<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - Sky&#039;s Blog</title>
	<atom:link href="https://blog.red7.com/category/technology-and-geeky-stuff/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.red7.com/category/technology-and-geeky-stuff/security/</link>
	<description>Communicating in a networked world</description>
	<lastBuildDate>Thu, 14 Sep 2017 21:06:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.red7.com/wp-content/uploads/2018/01/skyhi-wind-icon-256x256-120x120.png</url>
	<title>Security Archives - Sky&#039;s Blog</title>
	<link>https://blog.red7.com/category/technology-and-geeky-stuff/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Backdoors &#8211; How Absolutely Stupid!</title>
		<link>https://blog.red7.com/backdoors-how-absolutely-stupid/</link>
					<comments>https://blog.red7.com/backdoors-how-absolutely-stupid/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Thu, 24 Dec 2015 03:00:40 +0000</pubDate>
				<category><![CDATA[Complexity]]></category>
		<category><![CDATA[Free Speech + Human Rights]]></category>
		<category><![CDATA[Frothy Concepts]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology and geeky stuff]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=3911</guid>

					<description><![CDATA[<p>I have not written on this subject because I just see everyone else is banging on Congress about how stupid it would be to install &#8220;backdoors&#8221; in commercial email and software services. But honestly, I&#8217;m a bit concerned right now because government pressure is being stepped up. A &#8220;backdoor&#8221; is a mechanism that allows a [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/backdoors-how-absolutely-stupid/">Backdoors &#8211; How Absolutely Stupid!</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-full wp-image-1344" src="/wp-content/uploads/2009/05/cloud-with-computers.jpg" alt="Cloud computing" width="64" height="64" />I have not written on this subject because I just see everyone else is banging on Congress about how stupid it would be to install &#8220;backdoors&#8221; in commercial email and software services. But honestly, I&#8217;m a bit concerned right now because government pressure is being stepped up.</p>
<p>A &#8220;backdoor&#8221; is a mechanism that allows a service provider or government to access the contents of a system without knowing users&#8217; passwords and without their knowledge. It is essentially a universal key that opens everything.</p>
<p>We hear government officials crying out that this is the only way they can protect the nation against attack. In other words, the government wants to have universal access to every electronic communication, or we will all die in flaming terrorist attacks.</p>
<p>So just why is this the stupidest idea in the world?<span id="more-3911"></span>Well it&#8217;s <span style="text-decoration: underline;">so incredibly stupid</span> because it is impossible to guarantee that a &#8220;universal key&#8221; that decrypts everything can be kept secret. The government&#8217;s argument make it sounds like there&#8217;s a little physical key (like a little golden metallic key, let&#8217;s say) that could be kept safe in a place like Fort Knox and only brought out when needed. And yes, would be separate keys or processes for each provider or company (one for Apple, one for Dell, one for AT&amp;T, one for Facebook) But encryption does NOT rely upon physical keys—that&#8217;s a dangerous argument.</p>
<p>There would be additional processes and safeguards on these keys, but essentially once a key is figure out, an entire company, entire industry, entire set of encryption processes, could be compromised.</p>
<p>With encryption, the  key is a sequence of numbers. You don&#8217;t have to break into a vault and &#8220;steal&#8221; the key to have universal access — you just have to <span style="text-decoration: underline;">figure out</span> what the key is, even independent of the guys who created it in the first place, and once you figure it out, you&#8217;re in and you have access to everything—past, present, future.</p>
<p><img decoding="async" class="alignright wp-image-3308" src="/wp-content/uploads/2011/02/sky-039.jpg" alt="sky-039" width="222" height="222" />Here are some common-sense reasons why this just can&#8217;t possibly work:</p>
<ol>
<li>If someone were to find a way to independently generate or figure out the key(s), they&#8217;d be able to read every encrypted message ever created. (It&#8217;s a bit more complex than this, but it&#8217;s close.)</li>
<li>The key(s) would immediately become the target of every foreign government&#8217;s security services. If one of them discovered the key (stole it, recreated it, hacked an easier way of duplicating it), you&#8217;d probably not know. Just suddenly everything would become transparent to them.</li>
<li>Crooks will immediately attempt to discover the secret key(s). Don&#8217;t underestimate these guys. They are superb hackers and they have many millions of dollars to spend working on this. They might succeed.</li>
<li>It&#8217;s even easier, however. The key(s) would be stored somewhere on computers. If crooks could hack into that computer, they could probably extract the key.</li>
<li>A disgruntled government employee might release the key(s). Think about Edward Snowden if you want to argue that any government anywhere is really capable of keeping everything secret all the time, and forever.</li>
<li>Once the key is &#8220;out&#8221; it&#8217;s out forever. There&#8217;s no calling it back. (There could be mitigating circumstances on this one, but it would still be a terrible meltdown.)</li>
<li>The key(s) doesn&#8217;t affect just crooks and terrorists. It would also affect commercial transactions, banking, credit cards, stock markets &#8230; in short everything that depends upon encryption could be compromised if the key(s) were hacked.</li>
<li>Oh, and public key encryption has existed for years. If the government were to require that in the future there be backdoors for universal decryption, any of the existing encryption systems (which would not have backdoors) could continue to be used. (As far we we know there is no universal key for today&#8217;s systems.)</li>
<li>You know the phrase &#8220;If guns are outlawed only outlaws will have guns.&#8221; Well if commercial operators are required to provide the government with backdoors into their systems, you can be sure that outlaws will not, and from then on, only the outlaws will have secure communications.</li>
</ol>
<p>Convinced yet?</p>
<p>Is that enough? Do you trust any government to do this, let alone to understand the magnitude of this Pandora&#8217;s Box?</p>
<p>&nbsp;</p>
<p>[1] Interesting <a href="http://www.infoworld.com/article/3016418/security/acts-of-terrorism-could-push-congress-toward-encryption-backdoors-in-2016.html" target="_blank">Infoworld article</a> about this.</p>
<p>[2] Problems with backdoors <a href="http://www.infoworld.com/article/3018029/virtual-private-network/listen-up-fbi-juniper-code-shows-the-problem-with-backdoors.html?token=%23tk.IFWNLE_nlt_infoworld_daily_2015-12-23&amp;idg_eid=50371a93cfc9adb7d98a3cfc2a99902f&amp;utm_source=Sailthru&amp;utm_medium=email&amp;utm_campaign=InfoWorld%20Daily:%20Afternoon%20Edition%202015-12-23&amp;utm_term=infoworld_daily#tk.IFW_nlt_infoworld_daily_2015-12-23" target="_blank">Infoworld article</a></p>
<p>The post <a href="https://blog.red7.com/backdoors-how-absolutely-stupid/">Backdoors &#8211; How Absolutely Stupid!</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/backdoors-how-absolutely-stupid/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3911</post-id>	</item>
		<item>
		<title>Even Robots.txt won&#8217;t keep the googlebot away</title>
		<link>https://blog.red7.com/robots-txt-googlebot/</link>
					<comments>https://blog.red7.com/robots-txt-googlebot/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Tue, 06 Nov 2012 18:23:54 +0000</pubDate>
				<category><![CDATA[Blogging]]></category>
		<category><![CDATA[Organizations and Sociology]]></category>
		<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social tools]]></category>
		<category><![CDATA[Technology and geeky stuff]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[googlebot]]></category>
		<category><![CDATA[search]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=3538</guid>

					<description><![CDATA[<p>Well am I ever surprised! I would have thought that inserting a robots.txt file that tells googlebot to &#8220;go away&#8221; would cause it to &#8220;not index the site.&#8221; User-agent: * Disallow: / Instead, I discovered that the googlebot may still spot the site and then put up a message saying that the site exists but [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/robots-txt-googlebot/">Even Robots.txt won&#8217;t keep the googlebot away</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-full wp-image-3539" style="border: 0px none; margin: 4px 12px;" title="FFF-TUSJ-g" src="/wp-content/uploads/2012/11/FFF-TUSJ-g.png" alt="" width="100" height="100" />Well am I ever surprised! I would have thought that inserting a <strong>robots.txt</strong> file that tells googlebot to &#8220;go away&#8221; would cause it to &#8220;not index the site.&#8221;</p>
<blockquote>
<p>User-agent: *<br /> Disallow: /</p>
</blockquote>
<p>Instead, I discovered that the googlebot may still spot the site and then put up a message saying that the site exists but is not indexed. i.e. the Googlebot still publicizes the existence of the site. It makes Google look like the <em>good guys</em> and us look like the <em>bad guys</em> for putting up a robots.txt. Yay for Google liberating all online information! Boo for us trying to keep our site un-indexed until we’re ready to make it public.<span id="more-3538"></span>I suppose if the site is public, they reason it&#8217;s OK to mention its existence. However, most of us did not intend for any results whatsoever to show up in Google, so having it say &#8220;the site exists but I can&#8217;t index it&#8221; is a big of a revelation! Beware of this if you are creating a pre-production test site &#8212; your site may still show up in Google searches. Instead, turn on some other protection &#8212; like the “Maintenance mode” plug-in for WordPress, so that not only sites but humans can’t use the site. Here&#8217;s kind what the Google result looks like:</p>
<blockquote style="background-color: #ffffff;">
<p><span style="color: #0000ff;">Mork-A-Bork » Uncategorized</span><br /> <strong><span style="color: #339966;">mork-a-bork.info/</span></strong></p>
<div style="text-align: left; color: #222222; margin-top: 5px; margin-bottom: 10px;">A description for this result is not available because of this site&#8217;s robots.txt — learn more</div>
</blockquote>
<p>The post <a href="https://blog.red7.com/robots-txt-googlebot/">Even Robots.txt won&#8217;t keep the googlebot away</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/robots-txt-googlebot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3538</post-id>	</item>
		<item>
		<title>Top sysadmin tools for iPad</title>
		<link>https://blog.red7.com/ipad-sysadmin-tools/</link>
					<comments>https://blog.red7.com/ipad-sysadmin-tools/#comments</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Sat, 16 Apr 2011 04:21:33 +0000</pubDate>
				<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Cyber-nomads]]></category>
		<category><![CDATA[Mobile devices]]></category>
		<category><![CDATA[Mobile issues]]></category>
		<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software and online tools]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=3228</guid>

					<description><![CDATA[<p>Digital nomads, you can finally and really be the system administrator for your cloud (and other) servers from your iPad. Since December, each time I’ve left town, I have intentionally left my MacBook Pro at home in favor of my iPad. I found that just having a few specific apps allowed me to fully administer [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/ipad-sysadmin-tools/">Top sysadmin tools for iPad</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-1344" style="border: 0pt none; margin: 2px 12px;" title="Cloud computing" src="/wp-content/uploads/2009/05/cloud-with-computers.jpg" alt="" width="64" height="64" />Digital nomads, you can finally and <em>really</em> be the system administrator for your cloud (and other) servers from your <strong>iPad</strong>. Since December, each time I’ve left town, I have intentionally left my MacBook Pro at home in favor of my iPad. I found that just having a few specific apps allowed me to fully administer my cloud servers from the pad. Please note that a bluetooth (or other) keyboard is required for some of these apps to function fully. But generally I can do everything I need to when I’m on the road.<strong><span id="more-3228"></span></strong></p>
<p><strong><img loading="lazy" decoding="async" class="size-full wp-image-2634 alignright" style="border: 0pt none; margin: 2px 12px;" title="iPad" src="/wp-content/uploads/2010/02/apple-ipad.png" alt="" width="201" height="257" />MY TOP APP PICKS FOR SYSTEM ADMINISTRATION ON iPAD</strong></p>
<ul>
<li><strong><a href="http://www.zinger-soft.com/" target="_blank">iSSH</a></strong>— gives you secure shell (SSH) access to your servers using name+password or digital certs. If you use a command-line editor on your server (I use <em>vi</em>), be aware that up-down-right-left arrows won’t really function if you use the onscreen keyboard, but from a bluetooth keyboard they do work! Recently I’ve also had trouble with <em>ESC</em>, and I’ve had to tap its onscreen “button” instead on the physical key. You can also configure iSSH to emit true function keys (which are needed for some configuration work—in <em>htop</em>, for instance).</li>
<li><strong><a title="1Password" href="http://agilewebsolutions.com/onepassword" target="_blank">1Password</a></strong>— what a great way to keep all those passwords in one place! And encrypted too. 1Password for iPad syncs with 1Password on my Mac through Dropbox. When I make a new password, or change one, it is always available on the iPad as soon as I need it. This way I can use those 20-character random passwords that I’d never remember if I had to commit them to memory.</li>
<li><a title="Dropbox" href="http://dropbox.com/" target="_blank"><strong>Dropbox</strong></a>— Well of course you already know I use Dropbox for sync’ing 1Password across devices. And you can do without it if you sync the two devices “locally” on wi-fi, but I would never remember to do it—Dropbox lets it happen more in real-time and effortlessly.</li>
<li><strong><a title="DropDAV" href="http://dropdav.com/" target="_blank">DropDAV</a></strong>— (Not an iPad app, but essential nevertheless) I need DropDAV because I have a buddy who watches my back and serves as sysadmin when I’m on those long air flights or otherwise indisposed, and he and I need to share <span style="text-decoration: underline;">documents</span>, which we do through DropBox. <a title="DropDAV" href="http://dropdav.com/" target="_blank"><strong>DropDAV</strong></a> isn’t an app, it’s a service. Sign up and it makes your DropBox documents available to Pages and Keynote through WebDAV services on DropDAV.</li>
<li><strong><a href="http://ios.wordpress.org/" target="_blank">WordPress</a></strong> app— HTML <em>textboxes</em> don’t scroll properly on Safari on the iPad. This is a really big problem if you’re trying to admin a WordPress blog in Safari. So the <strong>WordPress</strong> iPad app is a necessity, though you don’t really have access to all of the WP <span style="text-decoration: underline;">admin</span> features (it’s designed for bloggers, not admins), which means I’m constantly back and forth between this app and Safari even when I’m working on a single blog. This needs improvement, but I can make it work well enough for now.</li>
</ul>
<p><strong>PROBLEMS WITH THE iPAD</strong></p>
<ul>
<li>No <strong>Flash</strong>. This means I can’t fully utilize a lot of tools, like <a title="CloudKick" href="http://cloudkick.com/" target="_blank">Cloudkick,</a> when on the road because they use Flash extensively. (However, I can log in at CloudKick even with my Yubikey one-time-password USB device, as long as I have the iPad USB camera adapter with me. That’s a trick to be explained elsewhere.)</li>
<li>There’s no <strong>PGP</strong> mail encryption/decryption for the iPad mail app. Although I have other ways of dealing with encrypted mail when I’m on the road, this is still a big problem. If you rely on encrypted mail, be sure you have an alternative available when you’re traveling with your pad.</li>
</ul>
<p>&nbsp;</p>
<p>The post <a href="https://blog.red7.com/ipad-sysadmin-tools/">Top sysadmin tools for iPad</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/ipad-sysadmin-tools/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3228</post-id>	</item>
		<item>
		<title>Don&#8217;t rely on governments to solve your security problems</title>
		<link>https://blog.red7.com/dont-rely-on-government/</link>
					<comments>https://blog.red7.com/dont-rely-on-government/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Sun, 19 Dec 2010 22:00:09 +0000</pubDate>
				<category><![CDATA[Free Speech + Human Rights]]></category>
		<category><![CDATA[Frothy Concepts]]></category>
		<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology and geeky stuff]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=3202</guid>

					<description><![CDATA[<p>Far from solving all your problems, if you rely on government to solve your cyber-security problems, I think you’re more likely to end up with restricted access to the Internet and someone other than hackers evaluating your communications. And I mean this is a possibility not only from your own national government but due to [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/dont-rely-on-government/">Don&#8217;t rely on governments to solve your security problems</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-3203" style="border: 0pt none; margin: 6px 30px;" title="Parrot" src="/wp-content/uploads/2010/12/parrot.jpg" alt="" width="165" height="165" />Far from solving all your problems, <span style="text-decoration: underline;">if you rely on government to solve your cyber-security problems</span>, I think you’re more likely to end up with restricted access to the Internet and someone other than hackers evaluating your communications. And I mean this is a possibility not only from your own national government but due to future international “cooperation” among governments.</p>
<p>Here are five reasons why you have to build your own cyber-protection capabilities rather than relying on governments to solve any of your security (and cyber-attack) problems for you. And you have to be vigilant and aware of what’s going on that might put governments even more in control of your online communications, reducing the options you have available to communicate privately with others as well as to defend yourself.<span id="more-3202"></span></p>
<div class="headline">Five reasons you shouldn’t rely on government</div>
<ol>
<li>Government behavior recently shows that ultimately they (all?) want online communications to be available for them to read, even if they’re encrypted. The excuse is that terrorists and traitors use encrypted channels and therefore all communications must be readable by the authorities. Thus countries are fighting to secure warrantless wiretapping[1. Here’s what the <a href="http://www.eff.org/issues/nsa-spying" target="_blank">EFF says on warrantless wiretapping</a> &#8211; this is a great jumping off point for info], and to get hold of encryption keys (RIM/Blackberry[2. This has been going on for a couple of years with RIM/Blackberry, <a href="http://www.schneier.com/blog/archives/2008/05/blackberry_givi_1.html" target="_blank">here Bruce Schneier tells us what the issue was as early as 2008.</a>], Google[3. Read <a href="http://economictimes.indiatimes.com/tech/internet/Google-wont-share-encryption-keys-with-Indian-sleuths/articleshow/7109074.cms" target="_blank">article about Google’s response in Economic Times</a> (India) 16 December, 2010], etc.) so they can read Internet traffic.</li>
<li>Some governments (certainly the US that we know of) are already copying your communications into their data storage for later correlation and reference [4. <a href="https://www.eff.org/files/filenode/att/presskit/ATT_onepager.pdf" target="_blank">Download the EFF release on AT&amp;T diverting fiberoptic traffic in San Francisco to the NSA</a>.]. ISPs and telcos have gigabit taps in place at interconnect facilities that give government agencies unfettered access to the entire information flow. I know from secondhand reports that this happens in other countries—you can google-around for more leads on that.</li>
<li>Governments are now saying (the <strong>UN</strong> particularly is floating this idea) they want to create international agreements so governments can work together to help make the Internet a safer place. This is a bad, bad, bad idea[5. <a href="http://googleblog.blogspot.com/2010/12/governments-shouldnt-have-monopoly-on.html" target="_blank">Here’s what Vint Cerf</a> and others said, <a href="http://www.huffingtonpost.com/2010/12/17/un-internet-regulation_n_798457.html" target="_blank">according to the Huffington Post</a>.] because repressive governments would rather you not have the ability to blog freely, and if this turns into an international agreement, everyone will be reduced to the lowest-common denominator.</li>
<li>They’re talking about <em>kill switches</em>[6. See my article<em> <a href="/in-case-of-emergenc/" target="_self">In case of emergency, shut eyes and stagger in the dark</a></em>.]  that would shut down critical portions of net communications in the event of a government-declared emergency. And many governments already selectively kill some types of communication, walling off YouTube, or Google search, online news like the New York Times, or other services  when they cover something the nation’s governors do not like.</li>
<li>If they don’t like something you say, then governments, or patriotic individuals, or attackers-for-hire will shut you down with denial of service attacks. So really you have to have your own plan in place and be ready to execute it. Your plan might just be to shut down, but at least you should be thinking about it in advance. And I’m telling you that governments are not going to be able to step in and protect you from that—it requires action at the level of your hosting facility.</li>
</ol>
<p>My bottom line is that you yourself have to take care of your security to the degree you can.</p>
<div class="headline">The Details</div>
<p>First, (#1 above) you need to encrypt your communications with your business partners and friends. There are lots of ways you can do this and all of them require some amount of work, and that small amount of work has always been a barrier. You gotta get over that barrier and do it!</p>
<p>Second (#2) if your communications are encrypted and are copied for later analysis, someone who wants to snoop on you probably won’t like it, but you still are safer because it may take a considerable time to break that encryption. And although 99.9% of what you say won’t be of interest anyway, unless you’re plotting some evil deed, it’s possible for people to misinterpret what you’re saying and go after you. And on top of that, some of your personal conversations might just be embarrassing.</p>
<p>On #3, it’s just a really bad idea for governments to make policy about what can be carried on the Internet because the repressive governments will speak loudest, and any uniform international rules that would be formed would aim to protect the <span style="text-decoration: underline;">interests of the most repressive governments</span>, not the rights of individuals. They’ll make it illegal to “advocate overthrow of the government” or “to offend national social norms” and since these differ so radically from one place to another, we will all be bound by rules that severely restrict our ability to speak openly about practically anything.</p>
<p>On #4, cutting access to the Internet in the event of a government-declared emergency immediately impedes the ability of civil society and NGOs to work across borders to stop any hostilities that might arise. It would plunge the net into darkness, where none of us could function. We see evidence of this in the ways <a href="/chinas-golden-shield-the-great-firewall-of-china/" target="_self"><em>China’s Golden Shield</em></a> (the Chinese firewall) is used to suppress any mention of topics the government does not wish to see discussed. There is no broad freedom of speech in countries that do this kind of filtering and blocking, and if this were institutionalized worldwide so that we could not offend the Chinese government (<span style="text-decoration: underline;">they</span> say offend the Chinese people, but we know it’s the government objecting, not the people—Chinese citizens are certainly as able as humans anywhere to accept diversity of opinions). Forming regulations that would apply worldwide would severely restrict freedom of speech in the most “free” countries in order to reduce it to the level acceptable to all repressive states.</p>
<p>And finally, #5 denial-of-service attacks are becoming the norm when someone doesn’t like what you’re saying. These are the “private” equivalent of setting up a firewall to stop your opinion from entering a country (like China) by shutting down your “printing press” as it were.</p>
<hr class="hr_dashed" />
<div class="headline">The footnotes and resources</div>
<p>Why the parrot photo? Well, I’ve long had a policy of “if you can’t say something new and unique, don’t say anything at all” so I have not, so far,   parroted any comments on Wikileaks or Julian Assange, though there are many hints about the future of free speech, journalism, and government involvement in all of this, in what you can read almost anywhere online!</p>
<p>The post <a href="https://blog.red7.com/dont-rely-on-government/">Don&#8217;t rely on governments to solve your security problems</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/dont-rely-on-government/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3202</post-id>	</item>
		<item>
		<title>Who is looking at your email history?</title>
		<link>https://blog.red7.com/your-online-history/</link>
					<comments>https://blog.red7.com/your-online-history/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Mon, 02 Aug 2010 16:15:45 +0000</pubDate>
				<category><![CDATA[Free Speech + Human Rights]]></category>
		<category><![CDATA[Mobile issues]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2994</guid>

					<description><![CDATA[<p>Who has access to your email addresses and your email-writing history? The Washington Post reported last week that the Obama administration is seeking to modify the 1993 Electronic Communications Privacy Act so that Internet service providers must turn over transaction records on email communications and possibly web browsing records, upon receipt of a “national security [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/your-online-history/">Who is looking at your email history?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="headline"><img loading="lazy" decoding="async" class="alignleft size-full wp-image-1344" style="border: 0pt none; margin: 4px 12px;" title="Cloud computing" src="/wp-content/uploads/2009/05/cloud-with-computers.jpg" alt="" width="64" height="64" />Who has access to your email addresses and your email-writing history?</div>
<p><a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/07/28/AR2010072806141.html" target="_blank">The Washington Post reported last week</a> that the Obama administration is seeking to modify the 1993 Electronic Communications Privacy Act so that Internet service providers must turn over transaction records on email communications and possibly web browsing records, upon receipt of a “national security letter” from the FBI. This particular legal process doesn’t require review by a judge—unlike search warrants.<sup>[1]</sup></p>
<p>The law does not allow access to the <span style="text-decoration: underline;">contents</span> of those emails without judicial oversight&#8230;only the more externally-visible addressing information, and that does tend to be what email systems log and archive. On the other hand, the term “electronic communication transactional records” which is what the government could require ISPs to divulge, is not defined in federal statutes, according to the Washington Post.<sup>[2]</sup> And so it could conceivably be extended to include other person-to-person communications, such as social media contacts</p>
<div class="headline">Previous attempts to access your reading history</div>
<p><img loading="lazy" decoding="async" class="size-full wp-image-1238 alignright" style="border: 0pt none; margin: 2px 12px;" title="The Social Graph of Malware" src="/wp-content/uploads/2009/04/the-social-graph-of-malware.jpg" alt="" width="96" height="96" />This is the same process the Bush administration used, in the early 2000s, to ask libraries to turn over the records of books checked out by patrons, which was strongly resisted by librarians at that time.</p>
<p>Phone companies keep records of all of the numbers you call, and these are subject to the same access rules. This has never been a question, and most people in the US are probably at least marginally aware of this.</p>
<blockquote><p>The real question isn’t whether someone is reading your email addresses and headers—it’s <em>how they are interpreting the titles, subjects, and names of the people you are corresponding with</em>. In the <a href="http://en.wikipedia.org/wiki/Joe_mccarthy" target="_blank">McCarthy era</a> here in the US, you could be blacklisted for associating with the wrong people.</p>
<p>If you have an inquiring mind, would you want someone to judge you <span style="text-decoration: underline;">based on the titles</span> of the books or publications you’re reading? Or the subjects and addressees of your email?</p></blockquote>
<hr class="hr_dashed" />[1] <a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/07/28/AR2010072806141.html" target="_blank">The Washington Post</a> — original article 29 July 2010</p>
<p>[2] <a href="http://www.nytimes.com/2010/07/30/opinion/30fri1.html?_r=1" target="_blank">The New York Times</a> 30 July, 2010 — secondary report and opinion</p>
<p>A whole nother ancillary question is whether your ISP actually keeps these records or not. If they do not, are they then exempt from having to turn over any records, or will the government require that they keep such records in the future? Some ISPs intentionally do not keep certain kinds of records, which helps keep your use of certain services anonymous. And, for instance, I’d guess that very few ISPs, if any, keep records of your browsing history, and this makes it prohibitively difficult to document all of the web sites you’ve visited.</p>
<p>The post <a href="https://blog.red7.com/your-online-history/">Who is looking at your email history?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/your-online-history/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2994</post-id>	</item>
		<item>
		<title>Private armies in cyberspace? A kill switch on the Internet?</title>
		<link>https://blog.red7.com/private-armies-in-cyberspace/</link>
					<comments>https://blog.red7.com/private-armies-in-cyberspace/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Wed, 14 Jul 2010 16:09:19 +0000</pubDate>
				<category><![CDATA[CyberSpark]]></category>
		<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cyber defense]]></category>
		<category><![CDATA[cyber war]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2800</guid>

					<description><![CDATA[<p>The government of the USA was constituted “to provide for the common defense” among other things.[1] Unfortunately the line between public responsibility and private responsibility for defense in cyberspace could be rather blurry. Clearly when there is warfare in the physical world the combatants are also likely to utilize cyber tactics of some sort, even [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/private-armies-in-cyberspace/">Private armies in cyberspace? A kill switch on the Internet?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-991" style="border: 0pt none; margin: 4px 12px;" title="cloud" src="/wp-content/uploads/2009/01/cloud.jpg" alt="" width="64" height="64" />The government of the USA was constituted “to provide for the common defense” among other things.<sup>[1]</sup> Unfortunately the line between public responsibility and private responsibility for defense in cyberspace could be rather blurry.</p>
<p>Clearly when there is warfare in the physical world the combatants are also likely to utilize cyber tactics of some sort, even if only for informational or propaganda purposes, but more likely as powerful tactics to take down their target’s ability to respond quickly or in a focused manner. Because governments aren’t really equipped to handle these types of attacks, which would include attacks against private infrastructure, not just government systems, they’d have to rely on private companies, individuals and groups — essentially private armies — to deflect or thwart any attack.<span id="more-2800"></span></p>
<p>There are some problems inherent in cyber attacks that make any kind of defense really tricky:</p>
<p>* During a cyber attack against private or military targets online, one might not be able to determine whether the attacker is civilian, criminal or military;</p>
<p>* Online <em>citizen militias</em> (hackers motivated by patriotism) could be impossible to distinguish from organized military cyber-attackers;</p>
<p>* <em>Collateral cyber-damage</em> to (or the freezing of, or interference with) the economic mechanisms that make daily life possible could paralyze large areas if not whole countries; the idea that a government (say the President of the US under the proposed cybersecurity bill) could <a href="http://www.cio.com/article/597783/Senate_Panel_Approves_Controversial_Cybersecurity_Bill?source=CIONLE_nlt_infosec_2010-06-25" target="_blank">shut down key elements of the Internet for up to 120 days</a> without legislative recourse[2], could be more dangerous than the attacks themselves;</p>
<p>* An ISP in any particular country (say the US, for example) might be conflicted about whether to allow a sudden flood of traffic to pass through its network to “attack” some foe, or whether to stop that flood in order to preserve its ability to serve  customers—in fact the ISP probably wouldn’t be able to tell the difference;</p>
<p>In a sense, were someone to “shut off the Internet,” which proponents say S 3480 does not allow, it would be suicidal, since the defenders would also lose their ability to communicate with each other and to thwart any attack. Turning off the Internet would not only deny your opponent a playing field, but would deny defenders the ability to respond. And the collateral damage would be that all financial, manufacturing, transportation and other systems that depend on the net would also shut down</p>
<p>Lots of room for debate, but clearly governmental agencies and legislatures are beginning to think about the necessary means and the possible limits of their actions.</p>
<hr />
<p>[1] <em>We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for the common defense, promote the general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity, do ordain and establish this Constitution for the United States of America.</em></p>
<p>[2] The <a href="http://hsgac.senate.gov/public/?FuseAction=home.Cybersecurity" target="_blank">Protecting Cyberspace as a National Asset Act</a> of 2010; some fear that this bill provides a “kill switch” the President of the US could use to “turn off” the Internet;</p>
<p>[-] <a href="http://www.guardian.co.uk/world/2010/may/23/us-appoints-cyber-warfare-general" target="_blank"><em>US Appoints first Cyberwarfare General</em></a> in guardian.co.uk</p>
<p>[-] EU Committee in UK on <a href="http://www.publications.parliament.uk/pa/ld200910/ldselect/ldeucom/68/6802.htm" target="_blank">protecting Europe against large-scale cyber-attacks</a></p>
<p>The post <a href="https://blog.red7.com/private-armies-in-cyberspace/">Private armies in cyberspace? A kill switch on the Internet?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/private-armies-in-cyberspace/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2800</post-id>	</item>
		<item>
		<title>Why “Shadows in the Cloud” should open your eyes</title>
		<link>https://blog.red7.com/shadows-in-the-cloud/</link>
					<comments>https://blog.red7.com/shadows-in-the-cloud/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Fri, 09 Jul 2010 16:09:00 +0000</pubDate>
				<category><![CDATA[CyberSpark]]></category>
		<category><![CDATA[Free Speech + Human Rights]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2773</guid>

					<description><![CDATA[<p>The public release of the document Shadows in the Cloud is important because this document contains some very important messages—stated very clearly—that haven’t really been said publicly before. If you’re not a cyberspace expert and don’t care for geek talk, you may think it’s just another report on cyber espionage. But the messages are important [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/shadows-in-the-cloud/">Why “Shadows in the Cloud” should open your eyes</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-991" style="border: 0pt none; margin: 4px 12px;" title="cloud" src="/wp-content/uploads/2009/01/cloud.jpg" alt="" width="64" height="64" />The public release of the document <a href="http://shadows-in-the-cloud.net" target="_blank">Shadows in the Cloud</a> is important because this document contains some very important messages—stated very clearly—that haven’t really been said publicly before.</p>
<p>If you’re not a cyberspace expert and don’t care for geek talk, you may think it’s just another report on cyber espionage. But the messages are important for everyone. And my point is that they are very clearly explained!</p>
<p><strong>Ron Diebert</strong> and <strong>Rafal Rohozinski</strong>, in their Foreward, point out that crime and espionage go together. Or that wherever one goes, the other is soon to follow.</p>
<blockquote><p><img loading="lazy" decoding="async" class="size-full wp-image-2911 alignright" style="border: 0pt none; margin: 4px 12px;" title="drive-by-illustration" src="/wp-content/uploads/2010/04/drive-by-illustration.jpg" alt="" width="130" height="120" />They don’t say this directly—these are my words: Crime, espionage (and warfare) seep into the interstitial spaces of society and occupy any vacuum they find. And from there they can grow to occupy the whole of the space, like a mold, fungus, or rot.</p>
<p>What we are seeing in online attacks against free speech sites these days, particularly drive-by attacks<sup>[1]</sup>, is that they do not seem to be politically or idealistically motivated, instead they are opportunistic and (presumably) economically motivated because they&#8217;re focused on injecting spambots and trojans, not on altering the message of the nonprofit web site.</p></blockquote>
<hr />
<p>[1] See <a href="http://cyberspark.net/home.html" target="_blank">CyberSpark.net and click “drive-by</a>” on that page</p>
<p>The post <a href="https://blog.red7.com/shadows-in-the-cloud/">Why “Shadows in the Cloud” should open your eyes</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/shadows-in-the-cloud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2773</post-id>	</item>
		<item>
		<title>DDoS, EDoS, then &#8220;that bad aftertaste&#8221;</title>
		<link>https://blog.red7.com/that-bad-aftertaste/</link>
					<comments>https://blog.red7.com/that-bad-aftertaste/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Wed, 07 Jul 2010 16:09:06 +0000</pubDate>
				<category><![CDATA[CyberSpark]]></category>
		<category><![CDATA[Free Speech + Human Rights]]></category>
		<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[The Social Graph of Malware]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2846</guid>

					<description><![CDATA[<p>In early June, I was in a nice rainy East Coast US city for meetings dealing with particularly thorny issues related to ways the Internet experience is being killed off for regular folks—and for institutions (NGOs) that are promoting free speech and human rights. Over a small breakfast, I sketched in my book some notes [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/that-bad-aftertaste/">DDoS, EDoS, then &#8220;that bad aftertaste&#8221;</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-1086" style="border: 0pt none; margin: 2px 12px;" title="seismogram-96x96" src="/wp-content/uploads/2009/03/seismogram-96x96.jpg" alt="" width="96" height="96" />In early June, I was in a nice rainy East Coast US city for meetings dealing with particularly thorny issues related to ways the Internet experience is being killed off for regular folks—and for institutions (NGOs) that are promoting free speech and human rights. Over a small breakfast, I sketched in my book some notes about the progression of malware over time. Basically paralleling <a href="http://thesocialgraphofmalware.com/home/" target="_blank">the development I describe in my site The Social Graph of Malware</a>, malware has gone from simple and juvenile defacement of web sites to become sophisticated and bandwidth-hogging socially-engineered schemes designed to get people to fall for a purchase they didn’t want to make,  or just to click a link to enroll their computer in a network of zombies poised to conduct nasty attacks on other people.<span id="more-2846"></span>What strikes me as the next stage in targeted attacks<sup>[1]</sup> hasn’t really been spoken of much, and the attacks only began in earnest during mid-2009—it’s that I think we’re entering an era in which attacks will be positioned to create a “bad aftertaste” and thus kill off the visitor/audience for some big web sites. The attacks are, in a sense, damaging the reputation, good will, and the <em>brand</em> of the attacked sites. These attacks take advantage of the <a href="http://www.google.com/tools/firefox/safebrowsing/" target="_blank">Google Safe Browsing</a> interface now <a href="http://www.mozilla.com/en-US/firefox/phishing-protection/" target="_blank">available in Firefox</a> and Chrome browsers, and the (new) <a href="http://brightcloud.com/" target="_blank">BrightCloud</a> toolbar for <a href="https://addons.mozilla.org/en-US/firefox/addon/161870/" target="_blank">Firefox</a> and for <a href="https://chrome.google.com/extensions/detail/imhcbdomggfmhmaeicplciogjbfamkep?hl=en" target="_blank">Chrome</a>—both of which alert a web user that they are about to use a web site that could contain malware [see diagram]. A would-be site visitor is presented with one of these “warnings” and is dissuaded from viewing the site. (Once the site has been cleaned up, the warning disappears, and visitors may decide to click through and go to the site anyway, if they wish.) The problem is that you are left with the <em>bad aftertaste<strong> </strong></em>of having gone to a legitimate site, seen this explicit warning, and you may decide never to go back even if the warning has been removed!</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2864" title="blocking-diagram" src="/wp-content/uploads/2010/06/blocking-diagram.jpg" alt="" width="509" height="297" /></p>
<p><!--more--></p>
<p>In prior years, attacks have been positioned to “take down” legitimate businesses by denying access to their sites [DDoS].<sup>[2]</sup> Soon it was discovered (and is not widely exploited yet) that if an attacker simply hammers a site so hard that the defending organization has to dedicate more resources (read “money”) to defense, they can wear down the organization by depleting its budget and even its “will to stay alive online.” This doesn’t work if the attacker is just exploiting a site to drive traffic to its own illegitimate sales site, but it <span style="text-decoration: underline;">does</span> work if the attacker’s intent is to take the organization down.</p>
<blockquote><p>I already see evidence of small to medium attacks of the economic sort, and predict that we will see far more of them during the remainder of 2010 and 2011. I am working with NGOs now to prevent this type of “bad aftertaste” attack trend, and will report on how it’s going as I gather more information and evidence.</p></blockquote>
<p>To get a feel for how much this is happening, see the <a href="http://stopbadware.org/" target="_blank">StopBadware</a> and the <a href="http://badwarebusters.org/" target="_blank">BadwareBusters</a> web sites (forums where people are discussing these attacks and their remediation).</p>
<hr class="hr_dashed" />[1] Many attacks taking place on web site today are <em>opportunistic</em> rather than <em>targeted</em>, meaning that an attacker finds a web server that can be exploited and compromised and then uses it regardless of who it represents or affects. By and large, these attackers want to remain undiscovered, if possible, so the compromised server doesn’t get fixed any time soon. Therefore, it’s usually a “silent” attack with no immediately visible consequences on the web page.</p>
<p>[2] (Distributed) <a href="http://en.wikipedia.org/wiki/Denial-of-service_attack" target="_blank">Denial of Service attacks</a> bog down the target web servers so they can’t respond to legitimate requests from customers. They make it impossible to reach the business or organization. In some cases, the attacker asks for a “ransom” payment to stop the attack, is other cases they conduct a short-lived attack to make a protest or prove a point, and in some cases they continue their attack long enough to have a direct economic impact on the target.</p>
<p>The post <a href="https://blog.red7.com/that-bad-aftertaste/">DDoS, EDoS, then &#8220;that bad aftertaste&#8221;</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/that-bad-aftertaste/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2846</post-id>	</item>
		<item>
		<title>Reclaim your Facebook privacy</title>
		<link>https://blog.red7.com/reclaim-your-facebook-privacy/</link>
					<comments>https://blog.red7.com/reclaim-your-facebook-privacy/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Wed, 26 May 2010 02:04:01 +0000</pubDate>
				<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Facebook]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2805</guid>

					<description><![CDATA[<p>Neat idea &#8211; although ReclaimPrivacy.org has gone away, you still may want to scan your Facebook privacy settings to see exactly how private you might not be! Comparitech offers to guide you through this. Try it out. Comparitech&#8217;s page also describes privacy issues you might want to address on google (gmail and google+) and suggestions on avoiding [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/reclaim-your-facebook-privacy/">Reclaim your Facebook privacy</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<table border="0" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td><a href="http://reclaimprivacy.org/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignleft size-full wp-image-2806" style="border: 0pt none; margin: 2px 12px;" title="ReclaimPrivacy.org" src="/wp-content/uploads/2010/05/reclaim-privacy-org.png" alt="" width="67" height="67" /></a>Neat idea &#8211; although <strong>ReclaimPrivacy.org</strong> has gone away, you still may want to scan your Facebook privacy settings to see exactly how private you might not be! <a href="https://www.comparitech.com/blog/vpn-privacy/privacyfix-is-no-more-but-you-can-still-protect-yourself-heres-how/" target="_blank" rel="noopener">Comparitech</a> offers to guide you through this. Try it out.</td>
</tr>
<tr>
<td>Comparitech&#8217;s page also describes privacy issues you might want to address on google (gmail and google+) and suggestions on avoiding tracking in browsers. I thought I had most everything set pretty well on my Facebook account, but I was a bit surprised at my results (back in 2010). The old ReclaimPrivacy piece of code could fix the settings for you, but yes, you can do it all yourself if you just follow all the steps. <span id="more-2805"></span></td>
</tr>
<tr>
<td><a href="http://mattmckeon.com/facebook-privacy/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignleft size-full wp-image-2813" style="border: 0pt none; margin: 2px 12px;" title="Facebook privacy visualization" src="/wp-content/uploads/2010/05/facebook-privacy-viz.jpg" alt="" width="178" height="174" /></a>A nice visualization of the erosion of privacy on Facebook is available from <a href="http://mattmckeon.com/facebook-privacy/" target="_blank" rel="noopener">Matt McKeon</a>. It covers the period 2005 to April 2010.</td>
</tr>
</tbody>
</table>
<p>The post <a href="https://blog.red7.com/reclaim-your-facebook-privacy/">Reclaim your Facebook privacy</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/reclaim-your-facebook-privacy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2805</post-id>	</item>
		<item>
		<title>Google Chinese-language search, Hong Kong, and Internet Cantonization</title>
		<link>https://blog.red7.com/google-hong-kong-and-cantonization/</link>
					<comments>https://blog.red7.com/google-hong-kong-and-cantonization/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Mon, 29 Mar 2010 01:00:36 +0000</pubDate>
				<category><![CDATA[Communicating]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Organizations and Sociology]]></category>
		<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2719</guid>

					<description><![CDATA[<p>So the “solution” to providing uncensored Chinese-language search, at least right now (beginning 22 March, 2010), is to have Chinese citizens use google.com.hk (hk==Hong Kong) rather than mainland-based google.cn. I guess it’s a breakthrough idea to do this, since under Hong Kong law, the uncensored search is legal, but of course the arguments going on [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/google-hong-kong-and-cantonization/">Google Chinese-language search, Hong Kong, and Internet Cantonization</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-2698" style="border: 0pt none; margin: 2px 12px;" title="goo" src="/wp-content/uploads/2010/03/goo.jpg" alt="" width="64" height="64" />So the “solution” to providing uncensored Chinese-language search, at least right now (beginning 22 March, 2010), is to have <a href="http://googleblog.blogspot.com/2010/03/new-approach-to-china-update.html" target="_blank">Chinese citizens use google.com.hk (hk==Hong Kong) rather than mainland-based google.cn</a>. I guess it’s a breakthrough idea to do this, since under Hong Kong law, the uncensored search is legal, but of course the arguments going on these days about restrictive access to the Internet have to do with nations trying to restrict the access of their citizens <em>based on physical location</em>. And the location of a server is important because the local authorities can come in and physically shut you down.</p>
<p>But the great firewall is already blocking Google.com.hk content, as would be expected.<span id="more-2719"></span></p>
<blockquote>
<p>We believe this new approach of providing uncensored search in  simplified Chinese from <a href="http://www.google.com.hk/">Google.com.hk</a> is a sensible solution to the challenges we&#8217;ve faced—it&#8217;s entirely  legal and will meaningfully increase access to information for people in  China. —David Drummond, Google</p>
</blockquote>
<p><strong>An experiment gone wrong</strong>: I’m glad they did this, but well, <span style="text-decoration: underline;">why didn’t they do it this way in the first place</span>? Why all the hair-tearing and gnashing of teeth while making the decision, and then put an office and servers in mainland China in the first place, and now have to revisit the decision? Hmmm. To many executives I’ve worked with, that would be a terrible admission of weakness, but to engineers (and to more and more investors) it’s just something they tried that didn’t work, and so they moved on.</p>
<p><strong>When it started (2006)</strong>: Here’s a report from Human Rights Watch about the new Google.cn service, <a href="http://www.hrw.org/en/reports/2006/08/09/race-bottom" target="_blank"><strong>Race to the Bottom</strong></a>, written at that time.</p>
<p><strong>The <em>cantonization*</em> of the Internet</strong>: Ultimately what I’m concerned about is that the Internet is fragmenting into  national enclaves or <em>cantons</em> where 1) content from “outside” is filtered or prohibited, and 2) what can be written by citizens is severely restricted. Most likely that’s not exactly what the early Internet developers were expecting in 1973. [also see <em><a href="http://en.wikipedia.org/wiki/Canton" target="_blank">canton</a></em>]</p>
<blockquote>
<p>What’s interesting to me, working on the edge of network security, is that the law-abiding citizens of many countries are going to be denied open access to information while hackers (who are “criminals” by their own national standards), who circumvent the technologies and the law, will probably have the most complete access to the wealth of information and communication taking place on the Internet. —Sky</p>
</blockquote>
<p> </p>
<hr class="hr_dashed" />
<p>Some good background viewing and reading on the issue:</p>
<p>Yeah, I’m calling it <em><span style="text-decoration: underline;">Canton</span>ization</em> rather than the traditional term, balkanization. I think it’s more appropriate to the Chinese situationcanton. [&#8220;Canton&#8221; comes from the Portuguese pronunciation of Guangdong, the Chinese province.]</p>
<p><em><a href="http://odeo.com/episodes/23574792-What-Will-Happen-If-Countries-Draw-National-Boundaries-On-the-Internet" target="_blank">What will happen if countries draw international borders on the Internet</a></em>? [2008, Odeo, MIT] And some comments <a href="http://www.laitman.com/2008/11/what-will-happen-if-countries-draw-national-boundaries-on-the-internet/" target="_blank">on Laitman.com</a></p>
<p><a href="http://hakpaksak.wordpress.com/2008/12/10/apples-itunes-npr-barriers-to-giving-and-the-%E2%80%9Cappliancing%E2%80%9D-of-national-boundaries/" target="_blank">Apple’s iTunes, NPR, Barriers to Giving, and the “Appliancing” of National Boundaries</a> [2008] Some materials can only be downloaded within certain geographical areas, and it may be illegal to take them into certain countries due to local restrictions (wipe your computer before you travel&#8230;)</p>
<p>Adrian Monck, <a href="http://adrianmonck.com/2008/12/unrequired-reading-161208-to-171208/" target="_blank">Unrequired Reading</a> &#8211; particularly the last part where he points out that Google is [December 2008] becoming able to negotiate with national governments on what will or won’t be done with respect to searches performed by residents of their countries.</p>
<p>The post <a href="https://blog.red7.com/google-hong-kong-and-cantonization/">Google Chinese-language search, Hong Kong, and Internet Cantonization</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/google-hong-kong-and-cantonization/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2719</post-id>	</item>
		<item>
		<title>No chance for true security?</title>
		<link>https://blog.red7.com/no-chance-for-true-security/</link>
					<comments>https://blog.red7.com/no-chance-for-true-security/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Thu, 28 Jan 2010 17:15:13 +0000</pubDate>
				<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software and online tools]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ngo in-a-box]]></category>
		<category><![CDATA[security in-a-box]]></category>
		<category><![CDATA[viruses]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2615</guid>

					<description><![CDATA[<p>Is security dead on the Internet? Yeah, it probably is—as long as we rely on software other people have written[1]. Unless you’re capable of writing all of your own software, without any errors, and keeping it isolated from software written by anyone else, you’re never going to have a secure digital life[2]. But there are [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/no-chance-for-true-security/">No chance for true security?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="http://security.ngoinabox.org/"><img loading="lazy" decoding="async" class="size-full wp-image-2618 alignleft" style="border: 0pt none; margin: 2px 12px;" title="security-in-a-box-175" src="/wp-content/uploads/2010/01/security-in-a-box-175.jpg" alt="" width="175" height="63" /></a>Is security dead on the Internet? Yeah, it probably is—as long as we rely on software other people have written<sup>[1]</sup>. Unless you’re capable of writing all of your own software, without any errors, and keeping it isolated from software written by anyone else, you’re never going to have a secure digital life<sup>[2]</sup>.</p>
<p>But there are things you can do to protect yourself. <a href="http://ngoinabox.org/" target="_blank">NGO-in-a-box</a> has developed <a href="http://security.ngoinabox.org/" target="_blank"><em>Security-in-a-box, a set of tools and tactics for your digital security</em></a>. Worth taking a look!</p>
<p>It’s often said that “if we can envision it, we can create it,” but in the world of computer (and network) software this is only partially true. We can attempt to create it, but it will always have bugs in it. And those bugs are the chinks in the armor that allow malware to work and cyberwarfare to succeed.</p>
<hr class="hr_dashed" />[1] That’s because I can write a perfect program with no bugs, but nobody else can. <img loading="lazy" decoding="async" class="alignnone size-full wp-image-2622" title="smiley wink 21x21 from skype" src="/wp-content/uploads/2010/01/wink-21x21.jpg" alt="" width="21" height="21" /></p>
<p>[2] See also <em><a href="http://thesocialgraphofmalware.com/" target="_blank">The Social Graph of Malware</a></em>, my site where I explore ways in which social engineering is used by the bad guys to get malware onto your computer.</p>
<p>The post <a href="https://blog.red7.com/no-chance-for-true-security/">No chance for true security?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/no-chance-for-true-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2615</post-id>	</item>
		<item>
		<title>Improved my Cable Broadband speed 3x (DOCSIS)</title>
		<link>https://blog.red7.com/improved-broadband-speed-3x/</link>
					<comments>https://blog.red7.com/improved-broadband-speed-3x/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Wed, 20 Jan 2010 17:15:13 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology and geeky stuff]]></category>
		<category><![CDATA[broadband]]></category>
		<category><![CDATA[cable modem]]></category>
		<category><![CDATA[DOCSIS]]></category>
		<category><![CDATA[modem]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2503</guid>

					<description><![CDATA[<p>Sound like spam? “Improved my cable broadband speed 3x?” Here’s the punchline: I got a 3x improvement in speed on my cable broadband service, but had to find and avoid a technical problems that is probably a security feature. And the DOCSIS 3 standard and modem is great. Read on&#8230; For months now, my Comcast [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/improved-broadband-speed-3x/">Improved my Cable Broadband speed 3x (DOCSIS)</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-1722" style="border: 0pt none; margin: 2px 12px;" title="Comcast speed visualization" src="/wp-content/uploads/2009/07/comcast-visualization.jpg" alt="" width="96" height="92" />Sound like spam? “Improved my cable broadband speed 3x?”</p>
<p>Here’s the punchline: I got a 3x improvement in speed on my cable broadband service, but had to find and avoid a technical problems that is probably a security feature. And the <a href="http://docsis.org/" target="_blank">DOCSIS</a> 3 standard and modem is great. Read on&#8230;<span id="more-2503"></span></p>
<p>For months now, my Comcast broadband (delivered by cable, and very pricey here in the US—my French friends pay 1/3 what I pay for essentially the same service) has been flaky. It has been dropping out for a couple of hours at a time, at other times getting really slow. Comcast customer service was nice about it—they were happy to talk to me and to ‘reset’ the modem remotely each time I called, but the fix only lasted an hour or two.</p>
<p>Two nights ago, right at midnight, the cable modem stopped working entirely. I called Comcast and they said ”we can ’see’ the modem and it looks fine” but the indicator light was off and it just wasn’t transmitting any data. So they agreed I could swap it out for another modem.</p>
<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-2511" style="border: 0pt none; margin: 2px 12px;" title="Motorola SB6120 Cable Modem" src="/wp-content/uploads/2010/01/sb61201.jpg" alt="" width="141" height="157" />The next afternoon I went to a local electronics store (Fry’s in Palo Alto) and bought a Motorola “SurfBoard” SB6120 modem. I’m not favoring Motorola here, although I used their mobile phones for over 15 years, and as a child in Illinois a good family friends were the brother and sister of Paul Galvin, founder of Motorola. It was just the one DOCSIS 3 modem that Fry’s had on the shelf. And the price was OK—higher than a DOCSIS 2, but the performance was supposed to be better.</p>
<p>And, well, it <span style="text-decoration: underline;">was</span> better! A lot better.</p>
<p><a href="http://docsis.org/" target="_blank">DOCSIS</a><sup>[1]</sup> 3 provides multiple channels, which it gangs together (called <em>bonding</em>) to give you higher speed from one cable connection. The cable operates at a bandwidth/frequency around 650mHz so it has plenty of bandwidth available (which is, of course, shared across users down the street from me, but <span style="text-decoration: underline;">sometimes</span> it’s all mine!).</p>
<p>So when I plugged in the new modem (and after calling Comcast tech support, who <em>provisioned</em> it for me in about 5 minutes) I was up and running. I plugged my MacBook into the modem, got an IP address, tested, and found i was running at over 20mbs. Fantastic! A solid 20mbs.<sup>[2]</sup></p>
<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-2509" title="lightning-left" src="/wp-content/uploads/2010/01/lightning-left.jpg" alt="" width="74" height="71" />Oh, and what was the surprise? Well, it turns out that the first device that you plug into “your” side of the modem is registered by that modem as its <span style="text-decoration: underline;">one and only router</span>. Nothing else that you plug in after that is even recognized by the modem. (It apparently uses the MAC address of the Ethernet interface on the device to recognize which device is the one it will talk to.) So you have to be careful to power-cycle the modem if you plug in a new router (I was doing my testing using a MacBook plugged directly into the modem, but then plugged in a Linksys router, which couldn’t talk to the Internet through the modem until I power-cycled the modem). I guess this is a good security procedure, but if you encounter it when you’re installing a new modem, it could waste hours of your time—it took me 4 hours of my time, and an hour on the phone with Comcast, to figure it out.)</p>
<hr class="hr_dashed" />
<p style="text-align: left;">[1] The best source I found for <a href="http://bradyvolpe.com/2009/10/12/docsis30-tutorial-introduction/" target="_blank">DOCSIS 3 information was the Brady Volpe site</a>. The actual <a href="http://www.cablelabs.com/cablemodem/specifications/index.html" target="_blank">DOCSIS spec</a> is online in the <a href="http://www.cablelabs.com/cablemodem/" target="_blank">DOCSIS section of the Cable Labs web site</a> (warning: the DOCSIS site seems only to work in MSIE on Windows &#8211; Firefox doesn’t browse this particular page very well at all). This is probably more than you wanted to know?</p>
<p>[2] I use <a href="http://speedtest.net/" target="_blank">speedtest.net</a> to check channel bandwidths.</p>
<p>The post <a href="https://blog.red7.com/improved-broadband-speed-3x/">Improved my Cable Broadband speed 3x (DOCSIS)</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/improved-broadband-speed-3x/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2503</post-id>	</item>
		<item>
		<title>Google.cn in again out again</title>
		<link>https://blog.red7.com/google-cn-in-again-out-again/</link>
					<comments>https://blog.red7.com/google-cn-in-again-out-again/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Tue, 19 Jan 2010 17:15:31 +0000</pubDate>
				<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2572</guid>

					<description><![CDATA[<p>I pulled together a page of references on the Google China issues, beginning with their 2006 announcement that they would begin providing filtered search results at google.cn and ending “today” with speculation about exactly what has been going on that caused them to announce they would stop filtering results and see whether they could reach [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/google-cn-in-again-out-again/">Google.cn in again out again</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="http://thesocialgraphofmalware.com/the-life-and-times-of-google-cn/" target="_blank"><img loading="lazy" decoding="async" class="alignleft size-full wp-image-993" style="border: 0pt none; margin: 2px 12px;" title="china" src="/wp-content/uploads/2008/05/china.jpg" alt="" width="96" height="96" /></a>I pulled together a <a href="http://thesocialgraphofmalware.com/the-life-and-times-of-google-cn/" target="_blank">page of references on the Google China issues</a>, beginning with their 2006 announcement that they would begin providing filtered search results at google.cn and ending “today” with speculation about exactly what has been going on that caused them to announce they would stop filtering results and see whether they could reach an accommodation with the Chinese government about providing unfiltered results in China. The summary page is <a href="http://thesocialgraphofmalware.com/the-life-and-times-of-google-cn/" target="_blank">at <em>The Social Graph of Malware</em></a>, not here. Go read it. And I’ll try to keep it up to date.</p>
<p>Its clear that the decision to filter was tough. And it probably took less to get them to reverse the decision than if the original decision had been clear cut. The issues that I see are involved include these:</p>
<ul>
<li>Censorship &#8211; even if mandated by local laws;</li>
<li>Censorship &#8211; on more universal grounds (such as censorship of hate speech, etc.);</li>
<li>Increasing Chinese cyberaggression &#8211; hacking servers, looking for industrial secrets (supposed Chinese, because it&#8217;s almost impossible to really know);</li>
<li>Aggressive attacks against <a href="http://www.infowar-monitor.net/2009/09/tracking-ghostnet-investigating-a-cyber-espionage-network/" target="_blank">minority communities and free speech advocates</a> (cited by Google, but I&#8217;ve seen them personally);</li>
<li>Drive-by malware insertions in free-speech web sites, and whether this is targeted or not;</li>
<li>Whether an equivalent of the <a href="http://en.wikipedia.org/wiki/Geneva_Protocol" target="_blank">Geneva Protocol</a> (which deals with weapons as opposed to prisoners) can be developed for cyberwarfare.</li>
</ul>
<p><em>The Social Graph of Malware</em> is a site I started a few months ago, and sporadically contribute to, that describes how social engineering contributes so much to the spread of malware. The Google incident that sparked their “reversal” decision to stop filtering (just a week ago) was largely a piece of social engineering. We have been seeing targeted attacks on the Tibetan exile community (and others) recently, utilizing social engineering tactics to get people to open poisoned files that then infect their computers. So I’ll continue to track the Google.cn issue on <em>The Social Graph of Malware</em> because of this connection.</p>
<p>The post <a href="https://blog.red7.com/google-cn-in-again-out-again/">Google.cn in again out again</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/google-cn-in-again-out-again/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2572</post-id>	</item>
		<item>
		<title>Adobe Reader under attack again</title>
		<link>https://blog.red7.com/adobe-reader-under-attack-again/</link>
					<comments>https://blog.red7.com/adobe-reader-under-attack-again/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Thu, 17 Dec 2009 20:12:26 +0000</pubDate>
				<category><![CDATA[Debris]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology and geeky stuff]]></category>
		<guid isPermaLink="false">http://sky.dlfound.org/?p=2197</guid>

					<description><![CDATA[<p>Adobe Reader is one of the most oft-used programs in the world. (Probably next to MS Word and other word processors.) And we all think it’s safe because it just reads a document format and displays it. To our surprise, we learned earlier this year that the Adobe Reader processes JavaScript that can be embedded [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/adobe-reader-under-attack-again/">Adobe Reader under attack again</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft" style="border: 0pt none; margin: 2px 12px;" title="reader_icon_special" src="http://thesocialgraphofmalware.com/wp-content/uploads/2009/12/reader_icon_special.jpg" alt="reader_icon_special" width="125" height="104" />Adobe Reader is one of the most oft-used programs in the world. (Probably next to MS Word and other word processors.) And we all think it’s safe because it just reads a document format and displays it.</p>
<p>To our surprise, we learned earlier this year that the Adobe Reader processes JavaScript that can be embedded in its PDF documents. Once again, here in December 2009, another vulnerability allows <a href="http://www.eweek.com/c/a/Security/New-Adobe-Reader-Acrobat-Vulnerability-Under-Attack-671958/?kc=EWKNLSTE12172009STR1://" target="_blank">JavaScript can be exploited to turn a PDF into a malicious piece o’ stuff</a>.</p>
<p>The fault won’t be fixed until mid-January 2010. Big companies have long turnaround on fixing software. Yes, they have to test to be sure everything still works after they make a fix &#8211; but meanwhile we can’t safely open PDF documents unless we have JavaScript turned off.</p>
<p><em>The attack vector is to send a poisoned PDF file to intended target individuals, purporting to be “From: a friend” and hoping that they’ll open the attached PDF thinking that it’s safe. Wrong again. You won’t be caught by this, will you?</em></p>
<p><em><a href="http://www.darkreading.com/vulnerability_management/security/app-security/showArticle.jhtml?articleID=222002143" target="_blank">More on this attack on DarkReading.com</a>.<br />
</em></p>
<p>The post <a href="https://blog.red7.com/adobe-reader-under-attack-again/">Adobe Reader under attack again</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/adobe-reader-under-attack-again/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2197</post-id>	</item>
		<item>
		<title>Security in the Cloud &#8211; Matey, there be challenges ahead</title>
		<link>https://blog.red7.com/security-in-the-cloud/</link>
					<comments>https://blog.red7.com/security-in-the-cloud/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Wed, 14 Oct 2009 16:01:53 +0000</pubDate>
				<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology and geeky stuff]]></category>
		<guid isPermaLink="false">http://sky.dlfound.org/?p=2041</guid>

					<description><![CDATA[<p>Being a user of and a promoter of cloud computing, I am also aware of challenges to the security of cloud computing environments. Cloud computing suppliers come in several flavors. I’ll address two of them here: 1) those who provide virtual hosts; and 2) those who provide automatically-scalable hosting solutions without distinguishable hosts. A virtual [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/security-in-the-cloud/">Security in the Cloud &#8211; Matey, there be challenges ahead</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-1344" style="border: 0pt none; margin: 2px 12px;" title="Cloud computing" src="/wp-content/uploads/2009/05/cloud-with-computers.jpg" alt="Cloud computing" width="64" height="64" />Being a user of and a promoter of <em>cloud computing</em>, I am also aware of challenges to the security of cloud computing environments. Cloud computing suppliers come in several flavors. I’ll address two of them here: 1) those who provide virtual hosts; and 2) those who provide <em>automatically-scalable</em> hosting solutions without distinguishable hosts.</p>
<p>A <em>virtual host</em> looks like an actual server. You (or your programmer/sysadmin) can use it as if it were your own dedicated server. In fact, however, it is only a portion of a much larger server. Rackspace/Mosso, and Slicehost are two I’ve discussed and actually use. The focus is on the <em>virtual server</em>.</p>
<p>An <em>automatically-scalable</em> hosting solution is a service or set of services which are hosted on one or more computers, and you can’t actually tell how big the server is or for that matter, whether it’s a whole array of servers. The focus is on the <em>virtual service</em> (not the server itself).</p>
<p>What’s good: Virtual servers are a more secure environment than shared servers because you are only dependent on your own security efforts. (On a shared server, if another user picks a poor password, or doesn’t upgrade their PHP software when security upgrades are released, <span style="text-decoration: underline;">you</span> can be hacked if their account is compromised.) Automatically-scalable hosts may also be secure in this same way if accounts are adequately protected from each other.</p>
<p>What’s bad: A root compromise of a virtual server may be possible. In fact, it’s probably inevitable that such things will happen. And if you don’t update your underlying software (like WordPress, for instance), they you’re likely to be in trouble anyway. So ultimately any server can be compromised.</p>
<hr class="hr_dashed" />“Cloud-clobbering” (talk &#8211; is cheap)— cloud servers may become a <a href="http://mis-asia.com/news/articles/cloud-clobbering-at-hack-in-the-box-security-conference,-malaysia" target="_blank">target for hackers</a>.at the 7th <a href="http://www.hackinthebox.org/" target="_blank">Hack in The Box Security Conference</a> in Kuala Lumpur.</p>
<p>I’ve written about “<a href="/edos-economic-denial-of-sustainability-attacks/" target="_blank">economic denial-of-sustainability</a>” attacks, in which an attacker causes a cloud user to so scale up their server usage that it becomes economically impossible for the defender to survive. These wouldn&#8217;t be possible if there were no cloud computing.</p>
<p>The post <a href="https://blog.red7.com/security-in-the-cloud/">Security in the Cloud &#8211; Matey, there be challenges ahead</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/security-in-the-cloud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2041</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: blog.red7.com @ 2026-03-23 05:13:24 by W3 Total Cache
-->