Security Now! #673 - 07-24-18 the Data Transfer Project
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
CCIA Submission to Rekabet Kurumu's Inquiry Into the Digital
CCIA Submission to Rekabet Kurumu’s Inquiry into the Digital Economy 27 April 2020 I. Introduction The Computer and Communications Industry Association,1 (“CCIA”) welcomes the opportunity to contribute to the market study into competition and the digital economy by Rekabet Kurumu (“Rekabet”), the Turkish Competition Authority. CCIA commends Rekabet for seeking a better understanding of the legal, economic and policy challenges that arise with the digitalization of the global economy and its significance in the competition analysis. CCIA looks forward to furthering the dialogue with Rekabet in this regard. The tech sector has had transformative effects on the entire economy. Tech has increased efficiency and lowered entry barriers in many markets and allowed the introduction of entirely new business models. Digital media distribution tools have created a space for individuals to broadcast their audio, photo and video content creations to the world. Online retail intermediaries like Hepsiburada and Trendyol allow small and medium sized enterprises to reach consumers and meet demand far beyond their geographic footprint, more quickly and cheaper than ever before. Social media services dramatically lower the cost for advertisers to reach their audience and avoid advertising wastage. Studies suggest that the consumer benefit of free online services is worth thousands of lira per person, per year.2 In order for innovation in the technology market to continue driving the global economy, both competition policy and sound antitrust enforcement must play a crucial role in ensuring that 1 The Computer & Communications Industry Association (CCIA) is a non-profit membership organisation that represents the interests of a wide range of companies in the Internet, technology and telecoms industries. -
Iot Threats, Challenges and Secured Integration
IoT Threats, Challenges and Secured Integration Christian Shink, p. eng., CSSLP System Engineer • Why IoT Devices? • Bot Attacks • 3 Botnets fighting over IoT Firepower • Secure IoT integration Why IoT Devices Internet of Things Internet working of physical devices, vehicles, buildings, … Devices embedded with electronics, software, sensors, actuators Network connectivity Any Path Any Service Any Network Anytime Any Business Any context Anyone Machinery Anybody Building energy Anything Management Any Device Healthcare Retail A Rapidly Growing Number of Connected Devices Copyright © 2017 Radware. All rights reserved. IoT is Highly Susceptible to Cyber Attacks IoT devices run an embedded or stripped-down version of the familiar Linux operating system. 1 Malware can easily be compiled for the target architecture, mostly ARM, MIPS, x86 internet-accessible, lots of (I)IoT and ICS/SCADA are deployed without any form of 2 firewall protection Stripped-down operating system and processing power leaves less room for security 3 features, including auditing, and most compromises go unnoticed by the owners To save engineering time, manufacturers re-use portions of hardware and software in different 4 classes of devices resulting in default passwords and vulnerabilities being shared across device classes and manufacturers Internet Security Trend report 2015 by Nexus guard: IoT is becoming a soft target for cyber-attack Copyright © 2017 Radware. All rights reserved. From the News “D-Link failed to take reasonable steps to secure its routers and IP cameras, potentially compromising sensitive consumer information” “The cameras aren’t designed to receive software updates so the zero-day exploits can’t be patched.” “We believe that this backdoor was introduced by Sony developers on purpose” Sources: 1. -
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites. -
Bibliography of Erik Wilde
dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992. -
North Korea Purloins Russian Technology to Add Teeth to Its Military Caliber
NEW DELHI TIMES R.N.I. No 53449/91 DL-SW-01/4124/17-19 (Monday/Tuesday same week) (Published Every Monday) New Delhi Page 16 Rs. 7.00 22 - 28 July 2019 Vol - 29 No. 25 Email : [email protected] Founder : Dr. Govind Narain Srivastava ISSN -2349-1221 Modi irradiates Christian victims of loopholed Defence Muslim oppression Procurement rot in Thailand With the world at large progressing with positive The country code of 66 on the incoming call speed and the concept of globalization seeing was unfamiliar, as was the number. its frutation with the spread of co-operative Usually I ignore such calls as they invariably and collaborative networks worldwide; among are threats from the worldwide network of the civic, economic and political spheres, the my fans or duct-cleaning companies worried defence sector of any nation in the modern about the air I breathe. But on that day, I took era becomes the top-priority... a chance. The other option... By Dr. Ankit Srivastava Page 3 By Tarek Fatah Page 2 North Korea purloins Russian technology to add teeth to its Military Caliber By NDT Special Bureau Page 2 Babies growing up with animals, Belief aids to climb the ladder Iran and its prospects for build stronger immune system of Success Democracy I meet so many mothers who won’t let their children walk All of us are on a daily struggle to be successful so as to be More than 80 million Iranians at home or living across the barefoot in the house or the park, won’t let them touch able to establish ourselves in society. -
Masters Thesis Stojko.Pdf
DEPARTMENT OF INFORMATICS TECHNICAL UNIVERSITY OF MUNICH Master’s Thesis in Information Systems An Information Model as a Basis for Information Gathering to comply with Data Portability according to GDPR Art. 20 Laura Stojko DEPARTMENT OF INFORMATICS TECHNICAL UNIVERSITY OF MUNICH Master’s Thesis in Information Systems An Information Model as a Basis for Information Gathering to comply with Data Portability according to GDPR Art. 20 Ein Informationsmodell als Basis fur¨ die Informationserhebung zur Datenportabilitat¨ nach Art. 20 DSGVO Author: Laura Stojko Supervisor: Prof. Dr. Florian Matthes Advisor: Dipl. Math.oec. Dominik Huth Date: November 15, 2018 I hereby declare that this thesis is entirely the result of my own work except where other- wise indicated. I have only used the resources given in the list of references. Munich, 15. November 2018 Laura Stojko Abstract With the announcement of the General Data Protection Regulation (GDPR) by the Euro- pean Union, data privacy laws shall be harmonized in European countries. In the digital era, personal data is of high significance for companies, especially within customer data- driven industries (e.g. social media platforms). Due to the new importance of personal data and its usage, the awareness for data privacy is increasing among people. Thus, good data privacy management is of high relevance for companies and customers. This thesis focuses on article 20 of the GDPR, which describes data portability as one essential aspect for new rights of the data subject. Data portability enables customers to receive their per- sonal data from companies and transfer it to others. Thereby, a level playing field within the market is supported. -
Natural Language Processing 2018 Highlights
NLP 2018 Highlights By Elvis Saravia 1 Table of Contents Introduction ............................................................................................................................................ 4 Research ................................................................................................................................................. 5 Reinforcement Learning ...................................................................................................................... 5 Sentiment Analysis and Related Topics ................................................................................................ 7 AI Ethics and Security .......................................................................................................................... 9 Clinical NLP and ML ........................................................................................................................... 12 Computer Vision ................................................................................................................................ 15 Deep Learning and Optimization ........................................................................................................ 17 Transfer Learning for NLP .................................................................................................................. 19 AI Generalization ............................................................................................................................... 20 Explainability and Interpretability -
Protokolle Im Fediverse
Protokolle im Fediverse Jens Lechtenbörger Oktober 2018 1 Einleitung Wie bereits diskutiert setzen Dezentralisierung und Föderation gemeinsame Standards voraus. Während das Fediverse als Federated Universe im engeren Sinne Funktionalitäten von Social Media basierend auf freier Software und föderierten Servern umfasst, gehören im weiteren Sinne auch andere Formen von Kommunikation dazu. Zu Protokollen, die mir besonders vielversprechend erscheinen, geben die folgenden Abschnitte weitere Informationen bzw. führen zu externen Quellen. 2 ActivityPub Als prominenter Vertreter von Fediverse-Protokollen im engeren Sinne wurde im Januar 2018 ActivityPub vom World Wide Web Consortium (W3C) stan- dardisiert. Der Implementation Report dokumentiert den Stand der Umset- zung von ActivityPub durch diverse Anwendungen. Lesen Sie die ActivityPub-Spezikation so weit, dass Sie folgende Fragen beantworten können: Was sind Actors, Objects und Activities? Welche Rollen spielen Inbox und Outbox für die Kommunikation? 3 XMPP Das klassische Beispiel föderierter Internet-Dienste ist die E-Mail für asyn- chrone Kommunikation (auch für Gruppenkommunikation, mit Anhängen aller Art). Für synchrone Echtzeit-Chats bietet das Extensible Messaging and Pres- ence Protocol (XMPP) einen auf dem Austausch von XML-Nachrichten basierenden oenen Standard, der aus dem um die Jahrtausendwende en- twickelten Jabber hervorgegangen ist. Heute wird XMPP nicht nur in 1 Messengern genutzt, sondern auch als Middleware im Internet der Dinge. XMPP-Server bilden analog zu E-Mail-Servern eine Föderation, so dass Be- nutzer unterschiedlicher, dezentral administrierter Server miteinander kom- munizieren können. Die Kommunikation setzt sogenannte Jabber IDs (JIDs) voraus, die zunächst wie E-Mail-Adressen aussehen ([email protected]), aber darüber hinaus auch Client-Anwendungen auf unterschiedlichen Geräten identi- zieren können ([email protected]/work-pc). -
2.3 Blockchain
POLITECNICO DI TORINO Corso di Laurea Magistrale in Ingegneria Informatica - Data Science Tesi di Laurea Magistrale Supporting the portability of profiles using the blockchain in the Mastodon social network Relatore Candidato prof. Giovanni Squillero Alessandra Rossaro Anno Accademico 2018-2019 École polytechnique de Louvain Supporting the portability of profiles using the blockchain in the Mastodon social network Authors: Alessandra ROSSARO, Corentin SURQUIN Supervisors: Etienne RIVIERE, Ramin SADRE Readers: Lionel DRICOT, Axel LEGAY, Giovanni SQUILLERO Academic year 2018–2019 Master [120] in Computer Science Acknowledgements We would like to thank anyone who made the writing of this thesis possible, directly or indirectly. First of all, we would like to thank our supervisors, Prof. Etienne Riviere and Prof. Ramin Sadre for their continous support and advice during the year. We would never have gone this far without them. Secondly, we thank Lionel Dricot, Prof. Axel Legay and Prof. Giovanni Squillero for accepting to be the readers of this thesis. Alessandra First of all, I would like to thank my family, my parents Claudia and Alberto, my brother Stefano and my sister Eleonora, that from the beginning of my studies believed in me, every time urging me to give more and sustaining me each time that I had difficulties. They are my strength and I feel really lucky to have them in my life. Another thanks is to my friends, to Soraya, Beatrice, Sinto and Stefano and especially to Matteo and Edoardo that each time that I needed, remember me to believe in myself and don’t give up. Thank you, sincerely! I would like to thank also my partner, Corentin, because we were a great team, sometimes with some misunderstandings, but I appreciated to work at this project with him! Corentin I must express my deep gratitude to my family and friends for their moral support. -
Data Transfer Project
Data Transfer Project August 20, 2018 Federal Trade Commission 600 Pennsylvania Ave NW Washington, DC 20580 To Whom It May Concern: Thank you for the opportunity to provide comment on the Federal Trade Commission’s Hearings on Competition and Consumer Protection in the 21st Century. As you may know, Google, Microsoft, Twitter, and Facebook recently announced the Data Transfer Project (datatransferproject.dev). We are excited to share our work on this project, including the thinking behind it, in response to your questions. Data portability is critical for user control and competition. Not only is this project relevant to the questions you raised in your request for comment on these topics, but we also encourage the Commission to consider the importance of portability throughout your process. The mission of the Data Transfer Project is to support direct, service-to-service portability. This will ultimately enable users to transfer data between two authenticated accounts behind the scenes, without having to download the data and relocate it themselves. This is an open-source project that will make it easier for people to switch services, or try new and innovative products, by improving the ease and speed of data portability. We have attached a detailed white paper that describes the technical foundations of the project and explains how our principles guided us toward this approach. The paper also includes detailed descriptions of the security and privacy considerations that are built into the project. Please let us know if you have any additional questions. Thanks, Keith Enright Julie Brill Damien Kieran Erin M. Egan Chief Privacy Officer Corporate Vice Data Protection Officer Vice President & Chief Google LLC President & Deputy Twitter, Inc Privacy Officer General Counsel Facebook, Inc. -
Reporting, and General Mentions Seem to Be in Decline
CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations. -
The Future of Data: Adjusting to an Opt-In Economy October 2018
The Future of Data: Adjusting to an opt-in economy October 2018 Prepared for 2 | Oxford Economics 2018 Contents Executive summary ...................................................................... 4 The dawn of the opt-in era ............................................................ 7 Who are these people and what do they want? ............................. 10 Not all consumers are the same .................................................... 15 The rise of the data economy ........................................................ 16 How industries use data ............................................................... 18 Meet the leaders ............................................................................ 21 Life in the data age ........................................................................ 29 The path forward: Calls to action ................................................... 30 Research methodology ................................................................. 31 Contact us .................................................................................... 32 Oxford Economics 2018 | 3 Executive summary 4 | Oxford Economics 2018 In a world increasingly driven by data, We found that consumers have individual consumers suddenly have a lot contradictory views of the information of power. How they exercise this power, economy. They will share sensitive data and the ways companies respond, will be yet do not trust the companies they share a major story for years to come. with, or fully understand how much is