Wednesday, December 31, 2014

Samsung: a 12.2-inch Ultrabook 950 g and an all-in-one … – Clubic

  In addition to a curved monitor and a pair of omnidirectional speakers, Samsung unveiled ahead of CES 2015 ultra-thin laptop and a desktop all-in-one curved screen.

Samsung Ativ Book 9: 11.5 mm, 950 g and 12.2 inch high resolution screen


Samsung launches to start the computer ready rumor Apple: an ultra portable to “Retina” screen. The new generation of Ultrabook Ativ Book 9 measures only 11.5 mm thick, weighs only 950 g, but it certainly has a beautiful 12.2-inch screen with a resolution of 2560 x 1600 pixels. Which is the equivalent Retina (doubling of pixels along the horizontal and vertical axis) of a screen of 1280 x 800 pixels, and which corresponds to a resolution of 240 pixels / inch. This screen standard delivers a maximum brightness of 350 cd / m², it features an outdoor mode to bring it to 700 cd / m².

To achieve such finesse, Samsung has unsurprisingly recourse to aluminum but also and especially to the new Intel Core processors M Broadwell architecture, low-performance processors, but at the height of common uses for a lower TDP than or equal to 6 W (unknown exact reference). The computer is also cooled without using a fan.

As usual for announcements made ahead of CES, there are few details, but this time we know that Samsung has focused on audio, with a Wolfson DAC, that autonomy can reach 10 h 30 min and finally we know the prices and the approximate launch date, at least in the United States. The Samsung Ativ Book 9 will be on sale during the first quarter of 2015 to $ 1200 with 4GB of RAM and a 128GB SSD, or $ 1,400 respectively 8 and 256 GB.




Samsung Ativ One 7: an all-in-one integrated TV tuner and curved screen


Samsung has also introduced the Ativ One 7, the first computer desktop all-in-one market curved screen. The device clearly shows the characteristics of S27D590C Monitor launched last September, but adds the necessary components to make it self-sustaining.

So we find a 27-inch TN panel providing a modest Full HD. Its radius of curvature is only 4 m. The screen contains an unspecified Intel Core i5 processor, 8GB of RAM and a hybrid storage medium consisting of a hard disk 1TB operating at 5400 rev / min and an undisclosed amount of memory cache to flash speed up transfers. In addition to the usual USB 3.0 ports, HDMI, Gigabit Ethernet port and Wi-Fi connectivity, the computer features an antenna connection, indicating that embeds (perhaps only option) a TV tuner.

This Samsung Ativ One 7 will also be launched in the first quarter of 2015 at a retail price of $ 1,300.

LikeTweet

Thunderstrike: the fault of all the dangers that targets Mac – Linformatique.org

Every Mac equipped with a Thunderbolt port are victims of a fault all hazards since it is virtually impossible to seal.

It is the occasion of the conference Chaos Computer Club that the security researcher Trammel Hudson has detailed a flaw that affects all Apple computers with a Thunderbolt adapter.

While the hacker Snare, in 2012, had already shown the ability to drag Mac malware using the opportunity to read areas of alternative submissions on Thunderbolt adapters through the PCIe connection via “Option ROM” Trammel Hudson for his part used this attack vector to rewrite EFI Boot ROM.

This particularly pernicious attack, called Thunderstrike highlights a huge vulnerability of Mac saw the EFI Boot ROM is a hardware component that manages the computer starts.

Although it takes physical access to the machine, which is not necessarily difficult for a hacker or a secret agent, this flaw is particularly pernicious because it indirectly gives full access to the machine allowing the installation of a back door, but especially that you reinstall the operating system or change the hard disk will not clean the infection since it is a separate component. This attack is particularly pernicious that it only takes one infected Thunderbolt peripheral sharing to spread the infection.

Apple has already taken a countermeasure against this vulnerability by changing the startup procedure. This patch is not enough in the eyes of Trammell Hudson as it believes it will be possible to return to a previous configuration on an older Mac, but also by the fact that the recent flaw called “Dark Jedi Coma” would bypass cons-measures implemented by Apple.

In order to protect themselves, Trammel Hudson has applied Thunderstrike attack on its own Mac to completely disable “Option ROM”, a highly technical solution which is unfortunately not everyone mainstream users. Until Apple offers a more permanent solution, the best advice is to not connect anything to the Mac.

It should also specify that Thunderstrike runs on any Intel Mac with a Thunderbolt port, ie including all MacBook marketed since 2011

..

LikeTweet

“Great Year” false good idea Signed Facebook … – ZDNet France

The engine of Facebook, it’s your appetite to stage the positive moments of your life. An evening with friends, the arrival on earth of the youngest, these holiday to the Seychelles where of course, it was fine. Otherwise, there is a picture filter to fix it.

Because seriously, who wants to flaunt his contacts its shortcomings, failures, his clumsiness? (If they are funny and that was a bit of self-deprecating humor can be anyway).

“I’m not on Facebook for a year,” says a former user disappointed with this machine to show happiness, “it depresses me.” As this article also highlights Slate, Facebook causes great frustration among those who can not or do not want to ‘promote’ their lives on the Internet. To see so many profiles boasting radiant lives and filled evenings / meetings / outputs, many tend to depreciate their own life experience joyful face these extracts carefully selected and posted on Facebook.



Flatter the ego users

Because Facebook is not to reflect on what life can be. He just needs to flatter the ego of its users to sell more advertising space and popularity to the brands which pay a high price to appear in the stream of life fantasy of its members.

With This necessarily positive content, Facebook has begun to offer its users by end of this year a little special format called “Super Year” (or “Year in Review in original). The idea? Indulging discovering a selection of the content published last year and then again fun showing his friends how much we were happy during this period of time.

“I had a great year! Thank you to have contributed “to mention the format chosen few who can contemplate on their wall happiness of the annual summary of each member consenting to the transaction.” Great Year “is based on an algorithm that selects the most loved and commented pictures the past year, gathers and presents the chronologically.

Example message of discontent after the distribution of the application “Super year.” Published on Facebook.

Personally, it made me realize that I already had a double chin skiing Last March, the state of my belly at the beach in July was pathetic, and my only notable activity this fall was to be invited to a wedding. This format has caused other negative reactions in the audience of Facebook , an example is the French Facebook page dedicated to the case.

If Eric Meyer

But the wrong format has also attracted the reaction outraged a member of this community. To the point that Facebook has to apologize. Eric Meyer lost her daughter this year. She was 6 years old and died from brain cancer. For this reason, it is not particularly keen to be offered a content “Great Year” at the end of 2014, he says on his blog. Eric Meyer evokes the “algorithmic cruelty” that has imposed an exhilarating glimpse of the past year, while in real life, it was very tragic.

“For those of us who have lived the death of loved ones, spent time in the hospital, divorced, have lost their jobs or have lived a hundred possible crises, we may not want to look back on the past year, “explains t -it.

After this blunder, widely reported on the web, Jonathan Gheller the project “Great Year” Facebook chief contacted Eric Meyer to apologize personally. “We can do better,” he has told the Washington Post. It should not be complicated.

 

LikeTweet

Android 5.01: bug affects memory management – Clubic

  New particularly annoying bug was discovered in the latest version of the Android system. This results in poor memory management. Android 5.0 Lollipop was published late because of a bug. In November, many owners of Nexus 5 had indeed complained that the autonomy of their smartphone decreased drastically. The phenomenon occurs at the output of Wi-Fi before.

But that’s not the only problem observed on the latest version of Android. Indeed, the latter bug affects management of RAM. Specifically, the system is not able to free up RAM when it is supposed to. The result of application crashes.

Hundreds of users have expressed their problem within official Google forums and on the platform of Reddit. According to the blog BGR, which reports information from affected devices we find the Nexus 4, 5, 6 and 7. Currently, the only solution is to reboot the device ….

Google Yet working for several years on the fluidity of its mobile system, work that began with the Project Butter in Android 4.1. The question is when this bug will be fixed.

LikeTweet

Tuesday, December 30, 2014

She lets bite 180,000 times a love of science – Linformatique.org

Immune against bites from bedbugs, Canadian biologist Regine Gries lets bite 180,000 times by bed bugs love of science.

Bedbugs are attracted to human bedding . Apart from the inconvenience it causes, the big question is to understand how they are to colonize us despite an almost complete eradication and how to fight against proliferation.

It is to these questions that a team of Simon Fraser Institute (Canada) tried to answer. To do this, it had serious assets: Regine Gries. This Canadian biologist is indeed immunized against the bite of these particularly stinging creatures that feed on human blood feeling no effect. Thus it has agreed to lend her skin science to feed bugs to better understand them.

This “was to be bitten several times per month by each of its small protected . In total, five years of work, Regine Gries has undergone more than 180,000 bites bedbugs! “Says the blog Treader Sciences. It is stated that “this lady is immunized against these bites. They do not cause these large home features red buttons with uncontrollable itching that accompany them. “

With his sacrifice, the team was able to identify the bugs emit pheromones to attract their peers . This discovery will allow us to design traps. But before they can be marketed, it will still do other tests: “There is in fact a number of tests to be performed for the development of the traps before marketing. By then, the researcher must continue to feed his colony … “

The main applicant stated about it.” I’m not particularly happy, but knowing how this technology will accommodate quantity people, it is worth it. “

While this study demonstrates the whole spirit of sacrifice Regine Gries, one can point out that Barry Marshall had done the same by shotant with Helicobacter bacteria pylori and by healing with antibiotics, which earned him the Nobel Prize in Medicine in 2005. Will it be the same with the Canadian scientist?

LikeTweet

Cyber-espionage: No more encrypted software can resist the NSA … – 20minutes.fr

HIGH-TECH Few software resist oversight of the US intelligence agency, the NSA …

Activists d & # XE9; nounce the activity & # XE9; s NSA before the D & # XE9; Department of Justice & # xE0; Washington, January 17, 2014
Activists denounce the activities of the NSA before the Justice Department in Washington, January 17, 2014 – Nicholas Kamm AFP

20 Minutes with agency

    • Created
    • Updated
  • Keywords

On the sidelines of the Chaos Communication Congress (annual conference on topics related to computer and hacking) held in Hamburg, German Der Spiegel publishes new documents provided by the US whistleblower Edward Snowden and dated 2012 .

These detail the efforts of the National Agency to US security (NSA) to pierce the strongest protection on the Internet. A spy deemed “abusive and intrusive” widely criticized and condemned by public opinion

& gt;. & Gt; Also read: The NSA monitors 70% of global mobile networks

Decrypt algorithms and encryption techniques used on the Internet, “the only way to resist government oversight” by Snowden, today ‘ hui forced into exile in Russia, that’s so, the workhorse of American intelligence which multiplies the efforts for many years to counteract these technologies. Developed, in 2013, Director of the NSA, James Clapper, praised the progress “revolutionary” agency “to thwart cryptography”.



Skype is open book

So what tools are still resisting the Agency? This is the question that tried to answer several journalists, through the documents provided by Snowden, published online an inventory before presenting it to the Hamburg conference. Their conclusion? “Almost nothing can resist the NSA”

First software as quoted by the German magazine failed. Skype, messaging Microsoft. The conversations through the program, which boasts an encryption that protects Listens “by malicious users,” are in fact available since February 2011. Spiegel even reveals a document that presents . the procedure for recovery of the messaging data

Snipped from NSA document: Encryption Considered a & # Xab; & # Xbb threat;

VPN, SSL, HTTPS

And the Microsoft software is not the only one to fold against the attacks of the NSA. Several protocols used for encryption for virtual private networks (VPNs) were foiled by the Agency for several years (NSA with a unit dedicated to the interception and espionage connections protected by VPN). One of them, SSL is used daily by the general public (it allows the “secure” connections to certain Internet sites). In other words, HTTPS, which enables secure web connection, no longer seems to be a problem in US intelligence, which in 2012 had set the goal to intercept and decrypt HTTPS 10 million a day.

Given Pari, since the NSA installed several back doors so you can easily decipher the exchanges meant to be private and secure by this small padlock left of your web address, or the “s” in “https”.

PGP or Truecrypt on the grill Tor

Is there then good news? Yes I Am. It turns out that the NSA, who in his ideal world would get their hands on a “universal decryption method” still believes that the popularization of encryption tools ( applications, software, called smartphones “inviolable”, etc. .) is the main threat to the continuation of its operations

& gt;. & gt; Read here: Espionage: Technologies to escape the NSA

And the agency to break teeth on programs asking her “major” problems or “catastrophic”?. PGP protocols, Truecrypt and Off The Record are probably indecipherable. Like other open source project: Tor. Successive encryption layers on which the Internet network relies prevent the NSA to intercept data passing through. “Right now,” says Der Spiegel.

LikeTweet

“Great Year” a false good idea Signed Facebook – ZDNet France

The engine of Facebook, it’s your appetite to stage the positive moments of your life. An evening with friends, the arrival on earth of the youngest, these holiday to the Seychelles where of course, it was fine. Otherwise, there is a picture filter to fix it.

Because seriously, who wants to flaunt his contacts its shortcomings, failures, his clumsiness? (If they are funny and that was a bit of self-deprecating humor can be anyway).

“I’m not on Facebook for a year,” says a former user disappointed with this machine to show happiness, “it depresses me.” As this article also highlights Slate, Facebook causes great frustration among those who can not or do not want to ‘promote’ their lives on the Internet. To see so many profiles boasting radiant lives and filled evenings / meetings / outputs, many tend to depreciate their own life experience joyful face these extracts carefully selected and posted on Facebook.



Flatter the ego users

Because Facebook is not to reflect on what life can be. He just needs to flatter the ego of its users to sell more advertising space and popularity to the brands which pay a high price to appear in the stream of life fantasy of its members.

With This necessarily positive content, Facebook has begun to offer its users by end of this year a little special format called “Super Year” (or “Year in Review in original). The idea? Indulging discovering a selection of the content published last year and then again fun showing his friends how much we were happy during this period of time.

“I had a great year! Thank you to have contributed “to mention the format chosen few who can contemplate on their wall happiness of the annual summary of each member consenting to the transaction.” Great Year “is based on an algorithm that selects the most loved and commented pictures the past year, gathers and presents the chronologically.

Example message of discontent after the distribution of the application “Super year.” Published on Facebook.

Personally, it made me realize that I already had a double chin skiing Last March, the state of my belly at the beach in July was pathetic, and my only notable activity this fall was to attend a wedding, which I would describe missed. This format has caused other negative responses in the audience of Facebook, an example of which is the francophone Facebook page dedicated to the case.

If Eric Meyer

But this bad format has also sparked outraged reaction of a member of this community. To the point that Facebook has to apologize. Eric Meyer lost her daughter this year. She was 6 years old and died from brain cancer. For this reason, it is not particularly keen to be offered a content “Great Year” at the end of 2014, he says on his blog. Eric Meyer evokes the “algorithmic cruelty” that has imposed an exhilarating glimpse of the past year, while in real life, it was very tragic.

“For those of us who have lived the death of loved ones, spent time in the hospital, divorced, have lost their jobs or have lived a hundred possible crises, we may not want to look back on the past year, “explains t -it.

After this blunder, widely reported on the web, Jonathan Gheller the project “Great Year” Facebook chief contacted Eric Meyer to apologize personally. “We can do better,” he has told the Washington Post. It should not be complicated.

 

LikeTweet

Retrospective of Facebook are controversial – BBC

Facebook offers its users to view a page titled “Year in Review” their vivid memories of the year. But significant does not mean happy.

Facebook fans have probably already noticed the ticket “Year in review” that sits on their timeline. The social network Mark Zuckerberg offers its users to review their year 2014. With one click, an algorithm aligns vertical frieze most popular pictures and statuses released on their profile. To the chagrin of the most unfortunate users, as Eric Meyer whose unfortunate experience goes around the Web.

In his blog post entitled The unfortunate cruelty algorithms, writer and developer tells how a photo of his six year old daughter died a few months earlier was left pinned to the top of the wall. Subtitled “Eric, this is what your year comes down!”, The image present in the background of the characters dancing arms in the air. “And there was no way to stop it,” he reflects.



Multiple Tribulations

The case of Eric Meyer is not isolated. The setbacks have increased since the opening of the service. “Mine (frieze, ed) reveals the announcement of my pregnancy and a little further the loss of our 23-week-old baby,” says a woman incognito on Reddit forum where many Internet users criticized the automation of service.

The experience is “the result of a computer code that works in most cases, reminding people how their year was awesome,” said Eric Meyer. “But for those of us who have experienced the death of a loved one, or have spent time in the hospital, or were hit by a divorce or have lost their jobs (…), it could be that we did not want to come back on this past year, “he insists.



Facebook favors happiness

First of all, lies the issue of choice of photos, statuses that appear in the frieze. The content selected by “Year in Review” are those who have received the largest number of interactions – like, shares and / or comments, says the Washington Post Jonathan Gheller, manager of the application. The assumption underlying the computer code boils down to is a widely distributed content is a vivid memory and therefore happy. A blunder like Facebook that favor the happiness on its platform.

“The actions on Facebook tend to focus on positive social interactions,” had already pointed out in 2013 an engineer of the company. According to Facebook itself, users press the button “Like” 4.5 billion times a day. “Some have asked a button ‘I hate’ because they wanted to say ‘this is not good.’ This is not something we think beneficial for the world, “outbid the number one site in mid-December 2014.

Facebook not crazy negative thoughts as unprofitable. The social network assisted by two American researchers conducted a study on the contagion of emotions from 11 to 18 January 2012, a study revealed the end of June 2014. The secret data collection 700,000 users had also made much. Facebook had manipulated their news stream to observe the influence that the tone of the messages could have on their behavior. Conclusion: moods are indeed epidemic. “We were concerned that exposure to the negativity of some makes individuals not see Facebook,” explains Adam Kramer, who led the investigation for Facebook on the contagion of emotions. The platform therefore everything to make us benedict.



The algorithm that wants to understand the emotions

The second problem is that Facebook’s algorithms reduce the world to three expressions: joy, “neutral” and sadness. To assess the level of contagion of emotions, Facebook had to identify them. The scientists used the software Linguistic inquiry and word count (LIWC) – Linguistic inquiry and in words in English – again computer code meant to detect punctuations, lexicons and individuals smileys, these icons used to illustrate our feelings. But “understand emotion is much more complex than simple keyword search,” notes The New Yorker. And the Manichean dichotomy: happy / unhappy enough to describe.

It remains an algorithm achieves what it has been programmed. So Eric Meyer offers, the blunder of which he was the victim could have been avoided if there was a way to curb notifications “Year in Review”. This is the last bad thing is the lack of empathy computer scientists have not provided “worst case scenario”, says the writer and developer. “We can do better – I am very grateful that despite his trouble he has taken the time to write this blog post,” acknowledged the head of the application, Jonathan Gheller. Eric Meyer suggests to Facebook for next year to install an option to hide or deny the repeated incentives from Facebook. In case.

LikeTweet

Cyber-espionage: Almost nothing resists the NSA – 20minutes.fr

HIGH-TECH Few software resist oversight of the US intelligence agency, the NSA …

Activists d & # XE9; nounce the activity & # XE9; s NSA before the D & # XE9; Department of Justice & # xE0; Washington, January 17, 2014
Activists denounce the activities of the NSA before the Justice Department in Washington, January 17, 2014 – Nicholas Kamm AFP

20 Minutes with agency

    • Created
    • Updated
  • Keywords

The magazine Der Spiegel published, alongside the Chaos Communication Congress (annual conference on technical and policy issues related to computers and hacking), which just took place in Hamburg, new documents provided by Edward Snowden, dated 2012. Ceux- it details the efforts of the US Information Agency (NSA) to pierce the strongest protection on the Internet.

Decrypt algorithms and encryption techniques used on the Internet, the only way to resist surveillance government, that is the workhorse of the agency is working hard to counter these technologies. And what tools still resist him? That’s the question that tried to answer journalists who, thanks to the documents provided by the US whistleblower, published online their inventory before also present it to the Hamburg conference. The answer? “Almost nothing can resist the NSA”

Skype, SSP, VPN, HTTPS

First software as quoted by the German magazine failed. Skype, messaging Microsoft. The conversations through the program, which boasts an encryption that protects Listens “by malicious users,” are in fact available since February 2011. Spiegel even reveals a 2012 document which has the Skype data recovery procedure

Snipped from NSA document: Encryption Considered a & # Xab; & # Xbb threat;

Microsoft’s software is not the only one to fold against the attacks of the NSA. Several protocols used for encryption for virtual private networks (VPNs) were foiled by the agency for several years (NSA with a dedicated unit to interception and espionage connections protected by VPN). One of them, SSL is used daily by the general public (it allows the “secure” connections to certain Internet sites). In other words, HTTPS, which enables secure web connection, no longer seems to be a problem at the agency, which had set the goal in 2012 to intercept and decrypt HTTPS 10 million a day.

PGP or Truecrypt on the grill Tor

The good news? NSA, despite his constant progress, still considers the popularization of encryption tools is the main threat today on continuing operations. And the agency to break teeth on programs asking her “major” problems or “catastrophic”. PGP protocols, Truecrypt and Off The Record are probably indecipherable. Like other open source project, Tor. Successive encryption layers on which the Internet network relies prevent the NSA to intercept data passing through. “Right now,” says Der Spiegel.

LikeTweet

NSA: few tools still resist to the agency’s technical … – ZDNet France

interception capabilities now known as decryption and made available to the NSA are almost unlimited, remains to define which protocols and what technologies today still resist efforts by the US agency. The latest documents published by Spiegel help to know a little more about Fort Meade capabilities. Although they date from 2012, they are among the Recent provided by Edward Snowden and provide insight into what few tools still escape the clutches of the NSA.

 
 And they finally few: as noted in the Spiegel publishing documents originally submitted by Laura Poitras and Jacob Appelbaum at a conference at the Chaos Communication Congress, only a handful of tools can now be estimated to Protect from NSA. The Pretty Good Privacy algorithm developed by Phil Zimmermann in 1991 is thus part, if it is implemented correctly. Truecrypt, Tor, Tails and OTR protocol also pose problems for analysts to the US agency and documents published by the Spiegel report several failures of the NSA deal with these tools. The most problematic for the NSA still users who use more of these conjugated how tools.
 
 

For the rest, the NSA’s task is much easier. HTTPS for example, which enables secure web connection does not seem to pose a problem to the agency, which had set the goal in 2012 to intercept and decrypt HTTPS 10 million a day. Another technique controlled by the NSA spying VPN, widely used in enterprise technology to secure a connection to an external server. These solutions are usually based on IPSec or PPTP protocols pose quite a few problems with the NSA, which has a fully dedicated to the interception and espionage connections protected by VPN unit.
 

 Despite the progress of the NSA, the agency still considers that the popularization of encryption tools is the main threat today on continuing operations. The documents consulted by the Spiegel detail the efforts made by the NSA to weaken cryptographic standards now stretch out to secure exchanges on the Internet: the daily reports and the NSA agents are frequently asked to participate in the Internet Engineering conferences Task Force. Besides gathering information, NSA benefit from this access to influence decisions taken within the entity. Spiegel publishes an excerpt from the document recalling that these changes to the commercial encryption software and tools must remain secret.
 

LikeTweet

Paris: A homeless dies “obviously” because of the cold – 20minutes.fr

To be published, your rating:

– Must comply with legislation. In particular and without limitation are prohibited: incitement to racial hatred and discrimination, incitement to violence; defamation, libel, insult and slander; incitement to suicide, anorexia, incitement to commit acts contrary to law; text collages subjected to copyright or copyright; innuendo racist, homophobic, sexist and stigmatizing jokes

– In addition, your message must comply with the rules of propriety. be respectful of Internet as journalists 20Minutes, not being off- topic and not fall into vulgarity

-. On the other hand, advertising messages, posted in several copies, in capital letters, containing links to sites other than 20Minutes or too long will be deleted. Similarly, 20Minutes.fr meets its obligations to its readers, but does not allow proselytizing. Comments should not call the vote for a party, trade union or candidate whatsoever.

LikeTweet

Monday, December 29, 2014

The enormous progress of the NSA to defeat Internet Security – The World

Le Monde | • Updated | By

The surroundings of Hamburg's congress center in the north of Germany, where every year the Chaos Communication Congress, a gathering dedicated to the political implications of new technologies.

For several months and the beginning of the revelations of Edward Snowden, computer security experts and advocates online privacy no longer know where to turn.

revelation after revelation, documents exfiltrated by the US whistleblower about the NSA testify to the power of the intelligence agency and its ability to pierce the strongest protection on the Internet. The question came back on everyone’s lips was both simple and complex: what tool he still resists

“Read also: Case Snowden: How the NSA encryption thwarts Communications

At the Chaos Communication Congress in Hamburg, a festival of four dealing days include computer security, the two American journalists Laura Poitras Jacob Appelbaum and finally brought, Sunday, Dec. 28, answers to this question.

During a conference, the two journalists submitted new documents – also and simultaneously published in Der Spiegel – removed from the stock by Edward Snowden. These reveal that several tools, programs or computer languages ​​pose big problems at NSA when it comes to drilling to date. These documents date from 2012, but the German magazine explains that they are likely to be still valid today.



Tools resistant

The tools robustness resists NSA are few: GnuPG, which is used to protect emails, Tails, an “amnesiac” operating system, OTR, a computer protocol protecting the confidentiality of instant discussions, the applications developed by collective Whispersystems (as Signal), Truecrypt, an encryption system documents whose mysterious interruption has raised many questions and Tor, including a browser for anonymous browsing on the Internet.

The efforts of the NOS against Tor were already known. New documents published show that these efforts were, for the moment, and until 2012 at least, no effects

“Read. TOR, software protection key of privacy in the viewfinder the

NOS

“I wanted to make a positive conference” says Jacob Appelbaum, who applauded by 3,500 people crowded into the auditorium of Hamburg’s congress center developers some of these tools.

Many unreliable tools

He and Laura Poitras, however, could not avoid enumerating some of the tools protection of communications that have not withstood the NSA. This list demonstrates the scale of resources devoted by the NSA and some of its allies to undo some of the main means of protecting communications over the Internet.

Der Spiegel writing example the connections called “https”, where the “S” stands for “secure” have “greatest-thing really secure” . According to documents published by the German magazine, NSA plans to “break 10 million https connections by the end of 2012″ . This type of protection allows a user to be sure to connect to an authentic site (his bank for example), and prevents an intermediary to intercept the information it transmits. It is used daily by hundreds of millions of users around the world, sometimes without even noticing.

Other means of protection is affordable NSA as SSH, a technique to securely connect two computers together, widely used by computer scientists. More worryingly, the documents indicate that the NSA can successfully tackle the VPN (“VPN”). The technology behind his obscure name for the general public, is nevertheless central to the security of many companies, which use them for such access from outside their internal network. Twelve NSA agents have been charged to bypass the VPN used by the Greek government, says one of the documents.



A “war against Internet security”

To work around these robust protections, the NSA uses “all available means” writes Der Spiegel , supercomputers capable of billions of calculations per second to send undercover agents to try to influence the development of these means of protection. These resources deployed are not surprising: according to an NSA document reproduces by Der Spiegel encryption of communications (and therefore the confidentiality of an increasing share of trade on the Internet) is now “threat” for the agency.

These new documents illuminate a little more what the German magazine described as “a war against Internet security” . Security, he still remembers, which is far from being the preserve of terrorists or criminals, but protects hundreds of millions of users in their daily use of the Internet.

Hundreds of activists and militants who cheered standing for several minutes at the end of the presentation of these documents have therefore nothing to be migraine before the NSA’s capabilities. But also something to celebrate: “is not hopeless, resistance is possible” has launched Mr. Appelbaum. “Free software and a well-implemented cryptography work.

“Read the article in Der Spiegel in its entirety, in English

LikeTweet

Norman Atlantic: the evacuation of passengers over – Le Point

All passengers of the ferry, which fire off Albania has made at least five people were evacuated, said Monday the Italian Coast Guard. “All the evacuated passengers, nine crew members still aboard to inspect the ship,” said the Coast Guard on their Twitter account. Norman Atlantic was carrying 478 people, 56 crew members and 422 passengers. Italian, Greek and Albanian maritime authorities had launched a race against time to recover hundreds of people trapped Monday on the deck of the ferry, the Norman Atlantic , which was carrying 478 passengers and crew members, Greek majority. The fire broke out on Sunday ferry at dawn in the space reserved for vehicles, for a stormy winds and sea, as the boat en route from Patras, in south-western Greece, and Ancona in eastern Italy.

Burns

The Italian leader Matteo Renzi confirmed Monday midday stock of five deaths during a year-end press conference in Rome. He thanked the rescuers who averted a “massacre” at sea, and assured that relief operations would end in the coming hours. At about 12 pm local time on Monday, the Italian Navy stated that 379 people had been rescued by helicopters and ships sent there.

LOOK rescue the images published by the Italian Navy on TwitterItalianNavy:

Fifty of these survivors, exhausted and chilled to, arrived Monday morning in Bari (South-East), aboard the freighter Spirit of Piraeus , according to the Italian authorities. “The situation is good” to the survivors in Greek majority, said the prefect of Bari, Antonio Nunziante. One of them, however, had bandages on his hands, and a doctor confirmed that some suffered burns to the hands or feet, but still not serious. “They cried and hugged their rescuers,” said he told the assembled journalists when docked the container.



Crew Training Lack

One of the survivors, unidentified, has however been very bitter about the circumstances of the drama, which began early Sunday morning off the coast of Albania. Asked about the Italian chain SKYTG24 this survivor denounced the lack of obvious crew training and inability to put boats into the sea. “One could be launching” a-t- he said.

Fotis Tsantakidis, truck driver, told his side to the Greek newspaper Ethnos he woke up because of intense burning smell. “I ran out. I wanted a life jacket, but I did not find one,” said he said, adding he could board the Spirit of Piraeus despite the strong waves making it very dangerous maneuver. “An Italian fell to the water at that time, but fortunately was wearing a life jacket,” he recounted. A Greek passenger has not been so lucky. Fell off the ferry in unclear circumstances, he stayed more than four hours in the water alongside his wife, who described her ordeal to the Italian news agency Ansa.

“I saw kill my husband. I tried to save him, but I did not finish, “said she said from a hospital in Lecce (South of Italy) where it has been transported after been saved. “This ship should not have to leave with a time too bad,” she also deplored

hypothermia and respiratory problems

The first survivors arrived in the night from Sunday to Monday in Brindisi, in the south-east of Italy, about 40 miles (about 75 kilometers) from the estimated position of the ferry in the Adriatic. The Italian Navy, which coordinates relief, and the Greek maritime authorities assured rotations. Most survivors are free, but suffer from hypothermia and respiratory problems, according to rescuers interviewed by the Italian media. The Italian authorities had mobilized four tugs in order to stabilize initially Norman Atlantic , a ferry 186 meters long.

After the rescue of all the survivors ended Monday afternoon, he will then issue towed to the port of Brindisi, if weather conditions permit, but a tow to Albania more close, is considered if necessary.

The ferry, built in 2009, flying the Italian flag and chartered by the Greek company Anek, had recently been inspected. According to the Italian owner, a problem was detected on one of the fire doors, located on the bridge number 5, the exact spot where the fire would be triggered, said Visenti Group, quoted by ‘Italian news agency Ansa. Prosecutors in Bari opened a criminal investigation to try to clarify the circumstances of this tragedy and find those responsible.

LikeTweet

Gmail: Access to the Google mail is blocked in China – 20minutes.fr

To be published, your rating:

– Must comply with legislation. In particular and without limitation are prohibited: incitement to racial hatred and discrimination, incitement to violence; defamation, libel, insult and slander; incitement to suicide, anorexia, incitement to commit acts contrary to law; text collages subjected to copyright or copyright; innuendo racist, homophobic, sexist and stigmatizing jokes

– In addition, your message must comply with the rules of propriety. be respectful of Internet as journalists 20Minutes, not being off- topic and not fall into vulgarity

-. On the other hand, advertising messages, posted in several copies, in capital letters, containing links to sites other than 20Minutes or too long will be deleted. Similarly, 20Minutes.fr meets its obligations to its readers, but does not allow proselytizing. Comments should not call the vote for a party, trade union or candidate whatsoever.

LikeTweet

Post validates its drones by delivery tests – Clubic

La Poste Group announced that it conducted several tests to deliver packages through flying drones. The Company believes that its experiments are inconclusive but gives no date for the introduction of these devices.

After Amazon, Google, UPS and DHL, La Poste, in turn making conduct tests delivery of goods through drones. These flying devices with 6 rotors managed to carry packages weighing more than 2 kg over a distance of 1200 meters. An experiment was successfully conducted last September in the Var region.

The company has tested the simple process as the different phases of delivery drone ie takeoff, flight, of landing and back to the central database. It reached its fine but said that it is here and not experimentation of an imminent marketing of this type of service.

The aim now is to allow drones to deliver of the largest parcels. In this context, GeoPost, the group’s subsidiary Post states that commissioned the Atechsys company to develop new prototypes. These drones should be able to carry on a twenty kilometers of large parcels (40cm x 30cm x 20cm), up to 4 kg.

The Post and seeks to develop a service capable of deliver goods or services in emergency situations. The idea is to be present in less easily accessible areas such as mountains, islands or some rural areas.

Also read

LikeTweet

Sunday, December 28, 2014

VIDEO. NASA unveils new images of a solar flare – L’Express

You’ve never seen the sun so. A video released by NASA on YouTube Monday shows a solar flare “significant” filmed by one of its satellites, which occurred on 19 December.

Of the satellite picture Solar Dynamics Observatory, there is activity on the surface of the star and film material, which measure usually hundreds of thousands of kilometers.



Risks on Earth after the eruption

Although very beautiful, these eruptions are of particular danger eruption emits radiation (gamma rays, X, radio waves …) and a cloud of charged particles which provides one to three days to reach the Earth. And disrupt communications, the GPS signal, some electronic devices may cause magnetic or damage to the electricity distribution networks thunderstorms.

In space, the radiation levels that follows increases suddenly, which could make disused satellites or shuttles and even hurt the astronauts.

Finally, they are responsible for the northern lights visible in the sky at high latitudes, mainly near the Arctic and Antarctic. And indeed, a series was captured on December 22, less than three days after the eruption in question:

LikeTweet

PlayStation junkies issued by Sony after 3 days … – Le Figaro

The Japanese group said on Sunday it had repaired the online service for its PS4 console PlayStation Network and its network was attacked by hackers on Christmas Day.

It was probably the three longest days of Sony’s history and the most frightening for addicts to the PlayStation. And it is perhaps not finished yet, because the return is gradual. The Japanese group nevertheless said Sunday that he had finally repaired the online service for its PS4 console PlayStation Network and its network attacked by hackers on Christmas Day, just like Microsoft XBox. If Microsoft had arrived the next day to repair its online service, restoration took longer to Sony. The restarting has been gradual, starting with the PS3 and PS Vita.

The attacks were claimed by hackers “grouped” under the name of the team lizard “Lizard squad.” They succeeded in blocking servers with numerous requests. According to a Japanese analyst interviewed by Bloomberg, one question remains: “It is not clear if this is just a cut of the PlayStation network, or if the personal data of customers were also stolen.”

The attack took place on the same day the group had distributed the film The Interview not only online but also in independent cinemas. Large distribution networks had decided not to schedule this fiction evoking the assassination of North Korean leader Kim Jong-un. The case had also taken the turn of a state case, when US President Obama had accused the North Koreans who provided for their part do not know these pirates … The programming of film in 300 different cinemas has instead been a good deal: the only day of Christmas, this film grossed $ 1 million

.

LikeTweet

PlayStation Network still disturbed, Sony-progressive recovery – Challenges.fr

BOSTON / NEW YORK, Dec. 28 (Reuters) – problems connecting to the PlayStation Network Sony remained Sunday for the fourth consecutive day, but the service was During recovery, announced the Japanese multinational.

The users of the PlayStation Network and Xbox Live Microsoft server suffered Thursday, Christmas Day, delays and connection problems due to computer attack claimed by the “Lizard Squad” group. Xbox Live server was restored Friday.

“We are facing now a general disruption of the network on which we are working,” said Sony in a statement on the PlayStation website.

A few hours earlier, Catherine Jensen, assistant customer service manager at Sony Computer Entertainment America, announced that the network was “back.”

Some of the 56 million players using the PlayStation Network have written Sunday on Twitter have been able to access it, while others complained about the microblogging site will be able to connect. (Jim Finkle and Liana B. Baker; Agathe Machecourt for the French service)

LikeTweet

VIDEO. PlayStation and Xbox victims of global piracy – FranceTV info

The two big names of video consoles, PlayStation (Sony) and Xbox ( Microsoft) have been the target of a cyber attack. She touched millions of players worldwide
Some gamers, as high school student, wanted to take advantage of the Christmas holidays to indulge in their favorite pastime. PlayStation. But for four days, it is impossible to connect to play online. “There was an error message that tells me that I can not connect to the PlayStation Network, so I can not play online and the game I bought. It’s very frustrating for us, “ says high school student.

For Sony, the fate hounds. There is one month, the studios of the company have been victims of a cyber attack by North Korean hackers, according to the FBI. The film “The Interview,” a comedy about an assassination attempt of the North Korean leader, was involved.

This time, no link is established with North Korea, computer attack was claimed by a group of hackers called “Lizard Squad”. “They try to teach a lesson to Sony to show him that he needs to better protect its networks,” says Steven Laff, computer security expert.

On the same subject read on

LikeTweet

Saturday, December 27, 2014

Internet again very disturbed in North Korea – The World

Kim Jong-un during an inspection of a factory manufacturing touchscreen devices produced in North Korea.

The new Chinese journalists in North Korea had found that the internet was ” very unstable “ throughout the day. According to the American Society of Dyn Cybersecurity Research, North Korea suffers “interruption of internet across the country.”

North Korea had been completely disconnected from the global network for nine hours Monday, December 22, a few days after being accused by the FBI of being behind the hacking of great magnitude that hit Sony Pictures.

The United States had not commented on the disruption of the North Korean internet, the origin of which remains to be determined – for which Pyongyang held responsible Washington. China has denied any action to cut North Korean connections, while the four networks that feed the country, weakly connected, all pass through the Chinese giant Unicom communications.

Explanation: How does the Internet in North Korea

Read also: “The Interview”: 1 million dollars recipe from the first day of release

LikeTweet