• Risks Digest 31.60 (1/2)

    From RISKS List Owner@21:1/5 to All on Fri Mar 6 16:49:41 2020
    RISKS-LIST: Risks-Forum Digest Friday 6 March 2020 Volume 31 : Issue 60

    ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, founder and still moderator

    ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as
    <http://catless.ncl.ac.uk/Risks/31.60>
    The current issue can also be found at
    <http://www.csl.sri.com/users/risko/risks.txt>

    Contents:
    Tesla Autopilot crash driver 'was playing video game' (BBC News)
    NTSB report on Walter Huang/Tesla crash (The Verge)
    Apple's Upcoming 'CarKey' Feature Will Let You Send Digital Keys
    Using Messages App (MacRumors)
    Reliability of Pricey New Voting Machines Questioned (ACM Tech News) ElectionGuard (Lite via Rob Slade)
    California man arrested on charges his DDoSes took down candidate's website
    (Ars Technica)
    A high-school student created a fake 2020 candidate. Twitter verified it
    (CNN Business)
    Radioactive products were popular in the early 20th century and still set
    off geiger counters (WashPost)
    Hackers Can Use Ultrasonic Waves to Secretly Control Voice Assistant Devices
    (TheHackerNew)
    Hackers target cable TV alert system and send false messages
    (Shawn Merdinger)
    Phishing scams are getting more sophisticated; what to look out for
    (Business Insider)
    LTE security flaw can be abused to take out subscriptions at your expense
    (Bochum)
    What to do about artificially intelligent government (Stanford)
    Lawsuit Says Google Used School Software To Spy On Children (NYT)
    New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices
    (The Hacker News)
    A Viral Email About Coronavirus Had People Smashing Buses And Blocking
    Hospitals. (Buzzfeednews)
    Security self-theatre? (COVID-19 and masks)
    Man who breached coronavirus stay-home notice stripped of Singapore PR
    status, barred from re-entry (The Straits Times)
    How coronavirus turned the dystopian joke of FaceID masks into a reality
    (Technology Review)
    The Computer Says No! UCLA face recognition (Fight for the Future via
    Paul Cornish)
    AI baby monitors attract anxious parents: Fear is the quickest way to get
    people's attention (WashPost)
    How North Korean Hackers Rob Banks Around the World (WIRED)
    Fido Alliance gets backing from Apple to replace passwords (9to5Mac)
    911 operators couldn't trace the location of a dying student's phone. It's
    a growing issue. (WashPost)
    Rice University Boosts 'Internet of Things' Security -- Again
    (Mike Williams)
    Startup's Stock Trading App experiences a day-long outage on one of
    the busiest trading days of the year (Tech Crunch)
    Government-Run Energy Company Keeps Reeling in the Same Employees
    in Phishing Training (nextgov.com)
    Clearview AI has billions of our photos. Its entire client list was just
    stolen (CNN Business)
    Afraid of the Thirteenth Floor? Superstition and Real Estate, Part 2
    (Skeptical Inquirer)
    Hilton drags corporate feet, minimizes disclosing personal data held
    (A friend via Gabe Goldberg)
    How a Hacker's Mom Broke Into a Prison -- and the Warden's Computer (WiReD)
    Old RISKS risks are still in vogue (WXYZ via David Lesher)
    Risks of Leap Years and Dumb Digital Watches (Mark Brader)
    TikTok Challenges, Ranked by How Likely They Are to Maim or Kill You (Vice) Algorithm Targets Marijuana Convictions Eligible To Be Cleared (npr.org)
    Would you eat a 'steak' printed by robots? (bbc.com)
    'They lied to us': Mom says police deceived her to get her DNA and charge
    her son with murder (NBC News)
    Taxes are expected to rise in Taunton, MA after an assessing tech snafu
    (Christopher Gavin)
    Pets 'go hungry' after smart feeder goes offline (bbc.com)
    Emissions possible: Streaming music swells carbon footprints (Al Jazeera
    via Dan Jacobson)
    Re: Linux is ready for the end of time (John Stockton)
    Re: Mysterious GPS outages are wracking the shipping industry
    (Craig S. Cottingham)
    Abridged info on RISKS (comp.risks)

    ----------------------------------------------------------------------

    Date: Wed, 26 Feb 2020 20:47:15 -0500
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: Tesla Autopilot crash driver 'was playing video game' (BBC News)

    An Apple employee who died after his Tesla car hit a concrete barrier was playing a video game at the time of the crash, investigators believe.

    The US National Transportation Safety Board (NTSB) said the car had been driving semi-autonomously using Tesla's Autopilot software.

    Tesla instructs drivers to keep their hands on the wheel in Autopilot mode.

    But the NTSB said more crashes were foreseeable if Tesla did not implement changes to its Autopilot system.

    The authority has published the results of a two-year investigation,
    following the crash in March 2018.

    Tesla's Autopilot software steered the vehicle into the triangular `gore
    area' at a motorway intersection, and accelerated into a concrete barrier.

    https://www.bbc.com/news/technology-51645566

    Darwin wins again.

    ------------------------------

    Date: Tue, 25 Feb 2020 17:49:59 -0800
    From: "Peter G. Neumann" <neumann@csl.sri.com>
    Subject: NTSB report on Walter Huang/Tesla crash (The Verge)

    [Thanks to Natarajan Shankar, PGN]

    https://www.theverge.com/2020/2/25/21153320/tesla-autopilot-walter-huang-death-ntsb-probable-cause

    ------------------------------

    Date: Sat, 22 Feb 2020 15:52:38 -0500
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: Apple's Upcoming 'CarKey' Feature Will Let You Send Digital Keys
    Using Messages App (MacRumors)

    As discovered in the first beta of iOS 13.4, Apple is working on a new
    `CarKey' feature that will allow an iPhone or an Apple Watch to unlock,
    lock, and start NFC-compatible vehicles.

    https://www.macrumors.com/2020/02/19/carkey-feature-digital-keys-messages-app/

    ------------------------------

    Date: Wed, 26 Feb 2020 11:45:43 -0500 (EST)
    From: ACM TechNews <technews-editor@acm.org>
    Subject: "Reliability of Pricey New Voting Machines Questioned"

    Computer security experts continue to express doubts that expensive new
    voting machines are reliable, considering them almost as risky as earlier discredited electronic systems. Called ballot-marking devices, the machines have touchscreens for registering voter choices and print out paper records scanned by optical readers. South Carolina voters will use the systems,
    which are at least twice as expensive as the hand-marked paper ballot
    option, in Saturday's primary. Daniel Lopresti, a computer scientist at
    Lehigh University and a South Carolina election commissioner, said, ``What
    we worry is, what happens the next time if there's a programming bug, or a
    hack or whatever, and it's done in a way that's not obvious?'' Said
    University of South Carolina's Duncan Buell, ``I don't know that we've ever seen an election computer, a voting computer, whose software was done to a
    high standard.'' https://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_6-240c1x220a01x070995&

    ------------------------------

    Date: Sat, 29 Feb 2020 11:08:05 -0800
    From: Rob Slade <rmslade@shaw.ca>
    Subject: ElectionGuard (Lite via Rob Slade)

    Microsoft has come up with a new electronic voting system, called ElectionGuard. https://lite.cnn.com/en/article/h_6371b42359928a22ad5ccd6d5369aef7

    (Yes, OK, *that* Microsoft. But it does sound possible.)

    First off, this is not online or remote voting. This is a vote tabulation system. You vote on a device, a memory card is read and counted, and you
    get a paper record of your vote. The individual votes are encrypted using homomorphic encryption (probably a version of Rivest's *Three Ballot* algorithm). https://en.wikipedia.org/wiki/ThreeBallot

    ElectionGuard is open source, so I imagine that electronic voting
    researchers will be looking under the hood. I'd like to know how you
    prevent election officials from reading the printouts that voters receive
    (but that's more a matter of training and process). I'd like to know how
    many random challenges you make, taking real votes and checking to see if they've been tabulated properly. (There are likely some legal issues in
    that regard.)

    But it does sound promising.

    ------------------------------

    From: Monty Solomon <monty@roscom.com>
    Date: Fri, 21 Feb 2020 18:37:47 -0500
    Subject: California man arrested on charges his DDoSes took down candidate's
    website (Ars Technica)

    Feds say defendant used Amazon servers to wage DDoS attacks that cost the rival campaign.

    https://arstechnica.com/information-technology/2020/02/california-man-arrested-on-charges-his-ddoses-took-down-candidates-website/

    ------------------------------

    Date: Fri, 28 Feb 2020 07:06:27 -0700
    From: Jim Reisert AD1C <jjreisert@alum.mit.edu>
    Subject: A high-school student created a fake 2020 candidate. Twitter
    verified it (CNN Business)

    Story by Donie O'Sullivan, CNN Business
    Video by Richa Naik and Craig Waxman

    Updated 1257 GMT (2057 HKT) February 28, 2020

    Andrew Walz calls himself a *proven business leader* and a *passionate
    advocate for students*. Walz, a Republican from Rhode Island, is running
    for Congress with the tagline, "Let's make change in Washington together,"
    or so his Twitter account claimed.

    Earlier this month, Walz's account received a coveted blue checkmark from
    Twitter as part of the company's broader push to verify the authenticity
    of many Senate, House and gubernatorial candidates currently running for
    office. Twitter has framed this effort as key to helping Americans find
    reliable information about politicians in the leadup to the 2020 election.

    But there's just one problem: Walz does not exist. The candidate is the
    creation of a 17-year-old high school student from upstate New York, CNN
    Business has learned.

    The student, who CNN Business spoke to with the permission of his parents
    and has agreed not to name as he is a minor, said he was `bored' over the
    holidays and created the fake account to test Twitter's election integrity
    efforts.

    https://edition.cnn.com/2020/02/28/tech/fake-twitter-candidate-2020/

    ------------------------------

    Date: Sun, 1 Mar 2020 00:53:12 -0500
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: Radioactive products were popular in the early 20th century and
    still set off geiger counters (WashPost)

    Not long ago, curator Natalie Luvera began to worry about the strangest item
    in the National Atomic Testing Museum's collection of artifacts —- a tiny 1920s device designed to restore lost manhood by irradiating the manliest of human body parts.

    Was the gold-plated *scrotal radiendocrinator* still dangerous after nearly
    a century? Luvera tested it with a Geiger counter, got a worrisome reading
    and called in a radioactivity response team to double-check. ``They came
    down and said, `Nope, you shouldn't have that here.' '' [.,,]

    The device was the brainchild of an extraordinary quack named William
    J.A. Bailey, who liked to describe radiation as *eternal sunshine*. He also hawked bottles of Radithor -— *certified radioactive water* —- that were touted as a cure-all for disorders such as impotence and fatigue.

    https://www.washingtonpost.com/health/the-lethal-legacy-of-early-20th-century-radiation-quackery/2020/02/14/ed1fd724-37c9-11ea-bf30-ad313e4ec754_story.html

    ...that's a great museum, BTW.

    ------------------------------

    Date: Mon, 2 Mar 2020 14:13:17 -1000
    From: the keyboard of geoff goodfellow <geoff@iconia.com>
    Subject: Hackers Can Use Ultrasonic Waves to Secretly Control Voice
    Assistant Devices (TheHackerNew)

    *It works over a longer distance and without the need to be in
    line-of-sight.*

    EXCERPT:

    Researchers have discovered a new means to target voice-controlled devices
    by propagating ultrasonic waves through solid materials in order to
    interact with and compromise them using inaudible voice commands without
    the victims' knowledge.

    Called SurfingAttack, <https://surfingattack.github.io/papers/NDSS-surfingattack.pdf> the attack leverages the unique properties of acoustic transmission in solid materials
    -- such as tables -- to ``enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer distance and without
    the need to be in line-of-sight.''

    In doing so, it's possible for an attacker to interact with the devices
    using the voice assistants, hijack SMS two-factor authentication codes, and even place fraudulent calls, the researchers outlined in the paper, thus controlling the victim device inconspicuously.

    The research was published by a group of academics from Michigan State University, Washington University in St. Louis, Chinese Academy of
    Sciences, and the University of Nebraska-Lincoln.

    The results were presented at the Network Distributed System Security
    Symposium (NDSS) on February 24 in San Diego.

    How Does the SurfingAttack Work? [...] https://thehackernews.com/2020/03/voice-assistants-ultrasonic-waves.html

    ------------------------------

    Date: Mon, 24 Feb 2020 14:04:08 -0500
    From: Shawn Merdinger <shawnmer@gmail.com>
    Subject: Hackers target cable TV alert system and send false messages

    On Thursday, 20 February 2020 in Washington state EAS units were compromised
    at WAVE Broadband and sent at least 3 unapproved EAS alerts to 3000+ cable subscribers.

    News:

    https://www.king5.com/article/news/local/no-emergency-false-alert-over-radiological-incident-sent-by-jefferson-county/281-568c86b3-8aae-4df0-b3b3-5dd4c800e0e8

    At least one family took the warning to heart. A viewer wrote to KING 5 and said, ``We experienced an hour of pure terror. We evacuated our house with
    our dogs and drove to Sequim to my parents. Wondering when and if we would die.''

    https://www.kiro7.com/news/local/false-alert-indicating-radiological-incident-appeared-tv-jefferson-county/KJI2SNVTZBE6DAOMYWFOQK47SM/

    ``A lot of problems happen when these are first put in because there's a default password and if somebody knows the default password and there hasn't been time for an organization to change the default password, those can
    easily be hacked,'' Nealey said.

    ------------------------------

    From: the keyboard of geoff goodfellow <geoff@iconia.com>
    Date: Tue, 25 Feb 2020 06:40:30 -0700
    Subject: Phishing scams are getting more sophisticated; what to look out for
    (Business Insider)

    - Phishing scams in which hackers pose as trusted figures to trick
    people into handing over passwords are getting increasingly sophisticated.
    - Security experts describe an arms race between services that weed out
    scammers and attackers developing new tricks and workarounds.
    - Phishing is on the rise, and costing over $57 million from more than
    114,000 victims in the US last year, according to a recent FBI report.

    EXCERPT:

    Hackers don't break in, they log in.

    That mantra, often repeated by security experts, represents a rule of thumb: The vast majority of breaches are the result of stolen passwords, not
    high-tech hacking tools.

    These break-ins are on the rise. Phishing scams -- in which attackers pose
    as a trustworthy party to trick people into handing over personal details or account information -- were the most common type of Internet crime last
    year, according to a recent FBI report <https://www.fbi.gov/news/pressrel/press-releases/fbi-releases-the-internet-crime-complaint-center-2019-internet-crime-report>.
    People lost more than $57.8 million in 2019 as the result of phishing, according to the report, with over 114,000 victims targeted in the US.

    And as phishing becomes more profitable, hackers are becoming increasingly sophisticated in the methods they use to steal passwords, according to
    Tanmay Ganacharya, a principal director in Microsoft's Security Research
    team.

    ``Most of the attackers have now moved to phishing because it's easy. If I
    can convince you to give me your credentials, it's done. There's nothing
    more that I need,'' Ganacharya told Business Insider.

    Ganacharya monitors phishing tactics in order to build machine-learning
    systems that root out scams for people using Microsoft services, including Windows, Outlook, and Azure, Microsoft's cloud computing service. This
    week, Microsoft announced <https://blogs.microsoft.com/blog/2020/02/20/delivering-on-the-promise-of-security-ai-to-help-defenders-protect-todays-hybrid-environments/>
    that
    it will begin selling its threat-protection services for platforms
    including Linux, iOS, and Android.

    Ganacharya spoke to Business Insider about the trends in phishing that his
    team has observed. Many of the tactics aren't new, but he said attackers
    are constantly finding new ways to work around defenses like Microsoft's
    threat protection. Here's what he described...

    [...] https://www.businessinsider.com/phishing-scams-getting-more-sophisticated-what-to-look-out-for-2020-2

    ------------------------------

    Date: Tue, 25 Feb 2020 06:41:20 -0700
    From: the keyboard of geoff goodfellow <geoff@iconia.com>
    Subject: LTE security flaw can be abused to take out subscriptions at your
    expense (Bochum)

    Researchers say the vulnerability impacts virtually all smartphones on the market*

    EXCERPT:

    A security vulnerability in LTE can be exploited to sign up for
    subscriptions or paid website services at someone else's expense, new
    research suggests.

    According to researchers <https://news.rub.de/english/press-releases/2020-02-17-lte-vulnerability-attackers-can-impersonate-other-mobile-phone-users>
    from Ruhr-Universitaet Bochum, the flaw exists in the 4G mobile
    communication standard and permits smartphone user impersonation, which
    could allow attackers to ``start a subscription at the expense of others or publish secret company documents under someone else's identity.''

    The research, titled IMP4GT: IMPersonation Attacks in 4G NeTworks, is the
    work of David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina P=C3=B6pper.

    *See also: *Honeywell, Verizon partner on integrating LTE, smart meters,
    lay groundwork for 5G <https://www.zdnet.com/article/honeywell-verizon-partner-on-integrating-lte-smart-meters-lay-groundwork-for-5g/>

    The IMP4GT attack <https://imp4gt-attacks.net/> impacts ``all devices that communicate with LTE,'' which includes *virtually all* smartphones, tablets, and some Internet of Things (IoT) devices.

    Software-defined radios are a key element of IMP4GT. These devices are able
    to read the communications channels between a mobile device and base
    station, and by using them, it is possible to trick a smartphone into considering the radio is the base station -- and dupe the network into
    treating the radio as the mobile phone.

    Once this channel of communication is compromised, it is time to start manipulating data packets being sent between an LTE device and base station.

    ``The problem is the lack of integrity protection: data packets are
    transmitted encrypted between the mobile phone and the base station, which protects the data against eavesdropping. However, it is possible to modify
    the exchanged data packets. We don't know what is where in the data packet,
    but we can trigger errors by changing bits from 0 to 1 or from 1 to 0.''

    These errors can then force a mobile phone and base station to either
    decrypt or encrypt messages, converting information into plaintext or
    creating a situation in which an attacker is able to send commands without authorization. [...] https://www.zdnet.com/article/lte-security-flaw-can-be-abused-to-take-out-subscriptions-at-your-expense/

    ------------------------------

    Date: Wed, 26 Feb 2020 19:16:55 -1000
    From: the keyboard of geoff goodfellow <geoff@iconia.com>
    Subject: What to do about artificially intelligent government

    EXCERPT:

    The White House's recent efforts to chart a national artificial intelligence (AI) policy are welcome and, frankly, overdue. Funding for AI research and updating agency IT systems is a good start. So is guidance for agencies as
    they begin to regulate industry use of AI. But there's a glaring gap: The
    White House has been silent about the rules that apply when agencies use AI
    to perform critical governance tasks. <https://about.bgov.com/news/white-house-proposes-92-billion-it-budget-in-fy-2021/>
    <https://news.bloomberglaw.com/tech-and-telecom-law/artificial-intelligence-principles-issued-by-white-house>

    This matters because, of all the ways AI is transforming our world, some of
    the most worrying come at the intersection of AI and the awesome power of
    the state. AI drives the facial recognition police use to surveil citizens.
    It enables the autonomous weapons changing warfare. And it powers the tools judges use to make life-changing bail, sentencing and parole decisions. Concerns about each have fueled debate and, as to facial recognition in particular, new laws banning use. <https://www.bloomberg.com/news/articles/2020-01-24/cops-spying-on-londoners-faces-sparks-human-rights-concerns>
    <https://www.bloomberg.com/news/videos/2019-05-16/face-it-you-re-being-watched-video>

    Sitting just beyond the headlines, however, is a little-known fact: AI use already is pervasive in government. Prohibition for most uses is not an
    option, or at least not a wise one. Needed instead is a frank conversation about how to give the government the resources it needs to develop
    high-quality and fairly deployed AI tools and build sensible accountability mechanisms around their use.

    We know because we led a team of lawyers and computer scientists at Stanford and New York universities to advise federal agencies on how to develop and oversee their new algorithmic toolkit.

    Our research <https://law.stanford.edu/education/only-at-sls/law-policy-lab/practicums-2018-2019/administering-by-algorithm-artificial-intelligence-in-the-regulatory-state/acus-report-for-administering-by-algorithm-artificial-intelligence-in-the-regulatory-state/#
    slsnav-report>
    shows that AI use spans government. By our estimates, half of major federal agencies have experimented with AI. Among the 160 AI uses we found, some -- such as facial recognition -- are fueling public outcries. But many others
    fly under the radar. The Securities and Exchange Commission (SEC) uses AI to flag insider trading; the Centers for Medicare and Medicaid Services uses it
    to ferret out health care fraud. The Social Security Administration is
    piloting AI tools to help decide who gets disability benefits, and the
    Patent and Trademark Office to decide who gets patent protection.

    Still other agencies are developing AI tools to communicate with the public,
    by sifting millions of consumer complaints or using chatbots to field
    questions from welfare beneficiaries, asylum seekers and taxpayers.

    Our research also highlights AI's potential to make government work better
    and at lower cost. AI tools that help administrative judges spot errors in draft decisions can shrink backlogs that leave some veterans waiting years <https://www.militarytimes.com/news/2018/09/10/watchdog-report-the-va-benefits-backlog-is-higher-than-officials-say/>
    (sometimes, close to a decade) for benefits. AI can help ensure that the decision to launch a potentially ruinous enforcement action does not reflect the mistakes, biases, or whims of human prosecutors. And AI can help make
    more precise judgments about which drugs threaten public health.

    But the picture is not all rosy. [...] https://thehill.com/opinion/technology/483878-what-to-do-about-artificially-intelligent-government

    ------------------------------

    Date: Sun, 23 Feb 2020 07:55:15 -0700
    From: the keyboard of geoff goodfellow <geoff@iconia.com>
    Subject: Lawsuit Says Google Used School Software To Spy On Children (NYT)

    EXCERPT:

    New Mexico's attorney general sued Google on Thursday, saying the tech giant used its educational products to spy on the state's children and families.

    Google collected a trove of students' personal information, including data
    on their physical locations, websites they visited, YouTube videos they
    watched and their voice recordings, Hector Balderas, New Mexico's attorney general, said in a federal lawsuit.

    ``The consequences of Google's tracking cannot be overstated: Children are being monitored by one of the largest data mining companies in the world,
    at school, at home, on mobile devices, without their knowledge and without
    the permission of their parents,'' the lawsuit said. <https://cdn.vox-cdn.com/uploads/chorus_asset/file/19734145/document_50_.pdf>

    Over the last eight years, Google has emerged as the predominant tech brand
    in American public schools <https://cdn.vox-cdn.com/uploads/chorus_asset/file/19734145/document_5.pdf>, outpacing rivals like Apple and Microsoft by offering a suite of
    inexpensive, easy-to-use tools.

    Today, more than half of the nation's public schools -- and 90 million
    students and teachers globally -- use free Google Education apps like Gmail
    and Google Docs. More than 25 million students and teachers also use Chromebooks, laptops that run on the company's Chrome operating system, the lawsuit said.

    In September, Google agreed to pay a $170 million fine to settle federal
    and New York State charges that it illegally harvested the personal data <https://www.nytimes.com/2019/09/04/technology/google-youtube-fine-ftc.html>
    of children on YouTube.

    The new lawsuit, filed in U.S. District Court for the District of New
    Mexico, claimed that Google violated the federal Children's Online Privacy Protection Act. The law requires companies to obtain a parent's consent
    before collecting the name, contact information and other personal details
    from a child under 13.

    The lawsuit also said Google deceived schools, parents, teachers and
    students by telling them that were no privacy concerns with its education products when, in fact, the company had amassed a trove of potentially sensitive details on students' online activities and locations. [...]

    https://www.nytimes.com/2020/02/20/technology/new-mexico-google-lawsuit.html

    ------------------------------

    Date: Fri, 28 Feb 2020 14:32:57 -1000
    From: the keyboard of geoff goodfellow <geoff@iconia.com>
    Subject: New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices
    (The Hacker News)

    EXCERPT:

    Cybersecurity researchers today uncovered a new high-severity hardware vulnerability residing in the widely-used Wi-Fi chips manufactured by
    Broadcom and Cypress -- apparently powering over a billion devices,
    including smartphones, tablets, laptops, routers, and IoT gadgets.

    Dubbed 'Kr00k' and tracked as CVE-2019-15126, the flaw could let nearby
    remote attackers intercept and decrypt some wireless network packets transmitted over-the-air by a vulnerable device.

    The attacker does not need to be connected to the victim's wireless network
    and the flaw works against vulnerable devices using WPA2-Personal or WPA2-Enterprise protocols, with AES-CCMP encryption, to protect their
    network traffic.

    ``Our tests confirmed some client devices by Amazon (Echo, Kindle), Apple (iPhone, iPad, MacBook), Google (Nexus), Samsung (Galaxy), Raspberry (Pi
    3), Xiaomi (RedMi), as well as some access points by Asus and Huawei, were vulnerable to Kr00k,'' ESET researchers said.

    According to the researchers <https://www.eset.com/int/kr00k/>, the Kr00k
    flaw is somewhat related to the KRACK attack <https://thehackernews.com/2017/10/wpa2-krack-wifi-hacking.html>, a
    technique that makes it easier for attackers to hack Wi-Fi passwords <https://thehackernews.com/2018/08/how-to-hack-wifi-password.html> protected using a widely-used WPA2 network protocol.

    First, Learn What Kr00k Attack Doesn't Allow: [...] https://thehackernews.com/2020/02/kr00k-wifi-encryption-flaw.html

    ------------------------------

    Date: Mon, 24 Feb 2020 04:56:25 -0500
    From: Monty Solomon <monty@roscom.com>
    Subject: A Viral Email About Coronavirus Had People Smashing Buses And
    Blocking Hospitals. (Buzzfeednews)

    Ukraine's security service said the fake email that was supposedly from the Ministry of Health had actually been sent from outside the country.

    https://www.buzzfeednews.com/article/christopherm51/coronavirus-ukraine-china

    ------------------------------

    Date: Sat, 29 Feb 2020 11:43:15 -0800
    From: Rob Slade <rmslade@shaw.ca>
    Subject: Security self-theatre? (COVID-19 and masks)

    OK, first off, to let you know that I know what I'm talking about, I put
    myself through university by working in the medical field, first as a
    practical nurse (I spent considerable time working in an isolation ward),
    and later as an industrial first aid attendant. (My required non-physics elective at university was medical physiology.) I've also been an emergency management volunteer for a couple of decades.

    Now I've talked about security theatre in regard to COVID-19, and we are discussing other issues related to the coronavirus. But one of the things
    that has bugged me ever since it started hitting the news is the masks.

    Masks won't keep you from getting COVID-19, or any other droplet bourne
    virus. (At least, they don't reduce your risk very much.) The paper face masks provide next to no protection in this regard, and the N95 masks aren't much better. Droplet bourne viruses will still get on your skin, on your
    face, and into your eyes, and simple daily activities make you touch your
    skin and face and mouth and eyes and provide the viruses a path inside. You don't need to inhale the virus to get it, and, if you do get COVID-19, it probably will be from some other pathway than inhaling it. This is why frequent (*very* frequent) handwashing is important. (Hand sanitizer is
    good, too. If you use it frequently.)

    Masks are useful, if *you* have the virus, in preventing you giving it to
    other people. (Not a complete prevention, mind, but useful.) So, if you
    are wearing a face mask in public during this epidemic, you are making one
    of two statements: 1) I AM INFECTED WITH THE COVID-19 VIRUS!! or 2) I AM STUPID AND IGNORANT!!

    This advice, by the way, applies to influenza as well. Which brings up
    another point: if you are worried about the COVID-19 virus, and still
    haven't yet gotten a flu shot, you are stupid and ignorant. Even in China,
    you are much, much more likely to get the flu than COVID-19. Even in China, the likelihood that the next person you meet will have COVID-19 is about
    .0001. (Probably somewhat less.) But if you go out into a crowd (if you
    can *find* a crowd in China these days), you are likely to encounter
    somebody with the flu. Having a flu shot probably doesn't reduce your risk
    of getting COVID-19, but it does reduce your risk of getting the flu. If
    you get the flu, then you may have to get tested for COVID-19, and that puts that much more demand on the system and resources.

    Wash your hands.

    If you haven't got a flu shot, get one.

    Don't panic buy, horde, or misuse masks and gloves. If you need them,
    you'll get them. (If other people haven't been panic buying and hoarding.) https://lite.cnn.com/en/article/h_cd175447b3f892d7adcb7c196b0b7316

    Now go wash your hands.

    ------------------------------

    Date: Wed, 26 Feb 2020 09:12:29 -0800
    From: Richard Stein <rmstein@ieee.org>
    Subject: Man who breached coronavirus stay-home notice stripped of
    Singapore PR status, barred from re-entry (The Straits Times)

    https://www.straitstimes.com/singapore/coronavirus-singapore-permanent-resident-who-breached-stay-home-notice-stripped-of-pr

    Singapore prioritizes public health and civility. Unwise to violate these orders, especially in a time of elevate pandemic conditions.

    ------------------------------

    Date: Sun, 1 Mar 2020 09:38:17 -1000
    From: the keyboard of geoff goodfellow <geoff@iconia.com>
    Subject: How coronavirus turned the dystopian joke of FaceID masks into a
    reality (Technology Review)

    *Thousands ordered masks that let them unlock their phones during
    outbreaks. But this viral art project doesn't just work with surveillance technology -- it works against it, too.*

    EXCERPT:

    Two weeks ago, Danielle Baskin had an idea for a tongue-in-cheek art
    project. Now, she's suddenly big in China.

    While talking with friends about the coronavirus outbreak

    [continued in next message]

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)