Comment and no one can use it (Score 2) 39
Microsoft Brings Its New AI-powered Bing To the Windows 11 Taskbar
... and no one can use it, because everyone is in the waiting list
Microsoft Brings Its New AI-powered Bing To the Windows 11 Taskbar
... and no one can use it, because everyone is in the waiting list
Bugs were found, Apple patched them.
There is much more to it than that. The news is that Trellix just discovered these vulnerabilities only now and made it public.
As a result, both national security agencies and criminals hide certain software vulnerabilities from both users and the original developer.
Governments face a trade-off between protecting their citizens' privacy through the reporting of vulnerabilities to private companies on one hand and undermining the communication technologies used by their targets—who also threaten the security of the public—on the other. The protection of national security through exploitation of software vulnerabilities unknown to both companies and the public is an ultimate resource for security agencies but also compromises the safety of every single user because any third party, including criminal organizations, could be making use of the same resource.
According to Trellix (formerly FireEye and McAfee Enterprise) in section The Vulnerabilities:
There were also vulnerabilities of this class in services that could be accessed by any app, with no entitlements necessary. The first of these we found was in OSLogService, an XPC service that can be used to read potentially sensitive information from the syslog. More significantly an attacker can exploit an NSPredicate vulnerability in UIKitCore on the iPad. By setting malicious scene activation rules an app can achieve code execution inside of SpringBoard, a highly privileged app that can access location data, the camera and microphone, call history, photos, and other sensitive data, as well as wipe the device.
The second story from Monday 13 has the following links:
1 www.theregister.com/2023/02/13/linux_ai_assistant_killed_off/
2 www.kickstarter.com/projects/aiforeveryone/mycroft-mark-ii-the-open-voice-assistant/posts/3729060
3 mycroft.ai/product/mark-ii/
The first story from Sunday 12 has the following links:
1 hardware.slashdot.org/story/19/12/14/1954242/building-your-own-open-source-privacy-protecting-voice-assistant-with-a-raspberry-pi
2 www.kickstarter.com/projects/aiforeveryone/mycroft-mark-ii-the-open-voice-assistant/posts/3729060
These two stories have 50% match of linked sources.
That is very easy to detect as possible dupe when someone hits preview button in story submissions. It could be displayed just as a warning.
Is there a way to contribute to the Slashdot code so that we can fix it?
Was there something fundamentally wrong with the core utilities that have had multiple decades of development and refinement that they need replacing? As far as I know, they are already efficient, secure, and cross-platform.
Well, at least it is not re-implemented in JavaScript. Oh, wait
"I said to the manager, 'This can harm somebody,' and she said by harming a few we can help the greater masses" said Hayward, former employee
Always say "Yes" if you want to have a job in corporate environment and when you are asked to do something.
They "cracked" it. How? What? What did they crack? Maybe they just read the metadata that wasn't encrypted? Who says it was "secure"? Doesn't sound secure to me. I read the article/link, but still had all these questions.
If you really want to know, then my advice would be to apply for a job in Homeland security. You will obviously have to sign an NDA to never reveal such information.
The ONLY unbreakable encryption is the One Time Pad.
When someone uses that and becomes a person of interest, then the homeland security simply bundles some keyboard logger into their next android/os update.
https://tech.slashdot.org/comm...
Telegram is NOT secure & Russia IS spying on i (Score:4, Interesting), Tuesday December 06, 2022
Telegram is not secure and its continued use in Ukraine may lead to users' deaths.
A recent security-focused review looking at a Nov 11 Washington Post story [washingtonpost.com] on Russian "stay behind" operations in Kherson has concluded that Russia is spying on Telegram chats in occupied Ukrainian regions [pwnallthethings.com]. A tidbit for you:
Telegram's security has long been called into question by the information security community. There's lots of aspects of how it is built that don't make sense from a security perspective. But so far, there's never been any good evidence that it's been exploited by the Russian security services in practice.
Until now.
Ihor's story is particularly amazing because it doesn't just reveal that Russian forces are surveilling Telegram chats. It also gives us a good hint as to how.
It even tells us what Russia wasn't doing--at least in the narrow case of Ihor. And it reveals how at least one other major and well-known security defect in Telegram--ones that have been left open on purpose by Telegram--would very likely have led to Ihor's death if Russian occupation forces had been only slightly more competent and successfully exploited them.
https://tech.slashdot.org/comm...
Telegram does NOT use the Signal protocol (Score:2) December 08, 2022
By default, chats are not encrypted. You can optionally encrypt 1 to 1 chats, but not group chats. Encryption uses the Signal protocol.
Yes, Telegram supports encrypted chats, but Telegram users overwhelmingly ignore that feature. As you noted, it has limited applicability (no encryption for group chats). IIRC, it also feels less usable (even beyond the fact that the option is buried in the UI).
According to Telegram's own website, they have implemented their own protocol called MTProto [telegram.org]. This is not Signal.
At least MTProto 1.0 was rather riddled with flaws. It was written by mathematicians without any knowledge of cryptography and was very roundly criticized. See this question on crypto.StackExchange [stackexchange.com] for detail. Presumably MTProto 2.0 addressed all of that, but Telegram's callous responses have alienated cryptographers. Telegram has given the impression that its chats are secure and encrypted and they've buried the option to actually enable encryption (regardless of its implementation). In other words, stay away from it.
https://yro.slashdot.org/comme...
Re:Let me be the first to say (Score:5, Interesting), November 30, 2022
Telegram sends the username in the SSL SNI field. (maybe only for verified users...)
So technically it doesn't need to give much more to authorities, its snoopable.
https://mastodon.technology/@r... [mastodon.technology]
Please do not recommend Telegram, its about as private as WhatsApp. Meaning pretty much not.
https://apple.slashdot.org/com...
Re: They can't do what Amazon does?, October 29, 2022
Have you tried to make an instant messenger that focuses on privacy and that they cannot decrypt your shit for anyone... present your decrypted content on their own website
Our software can decrypt Telegram protocol and process the messages as text.
A court warrant is required to investigate the content when some message triggers an alarm.
Our software runs on Internet backbone.
All syllogisms have three parts, therefore this is not a syllogism.