<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8567398124063555856</atom:id><lastBuildDate>Wed, 02 Oct 2024 05:19:26 +0000</lastBuildDate><category>security</category><category>vulnerability</category><category>governments</category><category>privacy</category><category>surveillance</category><category>Linux</category><category>cyberwar</category><category>dystopia</category><category>hack</category><category>snowden</category><category>windows</category><category>HTTPS</category><category>HTTPS/2</category><category>access</category><category>backdoor</category><category>censor</category><category>greenwald</category><category>hacking</category><category>infrastructure</category><category>internet</category><category>md5</category><category>nsa</category><category>radar</category><category>scada</category><category>secret</category><category>software</category><category>APT</category><category>AV</category><category>BEAST</category><category>BIOS</category><category>Bash</category><category>Blog</category><category>CVE</category><category>DRAM</category><category>Ease of Access</category><category>Encryption</category><category>FREAK</category><category>Heartbleed</category><category>IP</category><category>Internet 2</category><category>MacOSX</category><category>POODLE</category><category>RC4</category><category>SSL</category><category>TLS</category><category>advanced</category><category>adware</category><category>alliance</category><category>apache</category><category>assange</category><category>attack</category><category>authentication bypass</category><category>behaviors</category><category>biometric</category><category>braintree</category><category>break points</category><category>bug</category><category>cat-mouse</category><category>china</category><category>ciphers</category><category>curl</category><category>darknet</category><category>deepweb</category><category>digital certificates</category><category>dubstep</category><category>easter eggs</category><category>exfiltration</category><category>fear</category><category>fido</category><category>five_eyes</category><category>flaw</category><category>freedoms</category><category>future</category><category>gop</category><category>hidden</category><category>http</category><category>humanity</category><category>i2p</category><category>inspector</category><category>iphone</category><category>javascript</category><category>knowledge</category><category>leblanc</category><category>lenovo</category><category>malware</category><category>manning</category><category>microsoft</category><category>mobile</category><category>mr robot</category><category>net_neutrality</category><category>netcat</category><category>networks</category><category>north korea</category><category>openSSL</category><category>passwords</category><category>patriot_act</category><category>paypal</category><category>persistent</category><category>phone</category><category>public</category><category>ransomware</category><category>remote code execution</category><category>reverse engineer</category><category>satellites</category><category>search engines</category><category>security by obscurity</category><category>server</category><category>sha</category><category>sha-3</category><category>shellshock</category><category>siemens</category><category>societies</category><category>sony</category><category>speech</category><category>superfish</category><category>target</category><category>testSSL</category><category>threats</category><category>tor</category><category>tpp</category><category>trans-pacific</category><category>trojan</category><category>us</category><category>wget</category><title>Hack The Planet: Security by Obscurity in the 21st Century</title><description></description><link>https://unsecuritynow.blogspot.com/</link><managingEditor>noreply@blogger.com (UnsecurityNow)</managingEditor><generator>Blogger</generator><openSearch:totalResults>17</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-557250243498134043</guid><pubDate>Thu, 14 Jul 2016 19:37:00 +0000</pubDate><atom:updated>2016-07-14T14:37:57.945-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">break points</category><category domain="http://www.blogger.com/atom/ns#">dubstep</category><category domain="http://www.blogger.com/atom/ns#">easter eggs</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">inspector</category><category domain="http://www.blogger.com/atom/ns#">javascript</category><category domain="http://www.blogger.com/atom/ns#">mr robot</category><category domain="http://www.blogger.com/atom/ns#">ransomware</category><title>Mr Robot Season 2 Easter Eggs: Ransomware Message Revealed and Decoded!</title><description>Hello folks!&amp;nbsp; I&#39;m sure you have heard about the most popular TV Show of 2015 and perhaps of 2016, multiple awards winning TV sensation of Mr Robot.&amp;nbsp; I don&#39;t like TV shows and don&#39;t watch TV at all, but I got caught with Season 1 because of the hacking techniques the main character uses which sound and seem pretty legitimate (as well as the terms).&amp;nbsp; So, Season 2 took off yesterday but there has been a lot of work done on the Internet about it before then not only on their &lt;a href=&quot;https://www.whoismrrobot.com/&quot; target=&quot;_blank&quot;&gt;website&lt;/a&gt;, but also &lt;a href=&quot;https://www.fsoc.sh/&quot; target=&quot;_blank&quot;&gt;outside&lt;/a&gt; &lt;a href=&quot;http://i239.bxjyb2jvda.net/&quot; target=&quot;_blank&quot;&gt;of it&lt;/a&gt;;&amp;nbsp; including Easter eggs!&amp;nbsp; Easter eggs are &quot;secrets&quot; buried in layers for people to find out.&amp;nbsp; I have stumbled to a few great surprises but one was worth noting.&amp;nbsp; After they released Episode 1 before the air-date, kept me wondering...&lt;br /&gt;
&lt;br /&gt;
Episode 1 concludes in a Ransomware attack to evil corp banks which leaves their computer inoperable.&amp;nbsp; I could take a screenshot of it and decided to investigate the victim&#39;s IP address (which is public by the way) and found something interesting.&amp;nbsp; There seemed to be a message buried behind the timer which resets every-time you open the website, but what if I could stop the timer and let it go to 00:00:00? What would happen when the timer sets to 0?&amp;nbsp; Watch the video, learn a little about JS and base64 encoding (where the message is buried), grab some pop-corn and enjoy the video.... Dubtstep style!&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe width=&quot;320&quot; height=&quot;266&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/HZbD4VAzxKo/0.jpg&quot; src=&quot;https://www.youtube.com/embed/HZbD4VAzxKo?feature=player_embedded&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;</description><link>https://unsecuritynow.blogspot.com/2016/07/mr-robot-season-2-easter-eggs.html</link><author>noreply@blogger.com (UnsecurityNow)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/HZbD4VAzxKo/default.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-6449223592869062766</guid><pubDate>Thu, 14 Jul 2016 18:45:00 +0000</pubDate><atom:updated>2016-07-14T14:38:53.690-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">authentication bypass</category><category domain="http://www.blogger.com/atom/ns#">BIOS</category><category domain="http://www.blogger.com/atom/ns#">Ease of Access</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">microsoft</category><category domain="http://www.blogger.com/atom/ns#">security by obscurity</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How Can a 10 Year Old Have Administrator Access to Your Fortified Windows 8 and 10 Computer</title><description>Hello there. I have been a bit busy working and on-side projects so I would like to share with you some old work I have done before which I haven&#39;t shared on my Blog.&amp;nbsp; Even though I have done a similar video with Windows 7.&amp;nbsp; This shows that the principle of this flaw does not rely on software but in the design of it.&amp;nbsp; Since Micro$oft is too busy fixing more &quot;relevant&quot; bugs, I am posting this only for educational purposes.&amp;nbsp; I am not responsible nor condone illegal acts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now, watch and enjoy!&lt;br /&gt;
&lt;br /&gt;
Windows 8:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/EnseWVD9fr8/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/EnseWVD9fr8?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Windows 10:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/8DD_SarB15Q/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/8DD_SarB15Q?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;</description><link>https://unsecuritynow.blogspot.com/2016/07/how-can-10-year-old-have-administrator.html</link><author>noreply@blogger.com (UnsecurityNow)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/EnseWVD9fr8/default.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-3385781024546179411</guid><pubDate>Tue, 06 Oct 2015 18:06:00 +0000</pubDate><atom:updated>2015-10-07T18:13:47.969-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">AV</category><category domain="http://www.blogger.com/atom/ns#">BEAST</category><category domain="http://www.blogger.com/atom/ns#">ciphers</category><category domain="http://www.blogger.com/atom/ns#">digital certificates</category><category domain="http://www.blogger.com/atom/ns#">Encryption</category><category domain="http://www.blogger.com/atom/ns#">FREAK</category><category domain="http://www.blogger.com/atom/ns#">Heartbleed</category><category domain="http://www.blogger.com/atom/ns#">HTTPS</category><category domain="http://www.blogger.com/atom/ns#">HTTPS/2</category><category domain="http://www.blogger.com/atom/ns#">md5</category><category domain="http://www.blogger.com/atom/ns#">openSSL</category><category domain="http://www.blogger.com/atom/ns#">POODLE</category><category domain="http://www.blogger.com/atom/ns#">RC4</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">sha</category><category domain="http://www.blogger.com/atom/ns#">SSL</category><category domain="http://www.blogger.com/atom/ns#">testSSL</category><category domain="http://www.blogger.com/atom/ns#">TLS</category><title>How to determine your HTTPS is really secure</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcNKr-hEyRfaViZzvjkVbKYkyXTPVpVpESpq41o_vVXT4Suobf53TY77m_to_dY71MMOxRA5-KfyndvKZSd5O1tvaz0Fi9tn1CFMY3cwQQ1LRFM7t5PQWtenFQZNsYmEtY75cxZ422SJgt/s1600/insecure-tls.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcNKr-hEyRfaViZzvjkVbKYkyXTPVpVpESpq41o_vVXT4Suobf53TY77m_to_dY71MMOxRA5-KfyndvKZSd5O1tvaz0Fi9tn1CFMY3cwQQ1LRFM7t5PQWtenFQZNsYmEtY75cxZ422SJgt/s1600/insecure-tls.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
At this time when not even HTTPS is considered 100% secure, how do we determine we are going through a secure connection?  How can we tell that our connection from point A to point B is not being eavesdropped by a man in the middle? Nowadays, regular and more IT inclined users must be equally aware of their dangers and how to mitigate it. With recent vulnerabilities such as FREAK and Heartbleed, how can we know the TLS/SSL security are not being downgraded after we click a link? Well, read on.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Definitions&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
So, how do we determine if a connection is secure/insecure? First of all: what is considered insecure? Well, we know that a secure HTTPS connection includes the SSL/TLS data encryption and authentication protocols. We also know that SSL (Secure Socket Layer) protocol is the predecessor of TLS (Transport Layer Security). We now know that SSL (even its last version 3.0) is really insecure from what we&#39;ve seen in old and recent bugs and vulnerabilities such as &lt;b&gt;&lt;a href=&quot;https://isc.sans.edu/forums/diary/SSLv3+POODLE+Vulnerability+Official+Release/18827/&quot; target=&quot;_blank&quot;&gt;POODLE&lt;/a&gt;&lt;/b&gt;, &lt;a href=&quot;http://www.webopedia.com/TERM/S/ssl_beast.html&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;BEAST&lt;/b&gt;&lt;/a&gt;, &lt;a href=&quot;http://heartbleed.com/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;Heartbleed&lt;/b&gt;&lt;/a&gt; and &lt;a href=&quot;https://freakattack.com/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;FREAK&lt;/b&gt;&lt;/a&gt;. We also knwo that TLS 1.2 is the most secure (yet) protocol that goes along HTTPS communications. But things are not easy as they might seem, even TLS v1.2 (if not properly configured) can also be a target for BEAST vulnerability attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEig_686VyrUrOooJY7YB4fG6SAIH4RyLmbgJsAQoSzRbqcSRYES08XHcKtCbPrXUCnWC-2r_D2GMbMFDsVVGNbSubXM9ReGr7krB__e-X12PZYfAMkgyfpAjldSbE2axhmm3Av5QhWMegfa/s1600/freak-vulnerability-continuum.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;304&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEig_686VyrUrOooJY7YB4fG6SAIH4RyLmbgJsAQoSzRbqcSRYES08XHcKtCbPrXUCnWC-2r_D2GMbMFDsVVGNbSubXM9ReGr7krB__e-X12PZYfAMkgyfpAjldSbE2axhmm3Av5QhWMegfa/s640/freak-vulnerability-continuum.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Determining Vunerability Vectors&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
Depending of the attack, bug of vulnerability, there are different and many ways of compromise a system but the vectors associated with them are to be accounted for. For example, if you&#39;re susceptible for a MiTM (Man-in-the-middle) attack, he can potentially downgrade your secure connection thus leaving your system unprotected from the beforementioned attacks. This is call &quot;&lt;a href=&quot;https://www.praetorian.com/blog/man-in-the-middle-tls-ssl-protocol-downgrade-attack#MITM%20TLS%20Protocol%20Downgrade%20Attack&quot; target=&quot;_blank&quot;&gt;Downgrade Attack&lt;/a&gt;&quot;. Also, believe it or not&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Plan of Action&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In order to have a plan of action, it is very important to determine what products are installed in your computer(s).&amp;nbsp; By maintaining your browsers at the most minimum (is there a reason to have 3 different browsers on your computer?), it will simply mitigate risks. This is because we do not always remember to update our browser or simply if we think our Operating System is patched, our Browser(s) are too.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-SN0MZ-eknts/VhQPEeqHPDI/AAAAAAAAAVI/UFHvlKndMYc/s1600/ChromeTLS.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://2.bp.blogspot.com/-SN0MZ-eknts/VhQPEeqHPDI/AAAAAAAAAVI/UFHvlKndMYc/s320/ChromeTLS.png&quot; width=&quot;258&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Check SSL/TLS in Chrome&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;script type=&quot;text/javascript&quot;&gt;
    google_ad_client = &quot;ca-pub-4617726984699259&quot;;
    google_ad_slot = &quot;3225236529&quot;;
    google_ad_width = 728;
    google_ad_height = 90;
&lt;/script&gt;
&lt;!-- top --&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;//pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;

&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-Jeb3Ek_h_lM/VhQPkhMhPrI/AAAAAAAAAVQ/gi89RrUIhss/s1600/Firefoxciphersuite.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;289&quot; src=&quot;http://3.bp.blogspot.com/-Jeb3Ek_h_lM/VhQPkhMhPrI/AAAAAAAAAVQ/gi89RrUIhss/s320/Firefoxciphersuite.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;font-size: 12.8px;&quot;&gt;Check SSL/TLS in Firefox&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
This is a common mistake for amateurs and rookies in the subject, but they must be aware of the risks and take action. &amp;nbsp;Also, by running OpenSSL and TestSSL utilities, we can determine what SSL/TLS ciphers are at risk for example RC4-MD5 or RC4-SHA. &amp;nbsp;Also, such protocols such as TLS 1.0 is not secure anymore and you should rely on 1.2 at least. By using these utilities, it will help you in knowing what should be changed in order to have a little more secure web application.&lt;br /&gt;
&lt;br /&gt;
You have to be careful because if your web application uses the RC4 Cipher Suite, the connection might not be as secure as you might think. &amp;nbsp;The RC4 cipher is not a pseudo-random value that gets generated but the first 65 bytes can be decrypted in order to obtain passwords or cookie information stealing the session. &amp;nbsp;By having this &quot;Invariance Weakness&quot;, it leads to an attack called Bar Mitzvah which can be used to steal your session information.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/-l2A9kjP6Hb8/VhQUBlhAkVI/AAAAAAAAAVo/UbwtGv85eqQ/s1600/Bar-Mitzvah-cifrado-SSL-TLS-655x407.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;396&quot; src=&quot;http://1.bp.blogspot.com/-l2A9kjP6Hb8/VhQUBlhAkVI/AAAAAAAAAVo/UbwtGv85eqQ/s640/Bar-Mitzvah-cifrado-SSL-TLS-655x407.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-60MEiMDMPUY/VhQSbiff-YI/AAAAAAAAAVc/JN9jYzVV7aE/s1600/Bar-mitzvah.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;426&quot; src=&quot;http://4.bp.blogspot.com/-60MEiMDMPUY/VhQSbiff-YI/AAAAAAAAAVc/JN9jYzVV7aE/s640/Bar-mitzvah.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;In the Bar Mitzvah attack, it only takes 65 bytes to decrypted data (after the handshake) stealing cookies or passwords.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
The plan of action for RC4 is to totally deactivate it in order to mitigate these risks.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;center&gt;
&lt;b&gt;Sources&lt;/b&gt;&lt;/center&gt;
&lt;br /&gt;
&lt;br /&gt;
Definition of POODLE: https://isc.sans.edu/forums/diary/SSLv3+POODLE+Vulnerability+Official+Release/18827/&lt;br /&gt;
&lt;br /&gt;
Definition of BEAST:&amp;nbsp; http://www.webopedia.com/TERM/S/ssl_beast.html&lt;br /&gt;
&lt;br /&gt;
Definition of Heartbleed: http://heartbleed.com&lt;br /&gt;
&lt;br /&gt;
Definition of FREAK: https://freakattack.com/&lt;br /&gt;
&lt;br /&gt;
Downgrade Attack: https://www.praetorian.com/blog/man-in-the-middle-tls-ssl-protocol-downgrade-attack#MITM%20TLS%20Protocol%20Downgrade%20Attack&amp;nbsp;&lt;b&gt; &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
OpenSSL:&amp;nbsp;https://www.openssl.org&lt;br /&gt;
&lt;br /&gt;
TestSSL:&amp;nbsp;https://testssl.sh&lt;br /&gt;
&lt;br /&gt;
RC4 Vulnerability: http://securityaffairs.co/wordpress/35352/hacking/bar-mitzvah-attack-on-rc4.html&lt;/div&gt;</description><link>https://unsecuritynow.blogspot.com/2015/10/how-to-determine-your-https-is-really.html</link><author>noreply@blogger.com (UnsecurityNow)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcNKr-hEyRfaViZzvjkVbKYkyXTPVpVpESpq41o_vVXT4Suobf53TY77m_to_dY71MMOxRA5-KfyndvKZSd5O1tvaz0Fi9tn1CFMY3cwQQ1LRFM7t5PQWtenFQZNsYmEtY75cxZ422SJgt/s72-c/insecure-tls.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-8427710413387480186</guid><pubDate>Tue, 07 Jul 2015 04:14:00 +0000</pubDate><atom:updated>2016-01-28T14:55:29.552-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">apache</category><category domain="http://www.blogger.com/atom/ns#">backdoor</category><category domain="http://www.blogger.com/atom/ns#">Bash</category><category domain="http://www.blogger.com/atom/ns#">bug</category><category domain="http://www.blogger.com/atom/ns#">curl</category><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">http</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">MacOSX</category><category domain="http://www.blogger.com/atom/ns#">netcat</category><category domain="http://www.blogger.com/atom/ns#">remote code execution</category><category domain="http://www.blogger.com/atom/ns#">shellshock</category><category domain="http://www.blogger.com/atom/ns#">wget</category><title>BASH ShellShock Bug</title><description>By this time we all know that the BASH Shellshock Bug is now history, but think again. There are times when I have found servers with their BASH outdated. Since we know the versions affected are &amp;lt;=3.4, the good news is that it can be easily mitigated. By just updating BASH, you already are ahead of the game. The sad thing: not everybody update their system accordingly. Believe it or not, lots of companies still don&#39;t have their system patched and this has to change. They have to start being more conscious about their customers and clients and stop being lazy.&lt;br /&gt;
On this video, I will show you what the Shellschock Bug is, the risks of it, how to penetrate a vulnerable system as well as how to mitigate it. Enjoy&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;344&quot; src=&quot;https://www.youtube.com/embed/Dp-kDmIfkoA&quot; width=&quot;459&quot;&gt;&lt;/iframe&gt;</description><link>https://unsecuritynow.blogspot.com/2015/07/bash-shellshock-bug.html</link><author>noreply@blogger.com (UnsecurityNow)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/Dp-kDmIfkoA/default.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-1817280319983451976</guid><pubDate>Fri, 10 Apr 2015 19:17:00 +0000</pubDate><atom:updated>2015-04-19T12:05:55.041-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">access</category><category domain="http://www.blogger.com/atom/ns#">alliance</category><category domain="http://www.blogger.com/atom/ns#">behaviors</category><category domain="http://www.blogger.com/atom/ns#">biometric</category><category domain="http://www.blogger.com/atom/ns#">braintree</category><category domain="http://www.blogger.com/atom/ns#">dystopia</category><category domain="http://www.blogger.com/atom/ns#">fear</category><category domain="http://www.blogger.com/atom/ns#">fido</category><category domain="http://www.blogger.com/atom/ns#">future</category><category domain="http://www.blogger.com/atom/ns#">humanity</category><category domain="http://www.blogger.com/atom/ns#">leblanc</category><category domain="http://www.blogger.com/atom/ns#">md5</category><category domain="http://www.blogger.com/atom/ns#">mobile</category><category domain="http://www.blogger.com/atom/ns#">passwords</category><category domain="http://www.blogger.com/atom/ns#">paypal</category><category domain="http://www.blogger.com/atom/ns#">privacy</category><category domain="http://www.blogger.com/atom/ns#">public</category><category domain="http://www.blogger.com/atom/ns#">secret</category><category domain="http://www.blogger.com/atom/ns#">sha-3</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><title>Getting Closer to a New Machine Era</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZpY05nehf1Dh75hZR0kuCBZ1BP0eL70Ar79_GjwyAZU0pqs4v5znvAdA8RaJwliPqXusPdRtxP7RjDFIlXRqF-kQ-c9xHi02PIu4bvQD6kDnDN-2QYTJ8iW1_3Tz3ZzgOz1BMQLNH9ul7/s1600/666-chip.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZpY05nehf1Dh75hZR0kuCBZ1BP0eL70Ar79_GjwyAZU0pqs4v5znvAdA8RaJwliPqXusPdRtxP7RjDFIlXRqF-kQ-c9xHi02PIu4bvQD6kDnDN-2QYTJ8iW1_3Tz3ZzgOz1BMQLNH9ul7/s1600/666-chip.jpg&quot; height=&quot;360&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&quot;Also it causes all, both small and great, both rich and poor, both free 
and slave, to be marked on the right hand or the forehead, so that no 
one can buy or sell unless he has the mark, that is, the name of the 
beast or the number of its name. This calls for wisdom: let the one who 
has understanding calculate the number of the beast, for it is the 
number of a man, and his number is 666.&quot; &amp;nbsp; -Revelations 13:16-18&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;A Word from the Blogger&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
We are emerging to a new phase.&amp;nbsp; As passwords are slowly becoming more obsolete because of its nature of being insecure and hard to remember, a new era is emerging which will have a lot of controversy.&amp;nbsp; Since biometric methods of authentication haven&#39;t delivered what they promised,&amp;nbsp; they also been proven to fail a lot of times in these few years and we have seen how it can be easily bypassed in the last few months, we are now to wonder:&amp;nbsp; how are we supposed to store our information and do our &quot;private&quot; actions through the Internet without having our account (which, by the way, now contains everything we do) compromised.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgORzq6MI9cRRcUP_isH4pdN8L10PVisPO81_-8SV_gWHkn7H-Tl88AgZINKOv64oEAul5-NsjtT1bZV9m_TNs_fYnF4yd3wMRlRhSaQy8yLQgzfSLkaUxeEcmC-ZXz0UZD512JWRnTWH2W/s1600/130313_TRP_robotRevolutionW.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgORzq6MI9cRRcUP_isH4pdN8L10PVisPO81_-8SV_gWHkn7H-Tl88AgZINKOv64oEAul5-NsjtT1bZV9m_TNs_fYnF4yd3wMRlRhSaQy8yLQgzfSLkaUxeEcmC-ZXz0UZD512JWRnTWH2W/s1600/130313_TRP_robotRevolutionW.jpg&quot; height=&quot;210&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;www.slate.com&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
Even though I really love technology and I enjoy experimenting with it, I am completely against the ideology of merging humans with robots.&amp;nbsp; I am completely against the ideology of having robotic parts embedded into our body to surpass our average capabilities and nature of being what we are... humans.&amp;nbsp; By merging embedded robotic parts with our&amp;nbsp; body to make ourselves &quot;more efficient&quot;, is a mocking to God because of the arrogance and pride of wishing to be not only like Got but better than God.&amp;nbsp; If God wanted us to be robots, he would have created robotic parts in ourselves.&amp;nbsp; Also, it goes against the laws of nature which is also enforced, controlled and mediated by God. If the laws of nature are altered, an endless of domino reaction cataclysms would occur.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The Article&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
I have read some news which I could not let them slip.&amp;nbsp; In fact, I had other Blog entries in production and ready to push into live publishing, but I believe this is more important; so I started on this topic right away.&amp;nbsp; This event will the start of a huge dystopian life change in which the human race will long regret.&lt;br /&gt;
&lt;br /&gt;
On Friday April 17, 2015 in the Wall Street Journal, came an article, one of the most ever life changing in history.&amp;nbsp; &quot;&lt;a href=&quot;http://blogs.wsj.com/digits/2015/04/17/paypal-wants-you-to-inject-your-username-and-eat-your-password/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;A PayPal executive&lt;/a&gt; who works with engineers and developers of Paypal said that &quot;to find and 
test new technologies, embeddable, injectable, and 
ingestible devices are the next wave in identification for mobile 
payments and other sensitive on-line interactions.&quot; Also, the head of PayPal&#39;s and Braintree&#39;s Global Development Advocacy Jonathan LeBlanc said that &quot;The future of identification would not rely on passwords.&quot; As we know, PayPal has not only proven in the past to be a more secure than traditional forms of on-line payments but also has proven to have certain vulnerabilities which &lt;a href=&quot;http://www.theregister.co.uk/2013/03/12/avast_reseller_breach/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;exposed&lt;/a&gt; its user&#39;s use-rnames and encrypted passwords but also two-factor authentication techniques were previously &lt;a href=&quot;http://www.slate.com/blogs/future_tense/2014/08/05/paypal_s_two_factor_authentication_is_vulnerable_to_a_hack.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;hacked&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;The Problem - Fear to the Public&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
For these reasons as well as the fact that passwords (no matter how much encryption they have) are always eventually brekable, PayPal is turning its odds to a more &quot;reliable&quot;, secure and easier to use:&amp;nbsp; &lt;span class=&quot;main-article-info&quot;&gt;Embeddable, Injectable and Ingestible Devices.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcXvgQM1muo-qlM2Q8dgxQ9mPl5i_MSaWqbrLMDjIcqShBrGk-a-E3jZOXN6sUDa0n9qkUbgMYh0tZsM_nBOiD4T1k2IiF2b50rbMuVLB4oDm6TbQTb6f23c3QfUR2ihNtPirT1vd22x95/s1600/robot-job-takeover-robot-human-mind.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcXvgQM1muo-qlM2Q8dgxQ9mPl5i_MSaWqbrLMDjIcqShBrGk-a-E3jZOXN6sUDa0n9qkUbgMYh0tZsM_nBOiD4T1k2IiF2b50rbMuVLB4oDm6TbQTb6f23c3QfUR2ihNtPirT1vd22x95/s1600/robot-job-takeover-robot-human-mind.png&quot; height=&quot;368&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;http://www.makeuseof.com&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;span class=&quot;main-article-info&quot;&gt;&amp;nbsp;As LeBlanc has stated on his &lt;a href=&quot;http://www.slideshare.net/jcleblanc/kill-all-passwords&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;presentations&lt;/a&gt; named &quot;Kill All The Passwords&quot; presented all over the U.S. and Europe, 91% of people use passwords listed in the top 1000 most used passwords list and 79% on the top 500 respectively.&amp;nbsp; He also added more fear the fire by stating that the already (relatevely) safe algorithms we know now such as MD5, SHA-1,2 and 3 have bad security. Additionally, he also stated how Biometric authentication has a lot of false positives and false negatives making the authentication process a real pain to use and it is not an integrity check in which we can easily trust.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;main-article-info&quot;&gt;As the IoT (Internet of Things) are merging all our societal and private life facets to a more organized, transparent and traceable public domain, passwords are no longer trusted to &quot;safeguard&quot; our already-on-the-domain identities, therefore here comes his &quot;solution&quot;.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;main-article-info&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;main-article-info&quot;&gt;&lt;u&gt;&lt;b&gt;LeBlanc Solution&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiav-Fj31ftkPVzZq8uxuat4mVMIfavojsnuRclqZ2UCQAJrUx3aD-SrR3IYvrKzqRDSAhR9hy9luJp7_kXKK0U61VvjkzwsvMZm2JPAXXf8Kuy8G5a2lu1b0DuOIIrllwviaaQiwa-0rXk/s1600/kill-all-passwords-28-638.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiav-Fj31ftkPVzZq8uxuat4mVMIfavojsnuRclqZ2UCQAJrUx3aD-SrR3IYvrKzqRDSAhR9hy9luJp7_kXKK0U61VvjkzwsvMZm2JPAXXf8Kuy8G5a2lu1b0DuOIIrllwviaaQiwa-0rXk/s1600/kill-all-passwords-28-638.jpg&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;http://www.slideshare.net/jcleblanc/kill-all-passwords&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
As any seasoned salesmen and social-engineer already know, in order to sell a product or convinced someone to do a certain thing (a thing he wants you to do), he first has to create the need for it. One of the techniques used to accomplish this is to create fear. Once the fear and need is established, the solution comes next.&amp;nbsp; LeBlanc states his solution to authentication by using:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; -Fingerpring Scanning&lt;br /&gt;
&amp;nbsp; -Vein Recognition&lt;br /&gt;
&amp;nbsp; -Heart rate monitoring&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;By the following methods:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; -Ingestible Technology: Ingestible capsules will be used and powered by stomach acids to detect glucose, blood pressure,digestive health and &lt;span class=&quot;main-article-info&quot;&gt;other unique internal parameter &lt;/span&gt;patterns.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; -Brain-Chip Implants will be used (through &lt;span class=&quot;main-article-info&quot;&gt;built-in ECG sensors) to monitor the unique electrical activity of a person’s heart, and communicate via &quot;wireless wearable computer tattoos.&quot; &lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwa5-YfbVjgp2HWGog1o5_bgMTqG3droPmqKX9nzZhN9SnZWURHKh49dLjhsNRNV_nrUWb84H-h79RAI1MTBYEqU8m4uqjhtjK1I4mIKxBP0pYCfwJef6b9WhIBibfFyhHDUEpi5Kirt4J/s1600/kill-all-passwords-24-638.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwa5-YfbVjgp2HWGog1o5_bgMTqG3droPmqKX9nzZhN9SnZWURHKh49dLjhsNRNV_nrUWb84H-h79RAI1MTBYEqU8m4uqjhtjK1I4mIKxBP0pYCfwJef6b9WhIBibfFyhHDUEpi5Kirt4J/s1600/kill-all-passwords-24-638.jpg&quot; height=&quot;480&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;http://www.slideshare.net/jcleblanc/kill-all-passwords&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
These methods, LeBlanc&amp;nbsp; states they will be &quot;natural body identification&quot;, which we already know it will not be true, because the machine (bits and bytes) will be required to analyze body patterns, which does not make it 100% natural.&amp;nbsp; Think about false positives of our body reaction through the use of drugs, anomalies, sickness, and unexplained pattern behaviors.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;FIDO Alliance&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
PayPal has partnered with FIDO Alliance to incorporate better authentication systems for their users.&amp;nbsp; One of their projects is the Universal 2 Factor (U2F) authentication. As FIDO Alliance states on one of its videos, U2F offers a more &quot;open, secure and easy to use standard by using a public and private key pair.&quot; The Bluetooth USB-like adapter device will not require drivers and will be used as a second method of authentication (after inputting the password) and will be the intermediate between the browser and the user to prevent keylogging, phishing (the most weak link) and MitM (man-in-the-middle) attacks.&amp;nbsp; It will be also used with the mobile devices which, with the integral part of Duo Push will be used as a phone App.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ34ACSMcnfzQ7vOG4PUJS6OAkI9B7977jKLsPpM12DuntY0hA_vAISCwzzTa8dvFltFy6_lmggpQ_wwtWrMsEFEvtMzlGuur1Y0V43_IWnmhorCsbH3vi10lv5VZIj8Sgmhx8ChuvRYu0/s1600/graphic_FIDOExperience_SM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ34ACSMcnfzQ7vOG4PUJS6OAkI9B7977jKLsPpM12DuntY0hA_vAISCwzzTa8dvFltFy6_lmggpQ_wwtWrMsEFEvtMzlGuur1Y0V43_IWnmhorCsbH3vi10lv5VZIj8Sgmhx8ChuvRYu0/s1600/graphic_FIDOExperience_SM.png&quot; height=&quot;174&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;https://fidoalliance.org/about/overview&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
In my opinion, this will be the bridge and the temporary solution for PayPal before they go full speed with the new and so radical change which will change our lives forever.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;Final Thoughts&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
We are now living a very crucial time when the fight for privacy,&amp;nbsp; human rights, wars, terrorist attacks made through false flag operations and our form of communication as well as authentication will be playing a huge new role and change to a more dystopian reality which will be combined with our &quot;own form of control&quot; by using our own medical record, health situation and body parts to keep our private data, the data that never had to be released to the public domain, secure.&amp;nbsp; It is now the time to change our dormant state and fight for our human rights, which is the last thing we have left.&amp;nbsp; If we don&#39;t anything, one day our future grand children will look at the past (if not altered) and ask: what has happened with our humanity?&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiGDJFz8cK0dWiYNtIaB-vPVUpLjioPI2N1XVu9kbbF0UhE8kJLkcFidHk_DS-FIC6UegO8qAFdxmMghcQ_IV8IM8jTPSYTDvMe2T4nF5cD-YgpykoDUVOjCs4KH0rYJYuNaTbi_xZM0kL/s1600/MachineCity_rev.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiGDJFz8cK0dWiYNtIaB-vPVUpLjioPI2N1XVu9kbbF0UhE8kJLkcFidHk_DS-FIC6UegO8qAFdxmMghcQ_IV8IM8jTPSYTDvMe2T4nF5cD-YgpykoDUVOjCs4KH0rYJYuNaTbi_xZM0kL/s1600/MachineCity_rev.jpg&quot; height=&quot;308&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&lt;b&gt;&lt;u&gt;Sources&lt;/u&gt;&lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;
WallStreet Journal Article:&amp;nbsp; http://blogs.wsj.com/digits/2015/04/17/paypal-wants-you-to-inject-your-username-and-eat-your-password&lt;br /&gt;
&lt;br /&gt;
LeBlanc Presentation:&amp;nbsp; http://www.slideshare.net/jcleblanc/kill-all-passwords&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
FIDO Alliance: https://fidoalliance.org/news-more/videos/&lt;br /&gt;
&lt;br /&gt;
PayPal FIDO:&amp;nbsp; https://www.paypal-pages.com/samsunggalaxys5/us/index-faq.html</description><link>https://unsecuritynow.blogspot.com/2015/04/new-world-order-paypal.html</link><author>noreply@blogger.com (UnsecurityNow)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZpY05nehf1Dh75hZR0kuCBZ1BP0eL70Ar79_GjwyAZU0pqs4v5znvAdA8RaJwliPqXusPdRtxP7RjDFIlXRqF-kQ-c9xHi02PIu4bvQD6kDnDN-2QYTJ8iW1_3Tz3ZzgOz1BMQLNH9ul7/s72-c/666-chip.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-3592933774392553144</guid><pubDate>Fri, 03 Apr 2015 17:01:00 +0000</pubDate><atom:updated>2015-04-19T12:08:29.405-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">access</category><category domain="http://www.blogger.com/atom/ns#">advanced</category><category domain="http://www.blogger.com/atom/ns#">APT</category><category domain="http://www.blogger.com/atom/ns#">backdoor</category><category domain="http://www.blogger.com/atom/ns#">censor</category><category domain="http://www.blogger.com/atom/ns#">cyberwar</category><category domain="http://www.blogger.com/atom/ns#">exfiltration</category><category domain="http://www.blogger.com/atom/ns#">infrastructure</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">persistent</category><category domain="http://www.blogger.com/atom/ns#">privacy</category><category domain="http://www.blogger.com/atom/ns#">radar</category><category domain="http://www.blogger.com/atom/ns#">scada</category><category domain="http://www.blogger.com/atom/ns#">server</category><category domain="http://www.blogger.com/atom/ns#">target</category><category domain="http://www.blogger.com/atom/ns#">threats</category><category domain="http://www.blogger.com/atom/ns#">trojan</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><title>The Evolution of Hacking: Advanced Persistent Threats (APT)</title><description>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnT_lCnlUrM9zJZOoJuxWrFCkahiFk_IH8lab_bkt5ch8HuVsTz6joFmQfEs259ToooxQ4HuqUgRZ3c3sPjb1Apm-JPHMueAxNWYzv7OQqRujq375YJKNrtv66Sg8DLqpFmEzNTWe9EUHU/s1600/ISACA-APT01.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnT_lCnlUrM9zJZOoJuxWrFCkahiFk_IH8lab_bkt5ch8HuVsTz6joFmQfEs259ToooxQ4HuqUgRZ3c3sPjb1Apm-JPHMueAxNWYzv7OQqRujq375YJKNrtv66Sg8DLqpFmEzNTWe9EUHU/s1600/ISACA-APT01.jpg&quot; height=&quot;438&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;_r3&quot;&gt;&lt;span class=&quot;irc_ho&quot; dir=&quot;ltr&quot;&gt;www.itbusinessedge.com&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;_r3 irc_msc&quot;&gt;&lt;span class=&quot;irc_idim&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&amp;nbsp;&lt;u&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/u&gt; &lt;br /&gt;
&lt;br /&gt;
In the last couple of decades we had observe some of the most brilliant hacking techniques ever known. We also delved into a lot of sophisticated Malware which redefined the whole concept of security. As more and more simplicity are being worked on the tools and more people adapt to the whole security world, we have seen a substantial growth in not only sophistication but also security persistence.&amp;nbsp; Here is what becomes: APTs.&lt;br /&gt;
&lt;br /&gt;
Nowadays, we are not only fighting against malicious and curious hungry people who want our data, identity and financial information but also against governments, mafias, and &quot;terrorist&quot; nations to gain trade and national secrets.&amp;nbsp; As this world might be coming to an imminent end (the end of humanity), it is logical to think that more and more havoc will be caused into our lives and in order to survive, we will have to accept a New World government, where everything will be monitored, judged, moderated and executed within one a World Organization in justification for total security and safety for all humanity.&lt;br /&gt;
&lt;br /&gt;
As more havoc is being done in this society, so it happens in our digital world. Better autonomic, resillient and cognitive systems are also put into the market (and our society) and to the hands of the gifted ones (and malicious users) in order to provide this society with more advanced, smart ways to silently break into the most sophisticated and secure systems. Advanced Persistent Threats is defined as &quot;&lt;span class=&quot;_Tgc&quot;&gt; a set of stealthy and continuous computer hacking 
processes, often orchestrated by human(s) targeting a specific entity.&quot; By disseminating each word, we have a better idea of what APT really is:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Advanced - Multi-vector 0 day attacks.&lt;br /&gt;
&lt;br /&gt;
Persistent - Undetectable attacks over a long period of time.&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;Threat - Manace over sensitive information to a critical infrastructure and assets.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;u&gt;&lt;b&gt;Past Examples&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Below there are only a handful of APT examples:&lt;br /&gt;
&lt;br /&gt;
PoisonIvy&lt;br /&gt;
Stuxnet&lt;br /&gt;
NightDragon&lt;br /&gt;
GhostNet &lt;br /&gt;
Lurid&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Past Targets&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Moonlight Maze (1998)&lt;br /&gt;
Titan Rain (2003)&lt;br /&gt;
US Congressmen (2006)&lt;br /&gt;
Oak Ridge National Laboratory (2007)&lt;br /&gt;
Los Alamos National Laboratory (2007)&lt;br /&gt;
US Department of Defense (2008)&lt;br /&gt;
Office of His Holiness the Dalai Lama (2008)&lt;br /&gt;
Operation Aurora (2009)&lt;br /&gt;
Australian Resource Sector (2010)&lt;br /&gt;
French Government (2010)&lt;br /&gt;
Canadian Government (2011) &lt;br /&gt;
Australian Government (2011)&lt;br /&gt;
Comodo Affiliated Root Authority (2011)&lt;br /&gt;
RSA (2011)&lt;br /&gt;
Oak Ridge National Laboratory (2011)&lt;br /&gt;
L-3 Communications (2011)&lt;br /&gt;
Lockheed Martin (2011)&lt;br /&gt;
Northrop Grumman (2011)&lt;br /&gt;
International Monetary Fund (2011)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;u&gt;&lt;b&gt;How APT Works&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUhRSkkwvUm7NB4P3vzYnep-Zlxjjn9hWFHi7PxGnRb2xeIsmJAljrkxh1YXb33SfgvBOkStIWewrSYCKQLTw_shOyADzfY2kYEsjCob6rX21VNOlRd86Gkcx2wZXoBut9aKoyqXwPWryd/s1600/apt-lifecycle.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUhRSkkwvUm7NB4P3vzYnep-Zlxjjn9hWFHi7PxGnRb2xeIsmJAljrkxh1YXb33SfgvBOkStIWewrSYCKQLTw_shOyADzfY2kYEsjCob6rX21VNOlRd86Gkcx2wZXoBut9aKoyqXwPWryd/s1600/apt-lifecycle.png&quot; height=&quot;457&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;_Tgc&quot;&gt;First, it is important to identify the phases of a successful APT.&amp;nbsp; In order to successfully attack a system without being detected, a series of out of the radar sophisticated techniques must be used.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;u&gt;&lt;b&gt;First Step - Advanced (Infection)&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;Attack is conducted by sending the RAT&#39;s Trojan (server file) by tricking the user to run it.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;Methods can be used as attachments, visiting a website which a vulnerability was taken advantaged of the malicious user which can download the Trojan of the RAT.&amp;nbsp; An indirect and less suspecious method is being used by simply throwing a USB drive with the RAT&#39;s Trojan software to the target&#39;s backyard, car, or personal item such as his coat, or pant&#39;s pocket.&amp;nbsp; If he plugs it in thinking he luckily found a USB he can use, the malicious user can craft an autoexecutable which executes the RAT&#39;s Trojan software in the background.&amp;nbsp; He can put random school documents or home-made pictures (not his own) to make it less suspecious.&amp;nbsp; A more advanced alternative is if the malicious user crafted a malicious software which &lt;/span&gt;&lt;span class=&quot;_Tgc&quot;&gt;&lt;span class=&quot;_Tgc&quot;&gt;downloads the server file (RAT&#39;s Trojan) when &lt;/span&gt;innactivity is detected on the target&#39;s machine, so he doesn&#39;t notice system&#39;s performace or hints when the connection, download and auto-execution is taking place.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;/span&gt;&lt;span class=&quot;_Tgc&quot;&gt;&lt;span class=&quot;_Tgc&quot;&gt;The attacker, once the victim is infected, can manages the victim&#39;s PC through the Remote Administration Tool (the RAT).&lt;/span&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;When the victim is infected, it simply notifies the malicious user who is running the RAT on his end.&amp;nbsp; Then, the malicious user can conduct a series of activities:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Keylogging (logs every single keystroke)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Uploads and downloads system&#39;s files &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Unrestricted remote shell login&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Uses proxy services to hide attacker&#39;s identity (through HTTP/SOCKS)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Kills, lists and starts system processes&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Spies on victim&#39;s webcam&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Screen Captures &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Full administrative access to files and system&#39;s registry &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Used to send SPAM from the victim&#39;s machine&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Logs-off, restarts and shutdowns the victim&#39;s computer&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Update the RAT&#39;s server (trojan) on the victim&#39;s machine &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Uninstallation of RAT itself&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;span class=&quot;_Tgc&quot;&gt;&lt;span class=&quot;_Tgc&quot;&gt;&lt;u&gt;&lt;b&gt;Second Step - Persistent (Methods)&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;The persistent phase comes when the attacker conducts such stealthy activities, such as:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Updating the server file &lt;/span&gt;&lt;span class=&quot;_Tgc&quot;&gt;on the victim&#39;s machine so it doesn&#39;t get detected by anti-malwar &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Inject the server file to a specific system process. i.e: winlogon.exe, iexplorer.exe or rundll32.exe.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -The server file&#39;s shortcut image can be changed as well as the name of the file to avoid detection.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Auto-runs and connects to attacker if the server&#39;s injected service is killed&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;u&gt;&lt;b&gt;Third Step - (Exfiltration) Threats&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;This serious threat can be used to make nefarious exfiltration of mass data such as:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;u&gt;&lt;b&gt; &lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Network footprinting&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Assets enumeration&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Usernames and Passwords&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Administrative domain account creation for further access&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Plant backdoors for evasion&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Secret data and company secrets&#39; leak&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Data and infrastructure corruption&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Compromise other hosts&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Privilege Escalation &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Encrypt critical files and demand ramson to decrypt it&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&amp;nbsp; -Etc,Etc,Etc&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;u&gt;&lt;b&gt;Final Thoughts&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;As we are going through a war phase, a lot of attacks are being made with digital weapons.&amp;nbsp; More instrusive controls&lt;u&gt;&lt;b&gt;&lt;/b&gt;&lt;/u&gt; such as better digital IDS/IPS signatures, more skilled people, Firewall rules and Anti-virus behavioral scans as well as signatures (come on, they do help a little) are getting behind exponentially with the emerge of more sophisticated APT malware.&amp;nbsp; With the evolution of cognitive systems, soon we won&#39;t have to enlist to fight wars because machines will be able to fight them for us.&amp;nbsp; The hacking techniques now being used as almost automatic and will soon be cognitive and conducted with the help of a more accurate AI (artificial intelligence).&amp;nbsp; In this information age, not only critical infrastructure but also the whole society&#39;s information is the target and at risk minute by minute.&amp;nbsp; That is why we need to be our own Firewall and not only be diligent about our activities and actions (they do cause an effect), but also about how we determine our future.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ4IO-2jCZU3G3tn7Yoe59Fq6K3x8DT5scH55yCbsW6EZNJjVX97SPEZsu74GmMOEvWWJlJLWyERHN1ucqWgOguKzVXZNPFRuyo3r1wtdDdzGxUTqnhvQHM3B8jC6MU6WAdXgumAijoHxX/s1600/human-firewall.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ4IO-2jCZU3G3tn7Yoe59Fq6K3x8DT5scH55yCbsW6EZNJjVX97SPEZsu74GmMOEvWWJlJLWyERHN1ucqWgOguKzVXZNPFRuyo3r1wtdDdzGxUTqnhvQHM3B8jC6MU6WAdXgumAijoHxX/s1600/human-firewall.jpg&quot; height=&quot;454&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</description><link>https://unsecuritynow.blogspot.com/2015/04/evolution-of-hacking-apt.html</link><author>noreply@blogger.com (UnsecurityNow)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnT_lCnlUrM9zJZOoJuxWrFCkahiFk_IH8lab_bkt5ch8HuVsTz6joFmQfEs259ToooxQ4HuqUgRZ3c3sPjb1Apm-JPHMueAxNWYzv7OQqRujq375YJKNrtv66Sg8DLqpFmEzNTWe9EUHU/s72-c/ISACA-APT01.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-6772581829474158502</guid><pubDate>Fri, 27 Mar 2015 17:00:00 +0000</pubDate><atom:updated>2015-04-15T17:50:37.549-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">assange</category><category domain="http://www.blogger.com/atom/ns#">dystopia</category><category domain="http://www.blogger.com/atom/ns#">five_eyes</category><category domain="http://www.blogger.com/atom/ns#">freedoms</category><category domain="http://www.blogger.com/atom/ns#">governments</category><category domain="http://www.blogger.com/atom/ns#">greenwald</category><category domain="http://www.blogger.com/atom/ns#">manning</category><category domain="http://www.blogger.com/atom/ns#">net_neutrality</category><category domain="http://www.blogger.com/atom/ns#">patriot_act</category><category domain="http://www.blogger.com/atom/ns#">privacy</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">snowden</category><category domain="http://www.blogger.com/atom/ns#">speech</category><category domain="http://www.blogger.com/atom/ns#">surveillance</category><category domain="http://www.blogger.com/atom/ns#">tpp</category><category domain="http://www.blogger.com/atom/ns#">trans-pacific</category><title>The Bill of Rights</title><description>&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
   &lt;w:UseFELayout/&gt;
  &lt;/w:Compatibility&gt;
  &lt;w:DoNotOptimizeForBrowser/&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;
   &lt;m:brkBin m:val=&quot;before&quot;/&gt;
   &lt;m:brkBinSub m:val=&quot;&amp;#45;-&quot;/&gt;
   &lt;m:smallFrac m:val=&quot;off&quot;/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val=&quot;0&quot;/&gt;
   &lt;m:rMargin m:val=&quot;0&quot;/&gt;
   &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;
   &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;
   &lt;m:intLim m:val=&quot;subSup&quot;/&gt;
   &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;true&quot;
  DefSemiHidden=&quot;true&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;267&quot;&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; Name=&quot;header&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; Name=&quot;Default Paragraph Font&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;59&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Table Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Placeholder Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Revision&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;List Paragraph&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; Name=&quot;Bibliography&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:10.0pt;
 mso-para-margin-left:0in;
 line-height:115%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA0TlJhjlkh52ppr8dW8uhLRHH9v1lzq12mRJpGn3ZrBEJZ2dv6zz6ZaTK-P6x5BxC-OLqNeHIU5h642l5UJUBEONmmmmJaVc34RCGikBRJ1AgrCRrFz8Fooc0fnyAAiHV07kplgXc1kr1/s1600/freedoms_lost_by_frani54-d4shaxf.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA0TlJhjlkh52ppr8dW8uhLRHH9v1lzq12mRJpGn3ZrBEJZ2dv6zz6ZaTK-P6x5BxC-OLqNeHIU5h642l5UJUBEONmmmmJaVc34RCGikBRJ1AgrCRrFz8Fooc0fnyAAiHV07kplgXc1kr1/s1600/freedoms_lost_by_frani54-d4shaxf.jpg&quot; height=&quot;640&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 200%;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 200%;&quot;&gt;&amp;nbsp;Privacy is affected in many
ways.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;The Bill of Rights subjects to the
privacy of not only conducting your own religion and assembly at your own place
without being detained but also after you are being detained to testify for a
crime that you haven&#39;t seen or have no more details to add.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Also, the freedom of having your own thoughts
or ideas as long they do not affect a third party (freedom of speech), the
right of bear arms (as long as you have a valid gun license) and the freedom of
deciding whether a militia, navy or army man should stay at your house while
the nation is “under peace.”&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Certain
rights impose the fact that we are still free but some of them, such as the
freedom of speech are a double edged sword.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;
&lt;/span&gt;If one speaks badly about certain things just because it is his thought,
and someone sensitive just feels annoyed or hurt, you could be in trouble.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 200%;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMCYKLNQoKVfTu3DmgBCOWr95cjOQhJFvPqU5Pa2_qmUBNWx23ICtRs6lV9WSICuLoInuQFfpKWMLoU2fhVRTiR_vdhr0Uu0dOiMXodnsGbqoveUYG8dj_-eRjvduKkhFJvWeJr2l20jeg/s1600/bill-of-rights.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMCYKLNQoKVfTu3DmgBCOWr95cjOQhJFvPqU5Pa2_qmUBNWx23ICtRs6lV9WSICuLoInuQFfpKWMLoU2fhVRTiR_vdhr0Uu0dOiMXodnsGbqoveUYG8dj_-eRjvduKkhFJvWeJr2l20jeg/s1600/bill-of-rights.jpg&quot; height=&quot;458&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 200%;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 200%;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 200%;&quot;&gt;The same goes for the government.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;If the government thinks you have hurt them,
your freedom of speech is no longer free, and you will be punished for it.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;It depends a lot how people, entities, and
governments take your argument.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Of
course, this is more prevalent when there is an abusive system.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;People, then rather not even express their
opinions and there is where freedom of speech lacks.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 200%;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 200%;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUt1k0jI6X4xtnCmq0ec9VkfXzDwJlsO-w_ucdd-lubQG9tfMmqzyyj0zC1ZsF7xE_plyvUgoLxWMyqtkTeEmL1hi9-2tgHOwj61EABBwx9r5NejtN-3LtYrJPsGsW2HYJcqmtAdjJIs_N/s1600/NDAA-BoRits-suspend1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUt1k0jI6X4xtnCmq0ec9VkfXzDwJlsO-w_ucdd-lubQG9tfMmqzyyj0zC1ZsF7xE_plyvUgoLxWMyqtkTeEmL1hi9-2tgHOwj61EABBwx9r5NejtN-3LtYrJPsGsW2HYJcqmtAdjJIs_N/s1600/NDAA-BoRits-suspend1.png&quot; height=&quot;462&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 200%;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 200%;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 200%;&quot;&gt;Since after 9/11, not only we can see a proliferation of
abuses not only to the Bill of Rights but also seen on top-secret papers
exposed by whistle-blowers such as Chelsea (former &lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 200%;&quot;&gt;Bradley) &lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 200%;&quot;&gt;Manning and Edward Snowden as well
as by journalists such as Glenn Greenwald and Julian Assange dismantling
horrific projects and operations from the NSA as well as from the Five Eyes
(intelligence alliance compromising Australia, Canada, New Zealand, United
Kingdom and the United States).&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Little
by little our freedoms are diminishing for the name of “National Security” with
freedom interfering Acts as the Patriot Act (especially Section 215), Net
Neutrality, Trans-Pacific Partnership (TPP) and other mass-surveillance
programs.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;People need to wake up before
it is too late, because we are now facing the end of “our own control” times.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt; &lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj8n5fHULHZ9ELm8zbVBuvZSF0nMSMW9huUA3bCMXHg64-8bzqeDO7bVlvmif8H-wmlC2xPNlUVhyZoqHdTuZwUXw9iIxZqzrt4iMDBnK4ANhGbXRg6XBTPK6VJIP0Wtf0GwgA_iSIjITR/s1600/images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj8n5fHULHZ9ELm8zbVBuvZSF0nMSMW9huUA3bCMXHg64-8bzqeDO7bVlvmif8H-wmlC2xPNlUVhyZoqHdTuZwUXw9iIxZqzrt4iMDBnK4ANhGbXRg6XBTPK6VJIP0Wtf0GwgA_iSIjITR/s1600/images.jpg&quot; height=&quot;358&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 200%;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 200%;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 200%;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 200%;&quot;&gt;We are rapidly and nefariously losing our
freedoms for the name of “security” selling us a plethora of dystopia realities
fabricated by false-flag operations such as the endless wars we are facing now
as well as producing horror propaganda orchestrated by a shadow unified
government with terrorists groups using their best weapon:&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;media disinformation.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;We need to act and we need to act now because
as Benjamin Franklin once said:&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;“Those
who give up their liberty for more security deserve neither.”&lt;/span&gt;&lt;/div&gt;
</description><link>https://unsecuritynow.blogspot.com/2015/03/the-bill-of-rights.html</link><author>noreply@blogger.com (UnsecurityNow)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA0TlJhjlkh52ppr8dW8uhLRHH9v1lzq12mRJpGn3ZrBEJZ2dv6zz6ZaTK-P6x5BxC-OLqNeHIU5h642l5UJUBEONmmmmJaVc34RCGikBRJ1AgrCRrFz8Fooc0fnyAAiHV07kplgXc1kr1/s72-c/freedoms_lost_by_frani54-d4shaxf.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-647515546614779650</guid><pubDate>Fri, 20 Mar 2015 17:00:00 +0000</pubDate><atom:updated>2015-04-05T15:54:02.462-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">censor</category><category domain="http://www.blogger.com/atom/ns#">darknet</category><category domain="http://www.blogger.com/atom/ns#">deepweb</category><category domain="http://www.blogger.com/atom/ns#">governments</category><category domain="http://www.blogger.com/atom/ns#">hidden</category><category domain="http://www.blogger.com/atom/ns#">HTTPS/2</category><category domain="http://www.blogger.com/atom/ns#">i2p</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">Internet 2</category><category domain="http://www.blogger.com/atom/ns#">IP</category><category domain="http://www.blogger.com/atom/ns#">networks</category><category domain="http://www.blogger.com/atom/ns#">secret</category><category domain="http://www.blogger.com/atom/ns#">societies</category><category domain="http://www.blogger.com/atom/ns#">surveillance</category><category domain="http://www.blogger.com/atom/ns#">tor</category><title>Meet The Hidden Web</title><description>&lt;u&gt;&lt;b&gt;Terminology&lt;/b&gt;&lt;/u&gt; &lt;br /&gt;
&lt;br /&gt;
Also known as the Dark Web, Deep Web, Darknet or darkweb, whatever is left out of search engine indexes is located in these darknet. Despite the name used, according to NPR.org, the deepweb is made out of 96% of all content, far more webpages than the World Wide Web. What we cannot see with our &quot;naked&quot; eye (or in this case with traditional methods) is known to be unkown, but thanks to services such as Tor or I2P, we can actually experiment the full potential of information flow.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWctaZnWRFjdjKCttWgDhLUGne4bWe7yCOwvNBskb9UOIXADFHcjUmltDvwpifRgVWXOCg5OZ8XQzuMfHy4BKxr6sZu01Uc78v8B_csUjJAp0jjdbAJLR5RUXhWA2F0sVcUWtTxzP5VnuQ/s1600/anonymity-darknets-and-staying-out-federal-custody-part-one-deep-web.w654.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWctaZnWRFjdjKCttWgDhLUGne4bWe7yCOwvNBskb9UOIXADFHcjUmltDvwpifRgVWXOCg5OZ8XQzuMfHy4BKxr6sZu01Uc78v8B_csUjJAp0jjdbAJLR5RUXhWA2F0sVcUWtTxzP5VnuQ/s1600/anonymity-darknets-and-staying-out-federal-custody-part-one-deep-web.w654.jpg&quot; height=&quot;422&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Now, how can we know what is indexed and what is not? Well, for the most part it is very hard to know without delving yourself into the darknet itself, but some of it can be found in the &quot;robots.txt&quot; file of some websites. As previously stated in one of my &lt;a href=&quot;http://unsecuritynow.blogspot.com/2015/03/penetration-testing-with-google.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Blogs&lt;/a&gt;, the robots.txt file can be easily accessed, for example, on this &lt;a href=&quot;http://www.oak-brook.org/robots.txt&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;website&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
When connecting to the deep web, you can determine it is non-indexed because the websites are randomly assigned and have a .onion extension after their domain name; for example, DuckDuckGo&#39;s search engine website is http://3g2upl4pq6kufc4m.onion. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How to Access It&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Like everything on my Blog entries, I do not condone anything illegal or foolish. Use the darknet as your own discretion. You can find horrific, ugly things as you can also find beautiful lost pieces of information.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_RxSsiedASmS4H_HvqIWxpYeeas38gs2mGiywZKm9D7eiNmM6AuMwkNLf8hdy86gZl8F8CYSypGZGRIaxLdCf9LvVBW1A93fLI3o5zOEbefZFb1cQNpwZF7WWWPvCVQLFB2erwcjPDVrz/s1600/tor1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_RxSsiedASmS4H_HvqIWxpYeeas38gs2mGiywZKm9D7eiNmM6AuMwkNLf8hdy86gZl8F8CYSypGZGRIaxLdCf9LvVBW1A93fLI3o5zOEbefZFb1cQNpwZF7WWWPvCVQLFB2erwcjPDVrz/s1600/tor1.jpg&quot; height=&quot;340&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&amp;nbsp;The way to access the .onion sites is through Tor. As previously stated in my numerous Blogs, Tor was invented by the U.S. Navy in the mid-90&#39;s and it provides a pretty anonymous access to the Internet as well as I2P and .onion sites as well (darknets). Not only people who want to hide their &quot;activities&quot; can use Tor but also countries like Egypt, Lybia, Afghanistan, etc who don&#39;t have a complete access to the Internet and information.&amp;nbsp; Also, a lot of criminals such as paedophiles, hitmen, cyber-criminals, cyber-bullies, drug and gun dealers access the darknets as well as black markets to sell their good in an anonymous way.&amp;nbsp; These last uses are the reasons why darknets are considered dangereous.&lt;br /&gt;
&lt;br /&gt;
There are easy and fast alternatives such as the &lt;a href=&quot;https://www.torproject.org/projects/torbrowser.html.en&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Tor Browser&lt;/a&gt; which takes care of the tedious install and proxy configurations but it is not guaranteed that Tor will be 100% anonymous &quot;out of the box&quot;. Further configuration is always required.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqRogVqMhsn5Y_VGcw5t_YYsPsoGWMJdtogekGCB-rQGCF07eo6HWsFCghagnLM-gpNClXslg7c70-ETjTtPCt5EKTkDSPynHezLJZrPryghQ3RwsHRXwJ5qmUdMxz0LfYPj8m40mznA-V/s1600/nsa-tor-hack.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqRogVqMhsn5Y_VGcw5t_YYsPsoGWMJdtogekGCB-rQGCF07eo6HWsFCghagnLM-gpNClXslg7c70-ETjTtPCt5EKTkDSPynHezLJZrPryghQ3RwsHRXwJ5qmUdMxz0LfYPj8m40mznA-V/s1600/nsa-tor-hack.jpg&quot; height=&quot;360&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Even though Tor had some issues with bugs, security flaws and potentially NSA&#39;s surveillance and spoofed relays to spy on people, it is not wise to judge the whole Tor project because of some rotten potatoes in the past.&amp;nbsp; A lot of flaws were and are being fixed everyday as well as other software in the market. After all, Tor is also based on software and protocols which are being fixed and improved all the time. Also, it is not safe to consider Tor as a bullet-proof for all your &quot;hidden&quot; activities, but it is a good choice as an extra security layer to have in your security arsenal.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Where to Look&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8FSvO7HFDpuoQkQHotKryWETDgWboRTP7N6_xenyIGwtRx0OeIgfsBEqcXrDG_7dMsmaZFalnif6y8EvpWUOGKN5fF5qkUh_QeBehXNRKT7Nn718N6kcNz79CB4B4qRgDyiOXvLXL0_g0/s1600/tor-browser-4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8FSvO7HFDpuoQkQHotKryWETDgWboRTP7N6_xenyIGwtRx0OeIgfsBEqcXrDG_7dMsmaZFalnif6y8EvpWUOGKN5fF5qkUh_QeBehXNRKT7Nn718N6kcNz79CB4B4qRgDyiOXvLXL0_g0/s1600/tor-browser-4.jpg&quot; height=&quot;500&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Once you connect to the Tor Network, you can find who are in the network acting as relays.&amp;nbsp; Each relay are the people helping your connection being more secure. The entry and exit nodes (you and the server) are the only who knows about the site you are trying to visit (not the relays) and they also think your connection comes from another country.&amp;nbsp; Also, it is important to note that the only unencrypted part is from the exit relay to the destination.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIq9IGAudWZ24qKysT25El_ef4E_ki-fnrkrttlOVmZy4jsjtH4MiChBHc6q-ydca9l3hZN8eBsiadOJX4ozrm6eL1FC3wlZefyVnbOlEIXldHiWyIyhKpQ3-kKfdjSgqPJuN7L5B5zFGi/s1600/Tor+software.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIq9IGAudWZ24qKysT25El_ef4E_ki-fnrkrttlOVmZy4jsjtH4MiChBHc6q-ydca9l3hZN8eBsiadOJX4ozrm6eL1FC3wlZefyVnbOlEIXldHiWyIyhKpQ3-kKfdjSgqPJuN7L5B5zFGi/s1600/Tor+software.png&quot; height=&quot;356&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCtxjANBErCnVCFDrgJnaxgvdlJMCnrpOzSNBB4V3zG-LmdkWge-T6H2_xYeItdS-iM5IUZQqOZysWXnMOE_JJP3xdNgHyQOy_qQXHm-Yc_3CwDvZ2w21p5FmlJxR_O5QgQotVqjr82XhA/s1600/Onion_Routing.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCtxjANBErCnVCFDrgJnaxgvdlJMCnrpOzSNBB4V3zG-LmdkWge-T6H2_xYeItdS-iM5IUZQqOZysWXnMOE_JJP3xdNgHyQOy_qQXHm-Yc_3CwDvZ2w21p5FmlJxR_O5QgQotVqjr82XhA/s1600/Onion_Routing.png&quot; height=&quot;552&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
All of this is only to understand a little how Tor works, but let&#39;s get to how to surf the deep web.&lt;br /&gt;
&lt;br /&gt;
For starters, let&#39;s first find a starting point. To find a starting point, we need either 1) an .onion site with a list of other sites or 2) a search engine for deep web sites.&amp;nbsp; The reason why the first one is not very reliable is because the list is always out of date and the links might not work. The original one is called &lt;a href=&quot;http://eqt5g4fuenphqinx.onion/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;CoreOnion&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
1) There are sites that lists, or at least, tries to list the most up to date links. Some of them are: &lt;a href=&quot;http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;The Hidden Wiki&lt;/a&gt;, &lt;a href=&quot;http://dppmfxaacucguzpc.onion/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Tordir&lt;/a&gt;, and the &lt;a href=&quot;http://32rfckwuorlf4dlv.onion/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Onion URL Repository&lt;/a&gt; (You will need to be running Tor to enter to these sites).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2) You can also look at search deep web engines for .onion sites. Some of them are: &lt;a href=&quot;http://3g2upl4pq6kufc4m.onion/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;DuckDuckGo&lt;/a&gt;, &lt;a href=&quot;http://hpuuigeld2cz2fd3.onion/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;DeepSearch&lt;/a&gt;, and &lt;a href=&quot;http://nstmo7lvh4l32epo.onion/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Abyss&lt;/a&gt;. (You will need to be running Tor to enter to these sites).&lt;br /&gt;
&lt;br /&gt;
Once you have a starting point, you can surf on your own discretion. You will find a lot of information just about anything, and I mean ANYTHING.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Deepweb and Censorship&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhutHKoiwT5Nd-bCKD9ERaDpdis3Olc4hQG2eOHBXUZYd-3TNmBkNm749ogRy9tbDM1Gsug7dvRNMhBY3tMx2nLH3Yvz5Um9OTDnHYCOedpFXJv27ND2IjEHvsiL7Mu83bJfcSj7GD9iiQk/s1600/deep-web-sized.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhutHKoiwT5Nd-bCKD9ERaDpdis3Olc4hQG2eOHBXUZYd-3TNmBkNm749ogRy9tbDM1Gsug7dvRNMhBY3tMx2nLH3Yvz5Um9OTDnHYCOedpFXJv27ND2IjEHvsiL7Mu83bJfcSj7GD9iiQk/s1600/deep-web-sized.jpg&quot; height=&quot;426&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
One of the reasons governments cannot shut down the deepweb entirely is because governments also use it to hide their activities and make them more anonymous in order to avoid infiltration, eavesdropping and data leak. As anything in this world: one tool which is used for the good of humanity can and will be always be used as all things evil. Even though there are tons and tons of criminal activities in the deepweb and lots of them are being shut down such as &quot;The Silk Road v1 and v2&quot;, it is impossible to shut them all at once without bringing down the Tor network.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;The Repercussion: In Numbers&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6ce1_lMFaJ-PHxYen1BbI5NoA_caBcU7BNyh8wp9WTzJ_SxkvFUH-yZS4DL0OeBxmtmmQVZcyLCQOcRzU98pjwSO_wdfB8OWdA-MXz4WkelusyXvB3g910G4P7CPgwObPMhEhgYYCOjSO/s1600/bitcoin-stock.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6ce1_lMFaJ-PHxYen1BbI5NoA_caBcU7BNyh8wp9WTzJ_SxkvFUH-yZS4DL0OeBxmtmmQVZcyLCQOcRzU98pjwSO_wdfB8OWdA-MXz4WkelusyXvB3g910G4P7CPgwObPMhEhgYYCOjSO/s1600/bitcoin-stock.jpg&quot; height=&quot;370&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Since the military, governments, navy, airforce and secret societies also use the I2P and Tor networks to hide their daily &quot;secret&quot; activities, it would be a total loss for all of them if they shut it down. Governments always try to keep control of the darknet by shutting down criminal content most popular sites but they re-open soon after with a new random .onion address, or better yet, a mirror somewhere else. The repercussion, however was not a lot comparing with the profit. For example, The Silk Road v2 had approximately 1 million members and was making 1.2 billion in yearly profit. When the Silk Road was shut down by the F.B.I. on November 5, 2014, they sized about 26,000 bitcoins (equivalent to 4 million U.S. dollars at that time). Bitcoins is the anonymous form of purchasing services and goods in black-markets through the darknet. Used as BTC in the stock exchange and now (by April 6, 2015) it is worth &lt;span style=&quot;word-break: break-all;&quot;&gt;258.19 &lt;/span&gt;U.S. Dollars. Suprisignly, Silk Road&#39;s operator made $80 million in commissions from its members. When the silk road re-opened its value went 3 times what it was worth both in members and financially. &lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Net neutrality and Last Thoughts&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
After the EFF winning over net neutrality on March 12, 2015, ISPs and Cable companies don&#39;t have access to a lot of their client&#39;s control but since they lost the battle (but not the war) they are finding new ways to supress their clients&#39; browsing actions which is not included in the Net Neutrality rules. For example, Comcast is currently performing DPI (deep packet inspection) techniques to ensure they alert governments (if asked) if a customer is using Tor.&amp;nbsp; Since, they deeply analyze their customers&#39; packets, they can determine who is using Tor and who isn&#39;t. One easy (but not bulletproof) way to avoid this is to use &lt;a href=&quot;https://bridges.torproject.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Tor Bridges&lt;/a&gt;. Since using Tor relays which are indexed from the Tor network, if Comcast (or other ISP company) has access to this list, they can easily determine who is using Tor thus blocking access to it so the customer cannot access any site through it.&amp;nbsp; By using bridges, they cannot determine if their customer is using Tor because the bridge address is not listed as &quot;public&quot; in the Tor network, thus they cannot discern between a Tor or non-tor connection. They just don&#39;t know what it is. Bridges are being used in highly-oppressing countries, countries such as China, Hong Kong, Lybia, Egypt, Labanon, Syria, etc. to bypass their government Firewall.&amp;nbsp; They also use Proxy Chains which intercorrelate their connections and bounce it through a series of proxies to anonymize traffic even further.&lt;br /&gt;
&lt;br /&gt;
Additionally, you can use a VPN with Tor and Bridges to ensure more layers of anonymity, since by solely using Tor does NOT guarantee 100% anonimity.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFuIAEq1SD3OJv2do8JweayuT3CEBqWCOZ8ZWMie1xzbd2Lk2QlHjokOIgrX2zR9f_kVkhUltWemN4FxBjHiGEudIYhyJ9xsx1IZ2uCN0F-4eSbuGboO9bhjWuKWZ8qUe4yasGS5KBGKKY/s1600/screen-shot-2011-07-20-at-1-33-53-pm.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFuIAEq1SD3OJv2do8JweayuT3CEBqWCOZ8ZWMie1xzbd2Lk2QlHjokOIgrX2zR9f_kVkhUltWemN4FxBjHiGEudIYhyJ9xsx1IZ2uCN0F-4eSbuGboO9bhjWuKWZ8qUe4yasGS5KBGKKY/s1600/screen-shot-2011-07-20-at-1-33-53-pm.png&quot; height=&quot;400&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
With the emerge of a new, faster (even more controlled) Internet and free Internet such as Kim Dot Com&#39;s &lt;a href=&quot;http://thehackernews.com/2015/02/meganet-decentralized-internet.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;MegaNet&lt;/a&gt;, it is hard to conclude that Tor will be long enough to live our end of times.&amp;nbsp; Perhaps, a less centralized, non-IP address based network will be used for Freedom Fighters as the rest of the civilization will be using a faster but more controlled (and censored) Internet like the emerge of the Internet v2, which is already in progress and perhaps will be using HTTPS/2 (founded by Google).&amp;nbsp; It would be soon be a matter of speed and reliability vs privacy. The decision, hopefully, will be ours to make.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Sources:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://dafoster.net/articles/2013/04/21/exploring-onionland-the-tor-onion-darknet/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Exploring Onionland: The tor .onion Darknet&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.thewindowsclub.com/darknet-deepnet&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;DarKnet or DeepNet: What is it and how to access it?&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.npr.org/blogs/alltechconsidered/2014/05/25/315821415/going-dark-the-internet-behind-the-internet&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Going Dark: The Internet Behind The Internet&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://deepweblinks.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Deep Web Links&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.usatoday.com/story/news/nation/2013/10/21/fbi-cracks-silk-road/2984921/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;How FBI brought down cyber-underworld site Silk Road&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.google.com/search?q=BTC&amp;amp;ie=utf-8&amp;amp;oe=utf-8&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;BTC in Dollars - Current Stock Price&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.eff.org/deeplinks/2015/03/todays-net-neutrality-order-win-few-blemishes&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;EFF wins over Net Neutrality&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;</description><link>https://unsecuritynow.blogspot.com/2015/03/meet-hidden-web.html</link><author>noreply@blogger.com (UnsecurityNow)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWctaZnWRFjdjKCttWgDhLUGne4bWe7yCOwvNBskb9UOIXADFHcjUmltDvwpifRgVWXOCg5OZ8XQzuMfHy4BKxr6sZu01Uc78v8B_csUjJAp0jjdbAJLR5RUXhWA2F0sVcUWtTxzP5VnuQ/s72-c/anonymity-darknets-and-staying-out-federal-custody-part-one-deep-web.w654.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-5754580289069974295</guid><pubDate>Sat, 14 Mar 2015 03:41:00 +0000</pubDate><atom:updated>2015-03-22T15:44:09.206-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cat-mouse</category><category domain="http://www.blogger.com/atom/ns#">DRAM</category><category domain="http://www.blogger.com/atom/ns#">dystopia</category><category domain="http://www.blogger.com/atom/ns#">governments</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">iphone</category><category domain="http://www.blogger.com/atom/ns#">knowledge</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">nsa</category><category domain="http://www.blogger.com/atom/ns#">phone</category><category domain="http://www.blogger.com/atom/ns#">privacy</category><category domain="http://www.blogger.com/atom/ns#">radar</category><category domain="http://www.blogger.com/atom/ns#">satellites</category><category domain="http://www.blogger.com/atom/ns#">search engines</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">snowden</category><category domain="http://www.blogger.com/atom/ns#">software</category><category domain="http://www.blogger.com/atom/ns#">surveillance</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>Keeping yourself off of the Radar of the NSA. Only fiction? Part 2</title><description>Our privacy deminishes every day, day by day and the facts stated on part 1 of &quot;Keeping Yourself Off the Radar of the NSA&quot; is only the tip of this huge iceberg.&amp;nbsp; The recommendation I gave for part 1 was to use Tails, even though it is not bullet-proof and the person who has the most knowledge wins in this cat and mouse game.&amp;nbsp; In part 2, we will go through more risks which increase everyday while getting more complex as well.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXPx5wGNlaSnFEN6Cjr4ZE-1wfoOWj0enW7SgCoMk_FnHGU8kE8lKdFHBn4fPpLuPvAe9Ya_FjMfbNuyYRofV4rl9Gz6cp972zsJdSLts4Gg1hhokcT12DgGe1WJ-4wPjFXN8IWJgV41aN/s1600/privacy.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXPx5wGNlaSnFEN6Cjr4ZE-1wfoOWj0enW7SgCoMk_FnHGU8kE8lKdFHBn4fPpLuPvAe9Ya_FjMfbNuyYRofV4rl9Gz6cp972zsJdSLts4Gg1hhokcT12DgGe1WJ-4wPjFXN8IWJgV41aN/s1600/privacy.jpg&quot; height=&quot;426&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
On this week, we not only found out about software surveillance but also hardware and network-based data mining through big and wealthy corporations as well as the net neutrality law which, by the way, temporarily won the battle but certainly not the war. &lt;br /&gt;
&lt;br /&gt;
Last week, we found out about a vulnerability on Linux systems which are taking advantage from physical DRAM memory chips to gain kernel access to the system.&amp;nbsp; We also found out how Apple is sending the voice recordings consumers send to &quot;Siri&quot;, the iPhone Intelligent Personal Assistant, to third party companies for advertisement and other undocumented purposes. &lt;br /&gt;
&lt;br /&gt;
Further last week we have found out about certain phone brands such as Xiaomi Mi 4 is preloaded with malware by the manufacturer&#39;s customer ROM which then they denied and stated that those phones were fake replicas.&amp;nbsp; But don&#39;t worry, not all news are bad news in regards with surveillance.&amp;nbsp; Earlier this year, we have also found out about new ways to make it harder for governments and corporations to track our digital fingerprints.&amp;nbsp; The British multi-millionaire Kim dot Com did not only invented a secured end-to-end encrypted way to chat with your friends, but he is also now reinventing a new non-IP based &quot;Internet&quot; called &quot;MegaNet&quot; which, he states, will defy the whole surveillance essence.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhagP7ygsERjyN09tE7u_Gx47Uhyphenhyphen4znYQc_zKSozjmN2ZF6KqxAGDF1BnaPHlX6G6sVjxm6G4to1LGnP1DIbBLqeR0AQK__ULm7brXVHC3ok_diEkfwws2UNKykO8f1fqFQ5dXikwlc4eCP/s1600/meganet-decentralized-anonymous-network.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhagP7ygsERjyN09tE7u_Gx47Uhyphenhyphen4znYQc_zKSozjmN2ZF6KqxAGDF1BnaPHlX6G6sVjxm6G4to1LGnP1DIbBLqeR0AQK__ULm7brXVHC3ok_diEkfwws2UNKykO8f1fqFQ5dXikwlc4eCP/s1600/meganet-decentralized-anonymous-network.jpg&quot; height=&quot;394&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
But this is not the only attempt of defy tyranic global spies.&amp;nbsp; There are also other systems right now which are in Beta testing that will be used to form their own Internet and share information as free as people want it, because, after all, information should be free for the world to use it, manipulate it and see it however they would like as long there is no harm to others.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-FnvemsT5fOepTHLKFTPbEJuy3Qcmob9JekmUQsX_UImfoGM2QrchJf7QhL49aOm932jbU890lsqkZsItTeZc4sQqblm1IPFbdHSEP35j3YXNr5o860RkQysS0WyWkPUqR71x7tfgBH-H/s1600/satellite.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-FnvemsT5fOepTHLKFTPbEJuy3Qcmob9JekmUQsX_UImfoGM2QrchJf7QhL49aOm932jbU890lsqkZsItTeZc4sQqblm1IPFbdHSEP35j3YXNr5o860RkQysS0WyWkPUqR71x7tfgBH-H/s1600/satellite.jpg&quot; height=&quot;466&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
If you watched documentaries such as &quot;Track me if you can&quot; and &quot;Terms of Conditions May Apply&quot; (2003), you will realize that we have no or little control over our privacy. Even secret programs are out there that can track our identity by just finding our walking pattern. How are we then safe from the prying eyes?&lt;br /&gt;
&lt;br /&gt;
From hardware, to software to global surveillance to secret programs to track people and break our privacy, we are in a dystopian world where our only weapon is knowledge.</description><link>https://unsecuritynow.blogspot.com/2015/03/keeping-yourself-off-of-radar-of-nsa.html</link><author>noreply@blogger.com (UnsecurityNow)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXPx5wGNlaSnFEN6Cjr4ZE-1wfoOWj0enW7SgCoMk_FnHGU8kE8lKdFHBn4fPpLuPvAe9Ya_FjMfbNuyYRofV4rl9Gz6cp972zsJdSLts4Gg1hhokcT12DgGe1WJ-4wPjFXN8IWJgV41aN/s72-c/privacy.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-437538477166632466</guid><pubDate>Sat, 07 Mar 2015 02:59:00 +0000</pubDate><atom:updated>2015-03-09T21:13:30.094-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">adware</category><category domain="http://www.blogger.com/atom/ns#">Blog</category><category domain="http://www.blogger.com/atom/ns#">china</category><category domain="http://www.blogger.com/atom/ns#">cyberwar</category><category domain="http://www.blogger.com/atom/ns#">governments</category><category domain="http://www.blogger.com/atom/ns#">greenwald</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">HTTPS</category><category domain="http://www.blogger.com/atom/ns#">lenovo</category><category domain="http://www.blogger.com/atom/ns#">nsa</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">snowden</category><category domain="http://www.blogger.com/atom/ns#">superfish</category><category domain="http://www.blogger.com/atom/ns#">surveillance</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>Keeping yourself off of the Radar of the NSA. Only fiction? Part 1</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPwu6wSS0CJH2dal2y2WzXAeC7enmx_xu3ydNQUTv3hm28kHjNwm5XeM03yMF6zM1MG-gxVFB15nJGsrBBlGgEXEWGsg9EXYxjsgGkJWU7HlsbzjJGvyJfBTlgzJnWW0bs0-1jRk0DrlvN/s1600/radar.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPwu6wSS0CJH2dal2y2WzXAeC7enmx_xu3ydNQUTv3hm28kHjNwm5XeM03yMF6zM1MG-gxVFB15nJGsrBBlGgEXEWGsg9EXYxjsgGkJWU7HlsbzjJGvyJfBTlgzJnWW0bs0-1jRk0DrlvN/s1600/radar.jpeg&quot; height=&quot;483&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
What if I tell you that it is almost (if not) impossible to keep yourself out of the Big Brother&#39;s radar?&amp;nbsp; What if I told you that even though you take the most paranoid precautions, you are still caught on the net along with the other fishes? What if I told you that everything you have found out, everything you know about keeping yourself more secure is totally useless and you are hopeless when it comes to keep your data and digital prints safe? Well, let&#39;s dive into some facts....&lt;br /&gt;
&lt;br /&gt;
I have published last year a &lt;a href=&quot;http://unsecuritynow.blogspot.com/2014/07/how-to-better-your-privacy.html&quot; target=&quot;_blank&quot;&gt;Blog&lt;/a&gt; in how to keep yourself more secure on the net and in the physical (&quot;real&quot;) life.&amp;nbsp; You should know that by the time I have published that Blog with solutions in how to better your privacy, more than a few Snowden&#39;s revelations have been surfaced even into the most naive people&#39;s eyes. The first thing you should know is that this is a mouse and cat game. This means that when the cat (the NSA for example) is trying to find new ways to push surveillance and autonomous systems to keep track of every single move we do, the mouse (freedom fighters and originalists) are sneakly moving forward finding new ways to keep their privacy a little more... private.&lt;br /&gt;
&lt;br /&gt;
Edward Snowden who is now a refugee, along with the American journalist Glen Greenwald, had revealed some (not anymore) confidential U.S. Government files which pointed out the fact that we, as living beings in this world, are not free anymore.&amp;nbsp; Having a huge radar and a non-stoppable fierce, we have found out from the &lt;a href=&quot;http://www.rottentomatoes.com/m/citizenfour&quot; target=&quot;_blank&quot;&gt;Citizenfour&lt;/a&gt; movie, that the U.S. is not the only &quot;evil&quot; on this game. Other countries, such as the U.K., Rusia, China, Germany, France, Sweden and Brazil (to name a few) are also joining this surveillance of humans&#39; dystopia.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwHdC2Q6lO7iJxdW9KVHUbagA7IhK7Gw4NvvjtGhnQoBEoptrQTsnivNTHslYOD1IL2JfP3MO4Lp1IxggLVxgWBt78BFU43z2rKmgt7lDjL384QZhaCqpyoHeqK64UY2iznQCq_RpfTxAN/s1600/citizenfour.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwHdC2Q6lO7iJxdW9KVHUbagA7IhK7Gw4NvvjtGhnQoBEoptrQTsnivNTHslYOD1IL2JfP3MO4Lp1IxggLVxgWBt78BFU43z2rKmgt7lDjL384QZhaCqpyoHeqK64UY2iznQCq_RpfTxAN/s1600/citizenfour.jpg&quot; height=&quot;432&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;u&gt;How everything got changed&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
In the last couple of years we have not only found out the &quot;secret&quot; surveillance programs and secret projects the NSA and its partners were (and still) using such as &lt;a href=&quot;http://www.vjolt.net/vol6/issue2/v6i2-a10-Jennings.html&quot; target=&quot;_blank&quot;&gt;Carnivore&lt;/a&gt;,  &lt;a href=&quot;http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data&quot; target=&quot;_blank&quot;&gt;XKeyscore&lt;/a&gt;, &lt;a href=&quot;http://www.theguardian.com/world/2013/jun/08/nsa-prism-server-collection-facebook-google&quot; target=&quot;_blank&quot;&gt;PRISM&lt;/a&gt;, &lt;a href=&quot;http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html&quot; target=&quot;_blank&quot;&gt;Muscular&lt;/a&gt;, &lt;a href=&quot;https://en.wikipedia.org/wiki/Tempora&quot; title=&quot;Tempora&quot;&gt;Tempora&lt;/a&gt; and &lt;a href=&quot;https://en.wikipedia.org/wiki/Project_6&quot; target=&quot;_blank&quot;&gt;Project 6&lt;/a&gt; (to only name a few).&amp;nbsp; We also now found out what I believe is the worse of the worst.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgw2bO34XDlCXQS2Wktqg0O4ummZD-pBBOeuKegZlrNERIP7-niZNaKy0YGuWaJe2OBudOh3stipFCpnVozbOsWf7TW-NUSpz29SBU6jWh-Zy9dCsS4n25aCu9NPx3vqwjXEm_3C_gnKkXS/s1600/PRISM-Companies_1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgw2bO34XDlCXQS2Wktqg0O4ummZD-pBBOeuKegZlrNERIP7-niZNaKy0YGuWaJe2OBudOh3stipFCpnVozbOsWf7TW-NUSpz29SBU6jWh-Zy9dCsS4n25aCu9NPx3vqwjXEm_3C_gnKkXS/s1600/PRISM-Companies_1.jpg&quot; height=&quot;426&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
For now, the before-mentioned projects and programs work on a infrastructure level of networks (through spying big junks of data from big pipes) helped by Google, Facebook, Youtube, America Online, etc.&amp;nbsp; We all know how BIG Google is and how they also have access to most of the residential &lt;a href=&quot;http://www.computerworld.com/article/2474851/android-google-knows-nearly-every-wi-fi-password-in-the-world.html&quot; target=&quot;_blank&quot;&gt;wireless passwords of the whole world&lt;/a&gt; via Android phones.&amp;nbsp; Also, through the Muscular program, we found out how the NSA is able to launch an exploit to any computer they want (regardless of the Operating System) in a matter of seconds. So, they have control over everyone&#39;s email, potential visited sites, potential personal information, habits (good and bad ones), data, metadata and every single piece of your life via Internet infrastructure and software. But this is enough for the NSA and its partners to have a total and perfectly shaped profile about their citizens, right? .. WRONG!!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Early last month, we have found out that China was putting Adware (&lt;a href=&quot;http://www.cnet.com/news/superfish-torments-lenovo-owners-with-more-than-adware/&quot; target=&quot;_blank&quot;&gt;Superfish&lt;/a&gt;) to Lenovo laptops by breaking and impersonating HTTPS certificates and also China was blamed for placing &lt;a href=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/netis-routers-leave-wide-open-backdoor/&quot; target=&quot;_blank&quot;&gt;backdoors&lt;/a&gt; and &lt;a href=&quot;http://www.theguardian.com/books/2014/may/12/glenn-greenwald-nsa-tampers-us-internet-routers-snowden&quot; target=&quot;_blank&quot;&gt;surveillance software&lt;/a&gt; to routers in the past. Whether Superfish was software, now we are facing a new model.&amp;nbsp; Not only the NSA but also other governments are using hardware to spy on users inadvertently.&amp;nbsp; Earlier this month another Snowden revelation made a lot of people&#39;s jaws drop. This time, hiding &quot;special, deletion-proof&quot; &lt;a href=&quot;http://www.huffingtonpost.com/2015/02/16/nsa-computer-spying_n_6694736.html&quot; target=&quot;_blank&quot;&gt;spying software&lt;/a&gt; on the most common hard-drive brands, such as: Hitachi, Western Digital, Seagate, Toshiba within others.&amp;nbsp; This poses a huge risk because now we do not and cannot trust not even our own brand new laptops. &lt;br /&gt;
&lt;br /&gt;
Now that we know where we stand it is fair to ask ourselves: how can I protect myself? Is having a VPN, sitting behind 7 proxies or using TOR with a vast number of proxy-chains as well as using a live (read-only) USB drive running a live distro of Tails secure enough?&lt;br /&gt;
&lt;u&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/u&gt;
&lt;u&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The Solution?&lt;/span&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One thing we know. We know that this is a cat-mouse game and whoever knows more wins.&amp;nbsp; But this is not quite enough. Whoever is faster by staying up to date, develop the most (cryptographically) secure software as well as having a paranoid (security concious) attitude might be ahead of the game.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What about phones? As we know in the recent news, &lt;a href=&quot;http://www.zdnet.com/article/nsa-gemalto-sim-card-encryption-hack-key-questions/&quot; target=&quot;_blank&quot;&gt;Gemalto encryption keys&lt;/a&gt; were stolen by the NSA and British Intelligence Communities and as we know cloning SIM cards in order to evade some tracking is illegal in most countries such as the U.S. and the U.K.&amp;nbsp; How can we protect against not only the big monsters of the digital information such as Google, Yahoo, Facebook, etc? What about the exploits blindly launched by the NSA to our devices? We could have the best Firewalls and IDS/IPS but are they really enough against any Government which has the top cryptographic and evading software in the world?&amp;nbsp; What about defending against the spying hardware chipsets, hidden backdoors in our communication media such as routers and perhaps also Firewalls?&amp;nbsp; How can we also be safe against phone surveillance now that we know our SIM card data (or metadata) is being watched, analyzed and profiled?&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHvIKzySDbS6nAISH61N1d1fFDmPfUlftDh3pgRYPTuwpO1ouDTn2n_eRV24mUpyyt5Ora9yjQtGOr_9rm8l7LSNyNY4mPMpSEFWy9FTse2RGdA8M3twcifmSPM8VIv1Kc4n5YSvzNeDVh/s1600/no_escape.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHvIKzySDbS6nAISH61N1d1fFDmPfUlftDh3pgRYPTuwpO1ouDTn2n_eRV24mUpyyt5Ora9yjQtGOr_9rm8l7LSNyNY4mPMpSEFWy9FTse2RGdA8M3twcifmSPM8VIv1Kc4n5YSvzNeDVh/s1600/no_escape.jpg&quot; height=&quot;456&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
The only thing I can think of is to be abstinent, and run a live copy of Tails. Remove your hard-drive, disable services (hardware and software) you don&#39;t need,&amp;nbsp; use and maintain your Firewalls, IDS and IPS, use TOR with Proxychains and of course, avoid doing anything stupid online.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;u&gt;Sources:&lt;/u&gt;&lt;/div&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Global_surveillance_disclosures_%282013%E2%80%93present%29&lt;br /&gt;
&lt;br /&gt;
www.huffingtonpost.com/2015/02/16/nsa-computer-spying_n_6694736.html &lt;br /&gt;
&lt;br /&gt;
http://www.zdnet.com/article/nsa-gemalto-sim-card-encryption-hack-key-questions/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><link>https://unsecuritynow.blogspot.com/2015/03/off-radar.html</link><author>noreply@blogger.com (UnsecurityNow)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPwu6wSS0CJH2dal2y2WzXAeC7enmx_xu3ydNQUTv3hm28kHjNwm5XeM03yMF6zM1MG-gxVFB15nJGsrBBlGgEXEWGsg9EXYxjsgGkJWU7HlsbzjJGvyJfBTlgzJnWW0bs0-1jRk0DrlvN/s72-c/radar.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-8791930819133513728</guid><pubDate>Tue, 27 Jan 2015 19:32:00 +0000</pubDate><atom:updated>2015-02-06T16:49:35.528-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">attack</category><category domain="http://www.blogger.com/atom/ns#">cyberwar</category><category domain="http://www.blogger.com/atom/ns#">flaw</category><category domain="http://www.blogger.com/atom/ns#">gop</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">infrastructure</category><category domain="http://www.blogger.com/atom/ns#">north korea</category><category domain="http://www.blogger.com/atom/ns#">reverse engineer</category><category domain="http://www.blogger.com/atom/ns#">scada</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">siemens</category><category domain="http://www.blogger.com/atom/ns#">software</category><category domain="http://www.blogger.com/atom/ns#">sony</category><category domain="http://www.blogger.com/atom/ns#">us</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><title>North Korea, SONY and SCADA Flaws</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
In these couple of months I have found some patterns and anomalies in the news as well as the not so traditional ones about the North Korea, SONY and SCADA insecurity. How does all relate to each other? Is it really North Korea&#39;s fault? Was this already planned to have justified means to attack North Korea or all of this happened to boost viewers on the not-so-cool movie: The Interview? What about the new Hollywood movie: Blackhat which is about SCADA attacks to North Korea? Well, here are some facts:&lt;br /&gt;
&lt;br /&gt;
On November 24, 2014 a mystical image appeared on every SONY employee&#39;s computer at the same time warning them of an imminent demise.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqd3afPauMWYMyAj6_LBCp6Hjm2eheaGn7cfPB7Xyc-c42Oucq3VVb1dnXC8n87e2JSnsvD6WktpopVIP8-uu12UjqiR05Qs4cbsr00Kd5SE67m1ILRnk9qj4hbs73ePe-FR_PdgE_uG6l/s1600/hacked-by-gop-sony-pictures-under-attack-500.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqd3afPauMWYMyAj6_LBCp6Hjm2eheaGn7cfPB7Xyc-c42Oucq3VVb1dnXC8n87e2JSnsvD6WktpopVIP8-uu12UjqiR05Qs4cbsr00Kd5SE67m1ILRnk9qj4hbs73ePe-FR_PdgE_uG6l/s1600/hacked-by-gop-sony-pictures-under-attack-500.jpg&quot; height=&quot;400&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The bad news appeared on the media by 10:50 AM, after SONY&#39;s phone systems, workstations, and e-mail servers were paralyzed across SONY&#39;s headquarters including all locations.&amp;nbsp; The attackers threatened SONY by saying it is &quot;only the beginning&quot; and that they also have compromised their network and will release &quot;internal data&quot; they gathered.&amp;nbsp; They also blackmailed them by releasing their &quot;top secrets&quot; if they do not &quot;obey&quot; with their demands.&amp;nbsp; Whether these statements are true or not, it&amp;nbsp; was released to the mass media. By obtaining 100 TB of information, the &quot;Guardians of Peace&quot; (as they called themselves) got some pre-released movies which they were going to be aired by early next month. I am not going further with the description of this attack but you can find more information here:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://deadline.com/2014/12/sony-hack-timeline-any-pascal-the-interview-north-korea-1201325501&quot;&gt;http://deadline.com/2014/12/sony-hack-timeline-any-pascal-the-interview-north-korea-1201325501&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
On November 27, 2014, as SONY systems were still inaccessible, five movies were released to the public from these cyber criminals. One that caught the mass media&#39;s eyes and people&#39;s attention was &quot;The Interview&quot;.&amp;nbsp; This movie in which the dictator of North Korea: Kim Jong-un is killed by some U.S. unofficial agents. This, caused a plethora of commotions, catastrophic and suspicious events unleashed to North Korea. A North Korean website called this movie a &quot;provocative evil act.&quot;&lt;br /&gt;
&lt;br /&gt;
Suspiciously, by the next day: November 28, 2014, North Korea already got the blamed for SONY&#39;s breach by the FBI which started conducting an in-depth research on the breach on December 1, 2015. After that week, the Associated Press blames North Korea for the attack just because some &quot;cyber-security experts&quot; stated that they have found “striking similarities&quot; between the code used in the hack 
of Sony Pictures Entertainment and the one on South Korean companies and government agencies last year. Even though this seems like a blatant accusation, it wasn&#39;t until Thursday December 18 that the U.S. government publicly accused North Korea for such attacks.&amp;nbsp; By this time, huge amount of critical sensitive and private data have being pulled from Sony Entertainment; including but not limited to future and past movie scripts and personal e-mail messages putting in hot water various Sony&#39;s personnel involving Angelina Jolie, journalists (blamed for aiding the cyber-criminals) and U.S. President Barack Obama who were all key ingredients to a very horrifying and unpredictable turmoil.&lt;br /&gt;
&lt;br /&gt;
After a series of threats from the cyber-criminals stating they were going to blow up theaters and the white-house, President Obama stepped up for Sony and gave a speech about the consequences for &quot;not stepping up&quot; on this threat. President Obama also said he was going to take a &quot;proportional response&quot;. Days after his speech, SONY complied and they aired the movie. The funny thing is that mysteriously, on late December (December 22, 2014) , North Korea suffered a severe Internet outage which lasted nearly 10 hours and a 24 hour sustained instability on their networks. Not only that, North Korea had a blackout (yes, a power outage) after the Internet outage and yesterday (January 26, 2015), North Korea&#39;s power lines are starting to have problems again.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjzo-IKHc-p9GKMwrnZNvFtxh4OcVx4eeBmr4WCOTQiKlycRmzXnrLEBTW-7BGITnjos42sjtfCOhPtKk6fkNqpa5X2tiaLga8BmbJTc3E6tVlphl8Q408N0i20Xi5waK-CFYtI2GdeSct/s1600/150126-dyn-2-570x489.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjzo-IKHc-p9GKMwrnZNvFtxh4OcVx4eeBmr4WCOTQiKlycRmzXnrLEBTW-7BGITnjos42sjtfCOhPtKk6fkNqpa5X2tiaLga8BmbJTc3E6tVlphl8Q408N0i20Xi5waK-CFYtI2GdeSct/s1600/150126-dyn-2-570x489.png&quot; height=&quot;547&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Picture from: Dyn Research&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Whether this is a government to government attack or not, let&#39;s take a little look at SCADA systems.&amp;nbsp; SCADA (S&lt;span class=&quot;_Tgc&quot;&gt;upervisory Control and Data Acquisition) are systems which operates through an operational channel through a series of commands to a centralized control panel. These systems include (but are not limited to) water purifiers, oil refineries, nuclear plants, laboratory gadgets, traffic lights, PLC (Programmable Logic Circuits) peripherals and devices, backbone infrastructure of continents. The very bad idea of this is that all of these critical infrastructure components can be accessed and managed from the Internet.&amp;nbsp; Even though SCADA systems have been around for longer than the Israeli and CIA&#39;s creation of the worm Stuxnet (2004), it got really popular after Stuxnet&#39;s attack on Iran&#39;s nuclear plant.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA4quXQbqqXr1u65AmQX8B6XV2wj00N8FNKZwIgEdiF_TEX4hBcZLEJFjuwWf-uSaU9Tp2u0WrD6mkM1lYiTVnhSNTQkpysHwlgmhFhVdLtJHe5cGCTMwtiQIouB6XGktEdamQDk4syKhE/s1600/nuclear+plant.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA4quXQbqqXr1u65AmQX8B6XV2wj00N8FNKZwIgEdiF_TEX4hBcZLEJFjuwWf-uSaU9Tp2u0WrD6mkM1lYiTVnhSNTQkpysHwlgmhFhVdLtJHe5cGCTMwtiQIouB6XGktEdamQDk4syKhE/s1600/nuclear+plant.jpg&quot; height=&quot;426&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;_Tgc&quot;&gt;&lt;br /&gt;&lt;/span&gt;
Nowadays, people can benefit from SCADA beautifulness (and abused by cyber-criminals) by using a very popular search engine called SHODAN (&lt;a href=&quot;http://www.shodanhq.com/&quot;&gt;www.shodanhq.com&lt;/a&gt; which retrieves, scans, indexes and displays the login banner of the hosts through results via services (TELNET, FTP, SMB, HTTP, HTTPS, etc) for any device connected to the Internet. This not only includes SCADA infrastructure devices, but also a plethora of other devices; such as baby monitors, CCTVs, digital refrigerators and toasters, backbone routers, gas stations and anything that contains a silicon-based micro-chip connected to the Internet. &lt;br /&gt;
&lt;br /&gt;
Despite the protocol, a user is able to see the banner information which might prompt credential information, which increases the odds of a curious or malicious user by at least 50% of brute-forcing and get into the system.&amp;nbsp; This is a serious risk. So serious, one member of the U.S. Homeland Security described SHODAN as a national threat. &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmdufFXb4RC5WVyp665DeY8EeOL2iaN3G_kfttddbQU5Tc-686fVlUo5wwGwMsfRT3JTBF4vw9W0u2qtsC8vWzBft0NIknKJfN1zyutTHoJoixF3zsE4HJ9pVEZM9AyG8SAU_FdbA3IAyz/s1600/SCADA+Screen.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmdufFXb4RC5WVyp665DeY8EeOL2iaN3G_kfttddbQU5Tc-686fVlUo5wwGwMsfRT3JTBF4vw9W0u2qtsC8vWzBft0NIknKJfN1zyutTHoJoixF3zsE4HJ9pVEZM9AyG8SAU_FdbA3IAyz/s1600/SCADA+Screen.JPG&quot; height=&quot;512&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Whether it is a threat or not, I strongly believe the people who has to take the blame are the ones who &quot;secure&quot; these so critical systems so poorly and making them accessible in the Internet for all praying eyes. By making it easy for attackers by using default passwords, for example, anyone researching that manufacturer&#39;s or simply by looking at the user guide, can have instantly access and actually has the control of an entire city or continent. Also, there are weak passwords implemented to these systems which is based on lazy and ignorant system administrators. A very good example on this is the product manufacturer&#39;s flaw on SIEMENS products.&lt;br /&gt;
&lt;br /&gt;
SIEMENS provide an autonomic way of managing electrical, medical, energy, financial, consumer, etc.&amp;nbsp; Some of their products are very critical to global infrastructure, so they play a big role to SCADA systems.&amp;nbsp; In 2011, during the BlackHat - Las Vegas event, a security researcher showed the highly critical flaw in SIEMENS control systems. The flaw: hard-coded administrator password in the firmware. Login information could be obtained by reverse engineering the code of their software which could be available anywhere on the net. It is highly hard to believe that a company with such reputation and responsibility makes a mistake of this high degree.&amp;nbsp; Not only the attacker could exploit this vulnerability, but also could lock down the administrator having total access to the system and prevent anyone from interfering with his evil plans and actions.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXjhGFlPKpkshStvFXJF-d1Jm7oZwSixwQpdslN_iiqxeCMQkNd7J30AIUruFq5P9oCRUZehir9iTRYHh5ToTH8umAWvfY4vps-XxLtgklTZLtQ2LxydCFrfaGBGeuFyvUhf_-279bW_1b/s1600/siemens_plc_easter_egg-660x371.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXjhGFlPKpkshStvFXJF-d1Jm7oZwSixwQpdslN_iiqxeCMQkNd7J30AIUruFq5P9oCRUZehir9iTRYHh5ToTH8umAWvfY4vps-XxLtgklTZLtQ2LxydCFrfaGBGeuFyvUhf_-279bW_1b/s1600/siemens_plc_easter_egg-660x371.jpg&quot; height=&quot;358&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span itemprop=&quot;articleBody&quot;&gt;Siemens PLC hidden Easter egg in the firmware from Germany&lt;i&gt; hackers. (Courtesy NSS Labs)&lt;/i&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Above, it is a message left by some German &quot;hackers&quot; just to prove that their system could be exploited.&lt;br /&gt;
&lt;br /&gt;
So, where is all this heading to? Are SCADA systems really that insecure? How can they avoid getting their products compromised? Are they liable if a city &quot;goes down&quot;? Is a hack able to actually kill city&#39;s residents by infecting the water or make a thermonuclear plant?&lt;br /&gt;
&lt;br /&gt;
This is where the new movie, Blackhat (&lt;a href=&quot;http://www.imdb.com/title/tt2717822&quot;&gt;http://www.imdb.com/title/tt2717822&lt;/a&gt;) comes into place. We all know Hollywood for being very involved with everyone&#39;s lives because the most of us love movies. Also, we all know the impact Hollywood has in our lives. For one thing we know, that Hollywood has &quot;predicted&quot; so many events with hidden messages, symbolisms and even movie scripts. It might seem like they have the &quot;magical crystal ball&quot; in their hands. Even though Hollywood recreates an imminent dystopia for all of us to see and wonder about our future, their movies are a little far from reality. Though, the concept we have to really look at. They are always right about the main point and theme of their movies. Disseminating the facts from fiction and you will notice that one of Hollywood&#39;s new movies: Blackhat is not very far from the truth. This movie is about a hacker being hired by the U.S. government to defeat a black hat hacker (cracker or bad hacker) from causing a lot of chaos by affecting SCADA critical infrastructure points of North Korea and the WHOLE WORLD! &amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Apart of Stuxnet, nothing like this has ever been done, which proves that it can be possible and it is an option. Also there exist SCADA Trojans who are right now being improved to affect SCADA&#39;s systems.&amp;nbsp; But whatever we have looked at might have been limited to the audience eyes. Whatever we see and hear is already being filtered. There is, in fact, a cyber war going on right now and I would like to share this link with you. &lt;a href=&quot;http://map.ipviking.com/&quot;&gt;http://map.ipviking.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
It shows (in real time) which country is attacking who, their IP addresses (real or spoofed), destination, number of hits taken, etc.&amp;nbsp; It is not a simulation, nor a game. It is taken from the Norse Live Attack Intelligence database.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
With this graph in mind, North Korea&#39;s situation, knowing about SCADA and the movie Blackhat, I should ask these questions:&amp;nbsp; Are we all heading to an imminent disaster? Will it be a dystopian future as shown as in Hollywood movies? What about war involving citizens? Will wars be fought with guns, drones and tanks or by attacking critical SCADA infrastructures?&amp;nbsp; Will only governments do this or hacktivists will step up too to show their point of view?&amp;nbsp; I guess, the future is very near and the only way of knowing is giving it time.&amp;nbsp; Only time will tell... &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiYjzUoj4qW6EDzBvj4uLxZpuVMygEJ9f2U1Zl4arZuU6-4YM3-txUYxzAU4-Kdk6zafz-bqMBWaeUEWidemlZLy5i87W3wCVIvrFY-ptIlIkyHev-TISzzo6yLJ17-oz1aF0SlcA_7imL/s1600/cyberwar_thumb.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiYjzUoj4qW6EDzBvj4uLxZpuVMygEJ9f2U1Zl4arZuU6-4YM3-txUYxzAU4-Kdk6zafz-bqMBWaeUEWidemlZLy5i87W3wCVIvrFY-ptIlIkyHev-TISzzo6yLJ17-oz1aF0SlcA_7imL/s1600/cyberwar_thumb.png&quot; height=&quot;480&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Please, feel free to post your responses in the comments section below.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Sources:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://deadline.com/2014/12/sony-hack-timeline-any-pascal-the-interview-north-korea-1201325501&quot;&gt;http://deadline.com/2014/12/sony-hack-timeline-any-pascal-the-interview-north-korea-1201325501&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.cnbc.com/id/102289459&quot;&gt;http://www.cnbc.com/id/102289459&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.theguardian.com/world/2014/dec/22/north-korea-suffers-internet-blackout&quot;&gt;http://www.theguardian.com/world/2014/dec/22/north-korea-suffers-internet-blackout&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;a href=&quot;https://www.northkoreatech.org/2015/01/27/more-internet-problems-hit-north-korea/&quot;&gt;https://www.northkoreatech.org/2015/01/27/more-internet-problems-hit-north-korea/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;a href=&quot;http://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/54/stuxnet-malware-targets-scada-systems&quot;&gt;http://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/54/stuxnet-malware-targets-scada-systems&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.wired.com/2011/08/siemens-hardcoded-password/&quot;&gt;http://www.wired.com/2011/08/siemens-hardcoded-password/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.imdb.com/title/tt2717822/&quot;&gt;http://www.imdb.com/title/tt2717822/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://map.ipviking.com/&quot;&gt;http://map.ipviking.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>https://unsecuritynow.blogspot.com/2015/01/korea-scada-sony.html</link><author>noreply@blogger.com (UnsecurityNow)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqd3afPauMWYMyAj6_LBCp6Hjm2eheaGn7cfPB7Xyc-c42Oucq3VVb1dnXC8n87e2JSnsvD6WktpopVIP8-uu12UjqiR05Qs4cbsr00Kd5SE67m1ILRnk9qj4hbs73ePe-FR_PdgE_uG6l/s72-c/hacked-by-gop-sony-pictures-under-attack-500.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-2970401236084356012</guid><pubDate>Wed, 16 Jul 2014 22:22:00 +0000</pubDate><atom:updated>2015-01-03T13:10:14.980-06:00</atom:updated><title>How to Better Your Privacy</title><description>&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;h3 style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;
Reaching Out&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Nowadays we live security in a different way we used to several
decades ago. &amp;nbsp;With all the new laws, regulations and government
surveilance it is really hard for a regular user to keep privacy on the net.
&amp;nbsp;Lately I have been a little absent from writing anything about security
because I wanted to know where it was heading. &amp;nbsp;Tight with job and
homework deadlines I had little time for myself to really work something out
about security. &amp;nbsp;In a matter of fact, lately I haven&#39;t got much time to do
anything related to IT besides studying and working in the field.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Having a new job working for a PaaS (platform as a service)
outsourcing company as a Unix System Administrator, I have kept myself
motivated with IT and burned the rest of my time finishing up my degree with
highest honors. After finishing my degree, I decided to begin my Bachelor&#39;s
degree in Cyber-Security. Now I can see myself with a little more time to keep
up to date learning new security methods, techniques and products. After
hearing about the whole Edward Snowden case, I was urged to write something
about our daily-diminished freedoms but first I wanted to touch base with basic
guidelines to keep yourself secure from the web. &amp;nbsp;Since this blog covers a
wide variety of audieces (beginner, medium and advanced), I thought it would be
a great idea to start with simple steps to maintain your anonymity and here it
is. Enjoy and keep learning my friends.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;
Nothing is What It Seems&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Like any of you might know privacy cannot be obtained if we sacrifice
it to gain security. &amp;nbsp;Both must go linked and never lose their
characteristics or quality, otherwise we lose both (Benjamin Franklin). Also,
security is a two-faced concept: &amp;nbsp;feeling secure and being secure.
&amp;nbsp;You can be safe and feel safe as well as not being safe and feeling it,
but this concept really makes sense and opens up to arguments when there is a
courtain which prevents us from seeing what is really going on. &amp;nbsp;For
example, we can be secure and not feeling it or feeling secured even we are not.
Even the latter is the most common one, both ways are not what they really
seem, thus the name of &amp;nbsp;&quot;security by obscurity&quot;. This psychology
trick is practiced by many lawyers, law enforcement, the media and many
governments, entities, organizations and organizations. Even though they might
be playing with this concept to achieve their goals, our achievement, the 99%
of population&#39;s goal &amp;nbsp;is to achieve the feeling of being secure AND the
reality of being secure.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;
How to Determine Real Security&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;By experential knowledge (learning from experience) we can avoid
getting scammed again and identify a safe or unsafe environment a little
better. The problem arises when there is no transparency in the security
controls or the lifestyle that we live today with biased and mis-informative
media, excess of gadgets, unprotected access points, mobile Internet and on-line
banking. &amp;nbsp;The best way to be a little more secure and feeling secure is to
mitigate the risks of being watched and this is done by limiting (if not eliminating)
our bad and lazy habits. &amp;nbsp;Everywhere we go, we leave not only physical
tracks but digital ones. Every-time we turn on our car engine, play our favorite
satellite radio, browse Facebook, Twitter or LinkedIn, commute, text and call
using our phones, browse the Internet, shop on-line and physically using a POS
(point-of-service) device by swiping our credit or debit card we are leaving a
lot of physical and digital tracks - and this is only half a day-. &amp;nbsp;Jot
down your daily activity and what technology &amp;nbsp;models you use. &amp;nbsp;After
having a list of all the technology models (car, phone, credit-card, computer,
etc) determine if it is better off to mitigate if not eliminate one of all of
these models. &amp;nbsp;One example is to take out cash once a week instead of
paying with your debit card every time you want to eat out or put gas on your
car. &amp;nbsp;This is real security. To avoid risks by mitigating them you achieve
real security. Next, there are some examples and ways to mitigate risks of
digital and psyical trails. &amp;nbsp;First (on the further left) there will be the
technology model, next the risk, next the solution and ultimately (further
right) the accomplishment using the solution given. &amp;nbsp;Let&#39;s examine:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Using car -&amp;gt; People know where you are -&amp;gt; Use public
transportation -&amp;gt; Spend less money. More security.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Using satellite radio -&amp;gt; interest tracking -&amp;gt; Use iPod -&amp;gt;
More privacy. Still listen what you want.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Pay with credit/debit card -&amp;gt; digital trail -&amp;gt; use cash
-&amp;gt; more privacy, avoid&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;tracking.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;line-height: 107%;&quot;&gt;Use phone -&amp;gt; calls eavesdropping, less privacy -&amp;gt; Use
Red Phone -&amp;gt; encrypted calls.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;line-height: 107%;&quot;&gt;Use texting-&amp;gt; metadata and message content collecting-&amp;gt;
Use TextSecure to encrypt texts.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;line-height: 107%;&quot;&gt;Chat with friends -&amp;gt; messages being eavesdropped -&amp;gt; Use
ChatSecure -&amp;gt; Provides end to end encryption, more privacy&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small; line-height: 107%;&quot;&gt;Surf the Intenet -&amp;gt; Data Mining, less privacy
-&amp;gt; Use TOR (anonymizing software) -&amp;gt; More secure.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Surf in public shop -&amp;gt; eavesdropping communication -&amp;gt; Use VPN -&amp;gt; Encrypted tunnel for your communication.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;span style=&quot;line-height: 107%;&quot;&gt;Note:&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;line-height: 107%;&quot;&gt;For red phone, chat secure and
textsecure to work as with end to end encryption, both parties (sender and
receiver) must have the same application installed on their smart-phones.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;line-height: 107%;&quot;&gt;Conclusion&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;line-height: 107%;&quot;&gt;The point here is to not avoid have 100% privacy and
security because that is impossible in this digital and physical world.&amp;nbsp; What we must aim is to have the most privacy as
possible while keeping ourselves out from the stack of potatoes that governments
and entities like Google and Facebook use to watch our every-day habits and use
them for their own good.&amp;nbsp; Being aware is
the first step, now you have to step up and make it a habit.&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://unsecuritynow.blogspot.com/2014/07/how-to-better-your-privacy.html</link><author>noreply@blogger.com (UnsecurityNow)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-3117409424963438735</guid><pubDate>Wed, 09 Oct 2013 05:39:00 +0000</pubDate><atom:updated>2013-10-09T08:40:25.564-05:00</atom:updated><title>How Can a 10 Year Old Have Administrator Access to Your Fortified Windows 7 Computer</title><description>&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;Disclaimer:&amp;nbsp; First of all I would like to let you know that I don&#39;t held responsible for the misuse of the information stated here.&amp;nbsp; This blog is only to let people know about the vulnerabilities, bugs, and security vectors that are out there since the companies that posses them do not even talk about it, so I bring it to the light to make people more aware of this issue.&amp;nbsp; Since the first 10 amendments (the bill of rights) gives me the right to share information, here it is because knowledge is power.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&amp;nbsp;Nowadays, someone does not need to know a lot about security&#39;s inner-workings of the Windows 7 Operating System to take total control of it.&amp;nbsp; This simple procedure is so simple even a 10 year old can do it with the need of ONLY a Linux live CD or DVD (even a flash drive) to boot with BIOS.&amp;nbsp; This procedure I like to call it application hijacking and there is no fix or way to defend this in the Windows Operating System side. However it can be diminished by putting a password on the BIOS but even that way it can be bypassed by taking the CMOS battery out resetting the BIOS password completely. This way will be too notorious if the owner of the computer&amp;nbsp; checks the BIOS and realizes there is no prompt for password but it might be too late...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;So here it is. First, we can see the Window Log in is totally normal. This attack relies on the &quot;Ease of Access&quot; button which helps people with dissabilities use the Operating System providing them with magnifying glass, on-screen keyboard, voice recognition, etc.&amp;nbsp; As the name states &quot;Easy of Access&quot; now it becomes &quot;Ease of Penetration Access&quot; :)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/-OX2WWQqFyDA/UlTgWPI9ooI/AAAAAAAAANg/26BsdUCppBA/s1600/1.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;384&quot; src=&quot;http://4.bp.blogspot.com/-OX2WWQqFyDA/UlTgWPI9ooI/AAAAAAAAANg/26BsdUCppBA/s640/1.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;/span&gt;

&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/-Kt4SKzV_qkw/UlTjw-GJf2I/AAAAAAAAAQo/N9Qox5q6zLA/s1600/2.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;380&quot; src=&quot;http://4.bp.blogspot.com/-Kt4SKzV_qkw/UlTjw-GJf2I/AAAAAAAAAQo/N9Qox5q6zLA/s640/2.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;With this said, we will try booting on BIOS but first we need to configure so it boots with CD-ROM, DVD-ROM or Flash-Drive (however your preference is).&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/-qwtn94aAcv4/UlTjxrEA4KI/AAAAAAAAAQw/y39l7agQp5M/s1600/4.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;472&quot; src=&quot;http://4.bp.blogspot.com/-qwtn94aAcv4/UlTjxrEA4KI/AAAAAAAAAQw/y39l7agQp5M/s640/4.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/-x0YFpqc6JpU/UlTjyFciAzI/AAAAAAAAARA/-LC6WbWGJpU/s1600/5.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;470&quot; src=&quot;http://2.bp.blogspot.com/-x0YFpqc6JpU/UlTjyFciAzI/AAAAAAAAARA/-LC6WbWGJpU/s640/5.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;After this, we boot with Linux. For this lab, we will use one of my favourites distros: Kali Linux (aka Backtrack 6).&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/-7-Wf4oXN70k/UlTjydhikdI/AAAAAAAAARI/32xfnnGMkjo/s1600/6.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;538&quot; src=&quot;http://2.bp.blogspot.com/-7-Wf4oXN70k/UlTjydhikdI/AAAAAAAAARI/32xfnnGMkjo/s640/6.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;We wait until all files, hardware, kernel and services are loaded and we will get prompted with the desktop. You can try it with CLI or GUI. It really does not matter as long as you use this proper commands:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/-8Yrj80jfs8s/UlTjzNNnr6I/AAAAAAAAARU/OOBeCwfLGOE/s1600/7.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;454&quot; src=&quot;http://4.bp.blogspot.com/-8Yrj80jfs8s/UlTjzNNnr6I/AAAAAAAAARU/OOBeCwfLGOE/s640/7.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;First we create a directory where we will mount the physical hard-drive (where Windows 7 resides on).&amp;nbsp; Note /dev/sda# will be your hard-drive if you are using SATA drive and /dev/hda# if you are using IDE hard-drive.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;#mkdir /media/harddrive&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;#mount /dev/sda1 /media/harddrive/&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;Now we will proceed to the hihjacking process but first we will make a backup to the &quot;ease of access&quot; file which is called &quot;utilman.exe&quot;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;#cd /media/harddrive/&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;#cd Windows\&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;#cd System32\&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;# mv Utilman.exe Utilman.Backup.exe&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;Now let&#39;s do the hijacking process with cmd.exe :)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;#cp cmd.exe Utilman.exe&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;Reboot the system:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;#reboot &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/-RZ_lNTizqN8/UlTrqPzboqI/AAAAAAAAARs/MVa-z4mDJfY/s1600/8a.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;428&quot; src=&quot;http://2.bp.blogspot.com/-RZ_lNTizqN8/UlTrqPzboqI/AAAAAAAAARs/MVa-z4mDJfY/s640/8a.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;Now it is time to reboot the system, take out the CD, DVD or Flash-Drive, Change BIOS back to normal and let Windows start&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/-6a4WTtwI6Kk/UlTjzHME6hI/AAAAAAAAARc/gNIGKJftHSc/s1600/8.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;488&quot; src=&quot;http://1.bp.blogspot.com/-6a4WTtwI6Kk/UlTjzHME6hI/AAAAAAAAARc/gNIGKJftHSc/s640/8.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/-WmCYEHmmgjw/UlTjzemYAUI/AAAAAAAAARg/lOZfrbwDB0U/s1600/9.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;382&quot; src=&quot;http://2.bp.blogspot.com/-WmCYEHmmgjw/UlTjzemYAUI/AAAAAAAAARg/lOZfrbwDB0U/s640/9.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;After Windows start, let&#39;s click one more time to the &quot;Ease of (Penetration) Access&quot; button and &quot;Viola!!&quot;, the CMD.exe window with ADMINISTRATOR privileges appears :) &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/-jKx_CJzKuwo/UlTjsDDQN2I/AAAAAAAAAP4/6ljnl51lKfg/s1600/10.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;380&quot; src=&quot;http://2.bp.blogspot.com/-jKx_CJzKuwo/UlTjsDDQN2I/AAAAAAAAAP4/6ljnl51lKfg/s640/10.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;Now, let&#39;s give ourselves Administrator Access with the username &quot;Attacker&quot;:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;NET USER ATTACKER /ADD&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;NET LOCALGROUP ADMINISTRATORS ATTACKER /ADD&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;Let&#39;s verify the user attacker is an administrator:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;NET USER ATTACKER&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;You can also verify by seeing who is in our Administrator&#39;s group:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;NET LOCALGROUP ADMINISTRATORS&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;EXIT&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/-yuQPKP0nGOU/UlTjrhzHP0I/AAAAAAAAAPo/Tb7cxomNWjQ/s1600/11.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;550&quot; src=&quot;http://3.bp.blogspot.com/-yuQPKP0nGOU/UlTjrhzHP0I/AAAAAAAAAPo/Tb7cxomNWjQ/s640/11.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/-KxA9lqN7wnE/UlTjsnVdDRI/AAAAAAAAAQA/31gR29bvpIA/s1600/12.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;516&quot; src=&quot;http://4.bp.blogspot.com/-KxA9lqN7wnE/UlTjsnVdDRI/AAAAAAAAAQA/31gR29bvpIA/s640/12.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;Now it is time to login with our newly-super-user account:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/-C0G63FO830w/UlTjuRMHchI/AAAAAAAAAQI/z3nz3tcdAoE/s1600/13.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;http://1.bp.blogspot.com/-C0G63FO830w/UlTjuRMHchI/AAAAAAAAAQI/z3nz3tcdAoE/s640/13.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/-sINZqfzCbXw/UlTjvOVRs8I/AAAAAAAAAQQ/nbK09OK8z7Q/s1600/14.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;402&quot; src=&quot;http://1.bp.blogspot.com/-sINZqfzCbXw/UlTjvOVRs8I/AAAAAAAAAQQ/nbK09OK8z7Q/s640/14.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;Let&#39;s verify that the account we just logged in has administrator rights:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/--dVeQkvq8SM/UlTjv9RUgSI/AAAAAAAAAQc/vi4ZsnjVWVs/s1600/15.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;404&quot; src=&quot;http://4.bp.blogspot.com/--dVeQkvq8SM/UlTjv9RUgSI/AAAAAAAAAQc/vi4ZsnjVWVs/s640/15.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/-tewJj3m57_c/UlTjwANSEOI/AAAAAAAAAQg/HBpQzy2jo2Y/s1600/16.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;406&quot; src=&quot;http://4.bp.blogspot.com/-tewJj3m57_c/UlTjwANSEOI/AAAAAAAAAQg/HBpQzy2jo2Y/s640/16.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;The lesson of this lab is not to teach anybody to break rules but to make users aware of the dangers big profit-glutton corporations like Microsoft.&amp;nbsp; You can help securing your computer form this attack by 1) Disabling CD-ROM/DVD-ROM and USB External Storage. 2) Putting a BIOS password and 3) Removing CD-ROM, DVD-ROMs or buying a computer with not USB connections :-D&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;Big cheers to RS who made me aware of this security vector.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-size: large;&quot;&gt;I hope you enjoyed it!&lt;/span&gt;</description><link>https://unsecuritynow.blogspot.com/2013/10/how-can-10-year-old-have-administrator.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-OX2WWQqFyDA/UlTgWPI9ooI/AAAAAAAAANg/26BsdUCppBA/s72-c/1.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-243726185705869834</guid><pubDate>Wed, 27 Feb 2013 17:05:00 +0000</pubDate><atom:updated>2015-04-16T06:48:49.486-05:00</atom:updated><title>Shanghai Hackers and The “Obscured” Cyber-War?</title><description>&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Technology deals with a huge part in our lives.  Everyday we are 
consciously and unconsciously concerned about it mostly because we were 
grown into it and are very used to it because we all count with it 
everyday.  Most consumers think technology is our friend, but what does 
the government think and use technology?  You will be amazed in how 
different are the two perspectives.  When regular consumers are 
anxiously waiting for the next “cool gadget” with built-in biometric 
technology to come out, the US government is fighting against huge 
power-outages, Denial of Service attacks, network traffic sniffing, 
unauthorized backdoor access and other hacking techniques coming mainly 
from China.  This interesting contrast reflects how technology can be 
used for good and also bad.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyBiqwcOUZTJyS0VGxbB2PX6X4aVifZBXsPTLXclzFlBcfJcf2hv6cQ_mRP0W5TAD9LvFeIh8SJS2jFPktdF6PCZKCFdJNmc2Bc18gqB4R-2BLF0igCQ_fwAOgQFD-usIJfXFC-hEdWLKm/s1600/cyberwar_large.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyBiqwcOUZTJyS0VGxbB2PX6X4aVifZBXsPTLXclzFlBcfJcf2hv6cQ_mRP0W5TAD9LvFeIh8SJS2jFPktdF6PCZKCFdJNmc2Bc18gqB4R-2BLF0igCQ_fwAOgQFD-usIJfXFC-hEdWLKm/s200/cyberwar_large.jpg&quot; height=&quot;173&quot; width=&quot;200&quot; /&gt;&lt;/a&gt; Government DOSed, defaced 
websites taken down, oil rigs computers infected by malware, huge 
bot-nets managed by zombie university computers attacking government 
systems, spying wall-street journal newspaper and leaking national 
top-secret documents to the whole world, using SQL injection to share a 
whole governmental database (user credentials) to the web; even Google 
to obtain social-security numbers from Americans are all examples of a 
current “catastrophic cyber-war”; also known as the new “virtual pearl 
harbor”.  
(http://search.proquest.com.proxy.itt-tech.edu/docview/1284133751/abstract?source=fedsrch&amp;amp;accountid=27655).
  The news are making all of us afraid of a cyber war but who are 
attacking who?  Who are the suspected victims?  Who are the targets?  
What are the allegations?  And the most important:  Where are they 
located?  All these questions are making people afraid, hiding the 
truth.  The truth is plain and simple.  We should not have more fear 
than to governments attacking governments all around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The US government is recruiting going from 800 to 5,000 security 
specialists and gray-hat hackers to help governments steal data, 
disrupting operations, and playing a cat-mouse game which never ends.  
“[Government fighting government with virtual weapons] is the most 
dangerous and concerning technological threat in our lives” -Bruce 
Schneier.  We are all aware about the fact that China is attacking the 
US government.  According with Syndigate.info, 16 percent of observed 
cyber attacks came from China in the second quarter of the year” 2013 
(http://search.proquest.com.proxy.itt-tech.edu/docview/1283496982/citation?source=fedsrch&amp;amp;accountid=27655).
  While the government is tracking China (their suspected attacker) for 
as long as China started to see the U.S. as the arch-enemy due to the 
fact Bush started the war on the middle east.  As far as proves, there 
are many.  Several US government entities (NSA, Pentagon ,White House, 
etc), newspapers (Wall-street Journal), credit-card companies 
(Master-card, VISA); even really popular sites such as Google and 
Facebook 
(http://www.ehackingnews.com/2013/02/how-researcher-hacked-facebook-oauth-to.html).&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiowu2TW1rPolWT9eWzkwEmDLMfvUI7L8XLW_-G8ZtnjCMWYgObkERSQWW_NI2mkNO88n_JFkLOxiuLCP99LOmdDezeMV6QCmNZYpYkgreL49F_c4DjgXS03JyZILokxKwK9eZSJLSRki6B/s1600/spying.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiowu2TW1rPolWT9eWzkwEmDLMfvUI7L8XLW_-G8ZtnjCMWYgObkERSQWW_NI2mkNO88n_JFkLOxiuLCP99LOmdDezeMV6QCmNZYpYkgreL49F_c4DjgXS03JyZILokxKwK9eZSJLSRki6B/s320/spying.png&quot; height=&quot;244&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
While the U.S. is being attacked from China, the US is monitoring its 
more successful invention:  Stuxnet.  Stuxnet is a military worm which 
has been invented by US Government and Israelis to spy on “terrorists”. 
 Stuxnet has been invented in 2006 to make the US aware of other 
government&#39;s plans, and spy on whoever they would like.  It is being a 
success because it is really difficult to detect and is infecting 
thousand of worldwide computers acting stealthy and sneaky in order to 
have the less noticeable behavior possible.  Other than Stuxnet which 
has been public, who knows what other “stuxnets” are out there that are 
being also unnoticeable from other governments...&lt;br /&gt;
&lt;br /&gt;
According to 
Bruce Schneier on a Keynote at Internetdagarna 2011, the two things that
 are really difficult of knowing in regards of a cyber attack, are “who 
is attacking and why, and that is what makes cyber-defense so 
difficult”.  Also he said that with today&#39;s technology, anybody (even a 
kid) can do serious damage to a computer connected to the internet, 
including government websites using SQL injection techniques, launching 
DOS attacks and even guessing (brute-force) a default password set on a 
router sitting elsewhere configured by a negligent system administrator. Even though the risk is out there and according to 
the attack vectors, new rules, protocols and procedures are being put in
 place by governments (Government urged to set cyber standards:  
http://search.proquest.com.proxy.itt-tech.edu/docview/1298835132/abstract?source=fedsrch&amp;amp;accountid=27655).
  Even though some regulations might seem OK to diminish (not prevent) 
cyber terrorism, little by little our freedoms are at stake.  For that 
reason a good, solid standard procedure should be put in place which 
makes us feel safer and actually make us safer.  Security is a 
trade-off.  One has to risk something to get security back, but what you
 can never, and I mean NEVER trade for security is freedom.  Just like 
Benjamin Franklin once said “One that trades security for freedom, does 
not deserve security nor freedom”.  So what approach do we choose to be 
more secure not only from cyber-vandalists and script-kiddies but also 
from the governments?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
According to Antone Gonsalves 
February 22nd, 2013 
(http://readwrite.com/2013/02/22/no-cyberwar-with-china), cyber-war is 
not here yet because “Real cyberwar would start with an attack that 
destroys something valuable or vital, kills people, or both.”  Does it 
really make killing people and vital resources a real cyber-war?  I 
think it is a matter of perspective and with time we will realize that 
cyber-war will be more human-like wars.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxOxKWlVr0VdWfY74Q2RTyDsazWZHWFd7klFsh2AhmOBqoWP-YaQPrlRFqN49raZYZL7lA4MtPAIPgKu5r7AygSzQDz6e0PoFHKQ9Ly8ly555Zd-28wZXu-7Xqx_bzukETu8wgfYimtrYu/s1600/wiki.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxOxKWlVr0VdWfY74Q2RTyDsazWZHWFd7klFsh2AhmOBqoWP-YaQPrlRFqN49raZYZL7lA4MtPAIPgKu5r7AygSzQDz6e0PoFHKQ9Ly8ly555Zd-28wZXu-7Xqx_bzukETu8wgfYimtrYu/s200/wiki.jpg&quot; height=&quot;149&quot; width=&quot;200&quot; /&gt;&lt;/a&gt; I believe a 
way to prevent cyber terrorism is to stop being afraid of news and what 
the media and governments say.  The main goal for a terrorist is to 
“make terror”.  According to Webster-Merriam dictionary, terrorism is  
“the systematic use of terror especially as a means of 
coercion”(http://www.merriam-webster.com/dictionary/terrorism).  I 
highly think reinforcing general policies in general such as:  military 
control instead of focusing on every power-grid in the US skyrocketing 
their expenses for useless outcomes.  Also, another example to protect 
society from cyber attack and also physical attack is to reinforce rules
 and regulations on schools instead of putting additional guards in 
every school in the country to prevent sad kids from shooting everybody 
during his/her class.  The point is that it is mostly psychological.  It
 is true everyday more and more websites, databases, organizations, 
governments and financial institutions are being breached and being 
posted at pastebin and their own sites for everyone to see (for example 
Anonymous and Wikileaks).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is important is to 
realize that is more psychological than fact and to put into perspective
 general solutions and counter-measure the threats instead of being too 
specific and “micro-manage” things because we will fail most of the 
times.  It is also important to note that security relies on two 
factors:  feeling secure (psychological) and being secure (facts).  It 
is totally useless to rely on the most expensive and best-configured 
firewalls if you don&#39;t train your employees from not divulging important
 &lt;br /&gt;
information and keep them happy so no one goes “to the other 
side of the road” and buy you out just like Bradley Manning.  The most 
important is to be educated and to live a little bit more carefree. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sources:  &lt;br /&gt;
&lt;br /&gt;
Hackers take down U.S. government website by Xinhua News Agency - CEIS [Woodside] 26 Jan 2013. &lt;br /&gt;
http://search.proquest.com.proxy.itt-tech.edu/docview/1284133751/abstract?source=fedsrch&amp;amp;accountid=27655 &lt;br /&gt;
Chinese cyber attacks on Western firms, governments &#39;growing&#39;: Experts by Asian News International [New Delhi] 02 Feb 2013. &lt;br /&gt;
http://search.proquest.com.proxy.itt-tech.edu/docview/1283496982/citation?source=fedsrch&amp;amp;accountid=27655 &lt;br /&gt;
Government urged to set cyber standards Press, Jordan. The Gazette [Montreal, Que] 22 Feb 2013 &lt;br /&gt;
http://search.proquest.com.proxy.itt-tech.edu/docview/1298835132/abstract?source=fedsrch&amp;amp;accountid=27655 &lt;br /&gt;
&lt;br /&gt;
How researcher Hacked Facebook Oauth To Get Full Permission On Any Facebook Account &lt;br /&gt;
Reported by Sabari Selvan on Friday, February 22, 2013 | &lt;br /&gt;
http://www.ehackingnews.com/2013/02/how-researcher-hacked-facebook-oauth-to.html &lt;br /&gt;
U.S. presents plan against industrial cyber-espionage: US GOVERNMENT by EFE News Service [Madrid] 20 Feb 2013. &lt;br /&gt;
http://search.proquest.com.proxy.itt-tech.edu/docview/1289100384/abstract?source=fedsrch&amp;amp;accountid=27655 &lt;br /&gt;
&lt;br /&gt;
Why We&#39;re Not In A Cyberwar With China by Antone Gonsalves February 22nd, 2013 &lt;br /&gt;
http://readwrite.com/2013/02/22/no-cyberwar-with-china &lt;br /&gt;
&lt;br /&gt;
Bruce Schneier - Keynote at Internetdagarna 2011 http://www.youtube.com/watch?v=dhzk9ZDhObw &lt;br /&gt;
&lt;br /&gt;
Webster Dictionary:  Terrorism Definition </description><link>https://unsecuritynow.blogspot.com/2013/02/shanghai-hackers-and-obscured-cyber-war.html</link><author>noreply@blogger.com (UnsecurityNow)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyBiqwcOUZTJyS0VGxbB2PX6X4aVifZBXsPTLXclzFlBcfJcf2hv6cQ_mRP0W5TAD9LvFeIh8SJS2jFPktdF6PCZKCFdJNmc2Bc18gqB4R-2BLF0igCQ_fwAOgQFD-usIJfXFC-hEdWLKm/s72-c/cyberwar_large.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-3503812747318803735</guid><pubDate>Thu, 08 Apr 2010 16:52:00 +0000</pubDate><atom:updated>2010-04-08T11:57:46.667-05:00</atom:updated><title>Risk Management</title><description>The principles of maintaining a system secured are old as information itself.  As long information has been around, ways for preventing information from reaching unwanted hands have been highly reinforced.  Due to technology increase, it makes systems more vulnerable to different methods, also known as vectors.  Once a system administrator tries to find out what went wrong with the system, sometimes it is too late.  For this case, one must be aware of the latest technology involved in your field.  Ways of maintaining system secure are changing everyday but principles will never change.  Some principles are straightforward to understand and to perform because they do not include too much technical background.&lt;br /&gt;&lt;br /&gt;    One of the most important concepts of data security is to have availability.  How can something be secured if it has been deleted due to a weather incident, human negligence or a malicious act?  The first step is to back data regularly.  Data backup is perhaps the most antique way for preserving data.  There are different categories of backups:  full, differential, incremental and delta backup.  They differ in the amount of data and when is preserved.  The second step to prevent data disasters is to have the proper equipment.  Having a UPS (Uninterruptible power supply), having proper job practices, such as not bringing food to the workstations, and policies help an organization to prevent data disaster.&lt;br /&gt;&lt;br /&gt;    The disaster recovery process has many methods in which helps an organization preserve their data and not endangering it negligently.  Other than making proper backups, using proper equipment and procedures, there are also other ways that blend into the same process.  Anticipating risks, planning a strategy, and a post-disaster plan helps the organization to act accordingly to such an act.  There are two kinds of risk managements.  Quantitative and qualitative.  Quantitative risk management determines the impact of threats by providing clients with advice, knowledge, and tools necessary to adopt innovations.  Qualitative management risk is the separation or categorization of risks.  They are categorized in three ways:  low, medium and high following a scale from one (being the less severe) to ten (most severe).  Some of this scales rely on models.  Threats can be divided in categories as well.  They can be natural, physical, network human and eavesdropping threats.  One must understand the equal importance to those threats.  There are no less or more important threats, they are all the same because they all face critical destruction of data.  Even though a company might disagree to this concept I understand why.  A company with a limited budget cannot spend time fixing every whole that might be possible in a system.  They can only fix those holes they see the most eminent.  &lt;br /&gt;&lt;br /&gt;    Lastly, the people aware of the security holes varyies from company to company, but I personally think it must be done accordingly and very cautiously.  Critical information in the wrong hands can lead to more hands on that vulnerability and might lead to total disaster.  Only certain personnel must be told about the security vulnerabilities and/or breaches and give them a solution.  If no one is able or capable to determine what went wrong, they will less likely know what to do to fix them.  Some white-hat hacker organizations try to break into corporation systems and offer them help to fix them.    In a movie I watched yesterday called “En Busca de Los Hackers” (Seeking for Hackers) – Spanish version, a group of Spanish white hat hackers said that offering themselves to help companies with no hard evidence that somebody has broken into their system does not work.  Every company have turned them down.  The only method, for them, is the illegal approach.  They break into the system first, put the flaws in a disc explaining how they found it and present it to companies for hire.  1 out of 9 companies hired them.  No wonder there are vulnerable systems all around the world.  If people, including corporates have that fear about hackers, what can they do to make their systems better.  Of course, there are bad people out there, but not everybody who call themselves hackers are really what they are.&lt;br /&gt;&lt;br /&gt;    In this cyber world full of vulnerabilities it is hard to know who is in which side of the road.  The only solution for a company is to back up their data daily, that way if they ever lose something they only lose the revenue of a day worth of work, thus controlling how much money they might lose.  It is not a matter of if, it is a matter of when.  Every system in this world has been compromised at least once in this history, that means no system is silver-bullet for an organization.  There are security bases and procedures of course, and they try to minimize the risks as less as possible to save company time and critical data.  Only remember one thing, anybody with proper knowledge, a computer connected to the Internet and time, can break into ANY system.  One of the reasons is because companies do not encrypt data that goes through the networked medium.  Companies seek flexibility, and convenience and these have a price.  The price might be more than what they were looking to achieve, and the price is their privacy lost.&lt;br /&gt;&lt;br /&gt;Sources:&lt;br /&gt;&lt;br /&gt;http://www.it-observer.com/best-practices-securing-your-enterprise.html&lt;br /&gt;&lt;br /&gt;http://en.wikipedia.org/wiki/Risk_management&lt;br /&gt;&lt;br /&gt;“En Busca de los Hackers” – Seeking for Hackers ( Spanish Movie)</description><link>https://unsecuritynow.blogspot.com/2010/04/risk-management.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-330208889696713250</guid><pubDate>Thu, 01 Apr 2010 18:49:00 +0000</pubDate><atom:updated>2010-04-01T15:20:54.442-05:00</atom:updated><title>The Fragile Web</title><description>Stay secure over the Internet is almost virtually impossible.  Even though total security is completely impossible, there are ways to minimize the risks.  Prevention is half of the equation, the other half must be secure practices.  As more exposure we get as computer users, the more security driven most of us become.  If you are not worried about privacy because you use Linux or MAC, you still must be.  Non-encrypted communication, social engineering and online scams don’t discriminate Operating Systems thus making you even as vulnerable than Windows users. &lt;br /&gt;&lt;br /&gt;    It is harder to stay secure in the 21st century digital era because there are more flexibility options, and more temptations over the Internet.  Having a non-encrypted connection might expose your data to the wrong eyes risking your privacy even though you might think you are safe enough by having an up-to-date Antivirus installed on your computer and scan it everyday.  Also, having IDS on your home computer might not help a lot as well as a corporate firewall. I think leveling the risks with cost is the best way to implement security.  Why wasting a lot of money for professional use if the threats are not potentially important in a home environment than in a corporate which contains top secret information?  &lt;br /&gt;&lt;br /&gt;    By leveling risks with cost determines if you really should spend money and time on implementing such system.  Having a personal firewall might only help if the user is security conscious and is willing to spend time and effort on checking every process and communication that is going through your computer every time a pop up window appears.  It is worthless to have top of the notch technology if the user is not going to spend time on checking, and in this case, a user has to spend time and effort setting up firewall rules in order to minimize risks and false positives on a system.&lt;br /&gt;&lt;br /&gt;    Also, it is worth to mention that not only a personal firewall and an up-to date anti-virus and anti-spyware are needed.  It is also recommended for those who do transactions on-line and send important e-mails to use an encrypted connection.  The uses of VPNs are widely known for companies, but what about home users?  Is it not the same, if not similar risk in a corporate and a home user who is managing his online banking?  It only takes someone to make a targeted attack on you to have your identity stolen.  The best way to prevent this is “abstinence”.  Try to not do financial stuff online.  That way, corporations will likely change their online policies and try to improve the system so more people could use it. It all comes down to money. This method will negociate with corporations thus making them change their strategy.  For example, Verizon (Slashdot website) will charge an extra $25 to make online payments more secure.  I agree with their strategy over the phone using a one-time password for purchase confirmation, but I don’t agree by paying more to get a security improvement they should done in the first place.  Security must be provided with service at same rate.  &lt;br /&gt;&lt;br /&gt;    Even though paying with phone password confirmation might seem a more secure way to do online payments, there are risks in phones as well.  The only risk I can think of about phones is that users can put personal information about contacts.  If the phone is lost or stolen, important sensible information can be gathered.  For example, blackberries can not only be traced with a built-in GPS system but also the Facebook application does not time out after an X minutes or even days of inactivity.  That means, the user might have facebook application logged in for weeks or even months and if the phone is lost/stolen, and a bunch of other (internal) information can be taken from and about your contacts.  When technology increases and goes mobile, that is when the consumer must be more aware of risks because now information is not only wired, communicated into encrypted and non-encrypted information.  Now information is also being transmitted over the air (highly non-encrypted) and it can be eavesdropped by any person.  That is when Man-in-the-middle attacks come into place.  &lt;br /&gt;&lt;br /&gt;    Not only on phones, but also other communication medium over the air is vulnerable and susceptible for an attack.  Even though many people might think Man-in-the-Middle attacks might take a tremendously amount of effort, there is still an easy way to pull it off.  That way is by ARP poisoning using an open source tool called Cain &amp; Abel.  (irongeek website).  With this method, it is very easy for a knowledge (hacker?) person to get his stuff dirty on your personal information in places known as cyber-cafes, airports, Mc Donald’s and some convenience stores.  &lt;br /&gt;&lt;br /&gt;    Having the best flexibility possible, the most secure possible is impossible.  You can not have both.  While some people prefer convenience and flexibility over security, a wiser choice might be to try to achieve both at a certain level to minimize the risks of being hacked.  In this high-tech world, doing our everyday chores while going mobile might seem dangerous.  This is the time to think wisely about our decisions.  Come on! We can do better America!!&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Sources&lt;br /&gt;Verizon Strategy:  http://games.slashdot.org/story/10/03/22/2141205/Verizon-Set-To-Launch-Mobile-Payment-Service?art_pos=1&lt;br /&gt;&lt;br /&gt;Cain &amp; Abel:  http://www.irongeek.com/i.php?page=videos/using-cain-to-do-a-man-in-the-middle-attack-by-arp-poisoning</description><link>https://unsecuritynow.blogspot.com/2010/04/how-to-stay-secure-over-internet.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8567398124063555856.post-8108319938882582007</guid><pubDate>Wed, 31 Mar 2010 19:54:00 +0000</pubDate><atom:updated>2010-04-01T15:25:12.791-05:00</atom:updated><title>Struggle VS Google and China</title><description>Culture is what divides each nation.  Culture can make technology change the way is wanted.  Without culture, a society can be lost in richness and binds into another.  The culture is what we have inside and cannot describe it because it is part of our personality and rules we obey in our daily lives.  When culture is violated, we feel like we are being harassed and taken our dignity away.  When business agreements influences culture and principles of a nation, that is where the problem arises.&lt;br /&gt;&lt;br /&gt;    Google is very known as the power giant of online searches.  Anybody can access their own country version of Google by their own machines.  For example, if you are in Ukraine, the site Google.com will be redirected to Ukrainian version of Google.  Google had an agreement with China.  The agreement was that Google would provide fast searches inside the Big Firewall of China but have censorship on it so the Chinese nation wouldn’t be able to start a political revolution aided by the Internet.  We all know China is a communist country and communist governments limit the availability of information they consider “not suitable” for their nation to have access to.&lt;br /&gt;&lt;br /&gt;    When Google took away censorship, China government’s and some Chinese people felt their culture and life were violated.  I am unknown to the fact Google took away censorship but I know that was not a smart move.  I truly believe that if you really want business from a foreign country, you have to know their laws and not try to break them.  For example, in a party a DJ has to play the music people want to hear, not what they want to hear.  Even though the DJ might not like the music, he stills have to play it.  He will get paid for it, but if he disobeys and does whatever he wants, the clientele will be severely pissed at him.  That is what happened with Chinese government, and communists.  Many activists hacked into Google’s headquarter e-mail accounts and systems to reveal themselves for such a bad act.  Google kept on reacting badly to the response of Chinese nation, so havoc fell from the sky.  Chinese government say Google violated their agreement but so Google did something they thought it would solve the problems, even though it did not.&lt;br /&gt; &lt;br /&gt;    Google moved (redirected) Chinese version of Google to the version of Hong-Kong and that is a problem, the same problem they had before.  Chinese users will try to visit Google and yet have an uncensored version of Google from Hong Kong.  The Big Firewall of China is broken.  It is broken for two reasons.  Users can access any sites they want by going around the Big Firewall in two ways:  Google.hk and proxy servers.  Maybe Google might help China by removing the redirection, but I don’t think they will because they want money.  About proxy servers, there might be underground sites made by Chinese underground mafia which could provide users with proxy servers which make them connect to any site they want.  &lt;br /&gt; &lt;br /&gt;    Any way they choose, the Big Firewall will always be broken thus providing unsolicited information leak through it.  Nothing is perfect, and much less technology.  We all know that, the Internet is one of the most vulnerable systems in the world because it is very complex and it will take an unlimited amount of time to patch every hole in it.  We have special gateways, proxy servers, VPNs, Tor software, anonymizer sites and protocols that can be used to bypass any sort of security that might get in our way.&lt;br /&gt;&lt;br /&gt;Sources&lt;br /&gt;&lt;br /&gt;http://www.upi.com/Daily-Briefing/2010/03/23/Google-vs-China/UPI-93351269347903/&lt;br /&gt;http://techcrunch.com/2010/01/12/google-china-attacks/&lt;br /&gt;http://www.torproject.org/</description><link>https://unsecuritynow.blogspot.com/2010/03/struggle-vs-google-and-china.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item></channel></rss>