‘Homebrew’ email servers: Genius as well as sneaky? :: WRAL.com

No, it’s not always a room filled with wires and glowing blue lights. It’s probably not even the size of your furnace. The personal email server used by Hillary Rodham Clinton during her time as secretary of state was probably about the size of your office desktop computer and could have been tucked quietly in a corner somewhere.

She’s come a long way since 1997, when Clinton’s staff bought the then-first lady a copy of the book "E-Mail for Dummies."

Setting up your own email server is something only the geekiest of tech geeks do because of the serious hassles involved, including spending every waking hour fending off spam. Like brewing your own beer, it’s typically done just for fun — a way to challenge your smarts and fill the time. It also appeals to those who fear the government is sniffing around and could compel companies like Google or Yahoo to release customer data.

via 'Homebrew' email servers: Genius as well as sneaky? :: WRAL.com.

Clinton ran own computer system for her official emails :: WRAL.com

Hillz got mad skillz, running her own mailserver. Who knew she was a 7337 hacX0R?

The computer server that transmitted and received Hillary Rodham Clinton’s emails — on a private account she used exclusively for official business when she was secretary of state — traced back to an Internet service registered to her family’s home in Chappaqua, New York, according to Internet records reviewed by The Associated Press.

The highly unusual practice of a Cabinet-level official physically running her own email would have given Clinton, the presumptive Democratic presidential candidate, impressive control over limiting access to her message archives. It also would distinguish Clinton’s secretive email practices as far more sophisticated than some politicians, including Mitt Romney and Sarah Palin, who were caught conducting official business using free email services operated by Microsoft Corp. and Yahoo Inc.

via Clinton ran own computer system for her official emails :: WRAL.com.

Google in talks on phone network in US: executive, Technology – THE BUSINESS TIMES

Interesting report that Google intends to become an MVNO (reselling wireless service).

[BARCELONA] US Internet giant Google says it is in talks with telecom companies about operating its own mobile phone services in the United States.

"We are actually working with carrier partners. You will see us announce it in the coming months," Sundar Pichai, Google’s senior vice-president for products, said on Monday.

"We don’t intend to be a network operator at scale," however, he added, speaking at the Mobile World Congress, a major telecom trade fair in Barcelona.

The California-based company would become a kind of virtual mobile operator by buying access to existing firms’ networks and selling it on to clients.

via Google in talks on phone network in US: executive, Technology – THE BUSINESS TIMES.

This Is How Verizon Bullshits You | Maximum PC

Verizon hates regulation, but when it hurts their greedy business model.

The fact that Verizon is releasing this kind of PR stunt designed to tell you, the public, that the FCC is using an outdated regulation not suitable for the modern technology era, is complete horse shit. The PR machine at Verizon is essentially spitting in your face, thinking you won’t even notice because it knows the majority of the public is too ignorant of what actually goes on behind the scenes and that most people don’t really have the time to dig through reports and papers.

Up until today, Verizon was freely using Title II on and off wherever it felt it could cut costs and fund infrastructure using public funds. It’s now only making a play that the FCC’s rules are unfit for modern society because the new rules will hurt its revenue stream from content providers.

via This Is How Verizon Bullshits You | Maximum PC.

Wilson’s official statement on today’s FCC ruling

Here is Wilson’s official statement on today’s FCC ruling.

CITY OF WILSON APPLAUDS FCC CHAIRMAN WHEELER AND THE COMMISSION FOR ITS LEADERSHIP IN DECIDING IN FAVOR OF LOCAL BROADBAND CHOICE

Wilson, N.C. — The City of Wilson applauds FCC Chairman Wheeler and the Commission for their leadership today in approving the City’s petition to preempt a North Carolina state law that restricts municipal Gigabit broadband deployment. Today’s historic decision now enables Wilson and other North Carolina municipalities to provide the Gigabit broadband infrastructure and services that North Carolina and America need in order to remain competitive in our emerging knowledge-based global economy.
Continue reading

Why that boom you heard isn’t a “transformer blowing.”

Cutout fuse

Cutout fuse

During bad weather, many folks will hear electrical booms in their area and blame it on a “transformer blowing.”

The truth is that transformers are expensive, so the power companies protect them with equipment called “cut-out fuses.” In a lot of cases where a branch has brushed a power line, these fuses will blow and cut power to a street. If the branch falls away and the line isn’t damaged, a lineman can quickly restore power just by resetting the fuse using a long pole.

So now you know.

In electrical distribution, a fuse cutout or cut-out fuse is a combination of a fuse and a switch, used in primary overhead feeder lines and taps to protect distribution transformers from current surges and overloads. An overcurrent caused by a fault in the transformer or customer circuit will cause the fuse to melt, disconnecting the transformer from the line. It can also be opened manually by utility linemen standing on the ground and using a long insulating stick called a "hot stick".

via Fuse cutout – Wikipedia, the free encyclopedia.

The FCC rules against state limits on city-run Internet – The Washington Post

Wilson’s petition to the FCC was just granted and I couldn’t be happier. North Carolina’s “Level Playing Field” law, written by Time Warner Cable, is now null and void. Now communities across the state can build themselves their own digital future with a community broadband service.

I would be dancing in the street if the street wasn’t a slushy mess right now!

For years, cities around the country have been trying to build their own, local competitors to Verizon, Charter and other major Internet providers. Such government-run Internet service would be faster and cheaper than private alternatives, they argued. But in roughly 20 states, those efforts have been stymied by state laws.

Now, the nation’s top telecom regulators want to change that. On Thursday, the Federal Communications Commissions voted 3-2 to override laws preventing Chattanooga, Tenn., and Wilson, N.C. from expanding the high-speed Internet service the cities already offer to some residents.

via The FCC rules against state limits on city-run Internet – The Washington Post.

AP reporter soft-pedals phone key theft

Ken Dilanian

Ken Dilanian

Associated Press Intelligence reporter Ken Dilanian reports on the NSA/GCHQ’s theft of mobile phone keys, as reported by The Intercept.

WASHINGTON AP — Britain’s electronic spying agency, in cooperation with the U.S. National Security Agency, hacked into the networks of a Dutch company to steal codes that allow both governments to seamlessly eavesdrop on mobile phones worldwide, according to the documents given to journalists by Edward Snowden.

via AP News | The Times-Tribune | thetimes-tribune.com.

Dilanian’s soft-pedaling arrives in the second paragraph:
Continue reading

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle

NSA hacked SIM card manufacturer Gemalto and stole millions of encryption keys without the company’s knowledge. While I don’t particularly mind NSA targeting bad guys (that’s why we have NSA), I consider hacking the good guys to get the bad guys to be very poor form.

I am not surprised that this took place on Obama’s watch, either. His record is just as bad as George W. Bush’s. Perhaps worse.

The monitoring of the lawful communications of employees of major international corporations shows that such statements by Obama, other U.S. officials and British leaders — that they only intercept and monitor the communications of known or suspected criminals or terrorists — were untrue. “The NSA and GCHQ view the private communications of people who work for these companies as fair game,” says the ACLU’s Soghoian. “These people were specifically hunted and targeted by intelligence agencies, not because they did anything wrong, but because they could be used as a means to an end.”

via The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle.

Lenovo shipping laptops with pre-installed adware that kills HTTPS | CSO Online

Whoops. Lenovo shipped computers with adware that breaks ALL SSL on its laptops. Not only that, but the private key is also widely available, meaning anyone can spoof any website on an unsuspecting Lenovo owner’s computer. Major security fail!

Lenovo is in hot water after it was revealed on Wednesday that the company is shipping consumer laptops with Superfish Adware pre-installed. Security experts are alarmed, as the software performs Man-in-the-Middle attacks that compromises all SSL connections.

It’s a fact of life; PC manufacturers are paid to install software at the factory, and in many cases this is where their profit margin comes from. However, pre-installed software is mostly an annoyance for consumers. Yet, when this pre-installed software places their security at risk, it becomes a serious problem.

via Lenovo shipping laptops with pre-installed adware that kills HTTPS | CSO Online.

Update: More technical info here and here.