The evolution of the NSA’s XKeyscore

In the current generation of Narus’ system, the processing systems run on commodity Linux servers and re-assemble network sessions as they’re captured, mining them for metadata, file attachments, and other application data and then indexing and dumping that information to a searchable database.

via Building a panopticon: The evolution of the NSA’s XKeyscore | Ars Technica.

To Our Customers | Silent Circle Blog

However, we have reconsidered this position. We’ve been thinking about this for some time, whether it was a good idea at all. Today, another secure email provider, Lavabit, shut down their system lest they “be complicit in crimes against the American people.” We see the writing the wall, and we have decided that it is best for us to shut down Silent Mail now. We have not received subpoenas, warrants, security letters, or anything else by any government, and this is why we are acting now.

via To Our Customers | Silent Circle Blog.

Hybrid Drives Don’t Need More Than 8GB Of NAND

The study essentially proves that, at least in the workplace, any amount of NAND memory larger than 10GB would have a limited impact on performance. Of course, data-intensive tasks like analytics or video rendering, where fresh data is being accessed all the time, would benefit from larger amounts of faster memory, but an average user is unlikely to notice the difference between SSD and SSHD.

via Seagate: Hybrid Drives Don’t Need More Than 8GB Of NAND.

A Material That Could Make Solar Power “Dirt Cheap”

Like any other new entrant into the highly competitive solar-panel market, perovskites will have difficulty taking on silicon solar cells. The costs of silicon solar cells are falling, and some analysts think they could eventually fall as low as 25 cents per watt, which would eliminate most of the cost advantage of perovskites and lessen the incentive for investing in the new technology. The manufacturing process for perovskite solar cells—which can be as simple as spreading a liquid over a surface or can involve vapor deposition, another large-scale manufacturing process—is expected to be easy. But historically, it has taken over a decade to scale up novel solar-cell technologies, and a decade from now silicon solar cells could be too far ahead to catch.

via A Material That Could Make Solar Power “Dirt Cheap” | MIT Technology Review.

‘Fort Disco’ Botnet Behind Attack Campaign Against Thousands Of Sites

“The number of weak passwords is not surprising, as this campaign is clearly a target of opportunity and not focused on a specific target,” Bing says. “This is interesting as it marks a sea change in the tactics of attackers. In addition to drive-by exploits of unpatched Windows machines being the low-hanging fruit, attackers are learning that these blog and content management systems are often vulnerable to trivial attacks.”

via ‘Fort Disco’ Botnet Behind Attack Campaign Against Thousands Of Sites.

A Storm of Servers: How the Leap Second Led Facebook to DCIM

Last July 1, that scenario became real as the “Leap Second” bug caused many Linux servers to get stuck in a loop, endlessly checking the date and time. At the Internet’s busiest data centers, power usage almost instantly spiked by megawatts, stress-testing the facility’s power load and the user’s capacity planning.

via A Storm of Servers: How the Leap Second Led Facebook to DCIM.

What was happening? The additional second caused particular problems for Linux systems that use the Network Time Protocol (NTP) to synchronize their systems with atomic clocks. The leap second caused these systems to believe that time had “expired,” triggering a loop condition in which the system endlessly sought to check the date, spiking CPU usage and power draw.

Simple technique puts graphene capacitors on par with lead-acid battery

The resulting material displays all the electrical properties associated with a capacitor, meaning that it can charge and discharge its full capacity almost instantly. But it has a storage density that’s right at the low-end of the range seen in lead-acid batteries. It’s also stable over multiple charge/discharge cycles and holds on to 90 percent of its capacity even after being charged for 300 hours straight.

via Simple technique puts graphene capacitors on par with lead-acid battery | Ars Technica.

2,919 Movie Pirates Walk Free as BitTorrent Trolling Scheme Falls Apart

“The agreements are noticeably devoid of any provision for the disposition of any revenues that could be obtained from verdicts or court orders of fees or costs upon success in court, suggesting a business model of using the information obtained from early discovery into the identities of individual defendants to negotiate quick settlements under the threat of embarrassing and expensive litigation without actually litigating claims on their merits,” the Judge explains.

via 2,919 Movie Pirates Walk Free as BitTorrent Trolling Scheme Falls Apart | TorrentFreak.

Hacking and Rooting SOHO Home Routers

In a previous report, we released a list of SOHO router vulnerabiltiies and showed proof-of-concept (PoC) attack code for how to exploit them. For many of these routers, those PoCs operated through the main web-based interface. In this follow up study, we addressed only the extraneous, non-router services that were present on the routers. What we found was that of the 10 routers reviewed, all 10 could be compromised from the (wireless) LAN once a router had USB attached storage connected.

via Hacking and Rooting SOHO Home Routers.

This is hardly surprising.  Currently I only use SOHO routers as dumb wifi access points and that’s it.  I don’t know why anyone would want to make one of these cheaply built devices into some kind of NAS.

Web Ads Used to Launch Online Attacks

It didn’t take long for the victimized test server to begin struggling under the sudden load. In the first hour of the test, during which only $2 was spent on ads, more than 130,000 connections from browsers swamped the server. It wasn’t much longer until the server began falling offline under the growing load.

via Web Ads Used to Launch Online Attacks | MIT Technology Review.