ECCploit … nice…

… : ecc-rh-paper-eccploit-press-preprint.pdf … :

To address the second challenge, we present ECCploit, a new Rowhammer attack based on composable, data-controlled bit flips and a novel side channel in the ECC memory controller. We show that, while ECC memory does reduce the attack surface for Rowhammer, ECCploit still allows an attacker to mount reliable Rowhammer attacks against vulnerable ECC memory on a variety of systems and configurations.

Thx to Fefe. 

Krypto-pr – Do you Legally “own” with Bitcoin?

Things I read…: ” Short introduction to krypto-property by Preston Byrne”

https://prestonbyrne.com/2018/11/23/krypto_property/

Wrapping up, the reason that the matter of Bitcoin’s ultimate classification as property hasn’t come up yet is because, in common practice, ownership  disputes are resolved at a higher conceptual level than inquiring about the “nature of a bitcoin itself” – when I deposit coins at an exchange, e.g., it ought to be pretty clear from the exchange’s TOS that if I have a balance on the exchange, I can ask the exchange to spend an amount equal to that balance back to me on request and, if they fail to do so, I can ask a court to force the exchange to render specific performance or pay damages. A dispute of that kind, of which there have been many, doesn’t ask at what point title transferred and what the fundamental nature of that title is, because it doesn’t have to. It looks instead at the contractual obligations between the counterparties and whether those obligations were satisfactorily performed.

One could write chapter and verse comparing these two jurisdictions and their treatment of Bitcoin as an asset. That said, it’s a Friday night and I have places to be, so for now it will have to suffice to say only that the question has no answer and at some point, probably sooner rather than later, there is going to be a case that explores these fundamental issues (I am frankly shocked that Oxford v. Moss hasn’t been raised yet in any of the UK-based Bitcoin fraud prosecutions).

I look forward to reading those decisions.”

“The Decline and Fall of the Zuckerberg Empire”

http://nymag.com/intelligencer/2018/11/the-decline-and-fall-of-the-zuckerberg-empire.html

A 6,000-word report published in the New York Times last week disclosed in humiliating detailthe lengths to which Facebook has gone to protect its dominance and attack its critics. As various interlocking crises concerning hate speech, misinformation, and data privacy widened, top executives ignored, and then kept secret, evidence that the platform had become a vector for misinformation campaigns

(…)
Over the past year, I’ve spent time trying to wean myself off tech mega-platforms, generally with little success. Google’s search, for all my complaints, is still the best way for me to navigate the internet; Amazon is still so unbelievably convenient that the thought of quitting it exhausts me. But I logged out of Facebook more than a year ago and have logged back in fewer than a dozen times since. Checking Facebook had been a daily habit, but it also hadn’t improved my life or made itself necessary. Not many Roman plebes would have said that about the Pax Romana. Some empires fall because they’re invaded from the outside or rot from within. Zuckerberg’s could be the first in history to collapse simply because its citizens logged out.

The Midas Touch: Any Surface Input

… : See How AI Can Turn Almost Any Surface Into a User Interface … :

A startup called HyperSurfaces wants to completely change how you interact with the physical world — and based on some recently released demo videos, it might just meet that lofty goal. The London-based startup recently unveiled a new technology that can transform any object into a user interface. Essentially, this tech lets you communicate with a computing system using virtually anything you like as a conduit — a glass wall, a car door, even a metal clothes rack — and it has the potential to end our reliance on keyboards, buttons, and touch screens forever.

Why do we get such stupid ads? Because it’s only a numbers’ game…

Newco Shift : Dear Advertising Industry: Please Do Better. You’re Killing the Open Web. … :

Let’s apply that reality to our robe example. Let’s say the robe costs $60, and yields a $20 profit for our e-commerce advertiser, not including marketing costs. That means that same advertiser is can spend upwards of $19.99 per unit on advertising (more, if a robe purchaser turns out to be a “big basket” e-commerce spender).  So what does our advertiser do? Well, they set a retargeting campaign aimed anyone who ever visited our erstwhile robe’s page.  With CPMs averaging around a buck, that robe’s going to follow nearly 20,000 folks around the internet, hoping that just one  of them converts.

Instagram stored your password in plain text…

 Nice: Looks like Instagram is trying to compete with Linkedin in terms of password in-security: Instagram accidentally exposed some user passwords through its data download tool – The Verge … :

According to Instagram, some users who used that feature had their passwords included in a URL in their web browser, and that the passwords were stored on Facebook’s servers, Instagram’s parent company. A security researcher told The Information that this would only be possible if Instagram stores its passwords in plain text, which could be a larger and concerning security issue for the company. An Instagram spokesperson disputed this, saying that the company hashes and salts its stored passwords.

Wikipedia: List of Great Women in Computing

Women in computing – Wikipedia :

Women in computing have shaped the evolution of information technology. They were among the first programmers in the early-20th century, and contributed substantially to the industry. As technology and practices altered, the role of women as programmers has changed, and the recorded history of the field has downplayed their achievements.

Wikipedia: Timeline of Women in Computing

Timeline of women in computing – Wikipedia:

This is a timeline of women in computing. It covers the time when women worked as “human computers” and then as programmers of physical computers. Eventually, women programmers went on to write software, develop Internet technologies and other types of programming. Women have also been involved in computer science, various related types of engineering and computer hardware.

Youtube: Erfolg im Team: So geht Führung – Bernhard Zytariuk: Finde die Stärken in Menschen!

Ein guter Vortrag über Teambuilding und Führung: “Erfolg im Team: So geht Führung” von Bernhard Zytariuk

Money quote: “Die Fehler bei uns Menschen zu finden, das ist total einfach. Wir sind alles Mangelwesen mit großen Unzulänglichkeiten und die zu finden ist wirklich keine große Kunst. Aber die Stärken der Mitarbeiter zu finden, das ist die Hohe Schule. Und die Stärken dann noch zu entwickeln, das ist noch viel wichtiger.” 

This is the end… when the sun makes sea mines detonate (Vietnam stories)

A Powerful Solar Storm Likely Detonated Dozens of U.S. Sea Mines During the Vietnam War

“An analysis of recently declassified U.S. military documents confirms suspicions that, during the late stages of the Vietnam War, a powerful solar storm caused dozens of sea mines to explode. It’s a stark reminder of the Sun’s potential to disrupt our technological activities in unexpected ways. As part of Operation Pocket Money, the U.S. Navy planted a series of Destructor sea mines near strategic ports off the coast of North Vietnam. A few weeks later, on August 4, 1972, crew members aboard U.S. Task Force 77 aircraft suddenly observed a batch of explosions south of Hai Phong. In all, some 20 to 30 explosions were documented in just 30 seconds. Another 25 to 30 patches of muddy water were also observed, indicative of further explosions.”

CVE-2018-5407 “Portsmash”: New Intel CPU vulnerability helps steal data from encrypted content

… : New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data … :

“A team of security researchers has discovered another serious side-channel vulnerability in Intel CPUs that could allow an attacker to sniff out sensitive protected data, like passwords and cryptographic keys, from other processes running in the same CPU core with simultaneous multi-threading feature enabled.

The vulnerability, codenamed PortSmash (CVE-2018-5407), has joined the list of other dangerous side-channel vulnerabilities discovered in the past year, including Meltdown and Spectre, TLBleed, and Foreshadow.”