“Honey Encryption” Could Trick Criminals with Spoof Data

“Decoys and deception are really underexploited tools in fundamental computer security,” Juels says. Together with Thomas Ristenpart of the University of Wisconsin, he has developed a new encryption system with a devious streak. It gives encrypted data an additional layer of protection by serving up fake data in response to every incorrect guess of the password or encryption key. If the attacker does eventually guess correctly, the real data should be lost amongst the crowd of spoof data.

via “Honey Encryption” Could Trick Criminals with Spoof Data | MIT Technology Review.

tc: Linux HTTP Outgoing Traffic Shaping (Port 80 Traffic Shaping)

I‘ve 10Mbps server port dedicated to our small business server. The server also act as a backup DNS server and I’d like to slow down outbound traffic on port 80. How do I limit bandwidth allocation to http service 5Mbps (burst to 8Mbps) at peak times so that DNS and other service will not go down due to heavy activity under Linux operating systems?

You need use the tc command which can slow down traffic for given port and services on servers and it is called traffic shaping:

via tc: Linux HTTP Outgoing Traffic Shaping (Port 80 Traffic Shaping).

The Biggest Battle in All Of EVE

Once the TCU onlining was decided, the fight just became about carnage: who could kill the most the fastest. The fleets committed by both sides represent a staggering amount of time, effort, and ISK. Each titan costs about 100 billion ISK (up to 160 or even 220b for particularly expensive fits), which can be purchased for about $3,000 USD by buying game time and selling it to other players for ISK. More than that, though, to build a titan requires several weeks and a nice quiet undisturbed area of space, something harder to find in the current climate. Supercarriers are similarly challenging. Dreadnaughts and carriers, while not as difficult to build, still represent a significant investment of effort on the part of an industrialist somewhere.

via B-R5RB: The Biggest Battle in All Of EVE | TheMittani.com.

App Pays Attention to Phone’s Behavior to Spot New Malware

Today, San Francisco-based Zimperium unveiled its zIPS Android app (the “IPS” stands for “intrusion prevention system”), which the company says uses machine learning to watch how your smartphone normally acts and can spot strange changes in its usage, enabling it to detect and prevent attacks, including those that may strike via unprotected Wi-Fi networks.

via App Pays Attention to Phone’s Behavior to Spot New Malware | MIT Technology Review.

Google to Buy Artificial Intelligence Startup DeepMind for $400M

This is in large part an artificial intelligence talent acquisition, and Google CEO Larry Page led the deal himself, sources said. According to online bios, Hassabis in particular is quite a talent, a child prodigy in chess who was later called “probably the best games player in history” by the Mind Sports Olympiad.

via Exclusive: Google to Buy Artificial Intelligence Startup DeepMind for $400M | Re/code.

BeWifi lets you steal your neighbor’s bandwidth when they’re not using it

The way Telefonica has made this happen in a practical way is to build its own routers that can be installed in houses within a neighborhood. So far these have had to be installed by engineers, but the next generation are plug-and-play, and eventually all that will be needed is an over-the-air software update to customers’ existing routers. According to Rodriguez, the software “creates a mesh to aggregate the capabilities [of the routers].” Pooling all of the bandwidth from these routers allows anyone within the network to take advantage of it at home, and they can also connect to any BeWifi network they come across on their mobile devices when out and about.

via BeWifi lets you steal your neighbor’s bandwidth when they’re not using it | Ars Technica.

The title is a bit dramatic using the term “stealing” as if something as ephemeral as unused bandwidth, which disappears never to be used by anyone ever as time passes, is an asset that could be considered “stolen” if taken or used by someone else.  The victim of this kind of “theft” does not wake in the morning and see something missing unless they’re subscribed to some kind of data cap.  Most home installations do not have caps.

Telefonica is currently looking towards developing economies and its huge customer base of over 200 million households in 14 countries in South America as the places in which BeWifi could have a real impact.

How Silicon Valley’s most celebrated CEOs conspired to drive down 100,000 tech engineers’ wages

These secret conversations and agreements between some of the biggest names in Silicon Valley were first exposed in a Department of Justice antitrust investigation launched by the Obama Administration in 2010. That DOJ suit became the basis of a class action lawsuit filed on behalf of over 100,000 tech employees whose wages were artificially lowered — an estimated $9 billion effectively stolen by the high-flying companies from their workers to pad company earnings — in the second half of the 2000s. Last week, the 9th Circuit Court of Appeals denied attempts by Apple, Google, Intel, and Adobe to have the lawsuit tossed, and gave final approval for the class action suit to go forward. A jury trial date has been set for May 27 in San Jose, before US District Court judge Lucy Koh, who presided over the Samsung-Apple patent suit..

via The Techtopus: How Silicon Valley’s most celebrated CEOs conspired to drive down 100,000 tech engineers’ wages | PandoDaily.

Burden of proof of infringement on patent holder

The Supreme Court on Wednesday upheld the decision of the district court, stating that it holds that “when a licensee seeks a declaratory judgment against a patentee to establish that there is no infringement, the burden of proving infringement remains with the patentee.”

via US Supreme Court: Burden of proof of infringement on patent holder | ITworld.