I fixed it by playing the journalist card—but regular customers might not be so lucky.
Source: Skype restricted my paid account, without recourse, over a billing hiccup | Ars Technica
I fixed it by playing the journalist card—but regular customers might not be so lucky.
Source: Skype restricted my paid account, without recourse, over a billing hiccup | Ars Technica
How Microsoft made it possible, and how to truly purge it
The Office of the United States Trade Representative, the agency responsible for negotiating two massive upcoming trade deals, is being led by former lobbyists for corporations that stand to benefit from the deals, according to disclosure forms obtained by The Intercept.
The Trans-Pacific Partnership (TPP) is a proposed free trade accord between the U.S. and 11 Pacific Rim countries; the Transatlantic Trade and Investment Partnership (TTIP) is a similar agreement between the U.S. and the E.U.
The Obama administration is pushing hard to complete both deals, which it says will increase U.S. trade opportunities. Critics say the deals will provide corporate interests with sweeping powers to challenge banking and environmental regulations.
Here is information on three major figures in the Trade Representative’s office, gleaned from their disclosure forms:
— Sharon Bomer Lauritsen, the assistant U.S. trade representative for agricultural affairs, recently lobbied for the Biotechnology Industry Organization, a trade group for biotech companies. Lauritsen’s financial disclosure form shows she made $320,193 working to influence “state, federal and international governments” on biotech patent and intellectual property issues. She worked for BIO as an executive vice president through April of 2011, before joining the Trade Representative office.
— Christopher Wilson, the deputy chief of mission to the World Trade Organization, recently worked for C&M International, a trade consulting group, where he represented Chevron, the Biotechnology Industry Organization, British American Tobacco, General Electric, Apple and other corporate interests. Wilson’s financial disclosure shows he made $250,000 a year, in addition to an $80,000 bonus in 2013, before he joined the Obama administration. Wilson left C&M International in February of 2014 and later joined the Trade Representative’s office. C&M International reportedly lobbied Malaysia, urging it to oppose tobacco regulations in Australia.
— Robert Holleyman, the deputy United States trade representative, previously worked as the president of the Business Software Alliance, a lobbying group that represents IBM, Microsoft, Adobe, Apple and other technology companies seeking to strengthen copyright law. Holleyman earned $1,141,228 at BSA before his appointment. Holleyman was nominated for his current position in February of last year.
A second-tier German professional basketball team has been relegated to an even lower tier as a result of being penalized for starting a recent game late—because the Windows laptop that powered the scoreboard required 17 minutes to perform system updates.
The March 13 match between the Chemnitz Niners and the Paderborn Baskets was set to begin normally, when Paderborn (the host) connected its laptop to the scoreboard in the 90 minutes leading up to the game.
In an interview with the German newspaper, Die Zeit, Patrick Seidel, the general manager of Paderborn Baskets said that at 6:00pm, an hour and a half before the scheduled start time, the laptop was connected “as usual.”
“But as both teams warmed up, the computer crashed,” he said. “When we booted it again at 7:20pm, it started automatically downloading updates. But we did not initiate anything.”
After all the updates were installed, Paderborn was ready to start the game at 7:55pm.
Those of you with long memories will recall a barrage of complaints in the run up to Windows 8’s launch that concerned the ability to install other operating systems—whether they be older versions of Windows, or alternatives such as Linux or FreeBSD—on hardware that sported a “Designed for Windows 8” logo.
To get that logo, hardware manufacturers had to fulfil a range of requirements for the systems they built, and one of those requirements had people worried. Windows 8 required machines to support a feature called UEFI Secure Boot. Secure Boot protects against malware that interferes with the boot process in order to inject itself into the operating system at a low level. When Secure Boot is enabled, the core components used to boot the machine must have correct cryptographic signatures, and the UEFI firmware verifies this before it lets the machine start. If any files have been tampered with, breaking their signature, the system won’t boot.
This is a desirable security feature, but it has an issue for alternative operating systems: if, for example, you prefer to compile your own operating system, your boot files won’t include a signature that Secure Boot will recognize and authorize, and so you won’t be able to boot your PC.
However, Microsoft’s rules for the Designed for Windows 8 logo included a solution to the problem they would cause: Microsoft also mandated that every system must have a user-accessible switch to turn Secure Boot off, thereby ensuring that computers would be compatible with other operating systems. Microsoft’s rules also required that users be able to add their own signatures and cryptographic certificates to the firmware, so that they could still have the protection that Secure Boot provides, while still having the freedom to compile their own software.
This all seemed to work, and the concerns that Linux and other operating systems would be locked out proved unfounded.
This time, however, they’re not.
At its WinHEC hardware conference in Shenzhen, China, Microsoft talked about the hardware requirements for Windows 10. The precise final specs are not available yet, so all this is somewhat subject to change, but right now, Microsoft says that the switch to allow Secure Boot to be turned off is now optional. Hardware can be Designed for Windows 10 and can offer no way to opt out of the Secure Boot lock down.
RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept.
The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released.
By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.
The CIA declined to comment for this story.
The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store.
The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode.
Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”
It would be an understatement to say that net neutrality has been in the news quite a lot recently. One of the supposed arguments against it is that requiring all data packets to be treated equally within a connection will prevent companies from offering us a cornucopia of “specialized services.” The main example cited is for medical applications — the implication being that if net neutrality is required, people are going to die. Speaking at the Mobile World Congress that is currently underway, Nokia’s CEO Rajeev Suri has come up with a novel variation on that theme, as reported by CNET (via @AdV007):
Suri emphasises that self-driving cars need to talk over wireless networks fast enough to make decisions with the split-second timing required on the roads. “You cannot prevent collisions if the data that can prevent them is still making its way through the network”, said Suri, discussing Nokia’s drive toward instantaneous low-latency communication across the network.
Yes, according to Suri, there are going to be terrible pile-ups on the roads unless we get rid of net neutrality. Leaving aside the fact that low-latency communications across the internet will come anyway — if there’s one thing that’s certain in the world of digital technology, it’s that everything gets faster and cheaper — there’s another problem with this argument.
Self-driving cars that are so reliant on such guaranteed, high-performance networks are hardly going to be very resilient in real-life situations — and certainly not the kind of system that the public will want to entrust with the lives of themselves and their families. If self-driving cars are to be widely accepted, one of their key features must be the ability to work safely even with the flakiest of internet connections. Suri’s attempt to use this emerging technology as a weapon against net neutrality instead undermines the argument for self-driving cars themselves.
The world could really need a credible alternative to PayPal
There are way too many stories of Paypal unfairly and ridiculously cutting off services that rely on it as a payment mechanism, but here’s yet another one. Mega, the cloud storage provider that is perhaps well-known for being Kim Dotcom’s “comeback” act after the US government shut down Megaupload, has had its Paypal account cut off. The company claims that Paypal was pressured by Visa and Mastercard to cut it off:
Visa and MasterCard then pressured PayPal to cease providing payment services to MEGA.
MEGA provided extensive statistics and other evidence showing that MEGA’s business is legitimate and legally compliant. After discussions that appeared to satisfy PayPal’s queries, MEGA authorised PayPal to share that material with Visa and MasterCard. Eventually PayPal made a non-negotiable decision to immediately terminate services to MEGA. PayPal has apologised for this situation and confirmed that MEGA management are upstanding and acting in good faith. PayPal acknowledged that the business is legitimate, but advised that a key concern was that MEGA has a unique model with its end-to-end encryption which leads to “unknowability of what is on the platform”.
MEGA has demonstrated that it is as compliant with its legal obligations as USA cloud storage services operated by Google, Microsoft, Apple, Dropbox, Box, Spideroak etc, but PayPal has advised that MEGA’s “unique encryption model” presents an insurmountable difficulty.
In an interview last month, Timothy D. Cook, Apple’s chief executive, said the N.S.A. “would have to cart us out in a box” before the company would provide the government a back door to its products. Apple recently began encrypting phones and tablets using a scheme that would force the government to go directly to the user for their information. And intelligence agencies are bracing for another wave of encryption.
In fact, it seems noteworthy that this whole issue of increasing encryption by the tech companies to keep everyone out has been left off the official summit schedule. As the NY Times notes, Silicon Valley seems to be pretty much completely fed up with the intelligence community after multiple Snowden revelations revealed just how far the NSA had gone in trying to “collect it all” — including hacking into the foreign data centers of Google and Yahoo. And, on top of that, the NSA’s efforts to buy up zero day vulnerabilities before companies can find out and patch them:
“What has struck me is the enormous degree of hostility between Silicon Valley and the government,” said Herb Lin, who spent 20 years working on cyberissues at the National Academy of Sciences before moving to Stanford several months ago. “The relationship has been poisoned, and it’s not going to recover anytime soon.”