Tag: newstrack

Tor wonders how US spooks shut down sites

tor-browsingTor has been left scratching its encrypted head over how US and European law enforcement shut down more than 400 websites, including Silk Road 2.0, which used its technology.

Tor was set up, not to hide criminals, but to allow dissidents in autocratic countries to make contact with the real world. The fear is that if the US cops could break Tor, then lives could be at risk in countries whose governments would like to shut down dissident sites.

The websites were set up using a special feature of the Tor network, which is designed to mask people’s Internet use using special software that routes encrypted browsing traffic through a network of worldwide servers.

Tor—short for The Onion Router—also allows people to host ”hidden” websites with a special “.onion” URL, which is difficult to trace. But law enforcement appears to have figured out a method to find out where sites are hosted.

Last Week the Department of Justice shut down more than 410 hidden websites as part of ”Operation Onymous” and arrested more than 17 people, including Blake Benthall, 26, who is accused of running the underground marketplace Silk Road 2.0.

However, Tor is broke and does not have the cash to play a cat and mouse game with the well-funded European and US cops.

Andrew Lewman, the project’s executive director, in a blog post said that it was a miracle that its hidden services have survived so far.

It is possible that a remote-code execution vulnerability has been found in Tor’s software, or that the individual sites had flaws such as SQL injection vulnerabilities.

“Tor is most interested in understanding how these services were located and if this indicates a security weakness in Tor hidden services that could be exploited by criminals or secret police repressing dissents,” he wrote.

HP teams up with Wind River on Open Stack

founding_billDave_tcm_245_1630145Maker of jolly expensive printer ink, HP has forged a glorious alliance with Wind River to provide customers with a network functions virtualisation (NFV) solution based on HP’s Helion OpenStack.

Products which are spawned by the new alliance will enable carrier-grade   NFV capabilities.

The companies worked on the project jointly, taking the HP Helion OpenStack offering and Wind River’s carrier-grade technologies to further the already developing OpenStack NFV market. According to OpenStack-focused vendor Mirantis, telecommunications companies have been experiencing success with OpenStack-based NFV. Although still a new function, it appears that it is beginning to catch on with customers and vendors alike.

In a statement, the pair said that they wanted to create a product which allowed for the benefits of cloud computing, while meeting their rigorous reliability, performance and management requirements.

Saar Gillai, senior vice president and COO of HP Cloud and general manager for NFV at HP, in a prepared statement said the HP and Wind River project would provide a fully integrated and supported HP Helion cloud solution for carrier grade NFV.

“ We will also work together to enhance OpenStack technology to help ensure it evolves to meet carrier grade specifications,” Gillai said.

The new service will help cloud services providers compete better in a changing market. With the OpenStack NFV offering, HP and Wind River expect CSPs will be able to accelerate the transformation of their networks while also lower the total cost of ownership by adopting commercial, off-the-shelf hardware, they claim.

Carrier-grade NFV capabilities are not quite ready for customers, though. There is still some work to do to get the HP/WindRiver OpenStack NFV solution together, but the companies plan to launch in 2015.

Jim Douglas, senior vice president and CMO of Wind River said the telecom industry was eager to tap into the vast potential of NFV.

“By taking advantage of a virtualized or cloud environment, service providers can easily and quickly introduce new high-value services while reducing costs. In every case, maintaining carrier grade reliability is critical,” Douglas said.

 

Toshiba has new wearable computer chip

tieToshiba has announced it will begin sampling a new ARM-based application processor designed for wearable devices.

Dubbed the TZ1021MBG chip, it will form Tosh’s TZ1000 family of ApP Lite application processors for wearable devices such as smartwatches, smart glasses, activity monitors and smart bracelets. The new product will be on display during the four day Electronica 2014 show in Germany starting today.

The chip will be in mass production by March 2015.

The chip includes an integrated 48MHz ARM Cortex-M4F CPU with flash memory that is found in other chips in the ApP Lite product group, but it does not have Bluetooth Low Energy and the accelerometer that were integrated into the TZ1001MBG.

This makes the TZ1021MBG smaller and slimmer, according to Toshiba officials. The ARM Cortex-M4F CPU includes digital signal processing (DSP) and floating-point processing, enabling the combining of data from multiple sensors.

Toshiba officials said the chip includes highly sensitive analogue-to-digital converters (ADCs) that will help devices pick up and measure weak biomedical signals—such as a pulse or a heart’s electrical activity—and leverages a low-power design for devices that need long battery life.

The chip measures 6.7mm by 4mm by 1mm and includes 8MB of memory.

 

Chinese hack US post

postman_file_640_4806bc074ad1dChinese government hackers are suspected of breaching the computer networks of the United States Postal Service, compromising the data of more than 800,000 employees — including the postmaster general.

According to the FBI, the intrusion was discovered in mid-September, said officials, who declined to comment on who was thought to be responsible.

The announcement comes just as President Barak Obama arrived in Beijing for high-level talks with his counterpart, President Xi Jinping.

China has consistently denied accusations that it engages in cybertheft and notes that Chinese law prohibits cybercrime. But China has been tied to several recent intrusions, including one into the computer systems of the Office of Personnel Management and another into the systems of a government contractor, USIS, that conducts security-clearance checks.  Of course the US spooks have been doing the same thing in China, so it is a matter of all is fair in love and cold war.

The only question is why did the Chinese spooks think that hacking a the postal service was a good idea.

Postmaster General Patrick Donahoe said in a statement that it was an unfortunate fact of life these days that every organisation connected to the Internet is a constant target for cyber intrusion activity. “The United States Postal Service is no different. “Fortunately, we have seen no evidence of malicious use of the compromised data and we are taking steps to help our employees protect against any potential misuse of their data,” he said.

The compromised data included names, dates of birth, Social Security numbers, addresses, dates of employment and other information, officials said. The data of every employee were exposed.

No customer credit card information from post offices or online purchases at usps.com was breached, officials said.

While the OPM and USIS breaches involved data of people who had gone through security clearances and so could be useful to a foreign government seeking to gain access to individuals in sensitive government work, it is not clear why Postal Service employees would be of such interest.

Robots will steal UK jobs

Oxford's own Bridge of Sighs, pic Mike MageePeople in the UK will have more time to watch daytime TV if the result of a survey by an Oxford University team of scientists in conjunction with Deloitte is to be believed.

According to the survey, 35 percent of UK jobs and 30 percent of jobs in London look set to be taken over by automatons or by automated processes. London employers say advances in technology will be the most important reason for job losses.

And if you’re unlucky enough to be earning less than £30,000 a year, your job is five times more likely to be replaced.

While 73 percent of London businesses plan to increase their headcounts, 84 percent of those firms say skills of employees will have to change to include digital know-how, management and creativity.

Over 36 percent of London businesses will invest in bigger properties, the survey said.

Toshiba enters the cloud management fray

Toshiba Research EuropeGiant Japanese firm Toshiba said it has made available its Cloud Client Manager.

Toshiba said the cloud service is aimed at companies of every size and shape to manage so called endpoint devices – that is to say mobile phones and tablets, notebooks and the like.

The software currently gives patch management, asset inventory, power management and distribution of software device drivers. But in early 2015 the company will add mobile device management and cloud back up.

Here’s how it works.

Adminstrators use a standard web browser to control IT devices online without the need to invest in servers or dedicated management software.

The asset management feature shows all the managed machines in an enterprise and lets them see which software is installed on which machine.

Toshiba said the additional functionality in early 2015 will let administrators create user profile permissions and implement password strength, encryption, device lock and data wiping.

IBM takes aim at cloud entrepreneurs

IBM logoB2B startups are being given the chance to get up to $120,000 worth of credit if they buy into the IBM cloud.

The company said it wants to provide entrepreneurs with “instant infrastructure” to launch businesses and use their resources to code, build, scale and bring their products to market.

IBM is also offering the startups the chance to connect into its enterprise client base which, it said, are always looking to startups to help them with their own problems.

The global programme includes access to BM’s Bluemix platform that includes over 75 runtimes and services. Bluemix provides integration with Twitter, high speed data transfer tools, application health and performance monitoring services and database as a service (DaaS).

IBM estimates that by 2016 a quarter of all apps will sit on the cloud and 85 percent of new software is built for the cloud.

Entrepreneurs are also being offered technical support and consulting using IBM’s 43 “Innovation Centres”, and incubator space in Silicon Alley.

Heartbleed bug still compromises websites

The Bleeding Heart Dove - Wikimedia CommonsA bug that compromised systems in April this year still poses threats despite patches made to cover the security hole.

According to researchers at the University of Maryland, website administrators are still at threat from the Heartbleed bug.

The malefic sofware compromises the OpenSSL (secure sockets layer) making it possible for those with a malicious bent to read the memory of systems.

The Maryland researchers looked at a million sites in the United States in a bid to discover whether sys admins applied the correct protocols to prevent the bug.

While nearly 93 percent of web administrators patched the hole within three weeks of the arrival of Heartbleed, the researchers found only 13 percent followed up with other measures to make their systems bulletproof.

Sys admins should have patched OpenSSL software, revoke current certificates and re-issue new ones, said the researchers.

If these measures hadn’t been taken, attackers with a website private key could still pose as a website.

Google did evil to the Berlin Wall

ap6108231298-ab0817725a55e10f913b3d4d8f1ba2d18f00f8d4-s6-c30 Over the weekend, Google celebrated the Fall of the Berlin Wall with one of its doodles, failing to note its part in the history of one of the sections.

According to the Google Doodle team, they  “took a short bike ride from our Mountain View, California headquarters to our local public library to study an actual piece of the Berlin Wall.” These segments of the Berlin Wall were featured in the Doodle.

What the post fails to mention is how the two sections ended up at the library and how it might not have had to do that cycle ride if it had taken a less evil interest in history sooner.

The 12-foot-tall remnants sections of wall were bought over to the US by German-born businessman Frank Golzen. It all seemed fair enough. After all, they were spoils of a war which the US had spent a lot of time and money winning and made a suitable monument to the victory. They were placed in the Bayside Business Plaza where they were a lot more attractive than many of the other things on the estate and provided a bit of history that is missing in many Industrial Parks.

In 2012, Google bought the entire park, did not like the inclusion of the two sections of the Berlin Wall, and gave the Golzen family until summer 2013 to take the historic Berlin Wall out of the industrial park.

A 2012 City of Mountain View Staff Report stated that although the donating family has until next summer to remove the installation from the current location, their preference (and the preference of the new owner of the property) was to remove it sooner.

However, the recommendation to relocate the seven-ton concrete slabs to remote Charleston Park, adjacent to the Googleplex, was nixed by the City Council, who voted instead to move the Berlin Wall sections to its current home in front of a downtown public library. The walls were moved and re-dedicated in November last year.

 

Cambridge boffin dismisses the existence of a general processor

martin-luther-nails-thesis-1David Chisnall, of Cambridge University become the general processor’s first atheist, by refusing to believe in the existence of a general-purpose chip.

Writing in Queue  he said that there was a general trend to categorise processors and accelerators as “general purpose.” Of the papers published at this year’s International Symposium on Computer Architecture (ISCA 2014), nine out of 45 referred to general-purpose processors; one additionally referred to general-purpose FPGAs (field-programmable gate arrays), and another referred to general-purpose MIMD (multiple instruction, multiple data) supercomputers, stretching the definition to the breaking point.

However Chisnall nailed a statement on the door of the Intel research division that there was no such thing as a truly general purpose processor and that the belief in such a device was harmful.

Risking the wrath of the great Intel God he said that many of the papers presented at ISCA 2014 that did not explicitly refer to general-purpose processors or cores did instead refer to general-purpose programs, typically in the context of a GPGPU (general-purpose graphics processing unit), a term with an inherent contradiction.

He said that a modern GPU has I/O facilities, can run programs of arbitrary sizes (or, if not, can store temporary results and start a new program phase), supports a wide range of arithmetic, has complex flow control, and so on. Implementing Conway’s Game of Life on a GPU is a common exercise for students, so it’s clear that the underlying substrate is Turing complete.

Chisnall argues that it is not enough for a processor to be Turing complete in order to be classified as general purpose; it must be able to run all programs efficiently. The existence of accelerators (including GPUs) indicates that all attempts thus far at building a general-purpose processor have failed. If they had succeeded, then they would be efficient at running the algorithms delegated to accelerators, and there would be no market for accelerators.

Apple conducted a “bait and switch” on GT Advanced

6a01053686a547970c017d3e73793e970c-piCourt documents appear to show that Apple sank GT Advanced by offering it what would have been its largest sale ever and then changed the terms of the agreement after it was too late for the smaller company to go elsewhere.

In documents unsealed by a US  Bankruptcy Court in Springfield, Massachusetts, GT Advanced Chief Operating Officer Daniel Squiller says Apple conducted a bait and switch which brought the company to its knees.

GT Advanced, a maker of sapphire furnaces that supplied sapphire material to Apple for its smartphone screens, filed for Chapter 11 protection but has refused to publicly explain why it had imploded, because of  confidentiality clauses which Apple forced it to sign.

All this came to light because Judge Henry Boroff denied requests by the companies to keep some of the documents in the case under seal.

Last year, GT Advanced outfitted a plant owned by Apple in Mesa, Arizona with furnaces that it would use to make scratch-resistant sapphire exclusively for Apple.

“With a classic bait-and-switch strategy, Apple presented GTAT with an onerous and massively one-sided deal in the fall of 2013,” Squiller wrote.

At the start of negotiations, Apple offered to buy 2,600 sapphire growing furnaces from GT Advanced, which GT Advanced would operate on behalf of Apple, the “ultimate technology client to land,” according to Squiller.

“In hindsight, it is unclear whether Apple even intended to purchase any sapphire furnaces from GTAT,” he wrote.

Apple offered a deal, under which it would shift away economic risk by lending GT Advanced the money to build the furnaces and grow the sapphire, and then sell it exclusively to Apple for less than market value, Squiller wrote.

GT Advanced was effectively forced to accept the unfair deal in October 2013 because its intense negotiations with Apple had left it unable to pursue deals with other smartphone makers, he said.

However, Apple called GT Advanced’s accusations “scandalous and defamatory” and said that the statements are intended to vilify Apple and portray “Apple as a coercive bully.”

It said GT Advanced was eager to make a deal, and pointed to a jump of over 20 percent in the shares of GT Advanced after it was unveiled.

IBM bets on Watson

Sherlock-Holmes-and-WatsonBig Blue is hoping that its AI based supercomputer Watson can come up with a few ideas which will help turn it around.

IBM  is taking a kicking from cheap cloud computing services and the outfit is  facing an uncertain future.

Apparently, IBM’s research division is building on the research effort that led to Watson, the computer that won in the game show Jeopardy! in 2011. The hope is that this effort will lead to software and hardware that can answer complex questions by looking through vast amounts of information containing subtle and disparate clues.

John Kelly, director of IBM Research told MIT Technology review  that IBM was betting billions of dollars, and a third of this division now is working on artificial intelligence techniques related to Watson.

Earlier this year the division was reorganised to ramp up efforts related to cognitive computing. The push began with the development of the original Watson, but has expanded to include other areas of software and hardware research aimed at helping machines provide useful insights from huge quantities of often-messy data.

So far, the research has created new recipes by analysing thousands of ingredients and popular meals, and, less interesting, electronic components, known as neurosynaptic chips, that have features modelled on the workings of biological brains and are more efficient at processing sensory information.

The hope is that the technology will be able to answer complicated questions in different industries, including health, financial markets, and oil discovery; and that it will help IBM build its new computer-driven consulting business.

There is a growing belief that machine-learning techniques may provide ways to use big data.  Already Google, Facebook, and Amazon have their own methods for hunting through vast quantities of data for useful insights.

So far those Watson has proved a bit elementary.  Some companies and researchers testing Watson systems have reported difficulties in adapting the technology to work with their data sets. However that has not stopped IBM’s CEO, Virginia Rometty, said in October last year that she expects Watson to bring in $10 billion in annual revenue in 10 years, even though that figure then stood at around $100 million.

IBM is aggressively commercialising the technology. Last week the company announced it had teamed up with Twitter and the Chinese social network Tencent to offer a service that will try to find useful insights from messages daily sent through these services, as we reported here. A company that sells phones might, for example, learn about a possible problem with one of its products from comments made by restaurant patrons.

 

Blizzard boss wades into Gamergate

558_L-narikoBlizzard Entertainment’s president and CEO Michael Morhaime surprised the software industry by referring negatively to Gamergate.

For those who came in late, Gamergate is a campaign by backward misogynistic gamers to chase women from the industry with death threats and online harassment so that they can continue to play games where big-breasted women are saved by men. All this is done under a pretext that women gaming journalists are corrupt.

Morhaime has to be careful, after all, he sells many games to people who support Gamergate and have views about women which make cavemen look enlightened. He did not mention he was talking about Gamergate but it is not difficult to spot the thread.

“Over the past couple months; there’s been a  group of people who have been doing really awful things. They have been making some people’s lives miserable, and they have been tarnishing our reputation as gamers… “It’s not right.”

Blizzcon is a great example of how positive and uplifting gaming can be,” Morhaime added—speaking to his company’s long-running convention dedicated to its small but enormously popular handful of games. “Let’s carry the good the good vibes from this weekend out into the world all year round.”

“There is another person on the other end of the chat screen,” he continued, making a strong reference to the online harassment that has flared up unpleasantly in recent months. “They’re our friends, our brothers and sisters, our sons and daughters.”

“Let’s take a stand to reject hate and harassment,” Morhaime said.

“Let’s redouble our efforts to be kind and respectful to one another. And let’s remind the world what the gaming community is really all about.”

Dark net raided by police worldwide

seizedPolice in Europe and the United States have shut down over 400 so-called dark net sites and made multiple arrests.

The police forces shut down Silk Road 2.0 and other sites using the Tor network, that some have dubbed the unternet of fangs.

The sites were alleged to have sold weapons and drugs, according to the BBC.

Out of those arrested, six were British and have been bailed.

The report said Bitcoins worth over £630 thousand were seized.  Troels Oerling, who runs Europol’s cybercrime unit said the combined forces had closed web sites using Tor – crooks had thought themselves out of reach of the law.

Tor was originally created by the US Navy and still gets funding from the US government.  It uses many different levels of encryption in daisy chains across the globe, each link being separately encrypted.

Glass to power superfast computers

Glass of tea, Wikimedia CommonsScientists at the universities of Cambridge, Southampton and Surrey believe they’ve cracked a glass problem that has eluded researchers for decades.

They say they have made a breakthrough using amorphous chalcogenides, used in CDs and DVDs, that will allow the creation of all optical computer systems.

Dr Richard Curry, project leader of the team, said: “The challenge is to find a single material that can effectively use and control light to carry information around a computer. Much how the web uses light to deliver information, we want to use light to both deliver and process computer data.”

He said the team shows how a widely used glass can conduct negative electrons as well as positive charges, meaning that pn-junction devices can be made.

The team thinks that its research will be integrated into computers within a mere 10 years.  But the glass is already being manufactured and used for a memory technology called CRAM.