AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page
   Networked Database  Computer Support/Help/Discussion...   [1579 / 1624] RSS
 From   To   Subject   Date/Time 
Message   Sean Rima    All   CRYPTO-GRAM, August 15, 2024 Part 1   September 23, 2024
 9:22 PM *  

Crypto-Gram
August 15, 2024

by Bruce Schneier
Fellow and Lecturer, Harvard Kennedy School
schneier@schneier.com
https://www.schneier.com

A free monthly newsletter providing summaries, analyses, insights, and
commentaries on security: computer and otherwise.

For back issues, or to subscribe, visit Crypto-Gram's web page.

Read this issue on the web

These same essays and news items appear in the Schneier on Security blog, along
with a lively and intelligent comment section. An RSS feed is available.

** *** ***** ******* *********** *************
In this issue:

If these links don't work in your email client, try reading this issue of
Crypto-Gram on the web.

    Hacking Scientific Citations
    Cloudflare Reports that Almost 7% of All Internet Traffic Is Malicious
    Criminal Gang Physically Assaulting People for Their Cryptocurrency
    Brett Solomon on Digital Rights
    Snake Mimics a Spider
    2017 ODNI Memo on Kaspersky Labs
    Robot Dog Internet Jammer
    Data Wallets Using the Solid Protocol
    The CrowdStrike Outage and Market-Driven Brittleness
    Compromising the Secure Boot Process
    New Research in Detecting AI-Generated Videos
    Providing Security Updates to Automobile Software
    Education in Secure Software Development
    Leaked GitHub Python Token
    New Patent Application for Car-to-Car Surveillance
    On the Cyber Safety Review Board
    Problems with GeorgiaΓÇÖs Voter Registration Portal
    People-Search Site Removal Services Largely Ineffective
    Taxonomy of Generative AI Misuse
    On the Voynich Manuscript
    Texas Sues GM for Collecting Driving Data without Consent
    Upcoming Speaking Engagements

** *** ***** ******* *********** *************
Hacking Scientific Citations

[2024.07.15] Some scholars are inflating their reference counts by sneaking them
into metadata:

    Citations of scientific work abide by a standardized referencing system:
Each reference explicitly mentions at least the title, authorsΓÇÖ names,
publication year, journal or conference name, and page numbers of the cited
publication. These details are stored as metadata, not visible in the
articleΓÇÖs text directly, but assigned to a digital object identifier, or DOI
-- a unique identifier for each scientific publication.

    References in a scientific publication allow authors to justify
methodological choices or present the results of past studies, highlighting the
iterative and collaborative nature of science.

    However, we found through a chance encounter that some unscrupulous actors
have added extra references, invisible in the text but present in the
articlesΓÇÖ metadata, when they submitted the articles to scientific databases.
The result? Citation counts for certain researchers or journals have
skyrocketed, even though these references were not cited by the authors in their
articles.

    [...]

    In the journals published by Technoscience Academy, at least 9% of recorded
references were ΓÇ£sneaked references.ΓÇ¥ These additional references were only
in the metadata, distorting citation counts and giving certain authors an unfair
advantage. Some legitimate references were also lost, meaning they were not
present in the metadata.

    In addition, when analyzing the sneaked references, we found that they
highly benefited some researchers. For example, a single researcher who was
associated with Technoscience Academy benefited from more than 3,000 additional
illegitimate citations. Some journals from the same publisher benefited from a
couple hundred additional sneaked citations.

Be careful what youΓÇÖre measuring, because thatΓÇÖs what youΓÇÖll get. Make
sure itΓÇÖs what you actually want.

** *** ***** ******* *********** *************
Cloudflare Reports that Almost 7% of All Internet Traffic Is Malicious

[2024.07.17] 6.8%, to be precise.

From ZDNet:

    However, Distributed Denial of Service (DDoS) attacks continue to be
cybercriminalsΓÇÖ weapon of choice, making up over 37% of all mitigated traffic.
The scale of these attacks is staggering. In the first quarter of 2024 alone,
Cloudflare blocked 4.5 million unique DDoS attacks. That total is nearly a third
of all the DDoS attacks they mitigated the previous year.

    But itΓÇÖs not just about the sheer volume of DDoS attacks. The
sophistication of these attacks is increasing, too. Last August, Cloudflare
mitigated a massive HTTP/2 Rapid Reset DDoS attack that peaked at 201 million
requests per second (RPS). That number is three times bigger than any previously
observed attack.

    It wasnΓÇÖt just Cloudflare that was hit by the largest DDoS attack in its
history. Google Cloud reported the same attack peaked at an astonishing 398
million RPS. So, how big is that number? According to Google, Google Cloud was
slammed by more RPS in two minutes than Wikipedia saw traffic during September
2023.

** *** ***** ******* *********** *************
Criminal Gang Physically Assaulting People for Their Cryptocurrency

[2024.07.18] This is pretty horrific:

    ...a group of men behind a violent crime spree designed to compel victims to
hand over access to their cryptocurrency savings. That announcement and the
criminal complaint laying out charges against St. Felix focused largely on a
single theft of cryptocurrency from an elderly North Carolina couple, whose home
St. Felix and one of his accomplices broke into before physically assaulting the
two victims -- both in their seventies -- and forcing them to transfer more than
$150,000 in Bitcoin and Ether to the thievesΓÇÖ crypto wallets.

I think cryptocurrencies are more susceptible to this kind of real-world attack
because they are largely outside the conventional banking system. Yet another
reason to stay away from them.

** *** ***** ******* *********** *************
Brett Solomon on Digital Rights

[2024.07.19] Brett Solomon is retiring from AccessNow after fifteen years as its
Executive Director. HeΓÇÖs written a blog post about what heΓÇÖs learned and
what comes next.

** *** ***** ******* *********** *************
Snake Mimics a Spider

[2024.07.22] This is a fantastic video. ItΓÇÖs an Iranian spider-tailed horned
viper (Pseudocerastes urarachnoides). Its tail looks like a spider, which the
snake uses to fool passing birds looking for a meal.

** *** ***** ******* *********** *************
2017 ODNI Memo on Kaspersky Labs

[2024.07.23] ItΓÇÖs heavily redacted, but still interesting.

Many more ODNI documents here.

** *** ***** ******* *********** *************
Robot Dog Internet Jammer

[2024.07.24] Supposedly the DHS has these:

    The robot, called ΓÇ£NEO,ΓÇ¥ is a modified version of the ΓÇ£Quadruped
Unmanned Ground VehicleΓÇ¥ (Q-UGV) sold to law enforcement by a company called
Ghost Robotics. Benjamine Huffman, the director of DHSΓÇÖs Federal Law
Enforcement Training Centers (FLETC), told police at the 2024 Border Security
Expo in Texas that DHS is increasingly worried about criminals setting ΓÇ£booby
trapsΓÇ¥ with internet of things and smart home devices, and that NEO allows DHS
to remotely disable the home networks of a home or building law enforcement is
raiding. The Border Security Expo is open only to law enforcement and defense
contractors. A transcript of HuffmanΓÇÖs speech was obtained by the Electronic
Frontier FoundationΓÇÖs Dave Maass using a Freedom of Information Act request
and was shared with 404 Media.

    ΓÇ£NEO can enter a potentially dangerous environment to provide video and
audio feedback to the officers before entry and allow them to communicate with
those in that environment,ΓÇ¥ Huffman said, according to the transcript. ΓÇ£NEO
carries an onboard computer and antenna array that will allow officers the
ability to create a ΓÇÿdenial-of-serviceΓÇÖ (DoS) event to disable ΓÇÿInternet
of ThingsΓÇÖ devices that could potentially cause harm while entry is made.ΓÇ¥

Slashdot thread.

** *** ***** ******* *********** *************
Data Wallets Using the Solid Protocol

[2024.07.25] I am the Chief of Security Architecture at Inrupt, Inc., the
company that is commercializing Tim Berners-LeeΓÇÖs Solid open W3C standard for
distributed data ownership. This week, we announced a digital wallet based on
the Solid architecture.

Details are here, but basically a digital wallet is a repository for personal
data and documents. Right now, there are hundreds of different wallets, but no
standard. We think designing a wallet around Solid makes sense for lots of
reasons. A wallet is more than a data store -- data in wallets is for using and
sharing. That requires interoperability, which is what you get from an open
standard. It also requires fine-grained permissions and robust security, and
thatΓÇÖs what the Solid protocols provide.
--- 
 * Origin: High Portable Tosser at my node (618:500/14.1)
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0176 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.1.241108