How AI Is Spying On You Via CSAM – Apple Version They Say Is Hashing – I Call BS

This is pretty complex stuff. Needless to say, this is how Big Brother is watching you.

Why do you think that you get ads for something you never searched but just talked about? Hell, sometimes I just think of stuff and it shows up it seems.

You are a dumbass for taking nudies or sexting because they are probably laughing at you as they can look at everything.

You’ve been warned.

Schaeffer’s Law’s of the Digital Age – The Non-Racial Master/Slave Paradigm Through Digital Monitoring

Schaeffer’s First Law of the Digital Age:

The Global Digital Infrastructure (GDI) connects all human life on the planet into a single, giant, metastasizing organism throbbing with incredible potential for advancing human good, expanding knowledge exponentially, invading our lives with unimaginable malice and evil, and transforming unsuspecting users into helpless and obedient cyborgs.

Schaeffer’s Second Law of the Digital Age:

Each breakthrough in utility deriving from advances in the Global Digital Domain is accompanied by equal or greater vulnerabilities and potential detriments to quality of life.  Anything that can do amazingly great things for you can almost always do terribly awful things to you as well.

Schaeffer’s Third Law of the Digital Age:

It’s impossible to make or enforce laws to guard the people against the dangers of global digital power and impossible to prevent exponential growth in this power.  The Zuckerbergs and Bezoses and Googles of the world may propose to use their power benevolently, but they plan to use it and grow it without limit.  They claim they’ll be good masters, but they mean to be masters.

I’m not a conspiracy person, rather an observer of trends and patterns.  Haven’t we been down this path before in history where there are classes of people?  This time, they start as digital helpers like Alexa, Echo, Google assistant or Siri, but at what point are they re-directing our lives?  Aren’t there always people who try to control your lives thus enriching their lives both in money and power.

Since there are hackers constantly attacking the cloud, where your data is stored and accessible, when you lose control over your life?  The digital hacks can be found at Krebsonsecurity.com.

It has already begun with your digital footprint being tracked, monitored and being sold off to advertisers, but where does it stop, the Jetson’s?

I advise that you carefully monitor who is monitoring you, even the government.

Now for fun, why is that in the movies that the robots always try to take over the world and kill humans?

After Being Dissapointed by Lenovo One To Many Times, What PC Did I Buy Instead?

I’ve had PC’s since before the IBM PC in 1981.  I’ve built hundreds of computers over different phases of the PC life cycle (for myself, others and at computer stores I worked at for years).  I’ve personally owned many ThinkPads since they were introduced…likely between 40-50 including my multiple work PC’s. The same is true with Microsoft. I’ve worked with DOS and Windows, Windows for Workgroups, (built and wired my first network in 1994), NT, 95, 2000, XP and you name it.  I first put up webpages since 1993 and every version of DOS or Windows made starting with 1.0 for both.   I’ve finally had it with the declination of the quality, service, especially customer service and workmanship of IBM/Lenovo and Microsoft products.

I began to desire a different machine when the smartest guys at IBM (IBM Fellow’s) and the smartest (and of course some of my favorite) IT analysts starting using Mac’s.  It told me times were a changin’.

WHEN THEY WERE GOOD

It used to be that when you went to a frequent flyer lounge at an airport, it would be a ThinkPad convention because they were so tough, now everyone is switching to an iPad which I now also love and  have.

Further, when I retired, I bought what I thought would be the ThinkPad which would last me for at least 5 years (pictured below).  It was the worst PC experience to date, see the beginning below.

In reverse order, after 1.5 years, one of the USB ports failed, the screen is falling apart (for the second time…the first in only months), the battery died in the first 6 months (they fixed that under warranty after 1 month of calls and forcing a manager intervention because customer service blamed me) other hardware and software problems which eventually got fixed over hours of calls (the final fix was always simple and could have been easily accomplished from the start).

I called the Lenovo help desk and not only did they refuse to fix most of my problems (all within the warranty period), but they were with the exception of one person, unhelpful to me and not proficient in English 95+% of the time (some were rude, but tech support is a thankless job).  Note: I like the people from other countries and think that they are hard working so I have no problems with the people, rather the policies they are forced to adhere to put them into positions they shouldn’t be forced into.  I’m clearly calling out the company, not the people here. It’s just in this case we couldn’t understand each other and they mostly were not trained or who couldn’t fix problems and just couldn’t help fix issues Lenovo created.

Here’s what my screen looks like now with use that is less than normal due to my retirement status:

pc pic

SHIPPING DISASTER

This was compounded by the fact that they originally shipped me a computer which was in for repair as I found it had someone else’s  password on it.  Tech support recognized the serial number as someone else’s machine and I had to ship back a PC so that they could ship me what I ordered which  was supposed to be new.  They at first required me to pay for the return shipping for the machine which they wrongly shipped me in the first place.  It took them 5 weeks to get me this wrong machine once I ordered it in the first place, so needless to say, this added to a dissatisfied experience.  Let me summarize it: The 1st machine I received was in for repair which they shipped to me as my new machine.  They finally agreed to pay for the shipping back to them after weeks, but I was in dis-belief by now as I had to get upper management approval 3 levels above my call to tech support to get shipping approved and the machine I ordered sent to me.  This was a 6 week timeframe that I put up with to get a ThinkPad that looks like the one above.

WHAT HAPPENED TO THE COMPANY PURCHASED FROM IBM?

So, what happened when Lenovo bought the PC Division from IBM?  Quality and customer service have apparently suffered, at least for me.   It is fair to note that Lenovo is the PC leader even though PC’s are a dying breed and are now a commodity item, but that the lead is mostly due to HP executive incompetence and Dell lack of innovation.

WORKING FOR IBM PC DIVISION, MORE THINKPAD BACKGROUND AND EXPERIENCE THAN MOST HAVE

I worked with ThinkPads at companies before IBM.  I then did communications for the IBM-PC (PSG) division back in the early 2000’s.  IBM-PCs were a rock solid product that introduced many technologies from the floppy disk, HDD on PC’s, open system motherboard, the start of an incredibly successful industry, creation of millions of jobs, Bluetooth and WiFi to the industry.  It was well accepted by industry leaders as the standard to compare against and I was proud of representing the machines.  By then, we had slipped to about 4th place, but IBM had other priorities by then.  Analysts always recognized that the IBM ThinkPad was the industry leader, albeit most of the time the expensive option.  I never had a problem educating them that it was the industry leader to be compared against.  I also learned from IDC, Gartner, Forrester and others that Dell and HP were sub-standard compared to the ThinkPad.

THE IBM TO LENOVO EMPLOYEE TRANSITION

The co-workers who went to Lenovo were mixed.  The developers were good, with the chief designer being one of if not the best, but he obviously had nothing to do with my 410S.  The Press communications team however was a joke.   Much of the management that I had worked with were handcuffed by the new ownership.   However, with the non-inventor taking over control, changes in leadership including many Dell executives,  it has appeared to make it less than the leader of rugged laptops, a position it once enjoyed.

MY LATEST PURCHASE

Since my ThinkPad failed and the screen basically fell off (I am retired and don’t travel anymore so it didn’t have the wear and tear to justify its condition), the keyboard keeps sticking, ports not working and the other problems I’ve described have forced me to buy a new PC.

Side note: I worked with Microsoft since 1981 in one form or another, as a partner, but mostly as a competitor as Microsoft was very belligerent and went out of their way to be anti-IBM  (see my joint announcement wrap up).  I’ve worked with their products since DOS 1.0 which I still have installed on an original PC at home.  They loved Lenovo when the purchase was made and the difference was an overnight sea change in their attitude of helpfulness and pricing.

So the combination of Lenovo’s product being poor, their customer service being unhelpful led me to buying a MacBook Pro (but I got much more computing power and a brand new experience in helpfulness).

But, both Lenovo and Microsoft lost me as a customer and I can’t be alone.

Here is my new computer, a 13 inch Macbook Pro:

macbook pro

It sync’s with my phone and iPad seamlessly.  I don’t have weekly Microsoft security updates or blue screen of death experiences.  It is powerful, I can read Windows files and have converted them, multimedia is a snap, graphics are beautiful and most of all it works without gyrations to make drivers, port configurations and software incompatibilities work.  I have never before been an Apple fan except when I ran an advertising department for a few years and understood artists needs for them.

When managing a store at a computer chain, my store was recognized as the retailer that lead the nation in Apple sales so I do have experience with them.  My store also was a leading promoter of the first Macintosh during the famous 1984 ad time.  In other words, I know them well, but I’ve used Wintel computers most if not all of my life until now.

Further, I called their tech support and went to an Apple store and guess what, they were friendly and helpful, and it just works.  I paid less for the software than the PC version (I just built a multimedia PC for my TV viewing so I am fully aware of company configured, or self built PC’s vs. Mac machines hardware and software.

THE TREND OF PC’S

Mobile devices are killing standard laptops at a rate far faster than laptops replacing desktops, but there is still a need for machines that do more than a tablet until they increase in input efficiency, storage capacity and business application conversion (there are tons of legacy apps still out there as the average person still interacts with COBOL 13 times a day).  This hasn’t caused me any issues with my new laptop though, it just works.

The company that is easy to work with, keeps up with the trends and produces quality equipment will be the one who has market leadership.  I have voted with my money.

Kiss Your Password Security Goodbye

You may think that you have good password security.  More likely, you are like most people who re-use the same password for many accounts, don’t change it often enough and use your pet’s name or some other easy to find information that makes break in easy.

Face it, we are lazy, lax and don’t understand security and privacy. Nor do we understand the nature of identity theft until you are a victim.

So, unless your are fastidious about changing with complete randomness and creativeness, fugetaboutit, you’re toast…..here’s why.

THE BACKGROUND

From Wired:

It’s not a well-kept secret, either. Just a simple string of characters—maybe six of them if you’re careless, 16 if you’re cautious—that can reveal everything about you.

2012 bug

Your email. Your bank account. Your address and credit card number. Photos of your kids or, worse, of yourself, naked. The precise location where you’re sitting right now as you read these words. Since the dawn of the information age, we’ve bought into the idea that a password, so long as it’s elaborate enough, is an adequate means of protecting all this precious data. But in 2012 that’s a fallacy, a fantasy, an outdated sales pitch. And anyone who still mouths it is a sucker—or someone who takes you for one.

No matter how complex, no matter how unique, your passwords can no longer protect you.

Look around. Leaks and dumps—hackers breaking into computer systems and releasing lists of usernames and passwords on the open web—are now regular occurrences. The way we daisy-chain accounts, with our email address doubling as a universal username, creates a single point of failure that can be exploited with devastating results. Thanks to an explosion of personal information being stored in the cloud, tricking customer service agents into resetting passwords has never been easier. All a hacker has to do is use personal information that’s publicly available on one service to gain entry into another.

This summer, hackers destroyed my entire digital life in the span of an hour. My Apple, Twitter, and Gmail passwords were all robust—seven, 10, and 19 characters, respectively, all alphanumeric, some with symbols thrown in as well—but the three accounts were linked, so once the hackers had conned their way into one, they had them all. They really just wanted my Twitter handle: @mat. As a three-letter username, it’s considered prestigious. And to delay me from getting it back, they used my Apple account to wipe every one of my devices, my iPhone and iPad and MacBook, deleting all my messages and documents and every picture I’d ever taken of my 18-month-old daughter.

The age of the password is over. We just haven’t realized it yet.

Since that awful day, I’ve devoted myself to researching the world of online security. And what I have found is utterly terrifying. Our digital lives are simply too easy to crack. Imagine that I want to get into your email. Let’s say you’re on AOL. All I need to do is go to the website and supply your name plus maybe the city you were born in, info that’s easy to find in the age of Google. With that, AOL gives me a password reset, and I can log in as you.

First thing I do? Search for the word “bank” to figure out where you do your online banking. I go there and click on the Forgot Password? link. I get the password reset and log in to your account, which I control. Now I own your checking account as well as your email.

This summer I learned how to get into, well, everything. With two minutes and $4 to spend at a sketchy foreign website, I could report back with your credit card, phone, and Social Security numbers and your home address. Allow me five minutes more and I could be inside your accounts for, say, Amazon, Best Buy, Hulu, Microsoft, and Netflix. With yet 10 more, I could take over your AT&T, Comcast, and Verizon. Give me 20—total—and I own your PayPal. Some of those security holes are plugged now. But not all, and new ones are discovered every day.

The common weakness in these hacks is the password. It’s an artifact from a time when our computers were not hyper-connected. Today, nothing you do, no precaution you take, no long or random string of characters can stop a truly dedicated and devious individual from cracking your account. The age of the password has come to an end; we just haven’t realized it yet.

Passwords are as old as civilization. And for as long as they’ve existed, people have been breaking them.

In 413 BC, at the height of the Peloponnesian War, the Athenian general Demosthenes landed in Sicily with 5,000 soldiers to assist in the attack on Syracusae. Things were looking good for the Greeks. Syracusae, a key ally of Sparta, seemed sure to fall.

But during a chaotic nighttime battle at Epipole, Demosthenes’ forces were scattered, and while attempting to regroup they began calling out their watchword, a prearranged term that would identify soldiers as friendly. The Syracusans picked up on the code and passed it quietly through their ranks. At times when the Greeks looked too formidable, the watchword allowed their opponents to pose as allies. Employing this ruse, the undermatched Syracusans decimated the invaders, and when the sun rose, their cavalry mopped up the rest. It was a turning point in the war.

The first computers to use passwords were likely those in MIT’s Compatible Time-Sharing System, developed in 1961. To limit the time any one user could spend on the system, CTSS used a login to ration access. It only took until 1962 when a PhD student named Allan Scherr, wanting more than his four-hour allotment, defeated the login with a simple hack: He located the file containing the passwords and printed out all of them. After that, he got as much time as he wanted.

During the formative years of the web, as we all went online, passwords worked pretty well. This was due largely to how little data they actually needed to protect. Our passwords were limited to a handful of applications: an ISP for email and maybe an ecommerce site or two. Because almost no personal information was in the cloud—the cloud was barely a wisp at that point—there was little payoff for breaking into an individual’s accounts; the serious hackers were still going after big corporate systems.

So we were lulled into complacency. Email addresses morphed into a sort of universal login, serving as our username just about everywhere. This practice persisted even as the number of accounts—the number of failure points—grew exponentially. Web-based email was the gateway to a new slate of cloud apps. We began banking in the cloud, tracking our finances in the cloud, and doing our taxes in the cloud. We stashed our photos, our documents, our data in the cloud.

Eventually, as the number of epic hacks increased, we started to lean on a curious psychological crutch: the notion of the “strong” password. It’s the compromise that growing web companies came up with to keep people signing up and entrusting data to their sites. It’s the Band-Aid that’s now being washed away in a river of blood.

WHERE AND WHEN IT BEGAN (SORT OF)

No one can be sure except that since passwords were first used, there were bad guys trying to hack into them.  Here is an exposition of how it became an epidemic:

In 2009, a minor gaming website called Rockyou.com was hacked; although you’ve probably never heard of the site, the hack has probably affected you or someone you know. Almost every genuine hack over the last three years can be traced back to the Rockyou leak.

The reason it was so significant is it totally changed the way hackers do business. Before Rockyou, hackers had to build word lists of potential passwords using traditional dictionaries; the 14 million or so Rockyou passwords provided an instant database showing how people actually construct their passwords.

We’re all familiar with the hoops passwords make us jump through – requiring both letters and numbers, the use of upper-case and lower-case letters, a minimum number of characters, and the use of punctuation. Of course,we’re all human, so we want passwords to be easy to remember while fulfilling these arcane rules.

The list leaked from RockYou confirmed our grammatical bias: upper case letters tend to start words, while special characters or numbers come at the end. One of the most common ways to combine letters and numbers memorably was to add names & dates together – so Patton1945 or Napoleon1815 were common, for example.

Publicly available data makes this even easier; for example, databases are available containing the name of every Facebook user. These, when combined with every 4-digit number combination and a dictionary list of common words will break as many as 40 per cent of internet users’ accounts within minutes. This creates an even greater problem, as many people reuse passwords, meaning one crack can compromise multiple accounts.

Most people have multiple different internet accounts; collecting data and monitoring user activity through these accounts is at the core of many websites’ business models. The temptation to reuse important passwords for trivial sites that require a sign-in, like price comparison sites, restaurant bookers, dating sites or online shops, is almost irresistible. Of course, many of these sites are far from secure.

The Rockyou leak started a chain reaction; a huge number of sites have been hacked since, releasing even more password data. Equally, technology has advanced enormously. The sort of PC you can buy in Currys can attempt 8.2 million password combinations per second. Cryptographic feats that were the stuff of legend in the Second World War could be done on your iPhone; the sort of 16-digit passcodes thought uncrackable during the Cold War are now within the reach of cracking by skilled hackers with low budgets. Goodness only knows what state-sponsored outfits in the US or China can do.

If you look in the lists of passwords and usernames leaked online, it’s fairly easy to find yourself; with the huge amount of websites we sign up to these days, it’s almost inevitable that at least one of the sites where you have an accounts has been hacked in the last two years. I was able to find my own cracked username and password (taken from a hacked wargaming forum) with a little diligent searching. The biggest damage that could be done to me from that leak is losing control of my forum account; if I’d reused that password elsewhere, it could have been catastrophic.

Of course, each character you add to your password ramps up the time it takes to crack; adding even one letter can take crack time from hours to days, putting you into the category of not “unbreakable” – I doubt such a thing exists – but simply not worth the hassle.

The current best advice is to have passwords composed of 20 characters, with no real words, and your gobbledegook has to include upper and lower case letters, symbols, numbers and punctuation, all randomly scattered through the word. On top of that, you need to have a different password for every site you use and change your password for all of them every three months.