Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - British government willing to block EU net neutrality deal (buzzfeed.com)

An anonymous reader writes: The British government has said it will block the EU's recently signed net neutrality deal if it stops it censoring the internet. The European Parliament passed net neutrality legislation last month, but member state governments have to sign off the plan before it can become law.

Submission + - New Zealand spy agency to vet network builds, provider staff. (itnews.com.au)

Bismillah writes: The new Telecommunications (Interception Capability and Security) Act of 2013 is in effect in New Zealand and brings in several drastic changes for ISPs, telcos and service providers.

One of the country's spy agencies, the GCSB, gets to decide on network equipment procurement and design decisions, plus operators have to register with the police and obtain security clearance for some staff.

Somewhat illogically, the NZ government pushed through the law combining mandated communications interception capabilities for law enforcement, with undefined network security requirements as decided by the GCSB.

All network operators are subject to the new law, including local providers as well as the likes of Facebook, Google, Microsoft, who have opposed it, saying the new statutes clash with overseas privacy legislation.

Submission + - OpenSSH no longer has to depend on OpenSSL (gmane.org)

ConstantineM writes: What has been planned for a long time now, prior to the infamous heartbleed fiasco of OpenSSL (which does not affect SSH at all), is now officially a reality — with the help of some recently adopted crypto from DJ Bernstein, OpenSSH now finally has a compile-time option to no longer depend on OpenSSL — `make OPENSSL=no` has now been introduced for a reduced configuration OpenSSH to be built without OpenSSL, which would leave you with no legacy SSH-1 baggage at all, and on the SSH-2 front with only AES-CTR and chacha20+poly1305 ciphers, ECDH/curve25519 key exchange and Ed25519 public keys.

Submission + - Critical Infrastructure Initiative panic reaction to Heartbleed: ESR (itnews.com.au)

Bismillah writes: "They have backers with money, but no plan and no staff. We need to work out a way to either merge or not to step on each other," ESR believes.

ICEI being the Internet Civil Engineering Institute [site locked currently] that Eric S Raymond and others were about to launch soon, but then Heartbleed came along.

Submission + - Next-Gen Intel "Alpine Ridge" Thunderbolt Controller Detailed (techpowerup.com)

An anonymous reader writes: The controller leverages PCI-Express gen 3.0 to double bandwidth of the interface. It will launch around the same time as Intel's next-generation Core "Skylake" processors (some time in 2015), and in a typical implementation, will be wired to the CPU's root-complex, and not that of the PCH. With PCIe 3.0 x4 or PCIe 3.0 x2 links at its disposal, the controller can push data at a staggering 40 Gbps. The link can also ferry DisplayPort, HDMI 2.0, and USB 3.0 data through its link layer. That bandwidth should enable you to plug in up to two Ultra HD displays, apart from your storage array.

Submission + - AWS admits it scans Android apps to find secret keys (itnews.com.au)

AlbanX writes: Amazon Web Services admitted it decompiles Android apps to find out if its secret keys have been accidentally hard-coded within.

An Android app developer was contacted by AWS and told his credentials had been found within an app he developed. He was asked to remove them and use temporary creds within apps in the future.

Submission + - Routing and DNS security ignored by ISPs

Bismillah writes: The re-routing of Google's public DNS servers last weekend was yet another example of how easy it is to "steal the Internet" by abusing today's trust-based networks.

Problem is, ISPs don't seem to care about that, or securing DNS which is another attack vector that doesn't require compromising endusers' systems.

Why isn't more done to secure routing and DNS then?

Submission + - Aussie A-G wants enforced decryption of govt intercepted user data

Bismillah writes: If Attorney-General Brandis gets his way in the process of revising Australia's Telecommunications Interception Act, users and providers of VPNs and other encrypted services will by law be required to decrypt government intercepted data. Because, "sophisticated criminals and terrorists."

Across the Tasman, New Zealand already has a similar law, the Telecommunications Interception and Computer Security Act. Apparently, large Internet service providers such as Microsoft and Facebook won't be exempt from the TICSA and must facilitate interception of traffic.

Submission + - World's largest DDoS strikes US, Europe (itnews.com.au)

mask.of.sanity writes: CloudFlare has been hit by what appears to be the world's largest denial of service attack, in an assault that exploits an emerging and frightening threat vector. The Network Time Protocol Reflection attack exploits a timing mechanism that underpins a way the internet works to greatly amplify the power of what would otherwise be a small and ineffective assault. CloudFlare said the attack tipped 400Gbps, 100Gbps larger than the previous record DDoS attack which used DNS reflective amplification.

Submission + - Is this the biggest rip-off ever built on open source? (itnews.com.au) 2

littlekorea writes: Australia's weather bureau has racked up bills of $38 million for a water data system, based on Red Hat Linux, MySQL and Java, that was originally scheduled to cost somewhere between $2 million and $5 million. The Bureau's supplier, an ASX-listed IT services provider SMS Management and Technology, did a good job of embedding itself in the bureau, with all changes having to be made by the original consultant that built it. Smells fishy?

Slashdot Top Deals

"Flattery is all right -- if you don't inhale." -- Adlai Stevenson

Working...