The Internet - The first Worldwide Tool of Unification ("The End of History")

" ... Now I give you something that few think about: What do you think the Internet is all about, historically? Citizens of all the countries on Earth can talk to one another without electronic borders. The young people of those nations can all see each other, talk to each other, and express opinions. No matter what the country does to suppress it, they're doing it anyway. They are putting together a network of consciousness, of oneness, a multicultural consciousness. It's here to stay. It's part of the new energy. The young people know it and are leading the way.... "

" ... I gave you a prophecy more than 10 years ago. I told you there would come a day when everyone could talk to everyone and, therefore, there could be no conspiracy. For conspiracy depends on separation and secrecy - something hiding in the dark that only a few know about. Seen the news lately? What is happening? Could it be that there is a new paradigm happening that seems to go against history?... " Read More …. "The End of History"- Nov 20, 2010 (Kryon channelled by Lee Carroll)

"Recalibration of Free Choice"– Mar 3, 2012 (Kryon Channelling by Lee Carroll) - (Subjects: (Old) Souls, Midpoint on 21-12-2012, Shift of Human Consciousness, Black & White vs. Color, 1 - Spirituality (Religions) shifting, Loose a Pope “soon”, 2 - Humans will change react to drama, 3 - Civilizations/Population on Earth, 4 - Alternate energy sources (Geothermal, Tidal (Paddle wheels), Wind), 5 – Financials Institutes/concepts will change (Integrity – Ethical) , 6 - News/Media/TV to change, 7 – Big Pharmaceutical company will collapse “soon”, (Keep people sick), (Integrity – Ethical) 8 – Wars will be over on Earth, Global Unity, … etc.) - (Text version)

“…5 - Integrity That May Surprise…

Have you seen innovation and invention in the past decade that required thinking out of the box of an old reality? Indeed, you have. I can't tell you what's coming, because you haven't thought of it yet! But the potentials of it are looming large. Let me give you an example, Let us say that 20 years ago, you predicted that there would be something called the Internet on a device you don't really have yet using technology that you can't imagine. You will have full libraries, buildings filled with books, in your hand - a worldwide encyclopedia of everything knowable, with the ability to look it up instantly! Not only that, but that look-up service isn't going to cost a penny! You can call friends and see them on a video screen, and it won't cost a penny! No matter how long you use this service and to what depth you use it, the service itself will be free.

Now, anyone listening to you back then would perhaps have said, "Even if we can believe the technological part, which we think is impossible, everything costs something. There has to be a charge for it! Otherwise, how would they stay in business?" The answer is this: With new invention comes new paradigms of business. You don't know what you don't know, so don't decide in advance what you think is coming based on an old energy world. ..."
(Subjects: Who/What is Kryon ?, Egypt Uprising, Iran/Persia Uprising, Peace in Middle East without Israel actively involved, Muhammad, "Conceptual" Youth Revolution, "Conceptual" Managed Business, Internet, Social Media, News Media, Google, Bankers, Global Unity,..... etc.)

German anti-hate speech group counters Facebook trolls

German anti-hate speech group counters Facebook trolls
Logo No Hate Speech Movement

Bundestag passes law to fine social media companies for not deleting hate speech

Honouring computing’s 1843 visionary, Lady Ada Lovelace. (Design of doodle by Kevin Laughlin)

Wednesday, September 5, 2012

Viewpoint: Making sense of the Apple ID codes leak

BBC News, Chris Valasek, Security analyst, Coverity, 5 September 2012

Antisec claimed it sourced the UDID codes from an FBI agent's laptop, but
the US agency said there was "no evidence" it was the source

Related Stories 

Many are wondering how the recently leaked list of unique device identifiers (UDIDs) from the hacktivist group Antisec will personally affect them. You may be asking: should I be concerned?

First of all, an Apple UDID is just a unique number given to every device, such as an iPhone or iPad.

They are very similar to vehicle identification numbers given to cars, which are unique to each vehicle, helping to track its history, albeit without any information encoded.

The only association of UDID and personal information is provided when setting up a device on iTunes, not directly encoded into the serial number itself.

The UDID ensures that each device has a serial number that uniquely identifies it. This ID is sometimes, against Apple's recommendations, used by App developers for tracking a device.

For example, imagine a grocery list app that inappropriately uses the UDID of the device in a request for authentication, instead of a username and password.

This app may also expose certain application programming interfaces (APIs) for Twitter or Facebook, letting the app-user declare his or her favourite groceries via social media.

The app could also use the UDID for ad-tracking as well, ensuring that items of interest will be displayed based on the consumers habits.

Ditching the identifiers

If attackers had a UDID and knew of apps that used them inappropriately, they could potentially use it to compromise the privacy of an end user.

Having a UDID in no way gives the bad guys the ability to actively compromise an Apple device.

It is possible that the UDID could be used by certain apps to acquire personal information or potentially impersonate a user, but it does not provide any direct control or access to your iPhone/iPad.

Apple is moving away from the UDID, to something less device-specific such as core foundation universally unique identifiers (CFUUIDs).

Cause for concern?

Apple has not directly stated why they are making this move but I'd speculate that they wanted a unique identifier that was not necessarily linked to a physical device, which probably creates a headache for App developers and ad networks relying on the UDID for user association.

So, the answer to the question "Should I be concerned" is: Slightly.

Right now the true abilities of leveraging a UDID by an attacker are pretty grey.

There appears to be some apps out there that rely solely on UDID for linking personal information, but many do not.

As the UDID saga unfolds, we will see which apps incorrectly use the UDIDs to link to personal information and can more accurately identify the threat.

Honestly, there are many more threats out there to PC and Mac users that should be more concerning. Attackers are still quite focused on client-side exploitation via browsers, document readers, and their plug-ins.

Chris Valasek is a senior security researcher at Coverity, which develops products to check software for coding errors. He is also chairman of SummerCon, the US's oldest hacker convention.

No comments: