The new EricMartindale.com is an experiment in data aggregation, and might have a few bugs. Feel free to explore, and then provide feedback directly to @martindale.

search results for security

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Why not?  Who is backing bitcoin... in reply to

Why not?  Who is backing bitcoin to insure it?  No one.  We've already seen multi-million dollar values of bitcoin embezzlement.   The claim it is secure is bs.  

If I have bitcoin store at any one of these sites and then all of a sudden they go belly up, what happens?  I lose everything.

A bank going belly up at least they have backing on it to secure the vast majority of the funds kept in it. 

Is other currency, or banking 100% secure?  No.  But it is a lot more than bitcoin.  

It it was supported and insured like other currencies, I'd say there isn't a reason.  But it isn't. 

And it is as much beholden to the market as any other currency out there also.   We've seen people price manipulating it just like other currency trading.

So no real insurance or security, and questionable "banks" for it.  No thanks.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Doesn't sound like a targeted attack... in reply to

Doesn't sound like a targeted attack but, just accidental luck to get into something thought to be secured.

Personally I think that in the IT industry there needs to be proactive training for all software developers because there is a serious deficit on security education and its very hard to keep up because of its ever changing nature. Better yet would be a strong investment in automated tools which could evaluate code for exploits. I'm sure some automated security checking exists out there but, I can tell you that if banks aren't using this sort of tool then I doubt many companies are.

Getting rid of Adobe reader and flash would also help greatly...

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

New Chapters

After a year and a half working with some of the smartest and most competent engineers I've ever met, it's time for me to part ways with BitPay. I've had the opportunity to be deeply involved in the design, implementation, and deployment of some incredible technologies, but we're turning a page in the story of Bitcoin's rise and it's time to start exploring the new chapter. BitPay continues to paint an incredibly compelling picture as to what the decentralized future looks like – we worked on some incredibly far-reaching and massively impactful ideas, including: - [ChainDB][chaindb], a distributed database backed exclusively by the Bitcoin blockchain. - [Copay][copay], a truly decentralized wallet & identity management platform. - [BitAuth][bitauth], a secure authentication mechanism for peers on the web, using the `k1` curve. - [Impulse][impulse], a method of securing zero-confirmation transactions. - [Foxtrot][foxtrot], a completely encrypted data transmission network. - [Bitcore][bitcore], a library of common software functionality to glue everything together. You might notice a few common themes. Let me point out the two most important. Firstly, that everything here is open source (with the notable exception of ChainDB). Open source, and more importantly [free software][free software], is a very big deal to me. Prior to joining BitPay, I was [open sourcing education][coursefork], [contributing to open source software](https://github.com/martindale), and [speaking on the importance of open source](https://www.youtube.com/watch?v=iuYLWdG-lP0). Some of the things I'm most proud of are the things _other_ people built with the things _we_ gave away – _that's_ the real power of open source. Secondly, that everything here is based on Bitcoin, not some alternative blockchain. BitPay was a firm believer in Bitcoin as the exclusive platform that would secure the post-fiat era, and that belief has held strongly with me before and after my departure. Until a more compelling alternative to Bitcoin emerges, One of the other exciting things to come out of BitPay was the emergence of [DECENTRALIZE][decentralize], which we formed last fall with a few of our fellow employees. DECENTRALIZE has become [an acclaimed content source][cointelegraph:decentralize] in the latest resurgence of decentralized thinking, and now it gets to be a much bigger priority for me. Before I joined BitPay, I'd put a lot of work into [Maki][maki], a framework for making full-stack application development significantly easier. Maki took a bit of a back-burner position while I was focusing on my work at BitPay, so I'll be redoubling my efforts to see that vision through. In fact, I think now's as good a time as any to share that vision. To that end, I'm starting a new project named Fabric. I'd like to entirely eliminate centralized servers on the Internet and catalyze the development of an entirely new class of economic actor. More details soon. As we embark on our next journey, let's always remember the carefully selected input used to create [the Genesis Block][genesis]: > The Times 03/Jan/2009 Chancellor on brink of second bailout for banks [chaindb]: https://bitpay.com/chaindb.pdf [copay]: https://copay.io/ [bitauth]: https://github.com/bitpay/bitauth [impulse]: https://impulse.is/ [foxtrot]: https://github.com/bitpay/foxtrot [bitcore]: https://bitcore.io [decentralize]: https://decentralize.fm [free software]: http://www.gnu.org/philosophy/free-sw.en.html [coursefork]: https://coursefork.org/ [maki]: https://maki.ericmartindale.com/ [cointelegraph:decentralize]: http://cointelegraph.com/news/114496/leaders-in-bitcoin-broadcasting-pandoras-box-is-open-and-theres-no-going-back [genesis]: https://en.bitcoin.it/wiki/Genesis_block

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/111716948575577959969" oid="111716948575577959969">Marko... in reply to

+Marko Shiva Pavlovic that's just plainly delusional. Don't be lazy. Do some research, THEN provide commentary if you must. http://arstechnica.com/security/2012/06/flame-crypto-breakthrough/

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research...

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research into how malicious crackers could deliver some potentially lethal payloads to certain insulin pumps. +Scott Hanselman wrote up an extraordinary rebuttal to the media's sensationalism on the topic; it's far more worth the read than the news floating around out there, as I'm sure my diabetic friend +Geoffrey Steinman can attest.

Attachments

Hackers can kill Diabetics with Insulin Pumps from a half mile away - Um, no. Facts vs. Journalistic Fear mongering - Scott Hanselman

Scott Hanselman on Programming, User Experience, The Zen of Computers and Life in General

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research...

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research into how malicious crackers could deliver some potentially lethal payloads to certain insulin pumps. +Scott Hanselman wrote up an extraordinary rebuttal to the media's sensationalism on the topic; it's far more worth the read than the news floating around out there, as I'm sure my diabetic friend +Geoffrey Steinman can attest.

Attachments

Hackers can kill Diabetics with Insulin Pumps from a half mile away - Um, no. Facts vs. Journalistic Fear mongering - Scott Hanselman

Scott Hanselman on Programming, User Experience, The Zen of Computers and Life in General

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research...

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research into how malicious crackers could deliver some potentially lethal payloads to certain insulin pumps. +Scott Hanselman wrote up an extraordinary rebuttal to the media's sensationalism on the topic; it's far more worth the read than the news floating around out there, as I'm sure my diabetic friend +Geoffrey Steinman can attest.

Attachments

Hackers can kill Diabetics with Insulin Pumps from a half mile away - Um, no. Facts vs. Journalistic Fear mongering - Scott Hanselman

Scott Hanselman on Programming, User Experience, The Zen of Computers and Life in General

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research...

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research into how malicious crackers could deliver some potentially lethal payloads to certain insulin pumps. +Scott Hanselman wrote up an extraordinary rebuttal to the media's sensationalism on the topic; it's far more worth the read than the news floating around out there, as I'm sure my diabetic friend +Geoffrey Steinman can attest.

Attachments

Hackers can kill Diabetics with Insulin Pumps from a half mile away - Um, no. Facts vs. Journalistic Fear mongering - Scott Hanselman

Scott Hanselman on Programming, User Experience, The Zen of Computers and Life in General

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

As a corporate business insider I... in reply to

As a corporate business insider I can offer a perspective from the "enemy's" den. Many people agree that this movement has gained momentum and has the potential to become as big or bigger than the Tea Party Movement. I grew up in the same generation as many of those protesting today and I understand the innuendo behind Anonymous, I understand point being made by the zombies, and I understand what general sense of anger is meant for. However, keep in mind that you are generally a younger generation trying to speak to an industry dominated mostly by an older generation of people. To these people this movement appears random, chaotic, and annoying simply because they don't even know what this movement's demands or goals are. Indeed for almost all of September I don't think Wall Street even understood exactly what they were protesting, and just recently have they gotten some kind of vague idea as to what these people want done. Most people relate these types of sit-in's to hippies from their generation and view them as more of an unorganized annoyance. To my friends who I work with in NYC, comments I hear from them are to this effect (I am summarizing several people's opinions as one): "It's just stupid, they block traffic and cause trouble nearby. We have to exit buildings from completely the opposite side now just to avoid them if we're wearing a suit regardless of our purpose. No one is there during the day but all of a sudden they pop up during rush hour. They wreck local businesses and drive customers away. The corporations they protest are unaffected but the small businesses nearby are the ones they are actually hurting. We don't even know what they want."

My bosses have gone to meetings with Bernanke and Geithner it is unclear still whether these protests will actually have any influence over policy. At an executive level they still appear confused as to how to handle situation, mostly because they do not understand it. But understand this, from their perspective they have changed the following: In terms of big banks, their balance sheets have been improved light years beyond where they were in 2008 with more liquidity and more capital on hand to prevent these types of shocks to the system. They have repaid any tax dollars received and are often significantly more efficient at implementing change than the government is in making up it's mind on what to do. The majority of issues occurs because of the indecisiveness in Washington. Think about these issues: 12 people are tasked with cutting $1.7 Trillion in the next 5 weeks -- The only way that is going to happen is if they cut large dollar programs. That means Healthcare, medicare, social security, and of course military but that is even less politically viable than the other three. There is also gridlock on what will happen with the tax system in the future. Those main issues where indecisiveness has been are also some of the largest possible expenses a corporation could have. How do plan for variable expenses that could go up or down by 50% in EITHER direction? Corporations have no idea how to plan for healthcare, medicare, or social security plans for their employees because there is no decisiveness on what will occur in the future. They do not want to hire people that they cannot afford to keep a year later because of law changes. So even if they have the money for it now (which they do), they are unable to hire because of the risk of causing liquidity issues later and the massive negative PR associated with hiring and then firing. These banks also receive criticism for not lending money out, but this is not their fault. They ARE lending money out, but there is no demand. It is not supply side issues, there is plenty of money out there to be had. You can get a loan today no problem, don't believe me? Go try it at any bank you want. There is just no one who wants to take a loan. So all that free capital that we spent 3 years trying to push into banks is now stuck there.

This issue is not business related anymore. It is purely political. My above statements are not to absolve corporations of responsibility in 2008, but they are more to explain the current situation here and now. Europe is a whole other book to write about another time.

In a world where politicians and talking heads can call the greatest capitalist of our time Warren Buffett a socialist, and get away with it as "news" is the real issue at hand.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Hurricane Sandy: Resources, Guides, and Information With #HurricaneSandy  already flooding streets ...

Hurricane Sandy: Resources, Guides, and Information

With #HurricaneSandy  already flooding streets [1] and causing damage [2] in #NYC  due to the effects of the combined hurricane, western stormfront, and full-moon tides [3], I wanted to take just a quick moment to collect some resources related to the storm.  I have quite a few friends directly in the path of the storm (ahem, +Sharon Strandskov!) and I want to urge everyone to stay safe. Make no illusion, this storm is serious business: take a look at the attached photo to see a comparison to Hurricane Irene.

As always, preparedness is key.  If you're in the path of the storm and haven't yet found your battery-powered radio, it's strongly recommend that you do so now while you have the light, as both your Internet and cell signals are likely to be interrupted.  If you haven't stocked up on water and [non-perishable] food, it's a bit late and you're going to have to hunker down and hope for the best.

Course of Action:
From the FEMA Guidelines [4]:
  1) Listen to the radio or TV for information. [ed.: or FEMA's Twitter [5]]
  2) Secure your home, close storm shutters, and secure outdoor objects or bring them indoors.
  3) Turn off utilities if instructed to do so. Otherwise, turn the refrigerator thermostat to its coldest setting and keep its doors closed.
  4) Turn off propane tanks.· Avoid using the phone, except for serious emergencies.
  5) Moor your boat if time permits.
  6) Ensure a supply of water for sanitary purposes such as cleaning and flushing toilets. Fill the bathtub and other large containers with water.

As an additional tip that I recently learned, you can fill plastic bags with water and put them in your freezer to prepare for extended power/water outages.  These will stay cool longer than bottled water in your refrigerator.

If you're in one of the evacuation areas and haven't yet followed the instructions or aren't able to do so, make sure to seek shelter and follow the appropriate guidelines. [4]

Resources:
Google Crisis Map: http://google.org/crisismap/2012-sandy -- this is awesome, and a great central resource keeping up to date.
NOAA Station 44065: http://www.ndbc.noaa.gov/station_page.php?station=44065 -- this is a buoy off the coast of New York tracking the wind speed and direction, if you want direct from-the-source reports.
GOES-14 Satellite Imagery: http://www.ssec.wisc.edu/data/1min/index.php -- Composite satellite imagery from the SSEC program at WISC, on a 1 minute loop.
Weather.gov: http://www.weather.gov/ -- useful for official advisories and up-to-date information, straight from the source.
Weather.com: http://www.weather.com/

Take a moment and look up your local news station's Facebook / Twitter and subscribe, optionally via SMS so that when the power goes out, you still have a method of receiving realtime updates (provided cell coverage doesn't go down / get inundated with emergency requests).

As a bonus, there's a pretty awesome #HTML5  canvas wind visualization demo that updates in realtime [6].  Some pretty slick techniques there, so view the source [Luke].

Feel free to add your own resources in the comments.  I'll edit the post to add the most helpful resources.

[1]: http://observer.com/2012/10/gowanus-canal-flooding/
[2]: http://www.usnews.com/news/us/articles/2012/10/29/crane-dangles-from-nyc-high-rise-clearing-streets
[3]: http://blogs.discovermagazine.com/badastronomy/2012/10/26/hurricane-sandy-looms-over-the-us/
[4]: http://m.fema.gov/hu_during.htm
[5]: https://twitter.com/fema
[6]: http://hint.fm/wind/

Attachments

9 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Hurricane Sandy: Resources, Guides, and Information With #HurricaneSandy  already flooding streets ...

Hurricane Sandy: Resources, Guides, and Information

With #HurricaneSandy  already flooding streets [1] and causing damage [2] in #NYC  due to the effects of the combined hurricane, western stormfront, and full-moon tides [3], I wanted to take just a quick moment to collect some resources related to the storm.  I have quite a few friends directly in the path of the storm (ahem, +Sharon Strandskov!) and I want to urge everyone to stay safe. Make no illusion, this storm is serious business: take a look at the attached photo to see a comparison to Hurricane Irene.

As always, preparedness is key.  If you're in the path of the storm and haven't yet found your battery-powered radio, it's strongly recommend that you do so now while you have the light, as both your Internet and cell signals are likely to be interrupted.  If you haven't stocked up on water and [non-perishable] food, it's a bit late and you're going to have to hunker down and hope for the best.

Course of Action:
From the FEMA Guidelines [4]:
  1) Listen to the radio or TV for information. [ed.: or FEMA's Twitter [5]]
  2) Secure your home, close storm shutters, and secure outdoor objects or bring them indoors.
  3) Turn off utilities if instructed to do so. Otherwise, turn the refrigerator thermostat to its coldest setting and keep its doors closed.
  4) Turn off propane tanks.· Avoid using the phone, except for serious emergencies.
  5) Moor your boat if time permits.
  6) Ensure a supply of water for sanitary purposes such as cleaning and flushing toilets. Fill the bathtub and other large containers with water.

As an additional tip that I recently learned, you can fill plastic bags with water and put them in your freezer to prepare for extended power/water outages.  These will stay cool longer than bottled water in your refrigerator.

If you're in one of the evacuation areas and haven't yet followed the instructions or aren't able to do so, make sure to seek shelter and follow the appropriate guidelines. [4]

Resources:
Google Crisis Map: http://google.org/crisismap/2012-sandy -- this is awesome, and a great central resource keeping up to date.
NOAA Station 44065: http://www.ndbc.noaa.gov/station_page.php?station=44065 -- this is a buoy off the coast of New York tracking the wind speed and direction, if you want direct from-the-source reports.
GOES-14 Satellite Imagery: http://www.ssec.wisc.edu/data/1min/index.php -- Composite satellite imagery from the SSEC program at WISC, on a 1 minute loop.
Weather.gov: http://www.weather.gov/ -- useful for official advisories and up-to-date information, straight from the source.
Weather.com: http://www.weather.com/

Take a moment and look up your local news station's Facebook / Twitter and subscribe, optionally via SMS so that when the power goes out, you still have a method of receiving realtime updates (provided cell coverage doesn't go down / get inundated with emergency requests).

As a bonus, there's a pretty awesome #HTML5  canvas wind visualization demo that updates in realtime [6].  Some pretty slick techniques there, so view the source [Luke].

Feel free to add your own resources in the comments.  I'll edit the post to add the most helpful resources.

[1]: http://observer.com/2012/10/gowanus-canal-flooding/
[2]: http://www.usnews.com/news/us/articles/2012/10/29/crane-dangles-from-nyc-high-rise-clearing-streets
[3]: http://blogs.discovermagazine.com/badastronomy/2012/10/26/hurricane-sandy-looms-over-the-us/
[4]: http://m.fema.gov/hu_during.htm
[5]: https://twitter.com/fema
[6]: http://hint.fm/wind/

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Hurricane Sandy: Resources, Guides, and Information With #HurricaneSandy  already flooding streets ...

Hurricane Sandy: Resources, Guides, and Information

With #HurricaneSandy  already flooding streets [1] and causing damage [2] in #NYC  due to the effects of the combined hurricane, western stormfront, and full-moon tides [3], I wanted to take just a quick moment to collect some resources related to the storm.  I have quite a few friends directly in the path of the storm (ahem, +Sharon Strandskov!) and I want to urge everyone to stay safe. Make no illusion, this storm is serious business: take a look at the attached photo to see a comparison to Hurricane Irene.

As always, preparedness is key.  If you're in the path of the storm and haven't yet found your battery-powered radio, it's strongly recommend that you do so now while you have the light, as both your Internet and cell signals are likely to be interrupted.  If you haven't stocked up on water and [non-perishable] food, it's a bit late and you're going to have to hunker down and hope for the best.

Course of Action:
From the FEMA Guidelines [4]:
  1) Listen to the radio or TV for information. [ed.: or FEMA's Twitter [5]]
  2) Secure your home, close storm shutters, and secure outdoor objects or bring them indoors.
  3) Turn off utilities if instructed to do so. Otherwise, turn the refrigerator thermostat to its coldest setting and keep its doors closed.
  4) Turn off propane tanks.· Avoid using the phone, except for serious emergencies.
  5) Moor your boat if time permits.
  6) Ensure a supply of water for sanitary purposes such as cleaning and flushing toilets. Fill the bathtub and other large containers with water.

As an additional tip that I recently learned, you can fill plastic bags with water and put them in your freezer to prepare for extended power/water outages.  These will stay cool longer than bottled water in your refrigerator.

If you're in one of the evacuation areas and haven't yet followed the instructions or aren't able to do so, make sure to seek shelter and follow the appropriate guidelines. [4]

Resources:
Google Crisis Map: http://google.org/crisismap/2012-sandy -- this is awesome, and a great central resource keeping up to date.
NOAA Station 44065: http://www.ndbc.noaa.gov/station_page.php?station=44065 -- this is a buoy off the coast of New York tracking the wind speed and direction, if you want direct from-the-source reports.
GOES-14 Satellite Imagery: http://www.ssec.wisc.edu/data/1min/index.php -- Composite satellite imagery from the SSEC program at WISC, on a 1 minute loop.
Weather.gov: http://www.weather.gov/ -- useful for official advisories and up-to-date information, straight from the source.
Weather.com: http://www.weather.com/

Take a moment and look up your local news station's Facebook / Twitter and subscribe, optionally via SMS so that when the power goes out, you still have a method of receiving realtime updates (provided cell coverage doesn't go down / get inundated with emergency requests).

As a bonus, there's a pretty awesome #HTML5  canvas wind visualization demo that updates in realtime [6].  Some pretty slick techniques there, so view the source [Luke].

Feel free to add your own resources in the comments.  I'll edit the post to add the most helpful resources.

[1]: http://observer.com/2012/10/gowanus-canal-flooding/
[2]: http://www.usnews.com/news/us/articles/2012/10/29/crane-dangles-from-nyc-high-rise-clearing-streets
[3]: http://blogs.discovermagazine.com/badastronomy/2012/10/26/hurricane-sandy-looms-over-the-us/
[4]: http://m.fema.gov/hu_during.htm
[5]: https://twitter.com/fema
[6]: http://hint.fm/wind/

Attachments

9 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Hurricane Sandy: Resources, Guides, and Information With #HurricaneSandy  already flooding streets ...

Hurricane Sandy: Resources, Guides, and Information

With #HurricaneSandy  already flooding streets [1] and causing damage [2] in #NYC  due to the effects of the combined hurricane, western stormfront, and full-moon tides [3], I wanted to take just a quick moment to collect some resources related to the storm.  I have quite a few friends directly in the path of the storm (ahem, +Sharon Strandskov!) and I want to urge everyone to stay safe. Make no illusion, this storm is serious business: take a look at the attached photo to see a comparison to Hurricane Irene.

As always, preparedness is key.  If you're in the path of the storm and haven't yet found your battery-powered radio, it's strongly recommend that you do so now while you have the light, as both your Internet and cell signals are likely to be interrupted.  If you haven't stocked up on water and [non-perishable] food, it's a bit late and you're going to have to hunker down and hope for the best.

Course of Action:
From the FEMA Guidelines [4]:
  1) Listen to the radio or TV for information. [ed.: or FEMA's Twitter [5]]
  2) Secure your home, close storm shutters, and secure outdoor objects or bring them indoors.
  3) Turn off utilities if instructed to do so. Otherwise, turn the refrigerator thermostat to its coldest setting and keep its doors closed.
  4) Turn off propane tanks.· Avoid using the phone, except for serious emergencies.
  5) Moor your boat if time permits.
  6) Ensure a supply of water for sanitary purposes such as cleaning and flushing toilets. Fill the bathtub and other large containers with water.

As an additional tip that I recently learned, you can fill plastic bags with water and put them in your freezer to prepare for extended power/water outages.  These will stay cool longer than bottled water in your refrigerator.

If you're in one of the evacuation areas and haven't yet followed the instructions or aren't able to do so, make sure to seek shelter and follow the appropriate guidelines. [4]

Resources:
Google Crisis Map: http://google.org/crisismap/2012-sandy -- this is awesome, and a great central resource keeping up to date.
NOAA Station 44065: http://www.ndbc.noaa.gov/station_page.php?station=44065 -- this is a buoy off the coast of New York tracking the wind speed and direction, if you want direct from-the-source reports.
GOES-14 Satellite Imagery: http://www.ssec.wisc.edu/data/1min/index.php -- Composite satellite imagery from the SSEC program at WISC, on a 1 minute loop.
Weather.gov: http://www.weather.gov/ -- useful for official advisories and up-to-date information, straight from the source.
Weather.com: http://www.weather.com/

Take a moment and look up your local news station's Facebook / Twitter and subscribe, optionally via SMS so that when the power goes out, you still have a method of receiving realtime updates (provided cell coverage doesn't go down / get inundated with emergency requests).

As a bonus, there's a pretty awesome #HTML5  canvas wind visualization demo that updates in realtime [6].  Some pretty slick techniques there, so view the source [Luke].

Feel free to add your own resources in the comments.  I'll edit the post to add the most helpful resources.

[1]: http://observer.com/2012/10/gowanus-canal-flooding/
[2]: http://www.usnews.com/news/us/articles/2012/10/29/crane-dangles-from-nyc-high-rise-clearing-streets
[3]: http://blogs.discovermagazine.com/badastronomy/2012/10/26/hurricane-sandy-looms-over-the-us/
[4]: http://m.fema.gov/hu_during.htm
[5]: https://twitter.com/fema
[6]: http://hint.fm/wind/

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Reminder to the general public: please...

Reminder to the general public: please observe the grave inefficiencies of backscatter scanners in airport security:

Attachments

radsec.org/gallery.html

radsec.org/gallery.html

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

To be clear, a blockchain is...

To be clear, a blockchain is a data structure above and beyond transactions. If you only need a secure log, a merkle tree may be sufficient.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Airport security? What a joke....

Airport security? What a joke. It's actually safer to get manually checked! Those multi-million dollar machines are cost-saving measures.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: To be clear, a...

RT @martindale: To be clear, a blockchain is a data structure above and beyond transactions. If you only need a secure log, a merkle tree m…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: Reminder to the general...

RT @martindale: Reminder to the general public: please observe the grave inefficiencies of backscatter scanners in airport security: https:

Attachments

radsec.org/gallery.html

radsec.org/gallery.html

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: Reminder to the general...

RT @martindale: Reminder to the general public: please observe the grave inefficiencies of backscatter scanners in airport security: https:

Attachments

radsec.org/gallery.html

radsec.org/gallery.html

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

We, the ██████ of the ███████... in reply to

We, the ██████ of the ███████ █████, in order to ████ a more ███████ ██████, █████████ ███████ ██████ domestic ███████████, ███████ for the ██████ ███████, promote the ███████ ███████, and secure the █████████ of [redacted] to █████████ and our █████████ do ordain and establish this ████████████ for the ███████ ██████ of ███████.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

It's official, @bitpay is launching copay,...

It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig):

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Might want to check this too.... in reply to

Might want to check this too. Security generally is under serviced, bad guys are too often ignored in the design process.

http://www.csmonitor.com/USA/2011/0922/From-the-man-who-discovered-Stuxnet-dire-warnings-one-year-later

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I bet blackhats in Russia and... in reply to

I bet blackhats in Russia and China are pissed off that someone else revealed a useful exploit and security is about to be tightened.

More details would be nice. Like what OS are we talking about and why are they "wiping it off the system" and it keeps coming back? Are they not fixing the code that allows it in in the first place? Are they using some OS where one has to be careful what one clicks on lest one get infected with something? If so, how is something that insecure used in the war-fighting infrastructure? Did the NSA get overruled by some powerful senator that needed to repay a campaign favor?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Building Blockchain-secured Applications Is Easy with Bitcore We've spent a lot of time figuring out...

Building Blockchain-secured Applications Is Easy with Bitcore
We've spent a lot of time figuring out how to make #blockchain  technology much more accessible to developers.  There's a lot of things you can do with #bitcoin  that you might not realize – and they're all right at your fingertips with Bitcore.

Come join our lead developer +Manuel Araoz as he gives an introduction to Bitcore, our Javascript library for doing all things related to bitcoin and the blockchain.  The webinar is tomorrow, at 7PM EDT.  Don't miss it.

Attachments

Webinar Registration: Intro to Bitcore

Live: Tuesday, 21 April 2015 at 07:00 PM EDT

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/113227819899320297020" oid="113227819899320297020">Joseph... in reply to

+Joseph Coco I don't think you are being honest with the reality of what a business would have to have set up to take bitcoin. 

It is naive to think they can just manage it themselves, especially with the ever changing value, and varying international values,  just like regular credit payment services have to deal with. 

I think pro-bitcoin bias is coloring your responses.   My research on it as someone who considered using them, paints a lot different picture than you are presenting.

I'm no anti-bitcoin.  I'm all for all sorts of varieties of currency and transactions.   But I want the truth and facts to be said about them.

I also notice everyone is ducking the security and backing issue. 

Banks are accredited and insured to protect their customers.   There isn't any bitcoin handler that has that.  Not even Square Marketplace. 

If you want people to use them, great.  If you want to use them yourself, great.  But don't blow smoke up peoples....   trying to cover real negatives about them. 

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Problem Solving Challenge: Move 211 Tons of Gold

A recent post from renowned security analyst Bruce Schneier highlighted an interesting problem to me.

It was announced last week that Hugo Chávez of Venezuela intends to repatriate 211 tons of gold (worth some $12.1 billion dollars by calculations based on current prices) from Europe back to Venezuela.

Venezuela would need to transport the gold in several trips, traders said, since the high value of gold means it would be impossible to insure a single aircraft carrying 211 tonnes. It could take about 40 shipments to move the gold back to Caracas, traders estimated. “It’s going to be quite a task. Logistically, I’m not sure if the central bank realises the magnitude of the task ahead of them,” said one senior gold banker.

So the challenge is this: how can Venezuela safely retrieve 211 tons of gold from its European stores? What solutions can you come up with using lateral analysis?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

What I Do In My Spare Time...

Between work, my social life, and training, I play a game called EVE Online. It's the first game I've ever shelled out a monthly fee for, and it's well worth it. I came across this fan-made video for one of the in-game factions on CrazyKinux's blog.

Full screen this and play it in HD, while keeping in mind that this is made entirely of recorded gameplay video.

I'm the director of a group of players (called a "Corporation" as opposed to "Guild" in other MMORPGs), and if you're interested in playing with me, shoot me a line or message me in game as "Baeryn". You'll never find a game so perfect.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Mitigating the BEAST TLS attack in node.js

I've been relying heavily on node.js this past year to provide a robust set of tools to solve the problems I encounter on a daily basis. I was pleased to see honorCipherOrder was added to node's TLS library in node.js v0.7.6, and released with node.js v0.8.0.

Late last year, security researcher Juliano Rizzo announced a new attack against the AES encryption used in the SSL/TLS transaction he dubbed BEAST. The details are interesting to those who care, but it turns out that we can mitigate this attack in node.js by enforcing honorCipherOrder on the server. Let's take a look.

If you have an HTTPS server that looks like this:


var https = require('https');
var fs = require('fs');

var options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem')
};

https.createServer(options, function (req, res) {
  res.writeHead(200);
  res.end("hello world\n");
}).listen(443);

...you can now manage the cipher order by using the ciphers option. In the following code snippet we're going set the options for the above server to use Steve Caligo's cipher order, which prefers TLS 1.2 ciphers (which are not vulnerable to the BEAST attack) for clients that support TLS 1.2 but falls back to the RC4 ciphers on TLS 1.0 clients.[...]


var options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem'),
  ciphers: 'ECDHE-RSA-AES256-SHA:AES256-SHA:RC4-SHA:RC4:HIGH:!MD5:!aNULL:!EDH:!AESGCM'
};


Finally, we will enforce the cipher order on the server's side of the negotiation:

var options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem'),
  ciphers: 'ECDHE-RSA-AES256-SHA:AES256-SHA:RC4-SHA:RC4:HIGH:!MD5:!aNULL:!EDH:!AESGCM',
  honorCipherOrder: true
};

...which leaves us with the following code for a working server that is not vulnerable to the BEAST attack (in node v0.8.0+!):


var https = require('https');
var fs = require('fs');

var options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem'),
  ciphers: 'ECDHE-RSA-AES256-SHA:AES256-SHA:RC4-SHA:RC4:HIGH:!MD5:!aNULL:!EDH:!AESGCM',
  honorCipherOrder: true
};

https.createServer(options, function (req, res) {
  res.writeHead(200);
  res.end("hello world\n");
}).listen(443);

Edit, 6/13/2013: Lloyd Watkin has done some research on his own and decided to use a different cipher chain:

ECDHE-RSA-AES128-SHA256:AES128-GCM-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH

You should read into why he chose it and make an educated decision. </edit>

Until node.js implements this as the defaults (they should), this is something you should implement where using HTTPS with node!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.