Feb 102021
 

Security researcher finds it’s easy to confuse build systems with malicious versions of private software libraries

Bug hunter Alex Birsan last year managed to compromise the software supply chain of 35 companies by exploiting packaging mechanisms used by JavaScript, Python, and Ruby developers.…

External feed Read More at the Source: https://go.theregister.com/feed/www.theregister.com/2021/02/10/library_dependencies_attack/

 2021-02-10  Comments Off on The Register – Apple, Microsoft, PayPal among 35 organizations compromised by evil twin dependencies attack
Feb 102021
 

How do you rapidly record the output from your three million dollar analog computer in the 1940s when the results are only available on analog meters? The team responsible for the Westinghouse 1947 AC Network Calculator at Georgia Tech was faced with just this problem and came up with a nifty solution — hack the control panel and wire in a special-purpose drafting table.
What Is It?
What is this beast of a computer? Machines of this type were developed during and after World War 2, and strictly speaking, belong in the category of scale models rather than true computers. Although these machines were very flexible, they were primarily designed to simulate power distribution grids. There is a…

External feed Read More at the Source: https://hackaday.com/2021/02/09/the-modding-restoration-and-demise-of-a-3m-analog-computer/

 2021-02-10  Comments Off on Hackaday – The Modding, Restoration, and Demise of a $3M Analog Computer
Feb 102021
 

The recent announcement by Facebook that it would “reduce the amount of political content” on its platform is part of the drive by the US ruling establishment to block the spread of progressive, left-wing and socialist ideas on social media.

External feed Read More at the Source: http://www.wsws.org/en/articles/2021/02/10/poli-f10.html

 2021-02-10  Comments Off on World Socialist Web Site (en) – Facebook’s “depoliticization” aimed at censorship of left-wing and socialist organizations
Feb 102021
 

Although we have no evidence that voting machines were used for election
fraud in 2020, we know some are vulnerable to such use.

People should vote on paper, marking ballots with a pen. Then a
computerized machine can be used to count them. That machine should
not be able to alter them
.

External feed Read More at the Source: https://stallman.org/archives/2020-nov-feb.html#9_February_2021_%28Voting_machines_in_2020%29

 2021-02-10  Comments Off on Richard Stallman’s Political Notes – Voting machines in 2020
Feb 102021
 

Never forget the IoT device you invite into your home may become the state’s witness. That’s one of the unfortunate conclusions that can be drawn from Amazon’s latest transparency report.

Amazon has its own digital assistant, Alexa. On top of that, it has its acquisitions. One of its more notable gets is Ring. Ring is most famous for its doorbells — something that seems innocuous until you examine the attached camera and the company’s 2,000 partnerships with law enforcement agencies.

Ring is in the business of selling cameras. That the doorbell may alert you to people on your doorstep is incidental. Cameras on the inside. Cameras on the outside. All in the name of “security.” And it’s only…

External feed Read More at the Source: https://www.techdirt.com/articles/20210204/09284546183/amazon-transparency-report-indicates-multiple-iot-devices-are-juicy-targets-law-enforcement.shtml

 2021-02-10  Comments Off on Techdirt. – Amazon Transparency Report Indicates Its Multiple IoT Devices Are Juicy Targets For Law Enforcement