Bruce Sterling talks about the ‘stacks’, or how the internet has been gobbled up by the big corporations
Showing posts tagged internet
Bundled, Buried & Behind Closed Doors
by Ben Mendelsohn
Lower Manhattan’s 60 Hudson Street is one of the world’s most concentrated hubs of Internet connectivity. This short documentary peeks inside, offering a glimpse of the massive material infrastructure that makes the Internet possible.
Written and edited by Ben Mendelsohn
Shot and animated by Alex Chohlas-Wood
Part of my job is to cleanup PCs that have been infected with malware, maleware has completely replaced viruses, we rarely see a virus on a PC. This is the introduction to a paper entitled deSEO: Combating Search-Result Poisoning published by members of the University of Washington Computer Sciences Department. LINK >
The spread of malware through the Internet has increased dramatically over the past few years. Along with traditional techniques for spreading malware (such as through links or attachments in spam emails), attackers are constantly devising newer and more sophisticated methods to infect users. A technique that has been gaining prevalence of late is the use of search engines as a medium for distributing malware. By gaming the ranking algorithms used by search engines through search engine optimization (SEO) techniques, attackers are able to poison the search results for popular terms so that these results include links to malicious pages.
A recent study reported that 22.4% of Google searches contain such links in the top 100 results . Furthermore, it has been estimated that over 50% of popular keyword searches (such as queries in Google Trends  or for trending topics on Twitter ), the very first page of results contains at least one link to a malicious page . Using search engines is attractive to attackers because of its low cost and its legitimate appearance. Malicious pages are typically hosted on compromised Web servers, which are effectively free resources for the attackers. As long as these malicious pages look relevant to search engines, they will be indexed and presented to end users. Additionally, users usually trust search engines and often click on search results without hesitation, whereas they would be wary of clicking on links that appear in unsolicited spam emails. It is therefore not surprising that, despite being a relatively new form of attack, searchresult poisoning is already a huge phenomenon and has affected major search engines.
What the Internet Is and How to Stop Mistaking It for Something Else
This is the essay in a nut shell:
- The Internet isn’t complicated
- The Internet isn’t a thing. It’s an agreement.
- The Internet is stupid.
- Adding value to the Internet lowers its value.
- All the Internet’s value grows on its edges.
- Money moves to the suburbs.
- The end of the world? Nah, the world of ends.
- The Internet’s three virtues: a. No one owns it b. Everyone can use it c. Anyone can improve it
- If the Internet is so simple, why have so many been so boneheaded about it?
- Some mistakes we can stop making already
Graphene, is there anything it can’t do? Researchers are already trying to put it in processors, fuel cells, and batteries — now your internet connection might get ten-times faster thanks to the silicon successor.
Researchers at UC Berkeley have created tiny, one-atom-thick modulators that could switch the data-carrying light on and off in a fiber-optic connection much faster than current technology.
Via: Radio Free Europe and Radio Liberty (both US government run radio broadcast networks)
In recent days, with Iranians taking to the streets to protest against the government, the country’s Islamic authorities have boosted their censorship efforts in a bid to crush opposition activity online.
This is where Anonymous and its “Operation: Iran” come in.
The collective is providing users with special advice forums and tools to fight the Iranian government’s censorship. The group has also encouraged Iranian users to use distributed-denial-of-service attacks (DDOS) in order to take down key government websites like khamenei.ir, the website of Supreme Leader Ayatollah Khamenei, as well as leader.ir and president.ir.
The article includes an interview with Arash
Arash is a hacker who works with Anonymous to fight government censorship and cybercontrol in his native Iran.
It is fascinating how the group Anonymous is lauded by the US government for it’s support for Iranian protestors and condemned by them for their support of wikileaks. I understand that Visa, MasterCard and Bank of America are not on par with the Iranian government, however more critical analysis needs to be done to see what similarities exist in these disparate targets. Iranian governmental institutions and western financial institutions are both tools used by those in control, neither are accountable to the people they control.
What does democracy mean to you?
“Social media did not make the revolution in Egypt happen. But, with every step chronicled in real time and broadcast to anyone with an Internet connection, it hastened its pace and transferred the voice of international scrutiny from sovereign leaders to a community of millions. When it comes to pressuring an authoritarian leader to step down, the heat has never been turned up so quickly.
As entrepreneur Habib Haddad tweeted about the whole thing, ‘Social media has lowered the cost of revolution.’ ”