor is whether, lacking an overall majority, the government will want to expend limited political capital on this controversial topic.

It's also worth remembering that the UK government massively expanded its surveillance powers only recently. This policy was introduced by Theresa May herself when serving as Home Secretary; the resulting Investigatory Powers Act 2016 was dubbed the 'snooper's charter' by critics because it forces tech companies to store the 'internet connection records' (websites visited) of every UK internet user for a year.

Another area that the government seems keen to gain control over is is end-to-end encryption.

Neither of these moves met with a positive response from those in the information security sector at the recent Infosecurity Europe conference in London.

"Where I think it goes wrong is that when a government starts to talk about regulating the internet, they don't get it. We don't own the internet and no one nation, no one government, and no one state owns and can influence the internet," said Rik Ferguson, VP of security research at Trend Micro.

Part of the problem is that governments and legislation haven't caught up with the fast-paced evolution of the internet and the services built around it.

"A lot of the world's governments were formed at a time when we were still largely an agricultural society: 120 years ago if you worked for the government at the US Postal Service, you were probably better educated than anyone within 100 miles of your post office," said Paul Vixie, CEO at Farsight Security.

But now, the expertise of individuals within the technology and internet sectors has far outstripped the knowledge of the lawmakers -- and governments don't necessarily have the wherewithal to catch up.

"The assumption that the government should know and should see what everyone is doing has to be reopened. We have to ask that question again," argued Vixie.

Even those with some understanding of the situation "don't necessarily have the right security tools to keep your information secure" -- especially in situations where zero-day exploits are being stockpiled.

That was clearly demonstrated by the WannaCry ransomware attack, which was so effective because the US National Security Agency (NSA) lost control of hacking tools which were then used to make the ransomware spread even faster.

If internet regulation is tricky, then what to do about the widespread use of end-to-end encryption is even harder to deal with. If the UK or US insist on tech companies introducing a backdoor into the encryption they currently use to protect communications across the internet, then more authoritarian nations will certainly demand the same.

"I don't think the option of completely dismantling encryption is an option. There's privacy implications that need to be considered, individual rights which need to be considered," said Liviu Arsene, Senior E-threat Analyst at Bitdefender.

Then there's also the risk that severe regulation of the internet will only hamper regular users, while criminals remain unaffected as they continue to find new ways of staying under the radar.

"How completely stupid is that? Every time we see regulation, we see regular folks being impacted and criminals not being impacted", said Peter Wood, an ethical hacker and member the ISACA London Security Advisory Group.

"How is banning an encrypted algorithm from the US going to sort out criminals in any way? Do they really think terrorists will think 'I'm not allowed to, so I won't use it," he continued. "The naivety astounds me."

That's not to say the government shouldn't be able to regulate anything at all. There are numerous aspects of the internet on which governments have established rules and procedures -- including hate speech, exploitation and more -- that help to keep people safe, said Ferguson.

"These are illegal, people do get prosecuted. That's regulation and I'm happy with that, we need that -- many people need to be protected from themselves," he said.

However, Ferguson continued, "It's got to be with public agreement and it's got to be targeted. There is a line we have to be careful not to cross when regulation becomes censorship."

Not only is large-scale censorship a massive infringement on individual civil liberties, it could also also have large-scale economic consequences. According to Vixie, China's 'Great Firewall' is harming its economy and any leaders -- like Theresa May -- who are looking to follow suit should heed that warning.

"If China's experiment is ending by teaching them they should be more open and the government should have less control, then I'd like Theresa May to talk to some of the people that are there and find out what they've learned, rather than insisting Britain run its own parallel experiment to get the same results."

"In other words," Vixie said, "it's crazy talk".

See original here:
Backdoors, encryption and internet surveillance: Which way now? - ZDNet

Data protection fine shows security risks from using open source … – Out-Law.com

Tom Hadden of Pinsent Masons, the law firm behind Out-Law.com, said the need to manage those risks will become even greater once the General Data Protection Regulation (GDPR) begins to apply. Businesses face fines of up to 4% of their annual global turnover, or 20 million, whichever is the greatest, under the new Regulation, which will apply from 25 May 2018.

Hadden was commenting after the UK's Information Commissioner's Office (ICO) imposed a 100,000 fine on Gloucester City Council over its failure to fix a weakness in the security of its website. The vulnerability was exploited by a hacker who was able to access sensitive personal data relating to between 30 and 40 current and former employees of the council.

The ICO said Gloucester City Council was responsible for a serious breach of the Data Protection Act.

According to the ICO, Gloucester City Council failed to ensure software it was using was updated to fix a vulnerability in coding known as the 'Heartbleed' bug, which was identified in April 2014 as existing in some versions of encryption software developed by via the open source 'OpenSSL Project'.

Although IT staff at the council flagged the need to update the software, a patch issued for the software was never applied, according to the monetary penalty notice (17-page / 3.02MB PDF) issued by the ICO. The patching was "overlooked" at a time when the council was outsourcing its IT to a third party supplier, it said.

In a statement, the ICO said that Gloucester City Council "did not have sufficient processes in place to ensure its systems had been updated while changes to suppliers were made". Sally Anne Poole, group enforcement manager at the ICO, described this as "a serious oversight" on the part of the authority.

"A lack of oversight of this outsourcing, along with inadequate security measures on sensitive emails, left them vulnerable to an attack," Poole said. "The council should have known that in the wrong hands, this type of sensitive information could cause substantial distress to staff. Businesses and organisations must understand they need to do everything they can to keep peoples personal information safe and that includes being extra vigilant during periods of change or uncertainty."

Hadden of Pinsent Masons said: "This is a classic cautionary tale for businesses about the importance of keeping their software and systems properly up to date, and exercising constant awareness regarding patches that address security vulnerabilities."

"The Heartbleed bug is probably the most well publicised security vulnerability in the history of open source software because of its wide reaching impact. However, the patch to fix the vulnerability was readily available in April of 2014 and, as the ICO said, the patch was widely publicised," he said.

"Given the hefty fines regime that will be installed by the GDPR when it comes into force in the UK on 25 May 2018, it is of greater importance than ever that companies take the steps necessary to keep their software up to date and ensure that their data, particularly sensitive personal data, remains secure," Hadden said.

See the rest here:
Data protection fine shows security risks from using open source ... - Out-Law.com

OpenSuCo: Advancing Open Source Supercomputing at ISC – HPCwire (blog)

As open source hardware gains traction, the potential for a completely open source supercomputing system becomes a compelling proposition, one that is being investigated by the International Workshop on Open Source Supercomputing (OpenSuCo). Ahead of OpenSuCos inaugural workshop taking place at ISC 2017 in Frankfurt, Germany, next week, HPCwire reached out to program committee members Anastasiia Butko and David Donofrio of Lawrence Berkeley National Laboratoryto learn more about the efforts activities and vision.

HPCwire: Please introduce OpenSuCo what are your goals and objectives?

OpenSuCo: As we approach the end of MOSFET scaling, the HPC community needs a way to continue performance scaling. One way of providing that scaling is by providing more specialized architectures tailored for specific applications. In order to make possible the specification and verification of these new architectures, more rapid prototyping methods need to be explored. At the same time, these new architectures need software stacks and programming models to be able to actually use these new designs.

There has been a consistent march toward open source for each of these components. At the node hardware level, Facebook has launched the Open Compute Project; Intel has launched OpenHPC, which provides software tools to manage HPC systems. However, each of these efforts use closed source components in their final version. We present OpenSuCo: a workshop for exploring and collaborating on building an HPC system using open-source hardware and system software IP (intellectual property).

The goal of this workshop is to engage the HPC community and explore open-source solutions for constructing an HPC system from silicon to applications.

Figure illustrates the progress in open source software and hardware

HPCwire: Weve seen significant momentum for open source silicon in the last few years,with RISC-V and Open Compute Project for example, what is the supercomputing perspective on this?

OpenSuCo:Hardware specialization, specifically the creation of Systems-On-Chip (SoCs), offers a method to create cost-effective HPC architectures from off-the-shelf components. However, effectively tapping the advantages provided by SoC specialization requires the use of expensive and often closed source tools. Furthermore, the building blocks used to create the SoC may be closed source, limiting customization. This often leaves SoC design methodologies outside the reach of many academics and DOE researchers. The case for specialized accelerators can also be made from an economic sense as, in contrast to historical trends, the energy consumed per transistor has been holding steady, while the cost (in dollars) per transistor has been steadily decreasing, implying that we will soon be able to pack more transistors into a given area than can be simultaneously operated.

From an economic standpoint, we are witnessing an explosion of highly cost-sensitive and application-specific IoT (internet of things) devices. The developers of these devices face a stark choice: spend millions on a commercial license for processors and other IP or face the significant risk and cost (in both development time and dollars) of developing custom hardware. Similar parallels can be drawn to the low-volume and rapid design needs found in many scientific and government applications. By developing a low cost and robust path to the generation of specialized hardware, we can support the development and deployment of application-tailored processors across many DOE mission areas.

The design methodologies traditionally focused for use in these cost sensitive design flows can be applied to high-end computing due to the emergence of embedded IP offering HPC-centric capabilities, such as double-precision floating point, 64-bit address capability, and options for high performance I/O and memory interfaces. The SoC approach, coupled with highly accessible open source flows, will allow chip designers to include only features they want, excluding those not utilized by mainstream HPC systems. By pushing customization into the chip, we can create customization that is not feasible with todays commodity board-level computing system design.

HPCwire: Despite pervasive support in tech circles not everyone is convinced of the merits of open source, what is the case for open source in high performance computing?

OpenSuCo:While many commercial tools provide technology to customize a processor or system given a static baseline, they generally provide only proprietary solutions that both restrict the level of customization that can be applied, as well as increase the cost of production. This cost is of greatest importance to low-volume or highly specialized markets, such as those found in the scientific, research, and defense applications, as large volume customers can absorb this NRE as part of their overall production. As an alternative to closed source hardware flows, open source hardware has been growing in popularity in recent years and mirrors the rise of Linux and open source software in the 1990s and early 2000s. We put forth that Open Source Hardware will drive the next wave of innovation for hardware IP.

In contrast to closed-source hardware IP and flows, a completely open framework and flow enable extreme customization and drive cost for initial development to virtually zero. Going further, by leveraging community-supported and maintained technology, it is possible to also incorporate all of the supporting software infrastructure, compilers, debuggers, etc. that work with open source processor designs. A community-led effort also creates a support community that replaces what is typically found with commercial products and leads to more robust implementations as a greater number of users are testing and working with designs. Finally, for security purposes, any closed-source design carries an inherent risk in the inability to truly inspect all aspects of its operation. Open source hardware allows the user to inspect all aspects of its design for a thorough review of its security.

HPCwire: Even with the advances in open source hardware, a completely open source supercomputing system seems ambitious at this point. Can you speak to the reality of this goal in the context of the challenges and community support?

OpenSuCo:We agree that building a complete open-source HPC system is a daunting task, however, a system composed of an increased number of open source components is an excellent way to increase technological diversity and spur greater innovation.

The rapid growth and adoption of the RISC-V ISA is an excellent example of how a community can produce a complete and robust software toolchain in a relatively short time. While largely used in IoT devices at the moment, there are multiple efforts to extend the reach of RISC-V in both implementations and functionality, into the HPC space.

HPCwire: What is needed on the software side to make this vision come together?

OpenSuCo:The needs and challenges of an open source-based supercomputer are not any greater than that of a traditional closed system. Most future systems will need to face the continuing demands of increased parallelism, shifting Flop-to-Byte ratios and an increase in the quantity and variety of accelerators. An open system may possess greater transparency and a larger user community allowing more effective and distributed development. Regardless, continued collaboration between software and hardware developers will be necessary to create the required community to support this effort. As part of the OpenSuCo workshop we hope to engage and bring together a diverse community of software and hardware architects willing to engage on the possibility of realizing this vision.

HPCwire: Youre holding a half-day workshop at ISC 2017 in Frankfurt on June 22. What is on the agenda and who should attend?

OpenSuCo:The ISC 2017 workshop agenda consists of three technical tracks:

Hardware Track

Sven Karlsson and Pascal Schleuniger (Danmarks Tekniske Universitet)

Kurt Keville (Massachusetts Institute of Technology)Anne Elster (Norwegian University of Science and Technology)

Software Track

Hiroaki Kataoka and Ryos Suzuki

Anastasiia Butko (Berkeley Lab)

Xavier Teurel (Barcellona Supercomputing Center)

Collaboration Track

Bill Nitzberg (Altair Engineering, Inc.)

Jens Breitbart (Robert Bosch GmbH)

Antonio Pea (Barcelona Supercomputing Center)

Keynote Speaker: Alex Bradbury (University of Cambridge)

The complete agenda of the event can be found online athttp://www.opensuco.community/2017/05/24/isc17-agenda/.

While many of the emerging technologies and opportunities surround the rise of open-source hardware, we would like to invite all members of the HPC community to participate in a true co-design effort in building a completeHPC system.

HPCwire: Youll also be holding a workshop at SC17. Youve put out a call for papers. How else can peopleget involved in OpenSuCo activities?

OpenSuCo:While we have long advocated for innovative and open source systems for the HPC community, we are just beginning to tackle this comprehensive solution and cannot do it alone. We welcome collaborators to help build the next generation of HPC software and hardware design flows.

Go here to see the original:
OpenSuCo: Advancing Open Source Supercomputing at ISC - HPCwire (blog)