<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - Sky&#039;s Blog</title>
	<atom:link href="https://blog.red7.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.red7.com/tag/security/</link>
	<description>Communicating in a networked world</description>
	<lastBuildDate>Tue, 03 Jan 2017 21:01:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.red7.com/wp-content/uploads/2018/01/skyhi-wind-icon-256x256-120x120.png</url>
	<title>Security Archives - Sky&#039;s Blog</title>
	<link>https://blog.red7.com/tag/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>No chance for true security?</title>
		<link>https://blog.red7.com/no-chance-for-true-security/</link>
					<comments>https://blog.red7.com/no-chance-for-true-security/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Thu, 28 Jan 2010 17:15:13 +0000</pubDate>
				<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software and online tools]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ngo in-a-box]]></category>
		<category><![CDATA[security in-a-box]]></category>
		<category><![CDATA[viruses]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2615</guid>

					<description><![CDATA[<p>Is security dead on the Internet? Yeah, it probably is—as long as we rely on software other people have written[1]. Unless you’re capable of writing all of your own software, without any errors, and keeping it isolated from software written by anyone else, you’re never going to have a secure digital life[2]. But there are [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/no-chance-for-true-security/">No chance for true security?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="http://security.ngoinabox.org/"><img decoding="async" class="size-full wp-image-2618 alignleft" style="border: 0pt none; margin: 2px 12px;" title="security-in-a-box-175" src="/wp-content/uploads/2010/01/security-in-a-box-175.jpg" alt="" width="175" height="63" /></a>Is security dead on the Internet? Yeah, it probably is—as long as we rely on software other people have written<sup>[1]</sup>. Unless you’re capable of writing all of your own software, without any errors, and keeping it isolated from software written by anyone else, you’re never going to have a secure digital life<sup>[2]</sup>.</p>
<p>But there are things you can do to protect yourself. <a href="http://ngoinabox.org/" target="_blank">NGO-in-a-box</a> has developed <a href="http://security.ngoinabox.org/" target="_blank"><em>Security-in-a-box, a set of tools and tactics for your digital security</em></a>. Worth taking a look!</p>
<p>It’s often said that “if we can envision it, we can create it,” but in the world of computer (and network) software this is only partially true. We can attempt to create it, but it will always have bugs in it. And those bugs are the chinks in the armor that allow malware to work and cyberwarfare to succeed.</p>
<hr class="hr_dashed" />[1] That’s because I can write a perfect program with no bugs, but nobody else can. <img decoding="async" class="alignnone size-full wp-image-2622" title="smiley wink 21x21 from skype" src="/wp-content/uploads/2010/01/wink-21x21.jpg" alt="" width="21" height="21" /></p>
<p>[2] See also <em><a href="http://thesocialgraphofmalware.com/" target="_blank">The Social Graph of Malware</a></em>, my site where I explore ways in which social engineering is used by the bad guys to get malware onto your computer.</p>
<p>The post <a href="https://blog.red7.com/no-chance-for-true-security/">No chance for true security?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/no-chance-for-true-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2615</post-id>	</item>
		<item>
		<title>It&#8217;s the User, Stupid (It&#8217;s the Stupid User?)</title>
		<link>https://blog.red7.com/its-the-user-stupid-its-the-stupid-user/</link>
					<comments>https://blog.red7.com/its-the-user-stupid-its-the-stupid-user/#comments</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Mon, 30 Mar 2009 04:00:07 +0000</pubDate>
				<category><![CDATA[Organizations and Sociology]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology and geeky stuff]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">http://sky.dlfound.org/?p=1075</guid>

					<description><![CDATA[<p>In The Curious Case of the Invulnerable Browser, Roger Grimes of Infoworld writes about the recent CanSecWest 2009 PWN2OWN contest where hackers pitted their skills against web browsers to see how quickly they could break into a computer. The prize was the computer itself. Roger says that the state of browser security is actually pretty [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/its-the-user-stupid-its-the-stupid-user/">It&#8217;s the User, Stupid (It&#8217;s the Stupid User?)</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="http://weblog.infoworld.com/securityadviser/archives/2009/03/the_curious_cas.html?source=NLC-DAILY&amp;cgd=2009-03-27"><img decoding="async" class="alignleft size-full wp-image-1076" style="border: 0pt none; margin: 2px 12px;" title="Infoworld Security Column - Grimes" src="/wp-content/uploads/2009/03/infoworld-grimes.jpg" alt="Infoworld Security Column - Grimes" width="96" height="96" /></a>In <a href="http://weblog.infoworld.com/securityadviser/archives/2009/03/the_curious_cas.html?source=NLC-DAILY&amp;cgd=2009-03-27" target="_blank">The Curious Case of the Invulnerable Browser</a>, Roger Grimes of Infoworld writes about the recent <a href="http://cansecwest.com/" target="_blank">CanSecWest 2009 PWN2OWN</a> contest where hackers pitted their skills against web browsers to see how quickly they could break into a computer. The prize was the computer itself. Roger says that the state of browser security is actually pretty good, but even if browsers were inpenetrable, the major source of computer breakins is users browsing to a web site that then infects their computer.<span id="more-1075"></span></p>
<p>That’s my experience too. So it’s actually “user stupidity” that gets users’ computers hacked. They click on a link in an email advertising a sexy video and they end up on a site that poisons their computer instead. Or they open a tempting file that has been sent to them by email. <em>Social engineering</em> is the technique used to get into most computers.</p>
<p>Don’t click that link! Don’t open that file!</p>
<p>The post <a href="https://blog.red7.com/its-the-user-stupid-its-the-stupid-user/">It&#8217;s the User, Stupid (It&#8217;s the Stupid User?)</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/its-the-user-stupid-its-the-stupid-user/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1075</post-id>	</item>
		<item>
		<title>Slicing up the Cloud</title>
		<link>https://blog.red7.com/slicing-up-the-cloud/</link>
					<comments>https://blog.red7.com/slicing-up-the-cloud/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Mon, 05 Jan 2009 09:14:01 +0000</pubDate>
				<category><![CDATA[Cyber-nomads]]></category>
		<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Technology and geeky stuff]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[hosting]]></category>
		<category><![CDATA[scalability]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Slicehost]]></category>
		<category><![CDATA[Sustainability]]></category>
		<category><![CDATA[virtual private servers]]></category>
		<category><![CDATA[VPS]]></category>
		<guid isPermaLink="false">http://sky.dlfound.org/?p=581</guid>

					<description><![CDATA[<p>Cloud Computing&#8211; it&#8217;s a relatively new term for a relatively old concept. For at least six months now I&#8217;ve been thinking about two inevitabilities: 1) that my servers will fail some day soon; and 2) that I may have to rapidly scale (up) some customer&#8217;s site because it will suddenly have traffic needs well beyond [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/slicing-up-the-cloud/">Slicing up the Cloud</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-583 alignleft" style="border: 0pt none; margin: 2px 12px;" title="Slicehost" src="/wp-content/uploads/2009/01/picture-2.png" alt="Slicehost" width="40" height="45" /></p>
<p><strong>Cloud Computing</strong>&#8211; it&#8217;s a relatively new term for a relatively old concept. For at least six months now I&#8217;ve been thinking about two inevitabilities: 1) that my servers will fail some day soon; and 2) that I may have to rapidly scale (up) some customer&#8217;s site because it will suddenly have traffic needs well beyond the capacity of my servers.</p>
<p>The answer is pretty obvious to me &#8211; I&#8217;ll soon be eliminating my own serves in favor of purchasing computing power in whatever quantities I need at the time. Scalable on demand. From one of the cloud service providers that are coming online now.</p>
<p><span id="more-581"></span>Buying <a href="http://en.wikipedia.org/wiki/Cloud_computing" target="_blank">cloud computing</a> essentially means buying computing power without knowing or caring exactly where it is physically located or what type of equipment it&#8217;s on. Someone else buys the servers, puts them in racks, powers them, cools them, and connects them to the Internet. And they stand there ready to go into service whenever they&#8217;re needed.</p>
<p>I looked at <a href="http://aws.amazon.com/ec2/" target="_blank">Amazon EC2</a> first, because it&#8217;s been getting a lot of publicity. Amazon has built server farms that could scale up and down rapidly, and has been supporting its own services on those computers, for years. It&#8217;s was logical that they&#8217;d be in a position to sell &#8220;time&#8221; on servers to anyone who wants it&#8230;as long as they had the spare capacity. But Amazon charges $0.10 per hour for a basic &#8220;server&#8221; instance, which means $2.40 a day or over $72 a month for even one server. That&#8217;s pretty close to what I was paying Verio for a virtual private server in the late 1990s, and it&#8217;s probably 50% of what it costs me to have my own server with several times the capacity.</p>
<p>Then I ran across a company called <a href="http://slicehost.com/" target="_blank">Slicehost</a> &#8211; recently acquired by Rackspace. These guys offer raw server instances (virtual private servers) starting at $20 a month. These $20 &#8220;slices&#8221; are small, but they get the job done and they&#8217;re ideal for hosting web sites that are simple, have low traffic requirements, and yet might have to be scaled up at a future date. To scale, you access the Slicehost online control panel, and within minutes you can have a much larger slice of a server &#8211; still &#8220;private&#8221; &#8211; with literally the click of a button.</p>
<p>Oh, and the &#8220;private&#8221; is important. My clients need pretty tight security, and running a web site on a virtual private server means they don&#8217;t have to worry about some other user of the same server having a weak password and getting hacked, consequently opening up a window to my client also getting hacked. With a virtual private server, there&#8217;s only one user, and you&#8217;re responsible for your own problems.</p>
<p>So the site you&#8217;re looking at right now is on Slicehost. On their smallest and cheapest offering. And yet handling the traffic pretty well. And on top of that, I have several sites all on the same slice. This isn&#8217;t for the faint of heart &#8211; I had a Ubuntu 8.04 server instance installed and from there I installed all of the services I needed, but this really requires some middling sysadmin expertise. (Takes me under an hour to provision one slice and bring up a WordPress instance. Then about 30 minutes for additional WordPress instances or web sites.)</p>
<p>This is the future and it&#8217;s slick.</p>
<p>Oh, by the way, the new look of the web site is not related to the switch to Slicehost. I just got tired of the old look, and loved this new theme, and switched over during the migration to Slicehost.</p>
<p>The post <a href="https://blog.red7.com/slicing-up-the-cloud/">Slicing up the Cloud</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/slicing-up-the-cloud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">581</post-id>	</item>
		<item>
		<title>Let&#8217;s be Clear About This &#8211; Lots more Laptops will be Stolen</title>
		<link>https://blog.red7.com/lets-be-clear-about-this-lots-more-laptops-will-be-stolen/</link>
					<comments>https://blog.red7.com/lets-be-clear-about-this-lots-more-laptops-will-be-stolen/#comments</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Tue, 05 Aug 2008 19:00:39 +0000</pubDate>
				<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[social behavior]]></category>
		<guid isPermaLink="false">http://sky.dlfound.org/?p=519</guid>

					<description><![CDATA[<p>The Clear program at San Francisco International Airport (SFO) has suffered an almost-predictable blow &#8211; a stolen laptop computer containing confidential records. Clear is the program that pre-screens travelers, collects biometric data, puts this on a smart-card (embedded processor+memory, not RFID) and then allows travelers at a few high-traffic airports to go thru a quick-screen [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/lets-be-clear-about-this-lots-more-laptops-will-be-stolen/">Let&#8217;s be Clear About This &#8211; Lots more Laptops will be Stolen</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-280" style="border: 0pt none; margin: 2px 12px;" title="picture-3.jpg" src="/wp-content/uploads/2007/05/picture-3.jpg" alt="picture-3.jpg" width="126" height="90" />The <em>Clear</em> program at San Francisco International Airport (SFO) has suffered an almost-predictable blow &#8211; a stolen laptop computer containing confidential records.</p>
<p><em>Clear</em> is the program that pre-screens travelers, collects biometric data, puts this on a smart-card (embedded processor+memory, not RFID) and then allows travelers at a few high-traffic airports to go thru a quick-screen line (including a retinal scan to verify ID) rather than stand in lines with un-pre-screened passengers. They still get screened, but they &#8220;jump line,&#8221; sometimes skipping ahead of a hundred or more who are waiting in the regular lines.</p>
<p>Almost predictably, <a href="http://abclocal.go.com/kgo/story?section=news/local&amp;id=6306342" target="_blank">a laptop containing the data of 33,000 applicants (not participants) was stolen from a secured room at SFO</a>. A spokesperson says &#8220;it [the laptop] was protected by two passwords&#8221; &#8211; but that doesn&#8217;t tell us whether the information was encrypted, how secure the encryption was, nor why sensitive information would be on a computer that is portable (and thus easy to steal) computer. (It is pretty easy to bypass password security unless the data is also encrypted &#8211; I&#8217;ve done it myself more than once on client computers where they&#8217;ve forgotted a password &#8211; takes about 10 minutes.) And we don&#8217;t know what other types of information might be on this computer.</p>
<p><em>Clear</em> is run by an independent contractor under TSA oversight.</p>
<p>One interesting outcome was the comments <strong>ABC7 (San Francisco TV)</strong> collected &#8211; for instance <em>&#8220;Clear customers say the sooner the changes are made the better, although no one seemed too worried about the security breach. &#8216;You&#8217;re information is everywhere and people volunteer their information on places like Facebook, on Twitter, on MySpace and stuff,&#8217; &#8230; a traveler.&#8221;</em> I don&#8217;t actually think they understand the breadth of information that was reported to be on that computer &#8211; this is information that is to be used in a security screening, not just social security numbers (though those may not have been present), and presumably known only to the applicant &#8211; a far broader range of confidential information than most other systems would hold. It just shows that people are resigned to living in a transparent world &#8211; probably until they are directly affected, of course.</p>
<p><a href="http://www.ktvu.com/news/17098410/detail.html?rss=fran&amp;psp=news" target="_blank">KTVU reportage on this same story</a>. KTVU also reports <em>&#8220;The TSA requires RT service providers and sponsoring entities to encrypt all files containing participants&#8217; sensitive personal information. Noncompliance with such requirements can result in actions including suspension of a program and possible civil penalties.&#8221;</em> I have not verified this, and we don&#8217;t know the type of encryption that&#8217;s required &#8211; for instance a password on a ZIP file is probably not very secure, while encryption with a 2048-bit RSA key would be a lot harder to crack.</p>
<p><a href="/what-was-that-tsa-guy-doing-with-my-drivers-license/" target="_blank">I earlier reported on &#8220;odd&#8221; scanning of my driver&#8217;s license at a regional airport</a>, to which TSA replied (in comments on my blog) that it was (probably) an ultraviolet light (blacklight) being passed over the license to be sure it was genuine (this process reveals the &#8220;holographic&#8221; images in the license&#8217;s plastic layers). As I said, I was concerned that any scanned information that passed <em>into a laptop computer</em> allowed potential theft of this confidential information. Well, I guess this <em>Clear</em> incident further emphasizes that security information has no business being stored on a computer that can be physically stolen.</p>
<p>The post <a href="https://blog.red7.com/lets-be-clear-about-this-lots-more-laptops-will-be-stolen/">Let&#8217;s be Clear About This &#8211; Lots more Laptops will be Stolen</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/lets-be-clear-about-this-lots-more-laptops-will-be-stolen/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">519</post-id>	</item>
		<item>
		<title>What was that TSA guy doing with my driver&#8217;s license?</title>
		<link>https://blog.red7.com/what-was-that-tsa-guy-doing-with-my-drivers-license/</link>
					<comments>https://blog.red7.com/what-was-that-tsa-guy-doing-with-my-drivers-license/#comments</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Wed, 25 Jun 2008 07:07:49 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[the quantified life]]></category>
		<category><![CDATA[The Quantified Self]]></category>
		<guid isPermaLink="false">http://sky.dlfound.org/?p=453</guid>

					<description><![CDATA[<p>I boarded a plane at a small regional airport two weeks ago. And noticed some new and unusual behavior by the TSA screener at the security checkpoint. After I walked thru the metal detector, he took a small penlike device and scanned it across the name, address and photo on my driver&#8217;s license. Slowly. Twice. [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/what-was-that-tsa-guy-doing-with-my-drivers-license/">What was that TSA guy doing with my driver&#8217;s license?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I boarded a plane at a small regional airport two weeks ago. And noticed some new and unusual behavior by the TSA screener at the security checkpoint.</p>
<p>After I walked thru the metal detector, he took a small penlike device and scanned it across the name, address and photo on my driver&#8217;s license. Slowly. Twice. Which is why I figured he was scanning. At first my reaction was that he was optically scanning the information into this &#8220;<a href="http://www.nextag.com/pen-scanner/search-html" target="_blank">pen</a>&#8221; and that it would be dumped into a computer later on.</p>
<p><a href="http://www.schneier.com/" target="_blank">Bruce Schneier</a> is a fantastic source of information and particularly the <em>debunking</em> of security and security myths. From what I&#8217;ve read on <a href="http://www.schneier.com/blog/" target="_blank">Bruce&#8217;s blog</a>, it&#8217;s possible that the TSA guy was just running an ultraviolet light across the license to look at the holograms on the license. But my eyes are pretty sensitive to UV and honestly I didn&#8217;t see any reflection. (<a href="http://video.google.com/videoplay?docid=-1672905904171732325&amp;q=defcon+roysac.com+schneier&amp;total=1&amp;start=0&amp;num=10&amp;so=0&amp;type=search&amp;plindex=0" target="_blank">Cool video of Bruce&#8217;s Q&amp;A at defcon 15</a>.)</p>
<p>So I&#8217;m still working the theory that he scanned an image that would later end up in a TSA computer. (See <a href="http://www.irislink.com/c2-1056-189/IRISPen-Express---the-smart-handheld-scanner--.aspx?adwp=GGS-IP&amp;gclid=CJGksquDhZQCFSMYagod1DE_XA" target="_blank">IRIS pen scanner</a>, or look at what the <a href="http://www.nytimes.com/2007/07/26/technology/circuits/26pogue.html" target="_blank">New York Times</a> reported last year.)</p>
<p>What would happen to that scanned information? Well, if banks and healthcare institutions are any indication, it would likely go (via USB) onto a laptop computer somewhere, later on to be stolen.</p>
<p>I am continuing to research this, but wonder if anyone else has run into this scanning behavior by TSA?</p>
<p>The post <a href="https://blog.red7.com/what-was-that-tsa-guy-doing-with-my-drivers-license/">What was that TSA guy doing with my driver&#8217;s license?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/what-was-that-tsa-guy-doing-with-my-drivers-license/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">453</post-id>	</item>
		<item>
		<title>The All-seeing eye (in China)</title>
		<link>https://blog.red7.com/the-all-seeing-eye-in-china/</link>
					<comments>https://blog.red7.com/the-all-seeing-eye-in-china/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Sat, 31 May 2008 08:43:50 +0000</pubDate>
				<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<guid isPermaLink="false">http://sky.dlfound.org/?p=445</guid>

					<description><![CDATA[<p>I&#8217;m going to start a series of articles (and references) on how our governments are watching us. I&#8217;ll start with China, which is of course very much in the news right now for repressive measures it takes against its citizens. Many of you will know already that China monitors and censors Internet (particularly web) users, [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/the-all-seeing-eye-in-china/">The All-seeing eye (in China)</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-993" style="border: 0pt none; margin: 2px 8px;" title="china" src="/wp-content/uploads/2008/05/china.jpg" alt="china" width="48" height="48" />I&#8217;m going to start a series of articles (and references) on how our governments are watching us.</p>
<p>I&#8217;ll start with China, which is of course very much in the news right now for repressive measures it takes against its citizens. Many of you will know already that China monitors and censors Internet (particularly web) users, but may not be aware how widely it monitors its citizens.</p>
<p>This article <a href="http://www.rollingstone.com/politics/story/20797485/chinas_allseeing_eye/print" target="_blank"><em>China&#8217;s All-Seeing Eye</em></a> by Naomi Klein in Rolling Stone, should get you started. Her subtitle is <em>With the help of U.S. defense contractors, China is building the prototype for a high-tech police state. It is ready for export.</em></p>
<p>China is notable because what we in the U.S. might regard as fundamental freedoms, like the right to free speech and dissent, seem to be viewed as hindrances to social and economic development.</p>
<p>The post <a href="https://blog.red7.com/the-all-seeing-eye-in-china/">The All-seeing eye (in China)</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/the-all-seeing-eye-in-china/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">445</post-id>	</item>
		<item>
		<title>The Exploitation of the Online Class</title>
		<link>https://blog.red7.com/the-exploitation-of-the-online-class/</link>
					<comments>https://blog.red7.com/the-exploitation-of-the-online-class/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Sat, 19 Apr 2008 14:52:01 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software and online tools]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[viruses]]></category>
		<guid isPermaLink="false">http://sky.dlfound.org/?p=431</guid>

					<description><![CDATA[<p>I have been kept more than busy. Super busy. Recently with the many online exploits that assault us on all fronts. I wonder how many of you are noticing it yet. Steep uptick in the past two weeks. First, of course, spam continues to snowball. (A snowball from Hell!) Increasing at a ferocious rate. Since [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/the-exploitation-of-the-online-class/">The Exploitation of the Online Class</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-1026" title="exclamation" src="/wp-content/uploads/2008/04/exclamation.jpg" alt="exclamation" width="96" height="96" />I have been kept more than busy. Super busy. Recently with the many online <a href="http://en.wikipedia.org/wiki/Exploit_%28computer_security%29" target="_blank"><em>exploits</em></a> that assault us on all fronts.</p>
<p>I wonder how many of you are noticing it yet. Steep uptick in the past two weeks.</p>
<p><span id="more-431"></span>First, of course, <em>spam</em> continues to snowball. (A snowball from Hell!) Increasing at a ferocious rate. Since I manage email for a number of friends and customers, I have multiple spam filters in front of my mail because I receive hundreds of spam messages every day (many of them duplicates, of course, to the same account). Having three filters means that almost all spam messages are caught. But the filters are so aggressive that <em>many messages I need to read</em> also are trapped in the spam dragnet. So I have to go thru the spam box several times a day and 1) fish out the legitimate messages; and 2) trash-can the spam.</p>
<p>My defenses include: 1) <a title="Spam Assassin" href="http://spamassassin.apache.org/" target="_blank">SpamAssassin</a> running on my mailserver, which catches at least half of the spam so it never reaches my computer, and almost never quarantines a message that I really want; plus 2) <a title="Intego anti-spam software" href="http://www.intego.com/personalantispam/" target="_blank">Intego Personal Anti-Spam</a> which is more than aggressive and is rule and blacklist-driven; plus 3) <a title="Spam Sieve" href="http://c-command.com/spamsieve/" target="_blank">SpamSieve</a>, which is a Bayesian filter (looking at word combinations).</p>
<p>For virus-protection on the server side, I have <a href="http://us.mcafee.com/" target="_blank">Macafee anti-virus</a> installed (integrated into my <a title="Kerio with Macafee anti-virus" href="http://www.kerio.com/kms_antivirus.html" target="_blank">Kerio</a> mailserver) &#8211; which updates its definitions every few hours, and on my computer I use <a title="Intego virus barrier" href="http://www.intego.com/virusbarrier/" target="_blank">Intego VirusBarrier</a>, which complements Intego&#8217;s spam product.</p>
<p>The other problem that&#8217;s on the rise over the past couple of weeks is a <a href="http://en.wikipedia.org/wiki/Malware" target="_blank">malware</a> explosion, including <a href="http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29" target="_blank">trojans</a>/viruses embedded in attachments. We call &#8217;em <em>poisoned</em> files. I have seen poisoned ZIP, RAR, PDF, DOC and JPG files recently. It has gotten so bad that I no longer open any attached files unless I know exactly what they are and where they came from.</p>
<p>And many of these viruses look like they came from friends &#8211; even though their computers seem to be uncompromised. (Viruses used to mail themselves from infected computers, but recently that has not been the attack vector and instead the viruses seem to know how to get a list of your friends from elsewhere and then use that list, plus a legitimate email you have sent in the past, to target only your friends who would be interested in that message. Truly <em>social engineering</em>.</p>
<p>And the most insidious attack vector is the <em>poisoning of files that are legitimately available for download on well-traffic&#8217;d web sites</em>. Particularly visible among the Tibet support groups, certain computers have been invaded and trojans and virus-laden versions of PDF and other files that are there for download have been poisoned with viruses. So you go to a perfectly-good web site, download a file you expect to be OK, and suddenly you&#8217;ve got a virus. This practice is so widespread that it&#8217;s almost impossible to tell 1) how the file got infected; 2) how the server was invaded; and 3) to even know that you shouldn&#8217;t download! (I can say more about this later on when we know more about the attack vectors and the results of the malware &#8211; this is still pretty new and is evolving rapidly.) I hear from friends that <a title="Kaspersky anti-virus" href="http://www.kaspersky.com/" target="_blank">Kaspersky</a> and <a href="http://www.f-secure.com/" target="_blank">F-Secure</a> are the best protection against virus-laden downloads &#8211; at least for Windows users.</p>
<p>The post <a href="https://blog.red7.com/the-exploitation-of-the-online-class/">The Exploitation of the Online Class</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/the-exploitation-of-the-online-class/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">431</post-id>	</item>
		<item>
		<title>China&#8217;s Golden Shield (The Great Firewall of China) &#8211; How long can it stand?</title>
		<link>https://blog.red7.com/chinas-golden-shield-the-great-firewall-of-china/</link>
					<comments>https://blog.red7.com/chinas-golden-shield-the-great-firewall-of-china/#comments</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Sun, 28 Oct 2007 05:16:04 +0000</pubDate>
				<category><![CDATA[Blogging]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[the press]]></category>
		<guid isPermaLink="false">http://sky.dlfound.org/chinas-golden-shield-the-great-firewall-of-china/</guid>

					<description><![CDATA[<p>Here&#8217;s another, very recent, report on how well China&#8217;s Golden Shield (otherwise known as the Great Firewall of China) is or isn&#8217;t working. By Oliver August, in WIRED. I was encouraged to read here (and other places as well) news that blogging continues to increase in China and although there&#8217;s plenty of repression of bloggers, [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/chinas-golden-shield-the-great-firewall-of-china/">China&#8217;s Golden Shield (The Great Firewall of China) &#8211; How long can it stand?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-993 alignright" style="border: 0pt none; margin: 2px 8px;" title="china" src="/wp-content/uploads/2008/05/china.jpg" alt="china" width="48" height="48" />Here&#8217;s <a title="The Great Firewall of China" href="http://www.wired.com/politics/security/magazine/15-11/ff_chinafirewall" target="_blank">another, very recent, report on how well China&#8217;s Golden Shield (otherwise known as the Great Firewall of China) is or isn&#8217;t working</a>. By Oliver August, in WIRED. I was encouraged to read here (and other places as well) news that blogging continues to increase in China and although there&#8217;s plenty of repression of bloggers, there are just more and more of them every day.</p>
<p>For example, one tale from this article&#8230; <em>&#8220;As Chinese citizens become aware that their most potent advantage over censorship is their sheer numbers, more and more grievances are aired online — sometimes with significant consequences. The first cyber-rebellion to have a major political impact took place in 2003. Sun Zhigang, a young migrant worker in Guangzhou, died in police detention after failing to produce identity documents during a street check. Sun&#8217;s friends protested his death on discussion boards, and soon other sites picked up a campaign demanding police accountability and reform of the laws affecting migrant workers. Before the unprepared system monitors could react, an avalanche was in motion. &#8230;&#8221;</em></p>
<p><em>&#8220;Of course, China is hardly a Jeffersonian paradise. Thousands languish in prison because of harmless online activities. A recent example is Zhang Jianhong — blogging as Li Hong — who was sentenced to six years for posting political essays. Cases like his justify strong criticism of China. But they don&#8217;t prove that its monitoring system is successful on a national scale. &#8230;&#8221;</em></p>
<p>The post <a href="https://blog.red7.com/chinas-golden-shield-the-great-firewall-of-china/">China&#8217;s Golden Shield (The Great Firewall of China) &#8211; How long can it stand?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/chinas-golden-shield-the-great-firewall-of-china/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">344</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: blog.red7.com @ 2026-03-27 10:08:05 by W3 Total Cache
-->