[continued from previous message]
Modern phone systems were designed to be tapped, both recording the contents
of calls and, with considerably less protection, pen registers that record
who you called and who called you. While I believe that judges will apply
the law correctly when asked to authorize a tap, it is already obvious that
in states where abortion is illegal, a whole lot of stuff is illegal and
would authorize a tap. We have also seen way too many cases where people
skip the process and listen in without authorization.
Signal uses open source software written and maintained by a guy who has a
good reputation in the cryptography and security communities. I think it is credible when they say your conversations are encrypted in ways they cannot decode and they don't keep logs. Whatsapp uses the same encryption as Signal
so I think it's a reasonable second choice.
------------------------------
Date: Sun, 14 Aug 2022 15:21:54 -0400
From: "Arthur T." <
risks202208.6.atsjbt@xoxy.net>
Subject: Re: Tech giants, including Meta, Google, and Amazon, want to
put an end to leap-seconds (Ross, RISKS-33.38)
Not everyone writing software has the financial backing of a major
government. Nor do they necessarily have the level of quality control such funding can yield. If you look in the RISKS archives, you'll find instances (some fairly recent) of programs not even coding properly for leap *years*.
It is easier to not screw up something simple than something complex. Not
only are leap seconds more complex than not using them, they're
unpredictable and ad hoc.
I am not trying to directly address the complex question of whether leap seconds should be continued. I am merely trying to explain some of the objections.
------------------------------
Date: Sat, 13 Aug 2022 21:17:47 -0700
From: geoff goodfellow <
geoff@iconia.com>
Subject: Re: Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux,
macOS Users (noted in RISKS-33.38 without details)
A pair of reports from cybersecurity firms SEKOIA <
https://blog.sekoia.io/luckymouse-uses-a-backdoored-electron-app-to-target-macos/>
and Trend Micro <
https://www.trendmicro.com/en_us/research/22/h/irontiger-compromises-chat-app-Mimi-targets-windows-mac-linux-users.html>
sheds
light on a new campaign undertaken by a Chinese threat actor named Lucky
Mouse that involves leveraging a trojanized version of a cross-platform messaging app to backdoor systems.
Infection chains leverage a chat application called MiMi, with its
installer files compromised to download and install HyperBro samples for
the Windows operating system and rshell artifacts for Linux and macOS.
As many as 13 different entities located in Taiwan and the Philippines have been at the receiving end of the attacks, eight of whom have been hit with rshell. The first victim of rshell was reported in mid-July 2021.
Lucky Mouse, also called APT27 <
https://malpedia.caad.fkie.fraunhofer.de/actor/emissary_panda>, Bronze
Union, Emissary Panda, and Iron Tiger, is known to be active since 2013 and
has a history of gaining access to targeted networks in pursuit of its political and military intelligence-collection objectives aligned with
China.
The advanced persistent threat actor (APT) is also adept at exfiltrating high-value information using a wide range of custom implants such as
SysUpdate <
https://thehackernews.com/2021/04/luckymouse-hackers-target-banks.html>, HyperBro <
https://malpedia.caad.fkie.fraunhofer.de/details/win.hyperbro>,
and PlugX. <
https://thehackernews.com/2022/06/state-backed-hackers-using-ransomware.html>
The latest development is significant, not least because it marks the
threat actor's introductory attempt at targeting macOS alongside Windows
and Linux. [...]
https://thehackernews.com/2022/08/chinese-hackers-backdoored-mimi-chat.html
------------------------------
Date: Mon, 15 Aug 2022 13:26:19 -0500
From: "Craig S. Cottingham" <
craig@cottingham.net>
Subject: Re: Rainwater everywhere on Earth unsafe to drink due to *forever
chemicals*, study finds (EuroNews, RISKS-33.38)
I’m not disputing the conclusions of the researchers, but I'd really like to see some numbers before I take back my grain of salt.
* What is the accepted safe level?
* What is the current level (different for different areas, I assume)?
* What is the adjusted level of mortality due to higher levels of these
chemicals?
I've seen too many doom-and-gloom reports of the form of ``you're ten times more likely to get cancer if you do'' -- where it turns out that the probability over a lifetime goes from 0.001% to 0.01%.
[There is no one accepted safe level. People with severe allergies
have to be considered. PGN]
------------------------------
Date: Sun, 14 Aug 2022 06:11:13 -0400 (EDT)
From: Mark Brader <
msb@Vex.Net>
Subject: Re; Doug Jones's review (RISKS-33.37)
May I suggest adding a note to Doug Jones's review in the second-last issue, either pointing to my correction in the following issue or just giving
noting the correct information?
(By the way, I have bought the book. Haven't started reading it yet,
though.)
BTW, Is your autoresponder no longer in use? I was surprised not to receive
a response when sending the correction, and I just checked my spam bucket
and it isn't there either.
[Beats me. I have no idea how it is generated. PGN]
------------------------------
Date: Mon, 1 Aug 2020 11:11:11 -0800
From:
RISKS-request@csl.sri.com
Subject: Abridged info on RISKS (comp.risks)
The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is
comp.risks, the feed for which is donated by panix.com as of June 2011.
SUBSCRIPTIONS: The mailman Web interface can be used directly to
subscribe and unsubscribe:
http://mls.csl.sri.com/mailman/listinfo/risks
SUBMISSIONS: to risks@CSL.sri.com with meaningful SUBJECT: line that
includes the string `notsp'. Otherwise your message may not be read.
*** This attention-string has never changed, but might if spammers use it.
SPAM challenge-responses will not be honored. Instead, use an alternative
address from which you never send mail where the address becomes public!
The complete INFO file (submissions, default disclaimers, archive sites,
copyright policy, etc.) is online.
<
http://www.CSL.sri.com/risksinfo.html>
*** Contributors are assumed to have read the full info file for guidelines!
OFFICIAL ARCHIVES: http://www.risks.org takes you to Lindsay Marshall's
searchable html archive at newcastle:
http://catless.ncl.ac.uk/Risks/VL.IS --> VoLume, ISsue.
Also,
ftp://ftp.sri.com/risks for the current volume/previous directories
or
ftp://ftp.sri.com/VL/risks-VL.IS for previous VoLume
If none of those work for you, the most recent issue is always at
http://www.csl.sri.com/users/risko/risks.txt, and index at /risks-33.00
ALTERNATIVE ARCHIVES:
http://seclists.org/risks/ (only since mid-2001)
*** NOTE: If a cited URL fails, we do not try to update them. Try
browsing on the keywords in the subject line or cited article leads.
Apologies for what Office365 and SafeLinks may have done to URLs.
Special Offer to Join ACM for readers of the ACM RISKS Forum:
<
http://www.acm.org/joinacm1>
------------------------------
End of RISKS-FORUM Digest 33.39
************************
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)