Communications

South Korea's Biggest Telco Says 5G Has Failed To Deliver On Its Promise (theregister.com) 57

SK Telecom, South Korea's dominant mobile carrier and sibling of chipmaker SK hynix, has declared that 5G was over-hyped, has under-delivered, and has failed to deliver a killer app. From a report: The telco offered that assessment in a recent white paper titled "5G Lessons Learned, 6G Key Requirements, 6G Network Evolution, and 6G Spectrum." The paper opens with an unflattering assessment of 5G, which the authors recall being sold as an enabler of autonomous driving, unmanned aerial vehicles (UAM), extended reality (XR) and digital twins. Those applications were possible, but did not succeed due to a combination of "device form factor constraints, immaturity of device and service technology, low or absent market demand, and policy/regulation issues."

The performance of 5G networks was not the issue, the paper argues. The telco argued that some of the goals set out by the UN's international standardization org ITU-R for 5G were met, but many tasks are still far from completion four years into the technology's commercial deployment. Those goals were meant to be realized in the long term -- but that expectation was not accurately conveyed to consumers, leading to "excessive expectations."

Communications

US Announces More New Funding for Rural Broadband Infrastructure (apnews.com) 66

The Biden administration on Monday continued its push toward internet-for-all by 2030, announcing about $667 million in new grants and loans to build more broadband infrastructure in the rural U.S. From a report: "With this investment, we're getting funding to communities in every corner of the country because we believe that no kid should have to sit in the back of a mama's car in a McDonald's parking lot in order to do homework," said Mitch Landrieu, the White House's infrastructure coordinator, in a call with reporters. The 37 new recipients represent the fourth round of funding under the program, dubbed ReConnect by the U.S. Department of Agriculture. Another 37 projects received $771.4 million in grants and loans announced in April and June.

The money flowing through federal broadband programs, including what was announced Monday and the $42.5 billion infrastructure program detailed earlier this summer, will lead to a new variation on "the electrification of rural America," Landrieu said, repeating a common Biden administration refrain. The largest award went to the Ponderosa Telephone Co. in California, which received more than $42 million to deploy fiber networks in Fresno County. In total, more than 1,200 people, 12 farms and 26 other businesses will benefit from that effort alone, according to USDA.

Social Networks

NYC Bans TikTok on City-Owned Devices (theverge.com) 22

New York City is banning TikTok from city-owned devices and requiring agencies to remove the app within the next 30 days. From a report: The directive issued Wednesday comes after a review by the NYC Cyber Command, which a city official said found that TikTok "posed a security threat to the city's technical networks." Starting immediately, city employees are barred from downloading or using the app and accessing TikTok's website from any city-owned devices.

"While social media is great at connecting New Yorkers with one another and the city, we have to ensure we are always using these platforms in a secure manner," a New York City Hall spokesperson said in a statement to The Verge Wednesday. "NYC Cyber Command regularly explores and advances proactive measures to keep New Yorkers' data safe." The city cited US Office of Management and Budget guidelines discouraging TikTok's use on government devices as well as federal legislation banning the app that was passed earlier this year.

Television

Television Accounts for Less than Half of US Viewing Time for the First Time (wsj.com) 43

Powered by shows like "Suits" on Netflix, streaming's share of U.S. viewing time grew to a new high in July, while television viewing fell below 50% for the first time, according to new Nielsen data. From a report: The milestone is the latest sign of the rapid erosion of the cable-TV bundle, which has lost about a quarter of its subscribers over the past decade, as more Americans cut the cord in favor of streaming services like Netflix, Google's YouTube and Disney's Hulu. Cable television accounted for 29.6% of total U.S. viewing time in July, while broadcast attracted 20%, Nielsen said in a release published Tuesday.

Streaming services, meanwhile, captured 38.7% of Americans' viewing time, while a category labeled "Other" -- which Nielsen says includes usage such as DVD playback and gaming -- accounted for the remaining 11.6%. The growth of streaming platforms at the expense of cable and broadcast TV networks has accelerated in recent years, as most entertainment conglomerates introduced their own direct-to-consumer services to take on industry leader Netflix. As they sought to rapidly grow their subscriber bases, many of them chose to make their highest-profile and costliest content available exclusively on streaming. While original content helps reel in subscribers and build streaming brands, the most-watched programs are sometimes older TV shows. Last month, the show Americans spent the most time watching was "Suits," a legal drama starring Meghan Markle made for cable TV that made its debut more than a decade ago.

Encryption

Google's Chrome Begins Supporting Post-Quantum Key Agreement to Shield Encryption Keys (theregister.com) 13

"Teams across Google are working hard to prepare the web for the migration to quantum-resistant cryptography," writes Chrome's technical program manager for security, Devon O'Brien.

"Continuing with our strategy for handling this major transition, we are updating technical standards, testing and deploying new quantum-resistant algorithms, and working with the broader ecosystem to help ensure this effort is a success." As a step down this path, Chrome will begin supporting X25519Kyber768 for establishing symmetric secrets in TLS, starting in Chrome 116, and available behind a flag in Chrome 115. This hybrid mechanism combines the output of two cryptographic algorithms to create the session key used to encrypt the bulk of the TLS connection:

X25519 — an elliptic curve algorithm widely used for key agreement in TLS today
Kyber-768 — a quantum-resistant Key Encapsulation Method, and NIST's PQC winner for general encryption

In order to identify ecosystem incompatibilities with this change, we are rolling this out to Chrome and to Google servers, over both TCP and QUIC and monitoring for possible compatibility issues. Chrome may also use this updated key agreement when connecting to third-party server operators, such as Cloudflare, as they add support. If you are a developer or administrator experiencing an issue that you believe is caused by this change, please file a bug.

The Register delves into Chrome's reasons for implementing this now: "It's believed that quantum computers that can break modern classical cryptography won't arrive for 5, 10, possibly even 50 years from now, so why is it important to start protecting traffic today?" said O'Brien. "The answer is that certain uses of cryptography are vulnerable to a type of attack called Harvest Now, Decrypt Later, in which data is collected and stored today and later decrypted once cryptanalysis improves." O'Brien says that while symmetric encryption algorithms used to defend data traveling on networks are considered safe from quantum cryptanalysis, the way the keys get negotiated is not. By adding support for a hybrid KEM, Chrome should provide a stronger defense against future quantum attacks...

Rebecca Krauthamer, co-founder and chief product officer at QuSecure, told The Register in an email that while this technology sounds futuristic, it's useful and necessary today... [T]he arrival of capable quantum computers should not be thought of as a specific, looming date, but as something that will arrive without warning. "There was no press release when the team at Bletchley Park cracked the Enigma code, either," she said.

Crime

'Bulletproof' Web Site Hosting Ransomware Finally Seized, Founder Indicted (cnbc.com) 16

An anonymous reader shared this report from CNBC: The mastermind behind a ransomware hosting service that allegedly helped criminals collect more than 5,000 bitcoin in ransom from hundreds of victims was indicted in federal court this week, prosecutors announced Thursday. Artur Grabowski's LolekHosted service operated for about a decade and advertised itself as a haven for "everything but child porn," according to Florida prosecutors. Clients allegedly used the hosting service to deploy ransomware viruses that infected around 400 networks around the world... [That's 400 just for the Netwalker ransomware, which the announcement calls "one of the ransomware variants facilitated by LolekHosted."]

Grabowski was charged with computer fraud, wire fraud, and conspiracy to commit international money laundering. Grabowski himself is also the subject of a $21.5 million seizure order... Grabowski, a Polish national, faces a maximum sentence of 45 years, if he is ever detained and convicted.

Grabowski also "remains a fugitive," according to an announcement from the U.S. Department of Justice. It notes that the 36-year-old's site — registered in 2014 — also "facilitated" brute-force attacks, and phishing.

"Grabowski allegedly facilitated the criminal activities of LolekHosted clients by allowing clients to register accounts using false information, not maintaining Internet Protocol (IP) address logs of client servers, frequently changing the IP addresses of client servers, ignoring abuse complaints made by third parties against clients, and notifying clients of legal inquiries received from law enforcement."
Communications

FCC Prepares $75 Monthly Broadband Subsidies For 'High-Cost' Areas (arstechnica.com) 41

The Federal Communications Commission is paving the way for $75 monthly subsidies to make broadband service more affordable for low-income households in certain "high-cost" areas. From a report: The $75 subsidy will be part of the Affordable Connectivity Program (ACP) that generally offers $30 monthly discounts to people with low incomes. The ACP was created by Congress in late 2021 and implemented by the FCC to replace a previous pandemic-related subsidy program. The ACP already provides $75 monthly subsidies for homes on tribal lands, but not in other areas. The US law that created the ACP lets the FCC make $75 subsidies available in areas where the costs of building broadband networks are higher than average.

That's what the FCC did in its action announced yesterday. "The Infrastructure Act specified that the $75 monthly benefit would support providers that can demonstrate that the standard $30 monthly benefit would cause them to experience 'particularized economic hardship' such that they would be unable to maintain part or all of their broadband network in a high-cost area," the FCC said. ACP subsidies are distributed to Internet service providers that enroll in the program and give customers discounts. Comcast, Charter Spectrum, AT&T, Verizon, and other ISPs last year agreed to make $30 plans with download speeds of at least 100Mbps available to eligible low-income households, essentially making the Internet service free when the $30 subsidy is applied.

Canada

Canadian Telecom Giant Telus To Cut 6,000 Jobs (www.cbc.ca) 10

Telecommunications giant Telus says it is trimming 6,000 jobs, citing its need to free up cash flow and remain competitive. CBC.ca reports: The cuts involve 4,000 positions at its main Telus business and 2,000 at Telus International and include offers of early retirement and voluntary departure packages, the Vancouver-based company said Friday. Financial markets data firm Refinitiv says Telus had 108,500 workers at the end of last year. The cuts were made with "a very heavy heart" and prompted by the "evolving regulatory, competitive and macroeconomic environment," said Darren Entwistle, the company's president and chief executive. "Against the backdrop of rapid transformation in our industry and the ways in which our customers want to engage with us, today we are announcing a significant investment in an extensive efficiency and effectiveness initiative across Telus," he said in a news release.

The restructuring will cost Telus $475 million in 2023 and lead to annual savings of more than $325 million, the company said. Its plans to reduce its workforce were announced at the same time as the company revealed its second-quarter net income fell almost 61 per cent from the same period last year to $196 million. The company's net income amounted to 14 cents per share for the quarter ending June 30 compared with 34 cents per share in the same quarter a year earlier. Yet Entwistle positioned the company's strategy of building out broadband networks, digitizing operations and streamlining costs as "winning." "Our resilience and ability to embrace change and continuously evolve the way we operate are cornerstones of our Telus culture and will continue to fuel our future success," he said.

Security

Microsoft Comes Under Blistering Criticism For 'Grossly Irresponsible' Security (arstechnica.com) 55

An anonymous reader quotes a report from Ars Technica: Microsoft has once again come under blistering criticism for the security practices of Azure and its other cloud offerings, with the CEO of security firm Tenable saying Microsoft is "grossly irresponsible" and mired in a "culture of toxic obfuscation." The comments from Amit Yoran, chairman and CEO of Tenable, come six days after Sen. Ron Wyden (D-Ore.) blasted Microsoft for what he said were "negligent cybersecurity practices" that enabled hackers backed by the Chinese government to steal hundreds of thousands of emails from cloud customers, including officials in the US Departments of State and Commerce. Microsoft has yet to provide key details about the mysterious breach, which involved the hackers obtaining an extraordinarily powerful encryption key granting access to a variety of its other cloud services. The company has taken pains ever since to obscure its infrastructure's role in the mass breach.

On Wednesday, Yoran took to LinkedIn to castigate Microsoft for failing to fix what the company said on Monday was a "critical" issue that gives hackers unauthorized access to data and apps managed by Azure AD, a Microsoft cloud offering for managing user authentication inside large organizations. Monday's disclosure said that the firm notified Microsoft of the problem in March and that Microsoft reported 16 weeks later that it had been fixed. Tenable researchers told Microsoft that the fix was incomplete. Microsoft set the date for providing a complete fix to September 28.

"To give you an idea of how bad this is, our team very quickly discovered authentication secrets to a bank," Yoran wrote. "They were so concerned about the seriousness and the ethics of the issue that we immediately notified Microsoft." He continued: "Did Microsoft quickly fix the issue that could effectively lead to the breach of multiple customers' networks and services? Of course not. They took more than 90 days to implement a partial fix -- and only for new applications loaded in the service."
In response, Microsoft officials wrote: "We appreciate the collaboration with the security community to responsibly disclose product issues. We follow an extensive process involving a thorough investigation, update development for all versions of affected products, and compatibility testing among other operating systems and applications. Ultimately, developing a security update is a delicate balance between timeliness and quality, while ensuring maximized customer protection with minimized customer disruption." Microsoft went on to say that the initial fix in June "mitigated the issue for the majority of customers" and "no customer action is required."

In a separate email, Yoran responded: "It now appears that it's either fixed, or we are blocked from testing. We don't know the fix, or mitigation, so hard to say if it's truly fixed, or Microsoft put a control in place like a firewall rule or ACL to block us. When we find vulns in other products, vendors usually inform us of the fix so we can validate it effectively. With Microsoft Azure that doesn't happen, so it's a black box, which is also part of the problem. The 'just trust us' lacks credibility when you have the current track record."
The Almighty Buck

Internet Providers That Won FCC Grants Try To Escape Broadband Commitments (arstechnica.com) 75

An anonymous reader quotes a report from Ars Technica: A group of Internet service providers that won government grants are asking the Federal Communication Commission for more money or an "amnesty window" in which they could give up grants without penalty. The ISPs were awarded grants to build broadband networks from the FCC's Rural Digital Opportunity Fund (RDOF), which selected funding recipients in December 2020. A group calling itself the "Coalition of RDOF Winners" has been meeting with FCC officials about their requests for more money or an amnesty window, according to several filings submitted to the commission.

The group says broadband construction costs have soared since the grants were announced. They asked for extra money, quicker payments, relief from letter of credit requirements, or an amnesty window "that allows RDOF winners to relinquish all or part of their RDOF winning areas without forfeitures or other penalties if the Commission chooses not to make supplemental funds available or if the amount of supplemental funds the Commission does make available does not cover an RDOF Winner's costs that exceed reasonable inflation," a July 31 filing said.

A different group of ISPs urged the FCC to reject the request, saying that telcos that win grants by pledging to build networks at a low cost are "gaming" the system by seeking more money afterward. So far, the FCC leadership seems reluctant to provide extra funding. The commission could issue fines to ISPs that default on grants -- the FCC recently proposed $8.8 million in fines against 22 RDOF applicants for defaults. The Coalition of RDOF Winners doesn't include every ISP that was granted money from the program. But exactly which and how many ISPs are in the coalition is a mystery.

Printer

Canon Warns Printer Users To Manually Wipe Wi-Fi Settings Before Discarding 37

Printer manufacturer Canon is warning that sensitive Wi-Fi settings don't automatically get wiped during resets, so customers should manually delete them before selling, discarding, or getting them repaired to prevent the settings from falling into the wrong hands. From a report: "Sensitive information on the Wi-Fi connection settings stored in the memories of inkjet printers (home and office/large format) may not be deleted by the usual initialization process," company officials wrote in an advisory on Monday. They went on to say that manual wiping should occur "when your printer may be in the hand of any third party, such as when repairing, lending or disposing the printer."

Like many printers these days, those from Canon connect to networks over Wi-Fi. To do this, users must provide the SSID name, the password preventing unauthorized access to the network, and in some cases, additional information such as Wi-Fi network type, the local network IP address, the MAC address, and network profile. It would be reasonable to assume that performing a simple factory reset that returns all settings to their defaults would be enough to remove these settings, but Monday's advisory indicated that isn't necessarily the case. In the event this information is exposed, malicious actors could use them to gain unauthorized access to a network hosting a Canon printer.
Encryption

Cult of Dead Cow Hacktivists Design Encryption System for Mobile Apps (washingtonpost.com) 22

Once known for distributing hacking tools and shaming software companies into improving their security, a famed group of technology activists is now working to develop a system that will allow the creation of messaging and social networking apps that won't keep hold of users' personal data. From a report: The group, Cult of the Dead Cow, has developed a coding framework that can be used by app developers who are willing to embrace strong encryption and forsake revenue from advertising that is targeted to individuals based on detailed profiles gleaned from the data most apps now routinely collect. The team is building on the work of such free products as Signal, which offers strong encryption for text messages and voice calls, and Tor, which offers anonymous web surfing by routing traffic through a series of servers to disguise the location of the person conducting the search.

The latest effort, to be detailed at the massive annual Def Con hacking conference in Las Vegas next week, seeks to provide a foundation for messaging, file sharing and even social networking apps without harvesting any data, all secured by the kind of end-to-end encryption that makes interception hard even for governments. Called Veilid, and pronounced vay-lid, the code can be used by developers to build applications for mobile devices or the web. Those apps will pass fully encrypted content to one another using the Veilid protocol, its developers say. As with the file-sharing software BitTorrent, which distributes different pieces of the same content simultaneously, the network will get faster as more devices join and share the load, the developers say. In such decentralized "peer-to-peer" networks, users download data from each other instead of from a central machine.

Television

Massachusetts Lawmakers Eye a 'Netflix Tax' To Fund Community TV Channels (bostonglobe.com) 103

A proposed state tax in Massachusetts on streaming video services could increase prices for popular platforms like Netflix and Hulu, as the 5 percent fee would support approximately 200 community access cable channels struggling due to declining cable subscriptions. The Boston Globe reports: In July, the Joint Committee on Advanced Information Technology held hearings on legislation filed by Democratic State Representative Joan Meschino and Republican Representative Mathew J. Muratore, both of Plymouth. Their bill would require streaming video companies to pay a 5 percent fee on the gross revenues generated in the state. The estimated $65 million a year raised by the fee would support roughly 200 community access channels, the most in any state. The community channels are run by nonprofit organizations or town governments, and funded by cable TV companies, which are assessed a fee by local governments for the right to run their cables through city property. The cable companies pass the cost on to subscribers.

But subscriptions are plummeting as US consumers abandon pay TV for streaming services. Cable and satellite subscribers now number about 70 million, down more than 25 percent from 95.5 million a decade ago, according to Leichtman Research Group, a New Hampshire research and analysis company specializing in media, entertainment, and broadband industries. "The next three to five years it's really going to dry up even more so," said Muratore. Meschino said citizens can't afford to lose access to community media channels, because so many local newspapers have shut down. "There's literally no other way to consume that sort of hyperlocal programming," Meschino said.

About a dozen US states levy sales taxes on consumers' streaming video bills. But Meschino said that sales tax money goes into each state's general fund. Instead, she wants the streaming fee to be dedicated entirely to support for community media services, just like the fee paid by traditional cable TV companies. Some or all of the fees would likely be passed on to consumers. Gauthier estimates that a typical household's costs could rise about $2.40 a month, spread among several streaming networks. "Maybe it'll be 75 cents for your Amazon," he said. "Maybe it'll be 80 cents for your Disney."

United States

Who Paid for a Mysterious Spy Tool? The FBI, an FBI Inquiry Found. (nytimes.com) 41

A New York Times investigation uncovered earlier this year that the US government used spyware made by Israeli hacking firm NSO. Now, after an FBI investigation into who was using the tech, the department uncovered a confusing answer: itself. From a report: The deal for the surveillance tool between the contractor, Riva Networks, and NSO was completed in November 2021. Only days before, the Biden administration had put NSO on a Commerce Department blacklist, which effectively banned U.S. firms from doing business with the company. For years, NSO's spyware had been abused by governments around the world. This particular tool, known as Landmark, allowed government officials to track people in Mexico without their knowledge or consent.

The F.B.I. now says that it used the tool unwittingly and that Riva Networks misled the bureau. Once the agency discovered in late April that Riva had used the spying tool on its behalf, Christopher A. Wray, the F.B.I. director, terminated the contract, according to U.S. officials. But many questions remain. Why did the F.B.I. hire this contractor -- which the bureau had previously authorized to purchase a different NSO tool under a cover name -- for sensitive information-gathering operations outside the United States? And why was there apparently so little oversight?

Government

Hacking of Government Email Was Traditional Espionage, NSA Official Says (nytimes.com) 20

The hack of Microsoft's cloud that resulted in the compromise of government emails was an example of a traditional espionage threat, a senior National Security Agency official said. From a report: Speaking at the Aspen Security Forum, Rob Joyce, the director of cybersecurity at the N.S.A., said the United States needed to protect its networks from such espionage, but that adversaries would continue to try to secretly extract information from each other. "It is China doing espionage," Mr. Joyce said. "It is what nation-states do. We have to defend against it, we need to push back against it. But that is something that happens."

The hackers took emails from senior State Department officials including Nicholas Burns, the U.S. ambassador to China. The theft of Mr. Burns's emails was earlier reported by The Wall Street Journal and confirmed by a person familiar with the matter. Daniel J. Kritenbrink, the assistant secretary of state for East Asia, also had his email hacked, a U.S. official said. The emails of Commerce Secretary Gina Raimondo were also obtained in the hack, which was discovered in June by State Department cybersecurity experts scouring user logs for unusual activity. Microsoft later determined that Chinese hackers had obtained access to email accounts a month earlier.

Botnet

Ukraine Takes Down Massive Bot Farm, Seizes 150,000 SIM Cards (bleepingcomputer.com) 128

The Cyber Police Department of the National Police of Ukraine dismantled another massive bot farm, seizing computer equipment, mobile phones, and roughly 150,000 SIM cards of multiple mobile operators. BleepingComputer reports: The bots were used to push Russian propaganda justifying Russia's war in Ukraine, to disseminate illegal content and personal information, and in various other fraudulent activities. In a joint operation, the cyber police and units of the Ukrainian National Police executed 21 search operations in Vinnytsia, Zaporizhzhia, and Lvivand.

"The cyber police established that the attackers used special equipment and software to register thousands of bot accounts in various social networks and subsequently launch advertisements that violated the norms and legislation of Ukraine," a cyber police press release reads [machine translation]. "In addition to spreading hostile propaganda, the accounts were also used for unauthorized distribution of personal data of Ukrainian citizens on the Internet, in Internet fraud schemes, and for sending known false messages about threats to citizens' safety, destruction or damage to property."
Cyber police in Ukraine have busted several pro-Russian bot farms in the last year, including one last month called "Botoferma" and another one late last year that was working for the Russian secret services. Ukraine also traced a Russian propaganda operation to a bot farm that was secretly operating in the country's own capital of Kyiv last August. "The farm operated more than 1 million bot accounts, which helped the propaganda operation build an audience of over 400,000 users on social media," reports PCMag.
News

Kevin Mitnick, Hacker Who Once Eluded Authorities, is Dead at 59 (dignitymemorial.com) 100

Kevin Mitnick, once the so-called "most wanted computer criminal in US history," died on Sunday. He was 59. The New York Times adds: The cause was complications from pancreatic cancer. He had been undergoing treatment at the University of Pittsburgh Medical Center following his diagnosis more than a year ago, according to the King David Memorial Chapel & Cemetery in Las Vegas. After serving prison time for breaking into and tampering with corporate computer networks, he was released in 2000 and began a new career as a security consultant, writer and public speaker.

Mr. Mitnick was best known for the crime spree during the 1990s that involved the theft of thousands of data files and credit card numbers from computers across the country. He used his skills to work his way into the nation's phone and cell networks, vandalizing government, corporate and university computer systems. Investigators at the time named him the "most wanted" computer hacker in the world.

In 1995, after a more than two-year-long manhunt, Mr. Mitnick was captured by the F.B.I. and charged with the illegal use of a telephone access device and computer fraud. "He allegedly had access to corporate trade secrets worth millions of dollars. He was a very big threat," Kent Walker, a former assistant U.S. attorney in San Francisco, said at the time. In 1998, while Mr. Mitnick awaited sentencing, a group of supporters commandeered The New York Times website for several hours, forcing it to shut down. The next year, Mr. Mitnick pleaded guilty to computer and wire fraud as part of an agreement with prosecutors and was sentenced to 46 months in prison. He was also prohibited from using a computer or cellphone without the permission of his probation officer for the three years following his release.

From an obituary: Kevin was an original; much of his life reads like a fiction story. The word that most of us who knew him would use -- magnificent.

He grew up brilliant and restless in the San Fernando Valley in California, an only child with a penchant for mischief, a defiant attitude toward authority, and a love for magic. Kevin's intelligence and delight in holding the rapt attention of audiences revealed themselves early in his childhood and continued throughout his life. In time, he transitioned from pranks and learning magic tricks to phone phreaking, social engineering, and computer hacking.

When his desire to push boundaries led him too far astray, he landed in juvenile detention and eventually served a couple of stints in prison. His time on the FBI's Most Wanted List was well documented in his New York Times bestselling book, The Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, and his other titles: The Art of Deception, The Art of Intrusion, both co-authored with William Simon, and The Art of Invisibility with Robert Vamosi.

Kevin emerged from his final prison term, which he deemed a 'vacation,' in January 2000. He was a changed individual, and began constructing a new career, as a White Hat hacker and security consultant. He became a highly sought-after global public speaker, a writer, and established the successful Mitnick Security Consulting. In November 2011, he became the Chief Hacking Officer and part owner of security awareness training company KnowBe4, founded by close friend and business partner Stu Sjouwerman.

Transportation

Automakers Say They Resolved the Right-To-Repair Fight (wired.com) 28

An anonymous reader quotes a report from Wired: Who owns thedata generated by your car? And who controls access to it? For almost a decade, right-to-repair activists, automakers, parts manufacturers, auto repair shop owners, technicians, and regular people who own cars have fought over those questions. How they are answered could radically change the cost and convenience of owning a modern camera-studded and cloud-enabled car -- and, some say, the future of the increasingly tech-heavy auto industry. Last week, a few trade groups announced they had finally figured it all out. In a letter (PDF) to the US Congress, three industry organizations that together represent the major automakers and thousands of repair shops said they had signed a "memorandum of understanding" on the right to repair. In the agreement, the automakers commit to giving independent car repair shops access to the data, tools, and information necessary to diagnose and repair vehicles -- the data, tools, and information provided to the automakers' own dealership networks. "Competition is alive and well in the auto repair industry," the letter said.

Right-to-repair advocates -- who contend that consumers should be able to fix the products they buy -- aren't so sure. They say the agreement doesn't give car owners full and unfettered control of the streams of data generated by the latest cars' cameras and other sensors, which log data on location, speed, acceleration, and how a vehicle's hardware and software are performing. The advocates worry the new agreement gives automakers and automaker-associated repairers room to squeeze out smaller, independent shops and at-home tinkerers in the future, making it more difficult for car owners to find places to quickly and affordably fix their cars. And they say there are no enforcement mechanisms to guarantee automakers follow through on their promises. Notably, the new agreement didn't include the Auto Care Association, the largest US trade group for independent repair shops and aftermarket parts suppliers. The group's chair, Corey Bartlett, says the agreement doesn't address some of the major barriers facing consumers looking to get a tech-heavy car repaired.

Smaller and especially rural repair shops sometimes can't fix the newest models, because they can't pay for the expensive tools, subscriptions, and training needed, which can cost hundreds of thousands of dollars. As cars get more complex, and move more services into apps and onto the internet, they fear access will shrink. [...] Many repair shops, especially those who opt in and pay to be part of those certified networks, say they have no trouble finding the information they need to fix cars, even before this week's agreement. [...] Other repairers worry that without an industry-wide overhaul that forces automakers to standardize and open up their data, car companies will find ways to limit access to repair information, or push customers towards their own dealership networks to boost profits. They say that if auto owners had clear and direct ownership over the data generated by their vehicles -- without the involvement of automakers' specialized tools or systems -- they could use it themselves to diagnose and repair a car, or authorize the repair shop of their choice to do the work. "My fear, if no one gives some stronger guidelines, is that I know automakers are going to monetize car data in a way that's unaffordable for us to gain access," says Dwayne Myers, co-owner of Dynamic Automotive, an auto repair business with several locations in Maryland.

Networking

Li-Fi, Light-Based Networking Standard Released (tomshardware.com) 87

An anonymous reader quotes a report from Tom's Hardware: Today, the Institute of Electrical and Electronics Engineers (IEEE) has added 802.11bb as a standard for light-based wireless communications. The publishing of the standard has been welcomed by global Li-Fi businesses, as it will help speed the rollout and adoption of the data-transmission technology standard. Advantages of using light rather than radio frequencies (RF) are highlighted by Li-Fi proponents including pureLiFi, Fraunhofer HHI, and the Light Communications 802.11bb Task Group. Li-Fi is said to deliver "faster, more reliable wireless communications with unparalleled security compared to conventional technologies such as Wi-Fi and 5G." Now that the IEEE 802.11bb Li-Fi standard has been released, it is hoped that interoperability between Li-Fi systems with the successful Wi-Fi will be fully addressed.

Of course, Li-Fi isn't going to sweep away Wi-Fi and 5G alternatives (nor wired networks). Radio waves still have a distinct advantage with regard to transmission through the atmosphere at great distance, and though opaque objects. Instead, work must concentrate on using horses for courses -- with Li-Fi advantages being harvested where possible. [...] Now the IEEE 802.11bb standard is published, manufacturers can have greater confidence in the ecosystem and start integrating the tech, where suitable. One of the big wheels of Li-Fi, pureLiFi, has already prepared the Light Antenna ONE module for integration into connected devices. This 14.5mm long component is currently being provided to OEMs for evaluation. In its promotional materials the firm suggests that Li-Fi is preferable over Wi-Fi for: more connections without congestion, greater security and privacy, and doing the heavy lifting for the highest bandwidth tasks. We expect to see a far fuller gamut of Li-Fi network devices, and user devices which support the standard, emerge between now and MWC next February.

United States

US Ranks 32nd Worldwide On Broadband Affordability, Study Finds (techdirt.com) 57

An anonymous reader quotes a report from Techdirt: One recent study found that the U.S. was currently ranked somewhere around 32nd globally, behind countries like Russia, Lithuania, and Bulgaria [on broadband affordability] (you can find the full breakdown here): "The United States and Canada both have one of the highest internet costs," Alex Tofts, the Broadband Expert for Broadband Genie, said in a summary. "It's driven by a lack of competition and bigger distances to connect, with lower population density than other developed countries. However, both have average wages in the top fifteen in the world, compensating for the high cost of internet."

For decades, people (mostly the industry) tried to suggest the problem was because America was just so gosh darn big. But you'll notice that China and Russia, (ranked 25th and 17th, respectively) still perform better. Data routinely shows that affordability is the key obstacle to access, yet it's only been in the last few years that you've started to see this reality reflected in U.S. policymaking. [...] But again, the cause of this problem is very clear: monopolization and consolidation, protected by corruption. Few U.S. markets have the choice of more than one broadband provider at next-generation speeds. And that's because federal and state lawmakers are so comically corrupt, they routinely let AT&T, Comcast, Charter, or Verizon lobbyists endlessly merge, crush all competition, then literally write state or federal legislation and policy over several decades.

But it's not all doom and gloom. Decades of federal policy corruption and dysfunction have created an extremely strong, local, bipartisan grassroots movement for better broadband access. In countless towns and cities, municipalities, cooperatives, city-owned utilities, and creative new partnerships are building new, open access fiber networks with an eye on competition and cost. [...] Still, it's comical and grotesque that it's 2023 and a country that fancies itself a technology giant still can't meaningfully tackle equitable broadband access and affordability. And that telecom and media policy has basically become a boring afterthought in the era of "Big Tech." Ensuring equitable access to an essential utility is just too boring for most 2023 policy circles, much less the modern attention economy.

Slashdot Top Deals