The best result for big tech is if laws are absent or useless. The latest survey of big tech lobbying in the US reveals a flotilla of nearly 500 salespeople/lawyers touring the US state legislatures, trying to either draw up tech friendly legislation to insert into privacy bills, water then down through persuasion, or just keep them off the books.
The positive and negative real-world impacts of blockchain applications both direct and indirect are critical. Whether this increasingly institutionalized sector will spark a real revolution or further entrench SSDD remains to be seen.
Funny — they are building a personal brand “anonymously” … which doesn’t help their career, etc. … what’s the point? Probably won’t last.
The goal of the Digital Markets Act (DMA) is to ensure that large “gatekeeping” platforms —such as Google, Apple, Meta, Amazon and the like—do not use their position as a core platform to restrict innovation and growth among the companies and apps that rely on them.
A service level agreement (SLA) is a contract between a cloud provider and a user. The SLA describes the provider’s minimum level of service, specified by performance metrics, and the compensation due to the user should the provider fail to deliver this service.
Grooming techniques used in various frauds are getting more common and more elaborate. Fraudsters are coming up with narratives that involve complicated lies and may have different stages, depending on the type of fraud.
Domain Name System (DNS) abuse is one of the most important ongoing discussions in the community. Many of the existing industry white papers and general discussions around abuse incidents are based on data from reputation feeds, also called Reputation Blocklists (RBLs).
Digital twin technology allows for the creation of a virtual duplicate of a live production system, network environment, or cloud instance in real time — and it promises to be a rapidly growing market and boon to manufacturers and security pros alike.
If cloud services weren’t complicated enough for the typical business today to properly configure and secure, there’s also a lesser-known layer of middleware that cloud providers run that can harbor hidden security flaws.
Seven months from now, assuming all goes as planned, Google Chrome will drop support for its legacy extension platform, known as Manifest v2 (Mv2). This is significant if you use a browser extension to, for instance, filter out certain kinds of content and safeguard your privacy.
Cloud service providers drove the datacenter switching market to its fifth consecutive quarter of year-over-year growth, but it won’t last forever, Dell’Oro Group analyst Sameh Boujelbene told The Register.
But there’s a much bigger threat to democracy coming out of Silicon Valley and it’s this: America’s largest financial and tech increasingly act as independent countries, routinely exporting jobs, money and technology to our most significant global adversary.
It’s difficult to overstate how dramatic this shift is, both in substance and in tone. Overpaying, and even coddling, talented engineers has, for years, been seen as a point of pride among tech’s leadership class.
Excessive centralization can stymie coordination and erode freedom, democracy, and economic dynamism—decentralization is supposed to be the remedy. But the term on its own is too vague to be a coherent end goal.
Florida and Texas passed statutes last year that require the fair, unbiased treatment of social media users. The Ohio attorney general also brought a lawsuit asking an Ohio state court to declare that Google is a common carrier. Big Tech, of course, opposed all these efforts in the courts.
How did Facebook become a business worth $1 trillion at one point last year? Not just by fulfilling its mission of “connecting people,” but by keeping them hooked on the site, sometimes for hours on end.
The truth is out there, but Twitter is not forthcoming. Why might this be? Here is where we get to the core of the issue: the reach data provided by these companies—this pertains not only to Twitter but to hundreds of thousands of sites—form the basis of its pricing structure for advertisers and therefore drive the fundamentals of the business model.
A critical code execution zero-day in all supported versions of Windows has been under active exploit for seven weeks, giving attackers a reliable means for installing malware without triggering Windows Defender and a roster of other endpoint protection products.
By expanding the breadth of device-to-application solutions with IPv6, LoRaWAN’s addressable IoT market is also broadened to include internet-based standards required in smart electricity metering and new applications in smart buildings, industries, logistics, and homes.
Because the rate of expansion is higher than a typical network team can handle, AI must be introduced to keep the already complex network structure of the present manageable, while enabling organizations to be ready to manage expansions in real-time.
Technology companies added workers for the 18th consecutive month and employer job postings for tech occupations reached a new high in May, according to an analysis of the latest employment data by a nonprofit association for the IT industry and workforce.
This edition of weekend reads begins with a few straight security stories of interest. I knew key loggers existed in the wild, but the logging of keystrokes before a web form is submitted is apparently a lot more common than I realized—
They found that 1,844 websites gathered an EU user’s email address without their consent, and a staggering 2,950 logged a US user’s email in some form. Many of the sites seemingly do not intend to conduct the data-logging but incorporate third-party marketing and analytics services that cause the behavior.
Illustrating that security is often a game of “whack-a-mole,” web skimmers are obfuscating their operation—
Identity is fraught with problems even in the real world; just as people used to carry “letters of introduction” with them when they moved to a new area or started a new job, identity is often a matter of transitive trust. How to replicate transitive trust in the digital world is still a problem, but it’s also the foundation of decentralized systems—
The central thesis of the decentralized future is that I should be able to demonstrate certain aspects of my identity in the digital domain that are manifest in the physical domain – for example, my valid passport, academic record, Social Security details, and financial transactions.
Some thoughts on containers and security—
In this article, we outline how containers contributed to agile development, which unique security risks containers bring into the picture – and what organizations can do to secure containerized workloads, going beyond DevOps to achieve DevSecOps.
DNS is often used by attackers in various ways, so it’s always fruitful to watch this space—
Lots of stuff going on in the world of hardware and processors—
With the IPU, this offload model has been taken up another notch, with sophisticated networking and computation being put into a server’s network controller that makes it really a system in its own right.
Having created the Arm-based Nitro DPUs to offload compute, network, and storage virtualization and encryption work from its X86 servers, AWS decided back in 2018 to scale it up and create the initial Graviton to test the idea of using Arm servers in production.
Finally, a few articles on network performance and management—
When performance is poor, debugging these systems is challenging due to the complex interactions between different subcomponents and the possibility of the problem occurring at various places along the communication path.
Instead, I wanted to show how you can use Wireshark to find which specific packet triggered a Snort rule in seconds from within the Wireshark GUI, giving you all the surrounding context that a PCAP can give you.
And a bit of ‘net history—remember all 100 episodes of the History of Networking are still available, even if I’ve not recorded a new one in a long time—
networks and policy
Leading off this weekend, an article by Simon Sharwood on the impact of the centralization of the Internet. I wrote a somewhat longer article on the Public Discourse a while back on the same topic.
The internet has become smaller, the result of a rethinking of when and where to use the ‘net’s intended architecture. In the process it may also have further concentrated power in the hands of giant technology companies.
Is softwarization really going to change the way we build networks from the ground up? I suspect things will change, but they’ve always changed. I also suspect we’ll be hearing about how software is going to eat the world ten years from now, and IPv6 still won’t be fully deployed.
security and other technologies
This one on Costa Rica is a serious warning—
A soda can, a smartphone stand, or any shiny, lightweight desk decoration could pose a threat of eavesdropping, even in a soundproof room, if an attacker can see the object, according to a team of researchers from Ben-Gurion University of the Negev.
work and life
With a 2% unemployment rate, the tech industry is rethinking what job applicants need to get hired. Skills-based hiring is on the rise, and 59% of employers are considering eliminating college degree requirements — changes that could reshape the IT workforce.