Quantum computing promises a higher level of processing power over current computers, but it comes with its own challenges with implementation. When it comes to fruition, it’ll also break current privacy measures like your banking password. Financial Times explains how this works with a fine set of animations and illustrations.
First they capture a sound recording with a standard microphone. Then they run the audio file through software to filter out the metallic clicks. This provides a time series from which they can infer likely keys.
Soundarya Ramesh presented the work at HotMobile 2020 in the talk below:
Oh to be back in graduate school again. [via kottke]
Since then, two groups of researchers have demonstrated that it’s possible to fool the systems created to comply with G.D.P.R. to get someone else’s personal information.
One of the researchers, James Pavur, 24, a doctoral student at Oxford University, filed data requests on behalf of his research partner and wife, Casey Knerr, at 150 companies using information that was easily found for her online, such as her mailing address, email address and phone number. To make the requests, he created an email address that was a variation on Ms. Knerr’s name. A quarter of the companies sent him her file.
“I got her Social Security number, high school grades, a good chunk of information about her credit card,” Mr. Pavur said. “A threat intelligence company sent me all her user names and passwords that had been leaked.”
Yay.
I’m not saying these new laws are bad, but maybe get yourself a good password manager and change all those duplicate passwords.
George Mauer highlights how a hacker might access other people’s data by putting an equal sign in a CSV file, so that an import to Microsoft or Google Sheets runs a value as a formula, even if it’s quoted as a string.
The attacker starts the cell with their trusty = symbol prefix and then points IMPORTXML to a server they control, appending as a querystring of spreadsheet data. Now they can open up their server log and bam! Data that isn’t theirs. Try it yourself with a Requestb.in.
The ultra sinister thing here? No warnings, no popups, no reason to think that anything is amiss. The attacker just enters a similarly formatted time/issue/whatever entry, eventually an administrator attempts to view a CSV export and all that limited-access data is immediately, and queitly sent away.
The Plan for 2016: CDC and the President’s Global Health Security Agenda
2015 was a powerful reminder that a health threat anywhere is a health threat everywhere. In 2016, CDC and partners are looking forward to continuing work on the President’s Global Health Security Agenda (GHSA), an initiative led by the Department of Health and Human Services.
In 2012, only 1 in 6 countries reported being fully prepared for disease outbreaks. As the Ebola epidemic in West Africa tragically demonstrated, it is often the countries with the fewest resources who are hit hardest by public health emergencies. To better protect people everywhere, the United States has committed more than $1 billion over the next 5 years to help 31 countries better prepare for the health impacts of natural and man-made disasters. More than half of this historic investment will focus on the continent of Africa to help prevent future outbreaks.
Global Health Security Agenda Goals
The vision of GHSA is to stop disease outbreaks as quickly as possible. Partners will work together to build a global network that can respond rapidly and effectively to disease outbreaks and help countries build their own capacity to prevent, detect, and respond to public health emergencies.
The GHSA focuses on accelerating progress toward a world safe from disease threats by supporting enhanced surveillance and biosecurity systems, immunization campaigns, and curtailing antimicrobial resistance. Establishing national laboratory and disease reporting systems will help detect threats early. In addition to building epidemiologic and laboratory workforce capacity, GHSA also focuses on incident management system training and establishing emergency operations centers around the globe.
As President Obama said at the Global Health Security Agenda Summit in 2014, “We issued a challenge to ourselves and to all nations of the world to make concrete pledges towards three key goals: prevent, detect, and respond. We have to prevent outbreaks by reducing risks. We need to detect threats immediately wherever they arise. And we need to respond rapidly and effectively when we see something happening, so that we can save lives and avert even larger outbreaks.”
CDC’s Role in Global Health Security
CDC is improving preparedness and response internationally by building close relationships with ministries of health and other public health partners abroad to encourage public health and emergency management capacity building. The agency also provides GHSA countries with resources such as funds, administrative support, and dedicated personnel, including experts in emergency response, electronic surveillance systems, and specific health threats. CDC also links emergency response efforts to recovery efforts to ensure systems and processes that have been put in place for one response can be ready for the next public health emergency.
Ebola has reminded us that to protect its citizens, each country should be equipped with a core set of public health capabilities to detect a threat when it emerges, respond rapidly and effectively, and prevent it wherever possible. All countries need to be prepared, since disease monitoring and emergency response begin at the local level. Local responses will be quicker, more efficient, and more cost-effective than responding from a great distance. However, epidemics do not stay within borders and are not the problem of individual countries or regions. GHSA is an important step toward helping build capacity in other countries and ensuring that when national capacities are overwhelmed, the world moves immediately and decisively to contain the outbreak.
We here at The Finch & Peaare supporters of freedom, privacy, and the open exchange of ideas. We do our best to respect your privacy and the rights of those who produce creative content.
To those ends, we have, from the beginning published under Creative Commons licenses and have joined in advocacy to oppose government mass surveillance. Today, we are joining a multitude in the Reset the Netcampaign to take steps to provide a secure Internet, because our governments will not act to respect our basic freedoms. As security expert Bruce Schneier has noted, organizations like the NSA have chosen to work to make the Internet less secure for all of us, in order to make it easier for them to attack those they perceive as threats.
We would also encourage you to click the banner at the bottom of the page or the Reset the Netlogo to get information about taking back your privacy and helping to make the Internet secure.