Schneier on Security

Here are some squid cooking tips.

As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Tags: squid

Posted on March 10, 2017 at 4:02 PM 67 Comments

A decade ago, I wrote about the death of ephemeral conversation. As computers were becoming ubiquitous, some unintended changes happened, too. Before computers, what we said disappeared once we'd said it. Neither face-to-face conversations nor telephone conversations were routinely recorded. A permanent communication was something different and special; we called it correspondence.

The Internet changed this. We now chat by text message and e-mail, on Facebook and on Instagram. These conversations -- with friends, lovers, colleagues, fellow employees -- all leave electronic trails. And while we know this intellectually, we haven't truly internalized it. We still think of conversation as ephemeral, forgetting that we're being recorded and what we say has the permanence of correspondence.

That our data is used by large companies for psychological manipulation -- we call this advertising -- is well-known. So is its use by governments for law enforcement and, depending on the country, social control. What made the news over the past year were demonstrations of how vulnerable all of this data is to hackers and the effects of having it hacked, copied and then published online. We call this doxing.

Doxing isn't new, but it has become more common. It's been perpetrated against corporations, law firms, individuals, the NSA and -- just this week -- the CIA. It's largely harassment and not whistleblowing, and it's not going to change anytime soon. The data in your computer and in the cloud are, and will continue to be, vulnerable to hacking and publishing online. Depending on your prominence and the details of this data, you may need some new strategies to secure your private life.

There are two basic ways hackers can get at your e-mail and private documents. One way is to guess your password. That's how hackers got their hands on personal photos of celebrities from iCloud in 2014.

How to protect yourself from this attack is pretty obvious. First, don't choose a guessable password. This is more than not using "password1" or "qwerty"; most easily memorizable passwords are guessable. My advice is to generate passwords you have to remember by using either the XKCD scheme or the Schneier scheme, and to use large random passwords stored in a password manager for everything else.

Second, turn on two-factor authentication where you can, like Google's 2-Step Verification. This adds another step besides just entering a password, such as having to type in a one-time code that's sent to your mobile phone. And third, don't reuse the same password on any sites you actually care about.

You're not done, though. Hackers have accessed accounts by exploiting the "secret question" feature and resetting the password. That was how Sarah Palin's e-mail account was hacked in 2008. The problem with secret questions is that they're not very secret and not very random. My advice is to refuse to use those features. Type randomness into your keyboard, or choose a really random answer and store it in your password manager.

Finally, you also have to stay alert to phishing attacks, where a hacker sends you an enticing e-mail with a link that sends you to a web page that looks almost like the expected page, but which actually isn't. This sort of thing can bypass two-factor authentication, and is almost certainly what tricked John Podesta and Colin Powell.

The other way hackers can get at your personal stuff is by breaking in to the computers the information is stored on. This is how the Russians got into the Democratic National Committee's network and how a lone hacker got into the Panamanian law firm Mossack Fonseca. Sometimes individuals are targeted, as when China hacked Google in 2010 to access the e-mail accounts of human rights activists. Sometimes the whole network is the target, and individuals are inadvertent victims, as when thousands of Sony employees had their e-mails published by North Korea in 2014.

Protecting yourself is difficult, because it often doesn't matter what you do. If your e-mail is stored with a service provider in the cloud, what matters is the security of that network and that provider. Most users have no control over that part of the system. The only way to truly protect yourself is to not keep your data in the cloud where someone could get to it. This is hard. We like the fact that all of our e-mail is stored on a server somewhere and that we can instantly search it. But that convenience comes with risk. Consider deleting old e-mail, or at least downloading it and storing it offline on a portable hard drive. In fact, storing data offline is one of the best things you can do to protect it from being hacked and exposed. If it's on your computer, what matters is the security of your operating system and network, not the security of your service provider.

Consider this for files on your own computer. The more things you can move offline, the safer you'll be.

E-mail, no matter how you store it, is vulnerable. If you're worried about your conversations becoming public, think about an encrypted chat program instead, such as Signal, WhatsApp or Off-the-Record Messaging. Consider using communications systems that don't save everything by default.

None of this is perfect, of course. Portable hard drives are vulnerable when you connect them to your computer. There are ways to jump air gaps and access data on computers not connected to the Internet. Communications and data files you delete might still exist in backup systems somewhere -- either yours or those of the various cloud providers you're using. And always remember that there's always another copy of any of your conversations stored with the person you're conversing with. Even with these caveats, though, these measures will make a big difference.

When secrecy is truly paramount, go back to communications systems that are still ephemeral. Pick up the telephone and talk. Meet face to face. We don't yet live in a world where everything is recorded and everything is saved, although that era is coming. Enjoy the last vestiges of ephemeral conversation while you still can.

This essay originally appeared in the Washington Post.

Tags: doxing, essays, Google, Google Glass, hacking, passwords, privacy, surveillance

Posted on March 10, 2017 at 6:15 AM 53 Comments

Google's Project Zero is serious about releasing the details of security vulnerabilities 90 days after they alert the vendors, even if they're unpatched. It just exposed a nasty vulnerability in Microsoft's browsers.

This is the second unpatched Microsoft vulnerability it exposed last week.

I'm a big fan of responsible disclosure. The threat to publish vulnerabilities is what puts pressure on vendors to patch their systems. But I wonder what competitive pressure is on the Google team to find embarrassing vulnerabilities in competitors' products.

Tags: browsers, Google, Microsoft, patching, vulnerabilities

Posted on March 9, 2017 at 6:28 AM 38 Comments

If I had to guess right now, I'd say the documents came from an outsider and not an insider. My reasoning: One, there is absolutely nothing illegal in the contents of any of this stuff. It's exactly what you'd expect the CIA to be doing in cyberspace. That makes the whistleblower motive less likely. And two, the documents are a few years old, making this more like the Shadow Brokers than Edward Snowden. An internal leaker would leak quickly. A foreign intelligence agency -- like the Russians -- would use the documents while they were fresh and valuable, and only expose them when the embarrassment value was greater.

James Lewis agrees:

But James Lewis, an expert on cybersecurity at the Center for Strategic and International Studies in Washington, raised another possibility: that a foreign state, most likely Russia, stole the documents by hacking or other means and delivered them to WikiLeaks, which may not know how they were obtained. Mr. Lewis noted that, according to American intelligence agencies, Russia hacked Democratic targets during the presidential campaign and gave thousands of emails to WikiLeaks for publication.

To be sure, neither of us has any idea. We're all guessing.

To the documents themselves, I really liked these best practice coding guidelines for malware, and these crypto requirements.

I am mentioned in the latter document:

Cryptographic jargon is utilized throughout this document. This jargon has precise and subtle meaning and should not be interpreted without careful understanding of the subject matter. Suggested reading includes Practical Cryptography by Schneier and Ferguson, RFCs 4251 and 4253, RFCs 5246 and 5430, and Handbook of Applied Cryptography by Menezes, van Oorschot, and Vanstone.

EDITED TO ADD: Herbert Lin comments.

The most damning thing I've seen so far is yet more evidence that -- despite assurances to the contrary -- the US intelligence community hoards vulnerabilities in common Internet products and uses them for offensive purposes.

EDITED TO ADD (3/9): The New York Times is reporting that the CIA suspects an insider:

Investigators say that the leak was the work not of a hostile foreign power like Russia but of a disaffected insider, as WikiLeaks suggested when it released the documents Tuesday. The F.B.I. was preparing to interview anyone who had access to the information, a group likely to include at least a few hundred people, and possibly more than a thousand.

An intelligence official said the information, much of which appeared to be technical documents, may have come from a server outside the C.I.A. managed by a contractor. But neither he nor a former senior intelligence official ruled out the possibility that the leaker was a C.I.A. employee.

EDITED TO ADD (3/9): WikiLeaks said that they have published less than 1% of what they have, and that they are giving affected companies an early warning of the vulnerabilities and tools that they're publishing.

Commentary from The Intercept.

Tags: CIA, cryptography, leaks, malware, Russia, WikiLeaks

Posted on March 8, 2017 at 9:08 AM 151 Comments

The New York Times is reporting that the US has been conducting offensive cyberattacks against North Korea, in an effort to delay its nuclear weapons program.

EDITED TO ADD (3/8): Commentary.

Tags: cyberattack, cyberwar, national security policy, North Korea

Posted on March 8, 2017 at 7:03 AM 20 Comments

WikiLeaks just released a cache of 8,761 classified CIA documents from 2012 to 2016, including details of its offensive Internet operations.

I have not read through any of them yet. If you see something interesting, tell us in the comments.

EDITED TO ADD: There's a lot in here. Many of the hacking tools are redacted, with the tar files and zip archives replaced with messages like:

::: THIS ARCHIVE FILE IS STILL BEING EXAMINED BY WIKILEAKS. ::: ::: IT MAY BE RELEASED IN THE NEAR FUTURE. WHAT FOLLOWS IS ::: ::: AN AUTOMATICALLY GENERATED LIST OF ITS CONTENTS: :::

Hopefully we'll get them eventually. The documents say that the CIA -- and other intelligence services -- can bypass Signal, WhatsApp and Telegram. It seems to be by hacking the end-user devices and grabbing the traffic before and after encryption, not by breaking the encryption.

New York Times article.

EDITED TO ADD: Some details from The Guardian:

According to the documents:

I just noticed this from the WikiLeaks page:

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

So it sounds like this cache of documents wasn't taken from the CIA and given to WikiLeaks for publication, but has been passed around the community for a while -- and incidentally some part of the cache was passed to WikiLeaks. So there are more documents out there, and others may release them in unredacted form.

Wired article. Slashdot thread. Two articles from the Washington Post.

EDITED TO ADD: This document talks about Comodo version 5.X and version 6.X. Version 6 was released in Feb 2013. Version 7 was released in Apr 2014. This gives us a time window of that page, and the cache in general. (WikiLeaks says that the documents cover 2013 to 2016.)

If these tools are a few years out of date, it's similar to the NSA tools released by the "Shadow Brokers." Most of us thought the Shadow Brokers were the Russians, specifically releasing older NSA tools that had diminished value as secrets. Could this be the Russians as well?

EDITED TO ADD: Nicholas Weaver comments.

EDITED TO ADD (3/8): These documents are interesting:

The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

This is being spun in the press as the CIA is pretending to be Russia. I'm not convinced that the documents support these allegations. Can someone else look at the documents. I don't like my conclusion that WikiLeaks is using this document dump as a way to push their own bias.

Tags: CIA, cyberwar, hacking, malware, redaction, WikiLeaks, zero-day

Posted on March 7, 2017 at 9:08 AM 101 Comments

Matthew Green and students speculate on what truly well-designed ransomware system could look like:

Most modern ransomware employs a cryptocurrency like Bitcoin to enable the payments that make the ransom possible. This is perhaps not the strongest argument for systems like Bitcoin -- and yet it seems unlikely that Bitcoin is going away anytime soon. If we can't solve the problem of Bitcoin, maybe it's possible to use Bitcoin to make "more reliable" ransomware.

[...]

Recall that in the final step of the ransom process, the ransomware operator must deliver a decryption key to the victim. This step is the most fraught for operators, since it requires them to manage keys and respond to queries on the Internet. Wouldn't it be better for operators if they could eliminate this step altogether?

[...]

At least in theory it might be possible to develop a DAO that's funded entirely by ransomware payments -- and in turn mindlessly contracts real human beings to develop better ransomware, deploy it against human targets, and...rinse repeat. It's unlikely that such a system would be stable in the long run humans are clever and good at destroying dumb things but it might get a good run.

One of the reasons society hasn't destroyed itself is that people with intelligence and skills tend to not be criminals for a living. If it ever became a viable career path, we're doomed.

Tags: bitcoin, crime, ransomware

Posted on March 7, 2017 at 8:15 AM 22 Comments

Longtime Internet security-policy pioneer Howard Schmidt died on Friday.

He will be missed.

Tags: cybersecurity, national security policy

Posted on March 6, 2017 at 2:15 PM 4 Comments

The New York Times reports that Uber developed apps that identified and blocked government regulators using the app to find evidence of illegal behavior:

Yet using its app to identify and sidestep authorities in places where regulators said the company was breaking the law goes further in skirting ethical lines -- and potentially legal ones, too. Inside Uber, some of those who knew about the VTOS program and how the Greyball tool was being used were troubled by it.

[...]

One method involved drawing a digital perimeter, or "geofence," around authorities' offices on a digital map of the city that Uber monitored. The company watched which people frequently opened and closed the app -- a process internally called "eyeballing" -- around that location, which signified that the user might be associated with city agencies.

Other techniques included looking at the user's credit card information and whether that card was tied directly to an institution like a police credit union.

Enforcement officials involved in large-scale sting operations to catch Uber drivers also sometimes bought dozens of cellphones to create different accounts. To circumvent that tactic, Uber employees went to that city's local electronics stores to look up device numbers of the cheapest mobile phones on sale, which were often the ones bought by city officials, whose budgets were not sizable.

In all, there were at least a dozen or so signifiers in the VTOS program that Uber employees could use to assess whether users were new riders or very likely city officials.

If those clues were not enough to confirm a user's identity, Uber employees would search social media profiles and other available information online. Once a user was identified as law enforcement, Uber Greyballed him or her, tagging the user with a small piece of code that read Greyball followed by a string of numbers.

When Edward Snowden exposed the fact that the NSA does this sort of thing, I commented that the technologies will eventually become cheap enough for corporations to do it. Now, it has.

One discussion we need to have is whether or not this behavior is legal. But another, more important, discussion is whether or not it is ethical. Do we want to live in a society where corporations wield this sort of power against government? Against individuals? Because if we don't align government against this kind of behavior, it'll become the norm.

Tags: courts, Edward Snowden, NSA, power, privacy, surveillance, terms of service, Uber

Posted on March 6, 2017 at 6:24 AM 41 Comments

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.

See more here:
Schneier on Security

Good News From CIA Leak: Encryption Works! – The New American

The media have spun the recent story about CIA-developed hacking tools by claiming either that there's nothing to worry about, or that the problem is so severe that it is no longer possible to protect our privacy through encryption. In reality, privacy is under attack, but encryption still works.

With WikiLeaks recent disclosure of the CIAs secret hacking program, many are left wondering how deep the rabbit hole goes. How secure are the devices and softwares that people all over the world use and depend on every day? While the mainstream media have reported on this either as if there is nothing to it or its the end of both privacy and encryption, the truth is that encryption can still be used effectively to protect privacy.

As The New American has reported in previous articles, the tools (read: cyber weapons) developed by the CIA are scarily invasive. Any hacker who is worth his weight in silicon and who also has access to these tools has the ability to remotely access and control devices such as computers, mobile devices, and SmartTVs to watch and listen to targets, as well as the theoretical (if not actual) ability to hack and control cars and trucks to disable or override steering, brakes, acceleration, and airbag controls. And thanks to the haphazard way the cyber-weapon files and documents were circulated within the CIA and its contractor companies, that could be a lot of hackers.

And despite the pooh-poohing by the intelligence community and many in the mainstream media, recent statements by the CIA and White House, coupled with the FBI's investigation into the source of the leaked CIA documents, serve as admissions that the disclosures are genuine. So regarding both the existence of the cyber weapons and the fact that the CIA lost control of them, it is really is as bad as it looks.

But that is also very good news.

Buried in the CIA documents (and WikiLeaks analysis of those documents) is the fact that there has been a shift in the way the surveillance state gathers information. In the wake of the Snowden revelations about mass surveillance almost four years ago, many this writer included began to implement ways to protect themselves against mass surveillance. The most effective tool for that is encryption. By encrypting data at rest (files and folders stored on a device), the owners of that data can be assured that it can only be accessed by someone with the encryption key or password. By encrypting data in motion (communications), the parties to those communications have the same assurances.

Apple introduced encryption by default for devices running newer versions of iOS; Google followed suit with encryption by default for all devices running newer versions of Android. Millions of people in the United States and worldwide began using encrypted communication applications. The surveillance hawks predicted the end of the world, claiming that terrorists were using those tools to go dark. The hawks demanded back doors into the encrypted devices and softwares.

Reports of recent revelations about the CIA hacking program focus on the fact that the vulnerabilities exploited by the CIA-developed cyber weapons allow the hackers to compromise the underlying operating systems (such as iOS, Android, Windows, MacOS, Linux, Solaris, and others) to capture the data before it is encrypted. As this writer noted in an earlierarticle:

Because the operating systems themselves would be compromised, all software running on those devices would be subject to corruption, as well. This would mean that privacy tools such as those this writer uses on a regular basis would be rendered useless. For instance, an application such as Signal used for encrypting text messages and phone calls on mobile devices would continue to encrypt the communications, leaving the user feeling secure. But since the keyboard would record (and report) all keystrokes before Signal could encrypt and send the text message, the communication could still be harvested by the hackers. Likewise, since the microphone itself could be activated, it would make no difference that the communication leaving the device would be encrypted; the hackers would still be able to capture the unencrypted voice recordings of both parties.

So, how is that good news? Put simply: it means that encryption works!

The surveillance state has had to change its game. As the New York Times reported recently:

The documents indicate that because of encryption, the agency must target an individual phone and then can intercept only the calls and messages that pass through that phone. Instead of casting a net for a big catch, in other words, C.I.A. spies essentially cast a single fishing line at a specific target, and do not try to troll an entire population.

The difference between wholesale surveillance and targeted surveillance is huge, said Dan Guido, a director at Hack/Secure, a cybersecurity investment firm. Instead of sifting through a sea of information, theyre forced to look at devices one at a time.

The New American reached out to several companies and organizations involved in promoting digital liberty to ask what the CIA revelations mean for the state of privacy. What we found shows that for users who are willing to invest the time to keep their systems and programs up-to-date the CIA hacking tools can be effectively blocked.

Dr. Andy Yen is the CEO and one of the founders of ProtonMail, an open-source, end-to-end encrypted, Zero-Knowledge e-mail service with its servers in Switzerland. Dr. Yen told The New American that the CIA revelations are the biggest intelligence leak since Snowden in 2013 and the documents released so far appear to just be the tip of the iceberg. When asked about the security of ProtonMail running on devices that may have been compromised by hackers (the government or otherwise) exploiting the devices vulnerabilities, Dr. Yen said, From what we have seen so far, it is clear that ProtonMail's cryptography is not compromised, so the email privacy of our users is still secure. He added, We are encouraging users to work to harden their endpoint devices, by actively patching all the software that they run.

Part of that initiative to encourage users to harden their endpoint devices came in the form of a statement ProtonMail released the same day WikiLeaks dumped the CIA documents and files. Part of that statement says:

We can state unequivocally that there is nothing in the leaked CIA files which indicates any sort of crack of ProtonMails encryption. And despite claims to the contrary, there is also no evidence that Signal/Whatsapp end-to-end encryption has been breached. Heres what we do know:

Over the past three years, the CIA has put together a formidable arsenal of cyberweapons specially designed to gain surveillance capabilities over end-user devices such as mobile phones and laptop/desktop computers. These advanced malwares enable the CIA to record actions such as keystrokes on a mobile device, allowing them to conduct surveillance without breaking encryption. Through this technique, US intelligence agencies can gain access to data before they have been encrypted. This is in fact the only way to achieve data access, because cracking the cryptography used in advanced secure communication services such as ProtonMail and Signal is still impractical with current technology.

In other words, the danger is in running old software, including operating systems that are missing the most recent updates. We asked Dr. Yen if a user running the most recent patches for their operating system and other software could be at risk using ProtonMail. He answered, There can never be zero risk, so the way I would put it is, a user who has fully updated all his software would be at lowest risk of CIA hacking.

That is because outdated operating systems (Im looking at all of you who are still running Windows XP), software programs, and applications do not have the most up-to-date security patches. All software has vulnerabilities. As those vulnerabilities are discovered, the software developers issue updates to plug those vulnerabilities. Going over the list of the CIAs notes on how to attack different devices, operating systems, and softwares, one common denominator shines through: they all depend on exploiting unpatched vulnerabilities.

In the quote above from one of this writers previous articles, there is a reference to Signal an application for encrypted texts and phone calls. The company behind Signal is Open Whisper Systems. Signal has a list of endorsements from people Ed Snowden, Laura Poitras, Bruce Schneier, and others who have a real understanding of cryptography and the need for private communications. In a statement to The New American, Open Whisper Systems said:

These leaks are confirmation that ubiquitous encryption provided by WhatsApp and Signal are forcing intelligence agencies to use malware, pushing them from undetectable mass surveillance to high risk targeted attacks.

There again is the evidence that encryption works for those use it and keep their devices and software up-to-date.

Another open-source, end-to-end encrypted, Zero-Knowledge service is SpiderOak One, which offers an online backup service similar in function to DropBox with the distinction that everything built into SpiderOak One has the users privacy in mind. Since it is built on open-source software, there is no way for anything nefarious to be hidden in the code. Since it is end-to-end encrypted, even the administrators dont have access to the users data. Since it is Zero-Knowledge, the administrators dont know (or have any way to know) users passphrases. In a statement published on its website, SpiderOak said:

The latest leak of the Vault 7 files includes many exploits, but unlike previous leaks, initial analysis seems to indicate that they are entirely for attacks against endpoints.

This transition from network level to endpoint-focused attack is an interesting trend that points to an interesting hypothesis: Encryption is working.

Encryption - and particularly end-to-end encryption - fundamentally changes the cost of attacks. No longer can an adversary simply sniff network traffic, either locally or globally. To eavesdrop on communications they must take the more expensive and risky approach of compromising endpoints.

The take-away? Encryption works. At least for those willing to take the time and effort to make sure their endpoint devices (computers, mobile devices, routers, etc) are running up-to-date, reliable, trustworthy operating systems and software (which almost certainly excludes Microsoft Windows).

The answer to the question, How can someone protect themselves from surveillance? has not changed. Replace Windows with either Mac or (even better) Linux. Use open-source software and avoid proprietary software as much as you can. Encrypt everything you can, including your hard drive. Encrypt all communications, and encourage others to do the same. Its simple to do with applications such as ProtonMail and Signal. Keep your operating system and other software up-to-date. Dont store anything to an online backup service without first encrypting it there is no cloud; its just someone elses computer. And most importantly think about privacy and security. Make it a guiding principle in the way you use computers. Any chain is only as strong as its weakest link. The way you use computers the choices you make, the programs and applications you use, and the ways you use them are the biggest factors after following the above steps.

As for making a SmartTV secure, the best bet is to get rid of it. Period. The software is proprietary and the thing is designed as a spy tool.

Encryption has changed the game for the surveillance hawks. Now, instead of being able to conduct mass surveillance on scale, they are forced to compromise select and specific endpoint devices. If you are the specific target of a three-letter-agency, there is little you can do to avoid being spied on. For the rest of us, things are actually looking better.

More:
Good News From CIA Leak: Encryption Works! - The New American

Open source adoption in APAC no longer just about cost-cutting – ComputerWeekly.com

Open source software has evolved from providing low-cost alternatives to proprietary offerings to a platform for innovation, according to Red Hat CEO Jim Whitehurst.

Learn how to successfully adopt a DevOps in your organisation as well as how to improve the agility of the team and draw inspiration for your DevOps project from 3 case studies.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Over the last five years, most developments in big data, cloud and software-defined networking is happening first in open source, Whitehurst said during a media briefing in Singapore, adding that innovations by Internet giants such as Google and Facebook are largely based on open source platforms.

It is not just about saving money now, it is about enabling new capabilities to solve new business problems," he said.

Last year, a Red Hat-commissioned study by analyst house Forrester revealed that 52% of 455 CIOs and senior IT decision makers in the Asia-Pacific (APAC) region are already tapping open source software in areas such as cloud, mobility, big data and DevOps.

Forrester noted that IT leaders in APAC also see open source as a strategic investment, not just a cost-saving option.

Against this backdrop, Whitehurst said every company would now need to have an open source strategy, particularly in how open source software can be used to transform businesses.

Digital transformation is about technology enabling fundamental changes to an organisation, he said. But with business models changing so quickly and a massive amount of ambiguity, businesses have to rethink how they enable themselves to survive.

Whitehurst said although traditional businesses may develop and execute strategies to transform themselves, the world is moving too fast for any organisation to put up any meaningful five-year plan.

Who would have thought that Ford and General Motors would need to worry about Uber in a couple of years? And in the airline industry, people worry about Google having access to your calendar and proposing a better travel experience from another airline that meets your need, he said.

In addressing such concerns, Whitehurst said companies should plan less, not more, and focus on building capabilities so they can respond more quickly to change.

Whitehurst said some of the largest companies in the world are turning to Red Hat not for its technology, but because of the open source companys strong participation in communities and the ability to identify innovations that benefit businesses.

Everything we do is powered by participation, he said. Every line of code we put out there to the decisions we make, are done in an open way. We are radically open in how we try to solve problems, and that has made us successful.

Whitehurst also claimed that some organisations are doing open source in name only.

One of the issues with open source is that it technically defines a set of licences around software, so there are vendors that give away source code but are not building broad participation, he said.

Or, if you take something thats open source but not driving things upstream so that all your contributions can be consumed, youre not helping to drive open source forward, he added.

As an example, Whitehurst said that over 90% of the contributions to Cloud Foundry, which competes with Red Hats OpenShift, come from one company and not its users.

Theres nothing wrong with something like Cloud Foundry its just that its open source in licence only and not really an open source community, he said.

In an interview with Computer Weekly earlier this year, Cloud Foundrys executive director Abby Kearns said the number of community members has grown since the Cloud Foundry Foundation was created in 2015.

The foundation is also gearing up to woe more developers to the platform-as-a-service (PaaS) offering this year.

Follow this link:
Open source adoption in APAC no longer just about cost-cutting - ComputerWeekly.com

Leaked emails reveal Trump ally Nigel Farage’s long-standing links to Julian Assange – AOL

LONDON There was much confusion Thursday when Nigel Farage was spotted by BuzzFeed leaving the Ecuadorian Embassy in London the residence of WikiLeaks founder Julian Assange.

Asked why he was there, Farage replied that he couldn't remember what he was doing in the building, adding, "I never discuss where I go or who I see."

Emails leaked to Business Insider, however, reveal that UKIP under Farage's leadership had long-standing links to Assange.

In February 2011, after a European Arrest Warrant had been issued in a case in which prosecutors sought to question Assange in connection with a sexual-assault allegation, UKIP repeatedly reached out to Assange to see how they could work together. Assange has not been charged in the case.

The office of UKIP MEP Gerard Batten contacted Assange's lawyer Mark Stephens about "the possibility of meeting Mr Julian Assange."

They added: "So far, UKIP London has been only British political party to openly support Mr Assange fight against EAW and his freedom of speech, and we would very much like to continue doing so."

Leaked minutes of a subsequent meeting between Batten and Stephens reveal that Batten promised to table a motion in support of the WikiLeaks founder in the European Parliament. The party also offered the opportunity of a joint video press conference in Brussels.

The Farage-led Europe of Freedom and Democracy group subsequently tabled a motion attacking "the possible abuse of the European Arrest Warrant for political purposes."

Sitting alongside Farage, Batten called for the Parliament to debate Assange's arrest warrant.

"Is the Assange case about the alleged crimes committed or is it about the desire of America to extradite him from a compliant European country?" Batten asked MEPs.

When the European Parliament denied the chance for a debate on Assange, Batten later called them "contemptible."

In an appearance on the Russian state broadcaster Russia Today, Batten also labelled the attempts to extradite Assange as a "legalised kidnap."

A month later, the party organised a House of Lords event on the European Arrest Warrant with Assange's lawyer as the star guest.

Senior UKIP figures including Farage and Steven Woolfe met with potential UKIP donors and journalists to speak out against the warrant.

One leaked email, sent by Farage's former assistant Annabelle Fuller, suggests that he spoke with Assange's lawyer at the event.

The Trump Connection

Farage has also advocated on behalf of Assange since WikiLeaks' involvement in the US presidential election.

Speaking on his LBC radio show in January, Farage repeated Assange's denial of Russian involvement in the hacking of the Democratic National Committee and Democratic presidential nominee Hilary Clinton during the election.

"Julian Assange ... is absolutely clear that all the information he has got is not from Russian sources," Farage said.

The question of Farage's trip to meet Assange was raised at a White House press conference on Thursday.

The White House press secretary, Sean Spicer, was asked whether Farage had visited Assange "on behalf" of Trump. Spicer did not answer the question, saying only that "I don't keep [Farage's] schedule. I generally don't worry about what's going on across the pond."

A representative for Farage was contacted for comment.

More from Business Insider: 'It is amazing that I even have to ask this question': Top Republican senator asks Sessions if he thinks Assange broke the law Ecuador's presidential election could have big consequences for the fate of Wikileaks Julian Assange Pence used an AOL email for official business

Read the original:
Leaked emails reveal Trump ally Nigel Farage's long-standing links to Julian Assange - AOL

Pamela Anderson is "flattered" by rumours she is dating Julian Assange – NZCity

She said: "I met Julian through Vivienne Westwood. We mixed up our dates - I ended up at the embassy on the wrong day but was able to meet with Julian privately. I asked him how he thought I could be more effective as an activist. We came up with tenure to support relentless activism - giving activists tenure and cover basic needs so that they continue their great work while being able to provide for themselves and their families wherever they may be in the world.

"Since then I feel a genuine closeness to Julian. I have had more stimulating conversation with this man than all my ex-husbands and lovers combined. Our intentions were not to become romantic, but to join forces. The rumours are flattering. I think I might have what it takes to be an effective First Lady. If I had to choose a World Leader to stand beside and support whole heartedly it would be Julian Assange."

And now Pamela has accused Australia of "failing to exercise diplomatic protection" over Julian, who runs the whistleblowing organisation WikiLeaks.

In a post on her official website, she added: "Australian's must not forget. They have a fellow citizen trapped in the Ecuadorian Embassy in London who has not been able to go outside, feel the sunshine, hug his children or see his mother for four and a half years. He has been detained for 6 years ...

"The Julian Assange Case is incredibly complex. Australia has failed to exercise diplomatic protection over Julian, an Australian Citizen, refusing him the most basic assistance.

Australia is now seeking a seat on the UN Human Rights Council at a time when Julian, an Australian citizen, has been found to be arbitrarily detained by the UK and Sweden. An unlawful status under international law - and Australia is doing nothing about it. Australia's failure led to Ecuador's decision to grant Asylum to Julian."

View original post here:
Pamela Anderson is "flattered" by rumours she is dating Julian Assange - NZCity

Bitcoin ETF Rejection Reinforces Faith in Cryptocurrency – newsBTC

When SEC announced the rejection of Bitcoin ETF, a huge drop in Bitcoin price was expected. But nobody expected a sudden recovery soon after. Read more...

Bitcoin ETF easily qualifies as one of the buzzwords of 2017. The much-awaited SEC ruling on Bitcoin ETF left many people disappointed after the regulatory body weighed against it. However, the incident has also presented Bitcoin in a new light.

Bitcoin price is known for its volatility due to various influencing factors. These external factors fuel speculation, driving demand against supply. As the cryptocurrency matures, the room for speculating is gradually reducing, and need-based demand has taken over the driving seat, influencing Bitcoin price.

The renewed interest among investors in light of the potential approval of Bitcoin ETF by the SEC was considered to be the reason behind increasing demand in the recent days. It was also predicted that the failure of ETF approval would lead to a massive drop in demand, driving the digital currencys price down by hundreds of dollars. When the SEC announced its decision, people were expecting the cryptocurrency market to face a huge shock which might take a while to recover.

These speculations partially came true. Bitcoins price following the SEC announcement fell by close to $200. But surprisingly, the digital currency price recovered soon after to reach close to the earlier held levels. The quick bounce-back wasnt expected by many people, just like the time when the Chinese government cracked down on the countrys Bitcoin platforms. The effects of external factors on Bitcoin price has reduced drastically in the past few months, showing resiliency.

These two examples Chinese market volumes and Bitcoin ETF, were both expected to have a long-term effect on the digital currency. But thanks to the active community, effects were negligible, which has, in turn, increased the credibility of Bitcoin. The cryptocurrency has proved to be more stable than ever, giving it a chance to grab the mainstream currency title.

The failure of SEC to approve Bitcoin ETF may have proven to be more beneficial for Bitcoin than expected. The cryptocurrency has gained the faith of people, irrespective of whether they are part of the Bitcoin community or not. It will help Bitcoin further expand its community and emerge stronger than ever. Eventually, it will also influence regulatory agencies to approve the use of Bitcoin like any other currency.

See the original post here:
Bitcoin ETF Rejection Reinforces Faith in Cryptocurrency - newsBTC

Google, Microsoft Still Waiting On Wikileaks To Deliver CIA Hacking Tools – Forbes


Forbes
Google, Microsoft Still Waiting On Wikileaks To Deliver CIA Hacking Tools
Forbes
It's been two days since Julian Assange promised Wikileaks would hand over more information on Central Intelligence Agency (CIA) hacker tools to tech giants. That pledge followed a leak of nearly 9,000 documents that Wikileaks claimed belonged to CIA ...
The Worst and Best Parts of WikiLeaks' CIA LeakFortune
'Vault 7' document dump by WikiLeaks contains no 'smoking gun' showing CIA masquerading as other state actorsMarketWatch
WikiLeaks CIA cache: Fool me onceEngadget
TechNewsWorld -Salon -WIKILEAKS -WikiLeaks
all 4,135 news articles »

View post:
Google, Microsoft Still Waiting On Wikileaks To Deliver CIA Hacking Tools - Forbes

How to keep safe digitally in WikiLeaks age – USA TODAY

In this excerpt from their Facebook Live interview, USA TODAY's Elizabeth Weise and Jefferson Graham weigh in on tips to keep your digital lives safe in a Wkileaks era.

LOS ANGELES Hacking into your cellphone, router and even smart TVis far easier than any of usthought: the government, according to a stolen stash of documents,even has a guide on how to do it.

A telephone from the 1940s.(Photo: Elizabeth Weise)

As we saw this week, the latest data dump from Wikileaks allegedly showed how the CIA outlined ways the agency could potentially hack into our digital devicessmartphones, computers, TVs, Skype calls, text messages and more.

The CIA hasn't confirmed or denied the authenticity of these documents, but some of the big tech companies whose products were named in them Apple and Google, to name two took a close look at what they contained. Conclusion: Most of the techniques would have been stymied by recent updates to the operating systems.So download those updates!

As we do each weekend, we look back at the week's biggest tech headlines, and lead with the latest hacking scare.

We'd also like to offer some quick tips we discovered along the way this week to keep safe.

Cover the webcam on your laptop. Brett Molina points out that if Facebook co-founder Mark Zuckerberg and FBI Director James Comey think throwing tape over theirlaptop webcam is a wise way to keep hackers out of your business, you should, too.

Use a landline. Elizabeth Weise put together a 13-point list of ways to keep yourself digitally safe, and it includes the landline. Yes, the old, analog phone that many of us grew up withand have ditched. Weise reports that landlines are far harder to track than cellphones. (Many of us use cheaper, VOIP service as a home alternative to landlines, but alas, digital phone service in the home is just as easy to track as cellphones.)

--Two-Factor Authentication. On our Facebook Live broadcast devoted to digital safety tips, Weise pointedout that the 2-factor sign-in is a must for e-mail and social media accounts. It's a little harder--you essentially have to sign in twice before being allowed in, by typing in a code that comes usually via text, but it's worth it, she says, since hackers probably won't have access to your personal phone. (Watch the video clip on Two-factor directly below.)

How to keep your digital life safer in the Wikileaks era? USA TODAY's Elizabeth Weise and Jefferson Graham weigh in on 2-factor authentication for e-mail and social media on #TalkingTech.

Finally, while some were shocked to see this spelled out in black and white, the CIA/WikiLeaks news shouldnt be that surprisingany device thats connected as a two-way unit is vulnerable. Concerned about your digital safety? Turn off your Wi-Fi.

Meanwhile, the other memorable tech headlines of the week:

Facebook introduced yet another shameless clone of a popular feature from the Snapchat app this week. Snapchat Stories is a way for Snapchatters to show off a collection of photos and videos to friends that live for just 24 hours. Facebook, which already copied this feature for its Instagram and WhatsApp apps, is now bringing it to Messenger, the popular messaging app. However, there's nothing that much different about it.

(Speaking of Snap, inc. the parent company of Snapchat, had its first full week as a public company on Wall Street, where investors weren't as giddy about its future. While the stock jumped to $27 in the first two days of trading, this week it fell and hovered around the $23 mark, before closing Friday at $22.07.)

Google this week updated its Hangouts app, changing the focus from a group video messaging app to oneaimed at businesses for group chat among employees. In other words, Google is taking on the popular Slack service with similar features. To get there, as Edward C. Baig points out, Google split the app into two: a video chat service called Hangouts Meet, and a team-oriented messaging service known as Hangouts Chat. The update will become available later this year.

The Airbnb service announced this week that it had raised $1 billion in additional funding, which will help it push off an IPO. The company, which competes with hotels and motels by offering alternative lodging, is now valued at $31 billion. And guess what: It's making an operating profit.

Bugs Bunny poses with smartphone to plug the new Boomerang cartoon service(Photo: Warner Bros.)

Finally, two new streaming entertainment services were announced this week. If on-demand movies and TV shows from the likes of Netflix and Hulu arent your thing, how about an endless supply of classic cartoons or British dramas? The Warner Bros. Boomerang service, debuting in the spring, will offer5,000 toons from the Looney Tunes, Hanna-Barbera and MGM libraries and at $5 a month, sounds like a steal to me.

BritBox, from the BBC, touts British dramas like Upstairs, Downstairs and Brideshead Revisited. The endless supply of new announced streaming services got me wondering this week. If we order a bunch of them, we could end up paying just as much as we do now on cable. Cord cutters say no, but I wonder?

And thats all folks, for this week's edition of the top tech headlines of the week. I invite you to join me on Twitter, where I'm @jeffersongraham.

Read or Share this story: http://usat.ly/2mxcsd7

Read the rest here:
How to keep safe digitally in WikiLeaks age - USA TODAY

WikiLeaks CIA docs show it’s not 2017, it’s 1984. Now what? – CNET

"Big Brother is watching you." --George Orwell, "1984"

This past week, we learned what's in the new health care law being crafted by Congress, we found out IBM can cram a lot of data onto a single atom, and... what else?

Oh yeah, your TV could be spying on you.

And so could your phone, your tablet and your friggin' car.

It all came from more than 8,000 top secret documents reportedly from the Central Intelligence Agency and released by WikiLeaks on Tuesday. Aside from scaring the bejesus out of us, it also brought new life into our collective gallows humor and tendency to quote from George Orwell's dystopian classic, "1984."

That's the novel where people are constantly spied on by Big Brother, the omnipresent all-seeing government. One of the most potent tools in its arsenal was a "telescreen," or a television that can spy on you.

So, yeah, welcome to the future.

It turns out the fantastical tech we've brought into our lives, from phones that sit on our nightstands to tablets that entertain our kids, also have cameras and microphones that can be used to spy on us.

What's even more sigh-inducing than all these new revelations -- which are being compared to 2013's shocking Edward Snowden leaks involving the National Security Agency's mass surveillance programs -- is how shoulder-shrug-emoji everyone is about it.

The truth is that even though CNET and CBS haven't so far confirmed the authenticity of the WikiLeaks documents, and the CIA isn't supposed to spy on us domestically, these disclosures are a kind of confirmation of things hackers have been telling us for years.

"We know we have a spy agency," said Dan Petro, an associate at security research firm Biship Fox.

Even the CIA basically said, "Yeah, so what?"

"It is the CIA's job to be innovative, cutting edge, and the first line of defense in protecting this country from enemies abroad," Jonathan Liu, a CIA spokesman, said in an emailed statement. "America deserves nothing less."

A decade ago, talk of this type of spying was relegated to conspiracy theorists and the "tinfoil hat" crowd. (Here's a handy video showing how to make one, if you'd like.) Now it's just part of everyday life.

And just like the people in "1984," it turns out there isn't much we can do about all this, aside from convincing government to change.

Though Microsoft, Google and Apple say making sure your software is up to date should keep you safe, it's hard not to feel like maybe the only true answer would be to just ditch our tech once and for all.

OK, I know: A tech news and reviews site telling you to ditch tech is pretty ironic. But these are the times we live in. Big Brother is watching. No amount of how-to-ing is going to solve this one.

The one answer we know will work is to go low tech, and get your devices off the internet.

The LG TV I bought in 2010 that doesn't have any apps or a connection to the internet? I'm holding onto it for longer than I expected now.

If you're worried about your exotic Netflix, HBO Go and Hulu movie watching habits getting into the wrong hands, there's always VHS. And thanks to the Video Privacy Protection Act, if you can find a video store still renting tapes, you'll be (mostly) safe.

But move quick, because the last VCR maker stopped production last year.

Oh, and you can always ditch that Amazon Kindle and Apple iPad, too. It turns out "1984" is still in print, on dead-tree paper and everything. You can even buy it with cash from your local bookstore so there won't be a record in your credit card statement.

In Orwell's novel, the protagonists, Winston and Julia, rent a room without a telescreen to conduct their affair. But they get caught by the Thought Police anyway because their landlord, in a twist, turns out to be an agent in a sting operation to catch thought criminals.

Sadly, there's not much lower-tech you can go with people. Maybe move to a desert island?

CNET's Laura Hautala and Alfred Ng contributed to this report.

Life, disrupted: In Europe, millions of refugees are still searching for a safe place to settle. Tech should be part of the solution. But is it? CNET investigates.

Tech Enabled: CNET chronicles tech's role in providing new kinds of accessibility.

See more here:
WikiLeaks CIA docs show it's not 2017, it's 1984. Now what? - CNET

GOP senator reports hacking attempts after WikiLeaks criticism – The Hill

Sen. Ben Sasse (R-Neb.) reported Saturday that he was facing hacking attempts on "basically every device, every platform, personal and govt" following his recent criticism of WikiLeaks.

Sasse tweeted from his personal account:

Heads-up... I've been critical of Assange & WikLeaks this week.

So...big surprise: Am having multiple "password reset" attempts right now.

So...if you see crazy-tweets from me tonight, don't assume #HeavyBooze... https://t.co/J53RJWT9Hj

(basically every device, every platform, personal and govt) https://t.co/J53RJWT9Hj

Sasse slammed WikiLeaks this week after the anti-secrecy organization published nearly a gigabyte of classified documents describing CIA cyber operations. Federal officials have reportedly opened a criminal probeinto the alleged leak.

"[Wikileaks head] Julian Assange should spend the rest of his life wearing an orange jumpsuit," Sasse said in astatementon Thursday. "Hes an enemy of the American people and an ally to Vladimir Putin.

Sasse also sent a letter to Attorney General Jeff SessionsJeff Sessions134 foreign policy experts condemn Trump travel ban GOP senator reports hacking attempts after WikiLeaks criticism Diplomats warn of Russia hysteria MORE questioning whether the Trump administration was"aggressively"pursuing Assange's detention and prosecution.

The GOP senator noted in his letter that White House press secretary Sean Spicer had deferred questions over whether Assange belonged in jail to the Department of Justice at an earlier press conference.

"Frankly, it is amazing that I even have to ask this question of the Administration in light of the Intelligence Communitys formal assessment that Mr. Assanges website is a known outlet for foreign propaganda and in light of Mr. Assanges history of recklessly endangering the lives of Americans through his illegal disclosures," Sasse wrote.

Vice President Pence on Thursday told Fox News that the U.S. would pursue those involved in the incident, should the materials published by WikiLeaks prove to be valid CIA documents.

"If proven to be true and confirmed publicly, I can assure you that no resource will be spared in holding those [to] account that have leaked information that could well constitute a compromise of methods and a compromise of national security," Pence said.

Original post:
GOP senator reports hacking attempts after WikiLeaks criticism - The Hill