Friday Squid Blogging: Climate Change Could be Good for Squid
Basically, they thrive in a high CO2 environment, because it doesn't bother them and makes their prey weaker.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
Read my blog posting guidelines here.
Posted on June 14, 2019 at 4:41 PM • 57 Comments
- Speed Maximum Urban Limits
I have heard about innovative uses of the SIRI shortcut commands. However, according to the cited article:
"...last year, investigators at Quartz found that Google Android can track you using Bluetooth beacons even when you turn Bluetooth off in your phone." Ouch!
Trying to get google out of your life is really hard. Harder than FB. I now use DuckDuckGo and Startpage for searches, but their maps are not up to snuff. Besides, google is everywhere.
I have wondered why MS, Google, Amazon and the rest would NOT simply log all of our PIN numbers, passwords and so on just like they collect everything else. Certainly their privacy statements would allow it.
As for stores recording our pin numbers via loggers or cameras....why not? Who would stop them? All they need to say is "it's for store security". Case closed.
See above, there is a way to track you even if BT is turned off. Apparently, it's done via other installed apps. Meanwhile, at least on my iPhone, when you switch off BT, it's only good for 24 hours, then auto switches back to "on". I've wondered about that sometimes. Why?
The cams at Walmart and Target are (at least) at the self serve checkout stand. When you slide your card, you can see yourself in a small monitor while doing the transaction. Thus, there is a video recording of every purchase. This is when I usually get an uncontrollable urge to scratch my nose with my middle finger.
If they have them, you WILL see them for sure.
BTW, the article notes,
"Most people aren’t aware they are being watched with beacons, but the “beacosystem” tracks millions of people every day. Beacons are placed at airports, malls, subways, buses, taxis, sporting arenas, gyms, hotels, hospitals, music festivals, cinemas and museums, and even on billboards."
"They" are everywhere. Almost.
I'm thinking leave the phone in the car and off. Or maybe get one of those Faraday phone cases. Maybe, for father's day!
From your NYTimes link:
"U.S. Escalates Online Attacks on Russia’s Power Grid
WASHINGTON — The United States is stepping up digital incursions into Russia’s electric power grid in a warning to President Vladimir V. Putin and a demonstration of how the Trump administration is using new authorities to deploy cybertools more aggressively, current and former government officials said.
In interviews over the past three months, the officials described the previously unreported deployment of American computer code inside Russia’s grid and other targets as a classified companion to more publicly discussed action directed at Moscow’s disinformation and hacking units around the 2018 midterm elections.
Gsm Tested Solution Charging Nokia 1650 Not 100 But now the American strategy has shifted more toward offense, officials say, with the placement of potentially crippling malware inside the Russian system at a depth and with an aggressiveness that had never been tried before. It is intended partly as a warning, and partly to be poised to conduct cyberstrikes if a major conflict broke out between Washington and Moscow.
The commander of United States Cyber Command, Gen. Paul M. Nakasone, has been outspoken about the need to “defend forward” deep in an adversary’s networks to demonstrate that the United States will respond to the barrage of online attacks aimed at it.
But finding ways to calibrate those responses so that they deter attacks without inciting a dangerous escalation has been the source of constant debate.
Mr. Trump issued new authorities to Cyber Command last summer, in a still-classified document known as National Security Presidential Memoranda 13, giving General Nakasone far more leeway to conduct offensive online operations without receiving presidential approval.
But the action inside the Russian electric grid appears to have been conducted under little-noticed new legal authorities, slipped into the military authorization bill passed by Congress last summer. The measure approved the routine conduct of “clandestine military activity” in cyberspace, to “deter, safeguard or defend against attacks or malicious cyberactivities against the United States.”
Under the law, those actions can now be authorized by the defense secretary without special presidential approval.
“It has gotten far, far more aggressive over the past year,” one senior intelligence official said, speaking on the condition of anonymity but declining to discuss any specific classified programs. “We are doing things at a scale that we never contemplated a few years ago.”"
Sidebar photo of Bruce Schneier by Joe MacInnis.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Security.