Wednesday, April 08, 2015

Some Anonabox routers recalled for lack of basic security

Source: http://www.engadget.com/2015/04/07/anonabox-security-flaw-recalled/

The story of the Anonabox internet privacy router has a new ridiculous chapter. The initial production batch of the device has a major security flaw and Anonabox's overlords, Sochule have informed customers that it will replace those routers for free. It turns out the routers in question shipped without Wi-Fi password protection. Yup, the Anonabox "cloaking device" didn't have the simplest form of router security, a network password. Sure users could anonymously surf the Internet via Tor, but they couldn't stop anyone from within Wi-Fi range from hopping on their network and potentially hacking their devices. It was also determined that the root password of the affected devices is the incredibly easy to guess "Admin." According to a Wired report, 300 of the approximately 1,500 routers sold were about as secure as a screen door.

From its launch on Kickstarter, the Anonabox saga has been series of false claims. After blowing past its funding goal on Kickstarter, the crowd-funding site pulled the product citing false hardware claims. It was also discovered that many of the security declarations made by the company were inaccurate. After the device was moved to Indiegogo, creator August Germer's claims of involvement with the Tor community were also debunked.

Also, as noted by security researcher Nicholas Weaver, Anonabox users will most likely use non-Tor browsers on the Tor network. You should never use the same browser for Tor and non-Tor traffic because your ID cookie is logged in both instances.

Hey @anonabox, even IF your shit was secure (instead of grossly vulnerable), non-Tor Browser over Tor is EPICFAIL and known insecure.

- Nicholas Weaver (@ncweaver) April 7, 2015

Still, the company was able raise more than $82,00 and has apparently already sold about 1,500 devices. We'll never know how many of those were purchased by individuals believing the privacy hype and how many were bought by security researchers for the lulz.

[Image credit: Anonabox]

Filed under: , ,

Comments

Source: Wired, Reclaim Your Privacy

Read More...

Liquid metal printing puts flexible circuits on 'anything'

Source: http://www.engadget.com/2015/04/08/purdue-inket-printer-liquid-metal/

Thanks to top universities and some companies, soft robots and stretchy electronics are already a reality. Now a group of researchers from Purdue claim they've found the right manufacturing process to produce those types of devices en masse. Their method entails printing out circuits using an inkjet printer loaded with liquid metal alloy. "This process... allows us to print flexible and stretchable conductors onto anything, including elastic materials and fabrics," said Rebecca Kramer, one of the researchers. After all, if the circuits are made from liquid metal, they can be stretched, folded, squeezed, and so on and so forth, without breaking.

They call the technique "mechanically sintered gallium-indium nanoparticles," because, well, they need to turn liquid metal into nanoparticles first before it can function as ink. That's made possible by immersing the alloy into a solvent such as ethanol and subjecting the mixture to ultrasound in order to disperse the liquid metal.

The printed circuits end up being protected by a "skin" that prevents electrical conductivity. But that can easily be removed by applying light pressure (like stamping or scraping) on the printout, allowing designers to choose which parts of the circuits to activate. The team plans to explore the technique further and perhaps put it to the test, but you can read more about their study when their paper gets published in the April 18th issue of Advanced Materials.

Filed under: ,

Comments

Source: Purdue University

Read More...

Tuesday, April 07, 2015

It's impossible to tell the difference between real life and video games

Source: http://sploid.gizmodo.com/its-impossible-to-tell-the-difference-between-real-life-1696333116

I know which one is reality and which one is video game graphics and yet my brain keeps flip flopping and pretending like the video game is real life and real life is actually the game. The graphics are so impressive that in some angles, I honestly can't tell which is which.

Read more...


Read More...

drag2share: Intel's latest Atom chips are meant for all of your connected devices

source: http://www.engadget.com/2015/04/07/intel-atom-x3-sofia-iot/?utm_source=Feed_Classic_Full&utm_medium=feed&utm_campaign=Engadget&?ncid=rss_full

Intel's latest Atom processors aren't just for phones and tablets -- they're going to show up in many of the other devices you own before long. The chip maker has unveiled a new version of its Atom x3 (aka SoFIA) that's designed to run Internet of Things gadgets, such as smart appliances and outdoor sensors. They have built-in 3G or LTE data to stay online, and they're tough enough to survive extreme temperatures that would faze regular silicon. Unsurprisingly, these processors are made with Linux and Android in mind. There's no word from Intel as to which companies are using the new x3, but you'll definitely have to be patient. The developer kits don't start shipping until the second half of the year, so you probably won't see a truly wide range of Atom-powered gear until 2016.

Read More...

REPORT: Russia hacked the White House

Source: http://www.businessinsider.com/report-russia-hacked-the-white-house-2015-4

United State Cyber Command security attacks

Russian-hired hackers breached an unclassified White House system and pilfered information about President Barack Obama's daily schedule and communications, according to CNN. The hackers gained "access to sensitive information such as real-time non-public details of the president's schedule."

A phishing-style attack allowed Russian hackers to access a State Department computer network, which in turn allowed access to the White House's system. The hackers were working for the Russian government, but did not succeed in accessing any classified networks, according to the CNN report.

Even so, non-classified networks can contain sensitive information that the White House might not necessarily want in the hands of a rival government. And it's a sign that even high-level US government systems are far from impervious to outside attacks.

The attack stemmed from a nearly year-long breach of the US State Department's computer systems that investigators described as the "worst ever" against a US federal agency target, according to a March CNN report. Those ongoing problems with State's computer networks has apparently now impacted the White House as well.

On CNN, Deputy National Security Advisor Ben Rhodes explained that federal staffers have previously been encouraged to guard even non-classified information being passed through government systems because of hacking concerns.

"If you're going to do something that is classified you have to do it on one email system and on phone system, and act as if information could be compromised if it's not on the classified system," he said. Rhodes said that the hackers did not access classified information, even though the government views even unclassified information as "sensitive."

Rhodes wouldn't confirm or deny t! hat Russ ian hackers were responsible for the reported White House breach.

"It's fair to say ... Russia has been active in the cyber space and in the espionage space," Rhodes told CNN.

SEE ALSO: This al Qaeda affiliate's survival is a dangerous precedent

Join the conversation about this story »

NOW WATCH: A lawyer in Florida has come up with an ingenious way for drivers to evade drunken-driving checkpoints








Read More...