Archive for technology
And here some lost links to some ideas above:
- OpenStreetMap project of Hanover, Germany (picture with overview / interactive website)
- Placing “bombs” and wait for police (picture / video)
- Having fun with Human CCTV (picture / picture / video)
- What some other people think of what to do (video)
- Alan Parsons Project: Eye in the sky (audio-video)
- Having fun with paper baskets (picture / picture / picture by german initiative “Leipziger Kamera”)
- Hacking cameras
- Question what they see
- About the performance “God’s eyes here on earth”
- Surveillance Camera Players (video / video)
You like to get engaged?
Some proposals for what to do …
This campaign ist about to organize an international actionday around the 8th of June, the day that George Orwell’s 1984 has been published for the very first time.
It is our goal to raise attention on how far Mr. Orwells visions already has become true, having a special focus on how scarily far CCTV technology has been grown to and how our societies are being driven by this development.
We are nothing more or less than an open group, a collection of human beings and non-governmental organisations raising big concerns about newest developments of tracking, tracing, face recognition and data investigations.We are independent and above party lines.Everybody is welcome to join.
Yes! Its true, Anonymous Hackers released their own Operating System with name “Anonymous-OS”, is Live is an ubuntu-based distribution and created under Ubuntu 11.10 and uses Mate desktop. You can create the LiveUSB with Unetbootin.
Pre-installed apps on Anonymous-OS:
- ParolaPass Password Generator
- Find Host IP
- Anonymous HOIC
- Sql Poison
- Admin Finder
- John the Ripper
- Hash Identifier
- XChat IRC
Warning : It is not developed by any Genuine Source, can be backdoored OS by any Law enforcement Company or Hacker. Use at your own Risk.
12 marzo 2012
E stavolta mette on line una parte del database
Www.vatican.va è di nuovo irraggiungibile, ed è stato Anonymous a concedere il bis. Ma con una varietà: stavolta i mediattivisti digitali mettono anche on line una parte del database del sito, con nomi di autori e (presunte) password. Una curiosità: la pagina facebook del movimento ha annunciato il tango down di http://www.vatican.va, mentre la rivendicazione è indirizzata a radiovaticana.org (che risulta attualmente on line). Il testo della rivendicazione (che potete leggere qui):
Ci duole dovervi annunciare che i vostri sistemi sono meno sicuri di ciò che vi piacerebbe credere, poichè, mentre il clamore mediatico era rivolto verso l’oscuramento di vatican.va, ci siamo presi la libertà di attuare una piccola incursione nei vostri sistemi.
Purtroppo l’esito è pervoi assai nefasto, dato che i vostri Sysadmin (a cui tanto piace stuzzicare l’alveare che è Anonymous) non hanno fatto un buon lavoro.
Quando le api vengono molestate si arrabbiano e inseguono il disturbatore con una tenacia impressionante, pungendolo. Oggi siete stati punti.
“To our hacker allies, our fellow occupiers, our militant comrades all over the world, the time for talk is over: it’s time to hack and smash, beat and shag.”
The call to arms issued last week by the international hacker group Anonymous was accompanied by a frenzy of online hacking. Attackers took down the websites of a tear-gas manufacturer in Pennsylvania, the Nasdaq and BATS stock exchanges and the Chicago Board Options Exchange. A few days later they hacked into websites owned by the Federal Trade Commission and the Bureau of Consumer Protection.
The messages they left behind—about their opposition to everything from the Anti-Counterfeiting Trade Agreement, a controversial new treaty for enforcing intellectual property rights, to violent suppression of democracy protestors in the Middle East—had the air of giddy jubilation.
“Guess what? We’re back for round two,” the hackers wrote in reference to their attack on the FTC websites, their second such raid on the agency in less than a month. “With the doomsday clock ticking down on Internet freedom, Antisec has leapt into action. Again. Holy deja vu hack Batman! Expect us yet?”
Comic posturing aside, the hackers seemed amazed by their success: A barely organized ragtag “team of mayhem,” as one Anonymous offshoot dubbed itself, was knocking down the Web infrastructure built by major corporations and large government agencies as if it were nothing but paper backdrops in a school play.
The hackers hadn’t discovered some secret digital weapon. They weren’t exploiting some zero-day vulnerability in a core application. They weren’t backed by a powerful government agency. They didn’t even have the advantage of surprise—the group has been around in one form or another for almost a decade.
Yet they were winning—easily—against targets as noteworthy as the U.S. Department of Justice, the Federal Bureau of Investigation, the Central Intelligence Agency, the White House and Citigroup.
The victories underscore what is perhaps both the main point of the global Anonymous movement and the secret of its success—that the people in charge, whether they be in Alexandria, Egypt or Alexandria, Virginia—are too corrupt, too complacent and too careless too be trusted. Almost nothing makes that point as effectively as Internet security: Officials have known that the networks were vulnerable for well over a decade and have chosen to do little about it.
Anonymous lays siege to websites using a method called “distributed denial of service” or DDoS. There is nothing new about a DDoS attack, which basically floods a computer that is connected to the Internet with messages, such as connection requests, until it crashes.
The threat of DDoS was raised as far back as February 2000, when successful attacks on Amazon, eBay, CNN, Buy.com and Yahoo made headlines around the world.
Since then the size and frequency of DDoS attacks has continued to increase. Akamai, whose content delivery network spans 80,000 servers in 70 countries, recently reported that DDoS attack incidents had soared 2,000 percent in the past three years. Experts describe DDoS attacks of 10 Gigabits per second and larger as “the new normal.” IT analyst groups like Forrester and Gartner regularly advise their clients to invest in DDoS protection.
But the ongoing rout of large government and corporate sites by Anonymous indicates few are listening.
“Internet security is like life insurance,” said Carlos Morales, vice president of sales engineering for Arbor Networks, which sells DDoS protection to network operators and Internet service providers around the world. “A lot of people don’t think they need life insurance until they have a major event like a heart attack.”
Robert Ayoub, an analyst with Frost and Sullivan describes a pass-the-buck mentality. “Traditionally, companies have seen DDoS as an issue for service providers or the government,” he said, noting that differentiating between a legitimate spike in traffic from an attack isn’t easy.
Part of the reluctance of major corporations and government agencies to address DDoS may be that effective protection isn’t cheap. It requires investing in bandwidth, hardware and expertise. Traffic has to be filtered in the cloud and on-premises using a variety of techniques and equipment, which has to be licensed and maintained. Ideally, the two systems are coordinated, so that when an attack is discovered on-premises, a company can request help from its Internet service provider.
Basic cloud protection alone starts at about $5,000 a month. But that cost can increase exponentially depending on the volume of traffic and the size of the site that’s under attack.
Experts will tell you that scrimping isn’t really an option. In addition to attacks by Anonymous, companies, and financial institutions in particular, are coping with DDoS attacks by criminal gangs who use ever more sophisticated tools.
According to the World Infrastructure Security Report, which was published by Arbor Networks earlier this month, attackers are upping the ante by using DDoS to take out critical applications like HTTP, DNS. SMTP and also launching multi-vector attacks—making protection more costly.
The survey’s respondents, which included 114 self-classified Tier 1, Tier 2 and other IP networks operators, said the cost of single DDoS attack could range from $8,000 to $1.5 million dollars. More than 44 percent of respondents experienced between 10 and 500 DDoS attacks per month.
Despite the large numbers of successful attacks, security personnel who responded to the survey—more than 70 percent were engineers and/or managers—had difficulty getting the ear of higher ups. The majority of respondents said their companies had ten or fewer employees working in security and a whopping 58 percent had never rehearsed their security plans.
Efforts to defend networks so far have been so ineffectual that Anonymous recently posted its plans, Joker style, to take the Internet down on March 31. The hackers provided a blueprint for “Operation Global Blackout,” daring network operators to make the changes need to prevent the attack.
“We know you won’t listen,” Anonymous wrote. “We know you won’t change. We know it’s because you don’t want to. We know it’s because you like it how it is.”
Photo of Anonymous courtesy of liryon
Photo of Internet data center courtesy of The Planet
Published: 15 February, 2012, 21:03
Millions of computer users across the world could be blocked off from the Internet as early as March 8 if the FBI follows through with plans to yank a series of servers originally installed to combat corruption.
Last year, authorities in Estonia apprehended six men believed responsible for creating a malicious computer script called the DNSChanger Trojan. Once set loose on the Web, the worm corrupted computers in upwards of 100 countries, including an estimated 500,000 in America alone. The US Federal Bureau of Investigation later stepped up by replacing the rogue Trojan with servers of their own in an attempt to remediate the damage, but the fix was only temporary. Now the FBI is expected to end use of those replacement servers as early as next month and, at that point, the Internet for millions could essentially be over.
When functioning as its creators intended, the DNSChanger Trojan infected computers and redirected users hoping to surf to certain websites to malicious ones. Traditionally, DNS, or Domain Name System, servers translate alphabetical, traditional website URLs to their actual, numeric counterpart in order to guide users across the World Wide Web. Once infected by the DNSChanger Trojan, however, websites entered into Internet browsers were hijacked to malicious servers and, in turn, directed the user to an unintended, fraudulent site.
In coordination with the arrests in Estonia, the FBI shut down the malicious DNSChanger botnet network, and, additionally, replaced them with surrogate servers to correct the problem. Those servers, however, were installed “just long enough for companies and home users to remove DNSChanger malware from their machines,” according to the court order that established them. That deadline is March 8, and those surrogate servers are expected to be retired then. At that point, computers still infected with the Trojan will be essentially unable to navigate the Internet.
Who, exactly, will be affected? Security company IID (Internet Identity) believes that half of all Fortune 500 companies and more than two dozen major government entities in the US are still currently infected with the worm as of early 2012. Unless they take the proper steps to eradicate the Trojan from their systems, millions of users worldwide will be left hog-tied, helplessly attempting to navigate to nonexistent servers and, in effect, without the Web.
“At this rate, a lot of users are going to see their Internet break on March 8,” Rod Rasmussen, president and chief technology officer at Internet Identity, cautions Krebs On Security.
Currently, both the computer industry and law enforcement are working together through a coalition they’ve established called the DNSChanger Working Group. That group has been tasked with examining the options in phasing out the surrogate servers set up by the feds, but unless an alternative plan is agreed on, a great port of the Web will go dark next month.
“I’m guessing a lot more people would care at that point,” Rasmussen adds. While infected users are cautioned to correct the problem now, millions internationally are still believed to be infected. “It certainly would be an interesting social experiment if these systems just got cut off,” he adds.
Apple struck a blow against video game clones today by removing several offending apps from one rather prolific independent developer.
Among the removed games are apps such as Plant vs. Zombie, Angry Ninja Birds, and Temple Jump, each of which (as you might guess from their titles) had more than a little in common with with major titles such as Plants vs. Zombies, Angry Birds, and Temple Run, respectively.
The recently-removed Temple Jump in particular saw some notable success on the iTunes App Store, reaching the very top of the paid app chart, according to a report by technology blog TechCrunch.
All of the alleged app “clones” mentioned above come from independent developer Anton Sinelnikov. According to a Twitter post from iOS developer David Smith, Sinelnikov had 68 iOS apps available this morning — as of this writing, only nine remain.
This controversy is just the latest in a string of alleged copycat scenarios in the mobile space. Over the past few days, social gaming giant Zynga has been accused of copying not one, but two existing iOS apps, and Spry Fox has sued publisher 6waves Lolapps for supposedly lifting ideas from the match-three puzzle game Triple Town.
Despite these numerous incidents, this is one of the rare occasions where a platform holder has stepped in to police the situation itself.
“We’re really happy with how quickly Apple responded to the situation and removed [Temple Jump],” Imangi co-founder Natalia Luckyanova told Gamasutra. “The app was clearly a scam that traded entirely on the popularity of Temple Run and was packaged to confuse users.”
Luckyanova added that the Temple Jump app succeeded in confusing its audience, as a number of consumers accidentally purchased the app, thinking it was a tie in to Imangi’s popular title.
“This was really upsetting to us and damaging to our brand, because we work really hard to put out very high quality polished games and win the love of our fans, and we don’t want them to think that we would put out crap to steal a dollar from them,” she said.
As noted by TechCrunch, Apple’s iTunes App Store has a few systems in place to police the numerous available apps, but beyond submitting reviews and reporting bugs or offensive content, iOS users have no direct way to flag titles that mimic existing apps.
Luckyanova, however, says platform holders can’t be held responsible for stopping app scams, as such an undertaking would make the app review process far too complex.
“I don’t think there’s a perfect solution, because you need human judgement involved in the system. The platform holder can’t realistically police copyright violations, or just misleading apps. As developers, we sign an agreement saying that we have obtained all the IP permissions necessary for our work, so that responsibility is on the developer,” she said.
“I guess I don’t have a solution, because I wouldn’t want reviews to be even more strictly policed. The good thing is that most stores have a way to appeal the process if something does slip through the cracks.”
Last week, Apple revealed that third-party app developers — copycats and otherwise — have earned a total of $4 billion dollars through the Mac and iOS app stores so far.
The World Government Data Store and its associated API is easy to use and contains well over 2,000 datasets indexed from government data stores and it is growing all the time. Here we show you how to use the API and embed results simply into your site or mashup.
Governments around the globe are opening up their data vaults – allowing you to check out, visualise and analyse the numbers for yourself. Just over a week ago the UK Government opened its data store to the public, an action The Guardian’s Free Our Data campaign has long campaigned for. We felt there was a fascinating opportunity for us to build a missing link, which is a World Government Data Store where you can find statistics on a particular theme from data stores in any country that has opened up. By having datasets from all over the world in one centralised place, it is much easier for you to compare and contrast data.
As we wanted this resource to be widely used by developers we created a simple API onto the data store. The API allows you to search government data from the UK, USA, Australia and New Zealand from our index. We’ll keep adding new data sets and new countries as they open up and we index them.
Ein Beitrag zum Europäischen Datenschutztag: INDECT – »Wer die Freiheit aufgibt um Sicherheit zu… «Piratenpartei Brandenburg
… erlebt solch’ beängstigende Situationen, wie sie beispielsweise in China schon lange Realität sind. An fast jeder Straßenecke hängen Kameras; jede Bürgerin und jeder Bürger ist bekannt und kann jederzeit durch eine falsche Bewegung oder eine “verdächtige” Handlung zum “Verbrecher” werden. Was in anderen Ländern schon trauriger Alltag ist, könnte auch bald den europäischen Raum betreffen.
Die Rede ist von INDECT (Akronym für Englisch: Intelligent information system supporting observation, searching and detection for security of citizens in urban environment; Deutsch: Intelligentes Informationssystem zur Unterstützung von Überwachung, Suche und Erfassung für die Sicherheit von Bürgern in städtischer Umgebung) – einem von der Europäischen Union finanzierten Forschungsprojekt im Bereich der intelligenten Sicherheitssysteme, in das bereits rund 15 Millionen Euro aus Steuermitteln investiert wurden und das im Jahr 2013 abgeschlossen sein soll. Die PIRATEN Brandenburg weisen aus Anlass des heutigen Europäischen Datenschutztages auf die zahlreichen Gefahren des INDECT-Projektes hin und möchten die Bürgerinnen und Bürger für die vom Projekt ausgehenden Gefahren sensibilisieren.
»Ziel des Projektes ist es, durch den Einsatz von Videoüberwachung sowie der automatisierten Kontrolle des Internets automatisch strafrechtlich relevante Bedrohungen und Taten zu erkennen. Erreicht werden soll dies durch die Bündelung und automatische Auswertung der Aufzeichnungen verschiedener Überwachungssysteme und die Erstellung persönlicher Bewegungsprofile. Auf diese Weise soll eine präventive Polizeiarbeit ermöglicht werden«, so Michael Hensel, Vorsitzender der Piratenpartei Brandenburg. INDECT zeichnet sich vor allem durch seine vielfältigen Verknüpfungsfunktionen aus: So entscheidet ein kombiniertes System aus Überwachungskameras, Kennzeichen- und Polizeidateien, biometrischer Gesichtserkennung, Mobilfunküberwachung und Überwachungsdrohnen, wer sich “verdächtig” verhält.
Auf Grundlage dieses enormen Überwachungsnetzes sollen Bürgerinnen und Bürger online und offline beobachtet und auf “auffälliges Verhalten” überprüft werden. Michael Hensel weiter:
»Dieses Überwachungssystem kriminalisiert unschuldige Bürgerinnen und Bürger. Es widerspricht geltendem Recht, greift immens in die Grundrechte eines Jeden ein und setzt das Recht auf Privatsphäre im öffentlichen und virtuellen Raum sowie die Unschuldsvermutung außer Kraft.«
Hintergrund: Der Europäische Datenschutztag ist ein auf Initiative des Europarats ins Leben gerufener Aktionstag für den Datenschutz. Der Datenschutztag findet jährlich regelmäßig am 28. Januar statt, weil an diesem Datum die Unterzeichnung der Europaratskonvention 108 zum Datenschutz begonnen wurde. Mit der Konvention verpflichten sich die unterzeichnenden Staaten, für die Achtung der Rechte und Grundfreiheiten – insbesondere des Persönlichkeitsbereichs bei der automatisierten Datenverarbeitung – Sorge zu tragen. Ziel des Europäischen Datenschutztages ist es, die Bürgerinnen und Bürger Europas für den Datenschutz zu sensibilisieren. Dies soll durch Aktionen aller mit dem Datenschutz betrauten Organisationen erfolgen.
Gepostet von Tedman in Hot Topic, PC, Jan 28, 2012
Unser Titel hat sich leicht geändert, da nun auch ein Gesetz namens “ACTA” auf den Plan tritt. Dieses zeigt speziell in der EU Wirkung und wirft wieder Fragen und Empörung auf. Inzwischen haben bereits alle bis auf 5 EU-Mitgliedstaaten das Gesetz unterschrieben. Ein Mitglied des Handelsausschusses trat aus Protest zurück. Auch ein paar Hacker machten sich mit der Lahmlegung der EU-Parlamentswebseite bemerkbar.
Immer mehr Proteste, Aufrufe und mehr wirken rund um die Lage der Gesetzesvorschläge. Im Teil 4 konntet ihr erfahren, dass dieses Gesetz schon lange geplant ist (Teil 4: http://games-today.de/?p=566). Nachdem nun auch bekannt ist, dass dieses Gesetz bereits umgesetzt wird, löste dies Empörung aus.
Japan, die USA, Kanada, Australien, Singapur, Südkorea und weitere Länder hatten das Abkommen bereits im Oktober vergangenen Jahres gebilligt. Allgemein wird erwartet, dass die fehlenden fünf EU-Staaten, darunter auch Deutschland, mitziehen werden. Als letzte Hürde muss das Abkommen vom Europaparlament und den nationalen Parlamenten abgesegnet werden.
Mehrere EU-Parlamentarier haben bereits Widerstand angekündigt. Im polnischen Parlament zeigen sich Abgeordnete mit Guy-Fawkes-Maske, die bekannte Hater-Maske, um ihren Widerwillen auszudrücken.
Ein Bild dazu:
Derweil attackierten Hacker die Website des EU-Parlaments und legten sie am Donnerstag für mehrere Stunden lahm. Aber dies bleibt nicht der einzige Angiff: Wiederholt wurden in den letzten Tagen Webseiten von Regierungen und Organisationen angegriffen. Auch in Österreich gab es solche Attacken.
Zudem ruft die Seite “Stopp ACTA” zu einer Petition auf, die gegen das Gesetz angehen soll und dieses stoppen soll.
Um an der Petition teilzunehmen, klickt auf den folgenden Link. Hier wird auch ein Blog und weitere Informationen angeboten. Der Blog bietet noch einmal die Möglichkeit, die gesamte Geschichtezu verfolgen:
(INFO: Wir möchten drauf hinweisen, dass wir nur die Informationen zusammen tragen. Natürlich sind auch wir von Games-Today durchaus von den Auswirkungen betroffen und unsere Meinung zu den Gesetzen sollte eigentlich klar sein, doch bitten wir darum, dass die Leser für sich selbst entscheiden, wie sie drauf reagieren und was für eine Meinung sie daraus bilden.)
‘Working excessive overtime without a single day off during the week’
‘Living together in crowded dorms and exposure to dangerous chemicals’
Two explosions in 2011 in China ‘due to aluminum dust’ killed four workers
Almost 140 injured after using toxin in factory, reports New York Times
By Mark Duell
Last updated at 8:10 AM on 27th January 2012
Working excessive overtime without a single day off during the week, living together in crowded dormitories and standing so long that their legs swell and they can hardly walk after a 24-hour shift.
These are the lives some employees claim they live at Apple’s manufacturing centres in China, where the firm’s suppliers allegedly wrongly dispose of hazardous waste and produce improper records.
Almost 140 workers at a supplier in China were injured two years ago using a poisonous chemical to clean iPhone screens – and two explosions last year killed four people while injuring more than 75.