136 private links
Auf die Ibiza-Affäre folgte die Schredder-Affäre. Kanzler Kurz geriet im österreichischen Wahlkampf wegen der Aktion eines Mitarbeiters stark unter Druck. Jetzt zieht die Staatsanwaltschaft einen Schlussstrich.
Innenminister Seehofer will dem Verfassungsschutz ermöglichen, künftig Chats über WhatsApp oder Telegram mitzulesen. Die SPD gibt ihren Widerstand gegen die Pläne offenbar auf.
Die Betreiber der gescheiterten Pkw-Maut fordern 560 Millionen Euro vom Bund - der zieht nun vor ein Schiedsgericht. Derweil wurden Handydaten von CSU-Verkehrsminister Scheuer gesichert.
Zum zweiten Mal in sechs Wochen bringt die Bundesregierung Neuerungen im NetzDG auf den Weg. Das Melden von Hasspostings soll leichter werden, ebenso wie die Gegenwehr für Nutzer, die sich zu Unrecht sanktioniert fühlen.
When the decade began, tech meant promise — cars that could drive themselves, social networks that could take down dictators. It connected us in ways we could barely imagine. But somewhere along the way, the flaws of technology became abundantly clear.
In a famous essay from the early 1930s called “Economic Possibilities for Our Grandchildren,” Keynes imagined the world 100 years in the future. He spotted phenomena like job automation (which he called “technological unemployment”) coming, but those changes, he believed, augured progress: progress toward a better society, progress toward collective liberation from work.
Well, we know the grandchildren in the title of Keynes’s essay: they’re the kids and younger adults of today. The prime-age workforce of 2030 was born between 1976 and 2005. And though the precise predictions he made about the rate of economic growth and accumulation were strikingly accurate, what they mean for this generation is very different from what he imagined.
The protocols discussed here cover SAML 2.0, OpenID Connect (OIDC) and OAuth2. Note that OAuth2 is not an authentication protocol, but because of the popularity of its use in cases such as enabling users to sign in with a social provider such as Facebook or Amazon, it is included here.
Identity, authentication and authorization protocols
These three protocols overlap frequently in functionality:
-
Identity protocols supply information about a user — such as a persistent identifier, phone or email address — that may be used for long-term identification of that user to your system and hence for authenticating the user and authorizing access to resources. SAML and OIDC are the best-known examples.
-
Authentication protocols do not necessarily carry a personal identifier. For example, the Kerberos system is based on the exchange of transient anonymous keys that, in themselves, include no identification data.
-
Authorization protocols, such as OAuth2 and UMA provide a means to acquire access-protected resources without requiring the resource owner to share credentials. Interactive user consent is an important aspect of these protocols. The OAuth2 protocol is often used, casually, for identity and authentication using user data, such as an identifier, returned in the OAuth2 process.
#staatstrojaner #bundestrojaner
Human rights abuse and a decimated reputation killed Hacking Team. The new owners want to rebuild.
Lezzi is the owner of Memento Labs and its parent company, InTheCyber. Memento Labs was formed in March when Lezzi acquired Hacking Team.
The company provides what it calls a “trusted implant” to get KRAIT onto the target’s device, meaning the malware will be delivered from what looks to the victim like a known source. It’s a service “making effortless the social engineering campaign.” KRAIT is a small agent and hides inside legitimate applications.
The result of 15 years of development, RCS X offers “invisible” infection of “99% of the most used platforms in the world,” including macOS, Linux, Android, iOS, and BlackBerry.
- Edit /etc/systemd/logind.conf file:
- Find text #HandleLidSwitch=suspend
- Change suspend to ignore and remove the #
- Save file with changes
Back in 2017, I was building a rich text editor in the browser. Unsatisfied with existing libraries that used ContentEditable, I thought to myself “hey, I’ll just reimplement text selection myself! How difficult could it possibly be?” I was young. Naive. I estimated it would take two weeks. In reality, attempting to solve this problem would consume several years of my life, and even landed me a full time job for a year implementing text editing for a new operating system.
Rendering text, how hard could it be? As it turns out, incredibly hard! To my knowledge, literally no system renders text "perfectly". It's all best-effort, although some efforts are more important than others.
Freedom is a funny word. It's a hard thing to talk about because to a degree, if this kind of thing cuts down, let's say, on random crime, then it's going to make people effectively freer. Especially if you're a woman or someone who is vulnerable to being the victim of random crime, if some kind of surveillance system renders that less likely to happen, then effectively you've been granted a freedom that you didn't have before. But it's not the kind of statutory freedom that we tend to talk about when we're talking about politics.
Here's the point of the whole thing. The IETF people, when they were thinking about IPv6, saw this mess getting made - and maybe predicted some of the additional mess that would happen, though I doubt they could have predicted SDN and wifi repeater modes - and they said, hey wait a minute, stop right there. We don't need any of this crap! What if instead the world worked like this?
The FIRE (Financial Independence, Retire Early) movement is a lifestyle movement whose goal is financial independence and retiring early. The model became particularly popular among millennials in the 2010s, gaining traction through online communities via information shared in blogs, podcasts, and online discussion forums.
Those seeking to attain FIRE intentionally maximize their savings rate by finding ways to increase income or decrease expenses. The objective is to accumulate assets until the resulting passive income provides enough money for living expenses in perpetuity. Many proponents of the FIRE movement suggest the 4% rule as a guide, thus setting a goal of at least 25 times estimated annual living expenses. Upon reaching financial independence, paid work becomes optional, allowing for retirement from traditional work decades earlier than the standard retirement age.
Another type of American Dream has now developed: The freedom to upturn your desk, give your boss the finger, and retire on the spot—without making a lifestyle sacrifice, of course.
In some circles, the wealth required to burn any bridge you want has a name: “f–k you money.” That’s because, well, backed by the First Amendment and a large fortune, you can yell that without consequences to pretty much anyone, save for a judge, a plumber, or a tax assessor.
I decided then to write up the practices that I think lift a newly minted software engineer from amateur to professional: the path from fixing bugs as an “Engineer 1” to leading major projects as a “Senior Engineer.”
In this tutorial, learn to manage the persistent network configuration of your Linux host. Learn to:
- Understand basic TCP/IP host configuration.
- Configure Ethernet and wifi networks using Network Manager.
- Understand systemd-networkd.
In this tutorial, learn about TCP/IP network fundamentals for your Linux system. Learn to:
- Understand network masks and Classless Inter-Domain Routing (CIDR) notation.
+Know the differences between private and public dotted quad IP addresses. - Understand common Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports and services.
- Know the differences between and major features of UDP, TCP and Internet Control Message Protocol (ICMP).
- Know the major differences between IPv4 and IPv6.
- Know the basic features of IPv6.
In this traditional lecture, various teams provide an inside look at how this Camps infrastructure was planned and built. You’ll learn what worked and what went wrong, and some of the talks may even contain facts!