• Shamoon, le malware qui terrorise les sociétés pétrolières, en embuscade en Italie
    https://cyberguerre.numerama.com/305-shamoon-le-malware-qui-terrorise-les-societes-petrolieres-

    L’un des logiciels les plus dangereux du monde a refait surface en Italie. Shamoon serait responsable d’une vaste attaque de la compagnie Saipem, liée au secteur pétrolier. La notoriété du malware destructeur Shamoon s’est faite au Moyen-Orient. Connu pour être un des logiciels parmi les plus dangereux du monde, le code malfaisant fut derrière l’immobilisation — à deux reprises — de la Saudi Aramco. La firme pétrolière avait vu ses données détruites et remplacées provoquant de lourds dégâts financiers. (...)

    #malware #hacking #Shamoon #Saipem #Aramco

    //c0.lestechnophiles.com/cyberguerre.numerama.com//content/uploads/sites/2/2018/12/4648545892_7ac77ca30d_b.jpg


  • Shamoon malware destroys data at Italian oil and gas company
    https://www.zdnet.com/article/shamoon-malware-destroys-data-at-italian-oil-and-gas-company

    A new variant of the Shamoon malware was discovered on the network of Italian oil and gas contractor Saipem, where it destroyed files on about ten percent of the company’s PC fleet, ZDNet has learned. The vast majority of the affected systems were located in the Middle East, where Saipem does a vast majority of its business, but infections were also reported in India, Italy, and Scotland. Shamoon is one of the most dangerous strains of malware known to date. It was first deployed in two (...)

    #Saipem #Aramco #malware #Shamoon #hacking

    https://zdnet2.cbsistatic.com/hub/i/r/2018/12/13/69419122-0b57-40ba-a4d3-bf54810f7652/thumbnail/770x578/cf12d2097c4840683200f7b2328dab57/oil-refinery.png


  • Le chinois ZTE fournit des cartes d’identité numériques intrusives au gouvernement de Nicolas Maduro
    https://cyberguerre.numerama.com/250-le-chinois-zte-fournit-des-cartes-didentite-numeriques-int

    Le régime de Nicolas Maduro étend son contrôle sur les vénézuéliens grâce au développement d’une identité numérique pour chaque citoyen. La technologie supportant ce système d’identification est fournie par le Chinois ZTE. La Chine ne partage pas le blocus des Américains quand il s’agit du Venezuela : pour fournir le pays en technologies, les géants de Shenzen dont ZTE, prennent avantageusement la place des entreprises nord-américaines. L’équipementier chinois est installé au cœur de Caracas dans un (...)

    #ZTE #Identité #smartphone #écoutes #données #surveillance #élections #électeurs #passeport_électronique #hacking (...)

    ##Identité ##SocialCreditSystem
    //c0.lestechnophiles.com/cyberguerre.numerama.com//content/uploads/sites/2/2018/12/8439815798_c396c3b515_o.jpg

    • Le #carnet_de_la_patria (plusieurs entrées ici sur ce sujet) n’est pas qu’une carte d’identité, il est aussi moyen de paiement. Ainsi, il devrait être utilisé pour le versement des retraites. Il est obligatoire pour bénéficier d’un panier alimentaire mensuel, il est aussi utilisé pour obtenir de l’essence dans 41 municipios frontaliers et devrait l’être également au niveau national pour avoir accès au tarif subventionné de l’essence (lorsque la hausse annoncée et sans cesse reporté,…) aura eu lieu.

      Pour mémoire, la carte d’identité « sécurisée » française (ie biométrique) contient une puce RFID avec les données d’identification et l’image des empreintes digitales et une deuxième puce qui a vocation à permettre l’identification dans les échanges électroniques avec l’administration. Mais ce n’est pas un moyen de paiement ou de perception d’allocation ni un mini-dossier médical,…


  • Fuite de données personnelles au Quai d’Orsay
    https://www.nextinpact.com/news/107416-fuite-donnees-personnelles-au-quai-dorsay.htm

    Le ministère des Affaires étrangères révèle le vol des informations des « personnes à prévenir » en cas de problème d’un voyageur. Les adresses email et numéros de téléphone sont concernés. Après huit ans d’activité, le service Ariane a droit à sa fuite de données. Dans un communiqué, le ministère des Affaires étrangères confirme le vol d’informations personnelles, d’abord signalé par email à des personnes concernées. Le service permet aux voyageurs d’obtenir des informations de sécurité sur leur déplacement et (...)

    #données #hacking


  • 5 Rapid Ways to Hack Your Holiday Event
    https://hackernoon.com/5-rapid-ways-to-hack-your-holiday-event-eff81ff1658c?source=rss----3a814

    At its heart, hacking is all about finding ways to improve our lives, whether that’s by improving infrastructure, finding a new way to provide services, or figuring out how to get the most bang for your buck.Hacks allow us to do more with less and provide some much-needed support, which is something everyone needs more of during the holidays when faced with countless friendsgivings and professional holiday parties.These can be overwhelming for even the staunchest of networkers, but never fear — I’ve got some excellent tips for you that will help you seize these golden nuggets of opportunity and hack your way into success by the New Year!1. Know the EventAs simple as this sounds, half the time folks don’t really know why they are attending the events they are attending. So set some goals:If it’s (...)

    #social #networking #office-culture #communication #hacks


  • La fuite de donnée de l’hôtelier Mariott s’invite dans les négociations entre la Chine et les États-Unis
    https://www.zdnet.fr/actualites/la-fuite-de-donnee-de-l-hotelier-mariott-s-invite-dans-les-negociations-entre-

    La fuite de données massive ayant touché la chaîne hôtelière Marriott serait, selon plusieurs médias américains, liée à une opération menée par les agences du renseignement chinois. Le piratage de ces chaînes d’hôtel viendrait donc s’inscrire dans le contexte de guerre économique entre les États-Unis et la Chine. Aux États-Unis, l’enquête avancerait sur le piratage record ayant visé le groupe hôtelier Mariott et les soupçons se tournent vers le renseignement chinois selon des informations obtenues par le New (...)

    #Marriott #hacking


  • Marriott Data Breach Is Traced to Chinese Hackers as U.S. Readies Crackdown on Beijing
    https://www.nytimes.com/2018/12/11/us/politics/trump-china-trade.html

    The cyberattack on the Marriott hotel chain that collected personal details of roughly 500 million guests was part of a Chinese intelligence-gathering effort that also hacked health insurers and the security clearance files of millions more Americans, according to two people briefed on the investigation. The hackers, they said, are suspected of working on behalf of the Ministry of State Security, the country’s Communist-controlled civilian spy agency. The discovery comes as the Trump (...)

    #Marriott #hacking


  • Peut-on hacker… une voiture connectée ?
    https://cyberguerre.numerama.com/228-peut-on-hacker-une-voiture-connectee.html

    Avec l’avènement de la voiture autonome pour 2020 et la multiplication des attaques à distance, la cybersécurité est devenue une priorité pour l’industrie automobile. « Les gars, je suis bloqué sur l’autoroute ! Sérieusement, p***, c’est dangereux ! » En juin 2015, le journaliste de Wired, Andy Greenberg, roule à près de 110 km/h au volant d’une Jeep Cherokee et panique. Depuis plusieurs minutes, sa voiture semble hors de contrôle, et les bugs subis sont de plus en plus dangereux pour la conduite. Lorsque (...)

    #voiture #hacking

    //c1.lestechnophiles.com/cyberguerre.numerama.com//content/uploads/sites/2/2018/12/f-and-f-3.jpg


  • Software spia, le nuove armi africane

    Ufficialmente introdotti contro il terrorismo, sono usati anche per controllare dissidenti politici.

    Almeno dal 2009 l’Egitto è tra i principali acquirenti di strumentazioni per la sorveglianza di massa. #Software intrusivi che si possono agganciare ai telefonini oppure alle mail e tracciare così i comportamenti di chiunque. Specialmente se considerato un nemico politico dal regime. Al Cairo, dopo la primavera araba, si è abbattuto un rigido inverno dei diritti: oppositori politici, sindacalisti, persino ricercatori universitari come Giulio Regeni sono stati fatti sparire, ammazzati o torturati. Per fare tutto questo, le agenzia di sicurezza hanno spiato i loro bersagli attraverso sistemi informatici. Tra le aziende, chi ha fatturato vendendo gli strumenti per spiare i nemici politici, c’è l’italiana #Hacking_Team, le cui mail sono state rese pubbliche da una maxi fuga di notizie nel luglio 2015.

    L’Egitto non è l’unico paese africano a fare uso di questo tipo di tecnologie. In particolare in Africa, questo genere di strumenti per tenere sotto controllo la popolazione stanno diventando una costante. Sono l’ultima frontiera del mercato delle armi. Nemico ufficiale contro cui utilizzarle: il terrorismo, che si chiami Al Shabaab, Boko Haram, Isis. In pratica, da semplici persone “sospette” a dissidenti politici.

    Una stima di Markets and Markets del 2014 prevede che per il 2019 il mercato delle “intercettazioni” varrà 1,3 miliardi di dollari. E accanto a questo corre un mercato nero dalle dimensioni inimmaginabili, dove ogni transazione avviene nel deep web, il doppio fondo del contenitore di internet. Senza bisogno di autorizzazioni, né di sistemi di licenze, come invece previsto dalle normative di tutto il mondo. I paesi africani sono tra i nuovi agguerriti compratori di queste armi 2.0, di fabbricazione per lo più israeliana ed europea.

    La mappa degli spioni

    L’utilizzo e la vendita di questi sistemi – proprio come per le armi – in diversi paesi è schermato dal segreto militare, nonostante il “duplice uso” (civile e militare) che possono avere questi strumenti. Detti, appunto, dual-use. L’inchiesta Security for Sale (https://irpi.eu/sicurezza-vendesi), condotta in febbraio da 22 giornalisti europei, ha individuato i principali importatori di tecnologie intrusive in Africa. La lista è lunga: oltre il Kenya, di cui Osservatorio Diritti ha già parlato, e l’Egitto, l’esempio più famoso, ci sono Libia (ancora sotto Gheddafi, ndr), Etiopia, Nigeria, Sudan, Sudafrica, Mauritania e Uganda.
    #Kenya #Libye #Ethiopie #Nigeria #Soudan

    In Mauritania è in carcere da due anni il cittadino italiano #Cristian_Provvisionato per una vendita di sistemi di intercettazione finita male. Provvisionato, una guardia giurata che non sarebbe mai stata in grado di vendere sistemi di questo genere, avrebbe dovuto presentare ai mauritani un sistema di intercettazione per Whatsapp, che la sua azienda – Vigilar – avrebbe a sua volta acquistato attraverso la società indiano-tedesca Wolf Intelligence. Bersaglio del sistema sarebbero dovuti essere terroristi attivi al confine mauritano, per quanto diverse organizzazioni internazionali abbiano sollevato riserve rispetto al possibile utilizzo di sistemi del genere in un paese che viola i diritti umani.
    #Mauritanie

    L’accusa nei confronti di Cristian Provvisionato, cioè truffa, non regge perché il cittadino italiano era all’oscuro, come è stato comprovato da più ricostruzioni giornalistiche, di ciò che stava presentando in Mauritania. Aveva accettato il lavoro perché gli era stato promesso che sarebbe stato veloce, pulito e con un buon guadagno. Invece si trova ancora dietro le sbarre. Per il caso Provvisionato la magistratura milanese ha aperto un’inchiesta che coinvolge anche #Vigilar e #Wolf_Intelligence. Il partner israeliano dei due è una delle aziende da sempre competitor di Hacking Team.

    La stessa Hacking Team ha venduto ad altri regimi autoritari africani (scarica la ricerca del centro studi CitizenLab – università di Toronto). Il caso più clamoroso è quello dei servizi segreti del Sudan, che nel 2012, prima che entrasse in vigore qualunque embargo, hanno acquistato merce per 960 mila euro. Anche le Nazioni Unite, nel 2014, quando è entrato in vigore l’embargo con il Sudan, hanno fatto domande ad Hacking Team in merito alle relazioni commerciali con le forze d’intelligence militare del Paese.
    #Soudan #services_secrets

    Nello stesso 2012 una compagnia britannica aveva iniziato a vendere software intrusivi alle forze militari dell’Uganda. Era l’inizio di un’operazione di spionaggio di alcuni leader politici dell’opposizione che arrivava, denunciavano media locali nel 2015, fino al ricatto di alcuni di loro. Paese di fabbricazione del software spia, come spesso accade, Israele.
    #Ouganda

    Il Sudafrica è un caso a sé: da un lato importatore, dall’altro esportatore di tecnologie-spia. Il primo fornitore di questo genere di software per il Sudafrica è la Gran Bretagna, mentre il mercato di riferimento a cui vendere è quello africano. Il Paese ha anche una propria azienda leader nel settore. Si chiama #VASTech e il suo prodotto di punta è #Zebra, un dispositivo in grado di intercettare chiamate vocali, sms e mms.
    #Afrique_du_sud

    Nel 2013 Privacy International, un’organizzazione internazionale con base in Gran Bretagna che si occupa di privacy e sorveglianza di massa, ha scoperto una fornitura di questo software alla Libia di Gheddafi, nel 2011, nel periodo in cui è stato registrato il picco di attività di spionaggio (dato confermato da Wikileaks). Eppure, dal 2009 al 2013 solo 48 potenziale contravvenzioni sono finite sotto indagine del Ncac, l’ente governativo preposto a questo genere di controlli.

    Il settore, però, nello stesso lasso di tempo ha avuto un boom incredibile, arrivando nel solo 2012 a 4.407 licenze di esportazione per 94 paesi in totale. Il mercato vale circa 8 miliardi di euro. In Sudafrica sono in corso proteste per chiedere le dimissioni del presidente Jacob Zuma, coinvolto in diversi casi di corruzione e ormai considerato impresentabile. È lecito pensare che anche questa volta chi manifesta sia tenuto sotto osservazione da sistemi di sorveglianza.


    https://www.osservatoriodiritti.it/2017/05/08/software-spia-le-nuove-armi-africane
    #Afrique #surveillance #interception #surveillance_de_masse #Egypte #business

    ping @fil

    • Security for sale

      The European Union has deep pockets when it comes to security. Major defense contractors and tech giants compete for generous subsidies, to better protect us from crime and terrorism. At least that’s the idea. But who really benefits? The public or the security industry itself?

      Over the past year, we’ve worked with more than twenty journalists in eleven European countries to investigate this burgeoning sector. We quickly discovered that the European security industry is primarily taking good care of itself – often at the expense of the public.

      In this crash course Security for Sale, we bring you up to speed on EU policy makers and industry big shots who’ve asserted themselves as “managers of unease,” on the lobbies representing major defense companies, on the billions spent on security research, and on the many ethical issues surrounding the European security industry.

      “Security for sale” is a journalistic project coordinated by Dutch newspaper De Correspondent and IRPI collaborated for the Italian context. The webportal of “Security for Sale” collects all articles produced within the project in several languages.

      https://irpi.eu/en/security-for-sale

    • Lawful Interception Market worth $1,342.4 Million by 2019

      The report “Lawful Interception Market by Network Technologies and Devices ( VOIP, LTE, WLAN, WIMAX, DSL, PSTN, ISDN, CDMA, GSM, GPRS, Mediation Devices, Routers, Management Servers); Communication Content; End Users - Global Advancement, Worldwide Forecast & Analysis (2014-2019)” defines and segments the LI market on the basis of devices, network technologies, communication content, and services with in-depth analysis and forecasting of revenues. It also identifies drivers and restraints for this market with insights on trends, opportunities, and challenges.

      Browse 80 market tables and 23 figures spread through 177 pages and in-depth TOC on “Lawful Interception Market by Network Technologies and Devices ( VOIP, LTE, WLAN, WIMAX, DSL, PSTN, ISDN, CDMA, GSM, GPRS, Mediation Devices, Routers, Management Servers); Communication Content; End Users - Global Advancement, Worldwide Forecast & Analysis (2014-2019)”
      https://www.marketsandmarkets.com/Market-Reports/lawful-interception-market-1264.html
      Early buyers will receive 10% customization on reports.

      Lawful Interception (LI) has been proven to be very helpful for the security agencies or Law Enforcement Agencies (LEAs) for combating terrorism and criminal activities. Across the world, countries have adopted such legislative regulations and made it compulsory for the operators to make LI-enabled communication network. Since the advancement of communication channels and network technologies over the period of time, the interception techniques have also enhanced for variety of communications such as Voice over Internet Protocol (VoIP), web-traffic, Electronic Mail (Email), and more. Now, the interception is possible for all networks that deliver voice, data, and Internet services.

      Sophisticated communication channels and advanced network technologies are the major driving factors for the LI market. Nowadays, communication can be done in various forms such as voice, text, video, and many more. To transfer these types of data, network technologies need to constantly upgrade. The different types of network technologies that can be intercepted are VoIP, LTE, WLAN, WiMax, DSL, PSTN, ISDN, CDMA, GSM, and GPRS, are discussed in this report.

      MarketsandMarkets has broadly segmented the LI market by devices such as management servers, mediation devices, Intercept Access Points (IAP), switches, routers, gateways, and Handover Interfaces (HIs). The LI market is also segmented on the basis of communication contents and networking technology. By regions: North America (NA), Europe (EU), Asia Pacific (APAC), Middle East and Africa (MEA), and Latin America (LA).

      The LI market is expected to grow at a rapid pace in the regional markets of APAC and MEA. The investments in security in APAC and MEA are attracting the players operating in the LI market. These regions would also be the highest revenue generating markets in the years to come. Considerable growth is expected in the NA and European LI markets. New wireless network and network technologies like LTE, WiMax, NGN, and many more are expected to be the emerging technological trends in the LI market.

      MarketsandMarkets forecasts the Lawful Interception market to grow from $251.5 million in 2014 to $1,342.4 million by 2019. In terms of regions, North America and Europe are expected to be the biggest markets in terms of revenue contribution, while Asia-Pacific, Middle East and Africa, and Latin America are expected to experience increased market traction, during the forecast period.

      About MarketsandMarkets

      MarketsandMarkets is a global market research and consulting company based in the U.S. We publish strategically analyzed market research reports and serve as a business intelligence partner to Fortune 500 companies across the world.

      MarketsandMarkets also provides multi-client reports, company profiles, databases, and custom research services. M&M covers thirteen industry verticals, including advanced materials, automotives and transportation, banking and financial services, biotechnology, chemicals, consumer goods, energy and power, food and beverages, industrial automation, medical devices, pharmaceuticals, semiconductor and electronics, and telecommunications and IT.

      We at MarketsandMarkets are inspired to help our clients grow by providing apt business insight with our huge market intelligence repository.

      https://www.marketsandmarkets.com/PressReleases/lawful-interception.asp

    • Antiterrorismo con licenza d’uccidere

      Kenya osservato speciale: le ong parlano di vittime, sparizioni e intercettazioni diffuse.

      Da gennaio a ottobre 2016 in Kenya sono state uccise dalle forze dell’ordine 177 persone. Lo scrive nel suo rapporto annuale 2016/2017 la ong Amnesty international. Uccisioni stragiudiziali per mano delle cosiddette Kenyan Death Squads, gli squadroni della morte in azione contro presunti terroristi. A risalire la catena di comando, si arriva fino ai piani alti del governo, come aveva raccontato Al Jazeera in un’inchiesta del 2015.

      Il Kenya ha conosciuto il terrorismo di matrice jihadista alla fine del 1998, all’epoca della prima bomba all’ambasciata americana di Nairobi: un attentato che ha lanciato nel mondo il marchio Al Qaeda. Il Paese è passato attraverso centinaia di attentati e oggi il terrorismo si chiama Al-Shabaab (leggi “Al-Shabaab avanza in Somalia”). Ma i presunti terroristi sono solo una parte delle vittime degli squadroni della morte: anche avvocati, attivisti e oppositori politici sono finiti sulla lista dei torturati e uccisi. Fare leva sulla paura dei cittadini, in Kenya, è facile.

      Dal 2010 al 2015 si ha notizia di almeno 500 persone fatte sparire da questi nuclei interni di alcuni corpi speciali delle forze dell’ordine del Kenya. Operazioni supervisionate dal Nis, i servizi segreti, svolte poi da agenti della Criminal investigation division (Cid), oppure dall’unità Recce o ancora dalle Kenyan Defence Forces. «Si potrebbero chiamare “morti accettabili”», dice un ufficiale dei servizi segreti kenyoti intervistato sulla vicenda da un ricercatore della ong Privacy International.

      INTERCETTAZIONI DIFFUSE

      E l’argomento “terrorismo” è sufficiente a giustificare un sistema d’intercettazioni persistente, dove non esiste comunicazione che non sia tracciata, né supporti informatici che le forze dell’ordine non possano acquisire. Tutto il meccanismo per rintracciare “i nemici” passerebbe dalle comunicazioni telefoniche, ignorando qualunque norma costituzionale kenyota. «Gli ufficiali che abbiamo intervistato hanno ammesso che spesso si finisce sotto intercettazione per motivi politici e non solo per presunte attività di terrorismo», continua il ricercatore di Privacy International che ha curato il report “Traccia, cattura, uccidi” (per motivi di sicurezza, non è possibile rivelare il suo nome).

      Le forze speciali del Kenya avrebbero una presenza stabile all’interno delle compagnie telefoniche del paese. «Agenti Nis sono informalmente presenti nelle strutture per le telecomunicazioni, apparentemente sotto copertura», si legge nel rapporto. Elementi che sarebbero stati confermati da dipendenti di compagnie telefoniche e agenti. «I dipendenti hanno paura che negare l’accesso possa avere delle ripercussioni», aggiunge il ricercatore.

      Safaricom è la più importante compagnia telefonica del paese: controlla oltre il 60% del mercato della telefonia kenyota. Azionista di maggioranza è Vodafone e secondo il rapporto al suo interno ci sarebbero dieci agenti della Cid. Attraverso un’interfaccia, avrebbero libero accesso al database interno in cui sono registrate telefonate, proprietari, transazioni monetarie attraverso la rete mobile. Un universo.

      Questo è quello che raccontano le fonti interne scovate da Privacy International. Mentre Safaricom, ufficialmente, nega questo flusso di informazioni. L’amministratore delegato di Safaricom, Bob Collymore, tra gli uomini più ricchi del Kenya, ha risposto alla ong sostenendo che la sua azienda «non ha relazioni con Nis riferite alla sorveglianza delle comunicazioni in Kenya e non ci sono ufficiali Nis impiegati nell’azienda, ufficialmente o sotto copertura».

      Il Kenya acquista all’estero le strumentazioni di cui è dotato il sistema di intercettazioni in funzione nel paese. «Le fonti a cui abbiamo avuto accesso nominavano aziende inglesi ed israeliane, ma non sanno come funziona l’acquisto degli strumenti per intercettazioni», aggiunge il ricercatore di Privacy International. Gli strumenti più diffusi sono i famosi IMSI Catcher. All’apparenza, delle semplice valigette con un involucro nero all’estero, rinforzato. In realtà sono delle antenne attraverso cui è possibile intercettare telefonate effettuate nel raggio di circa 300 metri.

      Ci sono poi anche software intrusivi, che agganciano il telefono una volta che l’utente apre uno specifico messaggio via Sms o WhatsApp. Nel 2015 le rivelazioni su Hacking Team, l’azienda milanese che vendeva in mezzo mondo dei software spia, avevano permesso di scoprire anche trattative in corso con forze speciali del Kenya. Gli obiettivi dello spionaggio sarebbero stati uomini legati all’opposizione.

      https://www.osservatoriodiritti.it/2017/04/12/antiterrorismo-con-licenza-di-uccidere
      #anti-terrorisme #opposition #opposants_au_régime #persécution


  • A map that shows how territorial wolves are (http://www.citypages.c...
    https://diasp.eu/p/8160775

    A map that shows how territorial wolves are

    Wolf packs take their territory very seriously. That point is illustrated in incredible, colorful, squiggly detail via a new data map from Voyageurs Wolf… Article word count: 246

    HN Discussion: https://news.ycombinator.com/item?id=18633769 Posted by hecubus (karma: 1461) Post stats: Points: 133 - Comments: 21 - 2018-12-08T03:38:03Z

    #HackerNews #are #how #map #shows #territorial #that #wolves

    Article content:

    Researchers at VWP — a collab between the University of Minnesota and Voyageurs National Park — charted the locations of seven northern Minnesota wolf packs 68,000 times throughout the summer. The findings, pictured above, show how rigidly wolves stick to their own turf. 

    "The image basically speaks for itself — it shows how (...)


  • US Is Net Oil Exporter for First Time in 75 Years (https://www.bloo...
    https://diasp.eu/p/8160542

    US Is Net Oil Exporter for First Time in 75 Years

    To continue, please click the box below to let us know you’re not a robot.

    HN Discussion: https://news.ycombinator.com/item?id=18634927 Posted by tim333 (karma: 8833) Post stats: Points: 112 - Comments: 72 - 2018-12-08T12:30:16Z

    #HackerNews #exporter #first #for #net #oil #time #years

    Article content:

    To continue, please click the box below to let us know youʼre not a robot.

    HackerNewsBot debug: Calculated post rank: 98 - Loop: 122 - Rank min: 80 - Author rank: 17


  • An interview with the documentary filmmaker Adam Curtis (https://ww...
    https://diasp.eu/p/8159750

    An interview with the documentary filmmaker Adam Curtis

    An interview with the documentary filmmaker Adam Curtis Article word count: 8863

    HN Discussion: https://news.ycombinator.com/item?id=18634507 Posted by mpweiher (karma: 28584) Post stats: Points: 89 - Comments: 38 - 2018-12-08T08:56:07Z

    #HackerNews #adam #curtis #documentary #filmmaker #interview #the #with

    Article content:

    “It’s ‘fuck off’ to everything,” says Adam Curtis (pictured below), describing public sentiment today. The British documentarist sees himself as an optimist amid dystopians, and as a classical journalist whose medium happens to be film. For 30 years he has produced a rich body of documentaries on politics and society for the BBC—and in the process, has emerged as a cult-hero to young thinkers trying to (...)


  • Viral hepatitis: A silent epidemic killing more people than HIV, ma...
    https://diasp.eu/p/8157219

    Viral hepatitis: A silent epidemic killing more people than HIV, malaria or TB

    Viral hepatitis is on the rise. Tackling hepatitis B in Africa is key to fighting back. Article word count: 2534

    HN Discussion: https://news.ycombinator.com/item?id=18627683 Posted by pseudolus (karma: 2692) Post stats: Points: 153 - Comments: 63 - 2018-12-07T14:03:41Z

    #HackerNews #epidemic #hepatitis #hiv #killing #malaria #more #people #silent #than #viral

    Article content:

    Nuru was prepared for the worst when she went to get screened for HIV eight years ago. After caring for her mother in Uganda, who died as a result of the virus, Nuru moved to the United Kingdom to study, and decided to take her health into her own hands. “I was ready to be told I had HIV,” she says. “I felt, ‘That’s okay. I’ve (...)


  • Medium Killed Hacker Noon’s Revenue : WTF ?
    https://hackernoon.com/medium-killed-hacker-noons-funding-wtf-157a2f86d9d4?source=rss----3a8144

    I started writing on Medium in 2015 around the time I self-published my first book, Un-Crap Your Life.Not long after, I began submitting some of my tech articles to the Medium publication Hacker Noon. Back in 2016 there were fewer than 50K readers on Hacker Noon and even though it didn’t get a huge amount of traffic, I always felt a great deal of satisfaction when my articles got accepted and published in the Hacker Noon publication. My most popular Hacker Noon story chronicles the history of #blockchain visionary, Dan Larimer and has over 50K views at last count.I just learned that Medium cut off Hacker Noon’s sponsorships in September, which effectively killed Hacker Noon’s revenue stream.Hacker Noon has been profitable for a while, having formed partnerships with a small number of tech (...)

    #hacker-news #hackernoon #publishing #funding


  • Online New Years Hackathon
    https://hackernoon.com/online-new-years-hackathon-e189775627d7?source=rss----3a8144eabfe3---4

    Your attention; can I haz it?Hello, my name is Benjamin Spak. You are a web developer. Prepare for free stickers.CodeCareer.org is hosting a New Years Hackathon. You are invited!I know what you might be thinking.“Wait! Do I need pants?!”Nope! No pants needed. It’s an online event!You may be thinking“Okay, you had me at no pants. But, how do I get these stickers you mentioned? And, what else is in it for me?”Register for the Hackathon2. Build a new project that will help fellow web developers.3. Stream the creation process via Periscope(Twitter) or Twitch between December 28th -December 31st.Chat with other developers, while you build. Have fun. Be eligible to win more prizes & giveaways.Judging starts the 31st.Sign up now! Or before the deadline on December 28th.See the event website for (...)

    #new-years-hackathon #hackathons #online-hackathon #events #codecareer


  • Initial Impression of #wordpress 5 from a former WordPress Startup CEO
    https://hackernoon.com/initial-impression-of-wordpress-5-from-a-former-wordpress-startup-ceo-a1

    Initial Impression of WordPress 5.0 from a former WordPress Startup CEOWordPress 5.0 isn’t the future, it just barely catches WordPress up to the present.WordPress 5.0 and the #gutenberg Content EditorI don’t talk to a lot of my WordPress friends anymore, and when I do, I don’t really talk WordPress with them. The politics of WordPress absolutely bum me out, and I am done fighting with Matt Mullenweg. For those of you who don’t know, I was pretty much blacklisted along with the entire city of San Francisco by WordPress.org and Automattic for reasons that no one has ever fully explained to me. I will save that for another time.I use to be very publicly active in the WordPress community, as I spent a good 5-years of my life running a WordPress startup called CyberChimps, but I got tired of (...)

    #matt-mullenweg #wordpress-web-development #hackernoon


  • #blockchain and Future Tech from the Crow’s Nest with Daniel Jefferies
    https://hackernoon.com/blockchain-and-future-tech-from-the-crows-nest-with-daniel-jefferies-e82

    Episode 14 of the Hacker Noon #podcast: An interview with Science Fiction author, and futurist Daniel Jeffries.Listen to the interview on iTunes, or Google Podcast, or watch on YouTube.In this episode Trent Lapinski and Daniel Jeffries discuss cryptocurrency, blockchain, AI, future #technology, and philosophy.“We need to stop throwing the damn baby out with the bathwater, and assume that decentralized everything just works because it’s decentralized.”“These things that we have now, they are still in their earliest phase. We barely understand them. They are going to evolve into something so mind boggling different from what we have today.”“We have to look to each structure, and abstract out the things that work and create new mitigation systems that solve the problems of the existing ones, and (...)

    #daniel-jefferies #hacker-noon-podcast


  • https://theintercept.com/2018/12/04/jeremy-hammond-stratfor-hack-solitary-confinment

    Last month, [Jeremy Hammond] who has been serving a 10-year prison sentence since 2012 was accused by a guard at a federal detention center of “minor assault,” landing the so-called hacktivist in solitary confinement.

    [...]

    In 2013, Hammond pleaded guilty to hacking the private intelligence firm Stratfor Global Intelligence and other targets. The Stratfor hack lead to numerous revelations, including that the firm spied on activists for major corporations on several occasions.

    [...]

    This week will mark the start of Hammond’s third week in a so-called segregated housing unit — more commonly known as solitary confinement. The United Nations has said that confinement of such length could be considered torture.

    [...]

    In a statement during his sentencing hearing, Hammond referred to his hacking as “acts of civil disobedience and direct action,” describing “an obligation to use my skills to expose and confront injustice and to bring the truth to light.”

    [...]

    Hammond is currently scheduled for release in February 2020.

    #prison #jail #justice #arbitraire #hacker #surveillance #activisme #intercept #hammond #courage #anarchiste #anarchisme


  • 3 Questions About Hacker Noon 2.0
    https://hackernoon.com/3-questions-about-hacker-noon-2-0-ec9a4c453ce?source=rss----3a8144eabfe3

    Hey Stellabelle! Thanks for your contributions to Hacker Noon — have learned a good bit about the history of crypto from you. Jumping in below —1. “One question is how will our previously published articles (in Hacker Noon) be migrated over to your new site?”We back up everything we publish, so we could have a mediocre site live rather quickly. But we’ve hired two developers and are making a better environment worthy of your stories — and that will probably take us until late Q1 2019. Migration starts with ensuring that all links work. Whether some stories lives on subdomain, root domain or another different #hackernoon.com URL structure, our goal is to ensure that all links work in the transition. There are over 1 million backlinks to HackerNoon.com (source, ahrefs.com). We’ve learned a lot about (...)

    #hackernoon-two-point-0 #mediatech #publishing-tech #tech-blog


  • Un piratage compromet les données de centaines de millions de clients du groupe hôtelier Marriott
    https://www.lemonde.fr/pixels/article/2018/11/30/un-piratage-compromet-les-donnees-de-centaines-de-millions-de-clients-du-gro

    Le système de réservation de sa filiale Starwood a été piraté, et jusqu’à 500 millions de clients pourraient être concernés. Il n’en reste pas moins que tous les clients ayant effectué une réservation dans des hôtels de la marque Starwood jusqu’au 10 septembre dernier inclus sont concernés par cette fuite. L’entreprise affirme avoir commencé à les contacter. Des données très précises Selon le groupe, 327 millions de clients ont vu exposées tout ou partie de leurs données à la fois précises et sensibles : leur (...)

    #données #hacking #Marriott


  • The VC Approach In Today’s Tech Markets with Steve Schlafman
    https://hackernoon.com/the-vc-approach-in-todays-tech-markets-with-steve-schlafman-c0366c792c0f

    Episode 13 of the Hacker Noon #podcast: An interview with venture capitalist Steve Schlafman from Primary Ventures.Listen to the interview on iTunes, or Google Podcast, or watch on YouTube.In this episode Trent Lapinski and Steve Schlafman discuss venture capital, leadership, executive coaching, and even mediation.“For me I always ask myself is this an entrepreneur who that is special, talented, tenacious, and on a mission.”“Is this someone who can go and tell a great story, inspire potential employees, investors, partners. Is this someone who people are going to gravitate towards? In a competitive hiring environment, are they going to be able to build a World class team?”“I don’t need to see a huge amount of traction. I need to answer the question: Is there enough evidence or an unique (...)

    #venture-capital #executive-coaching #hacker-noon-podcast #technology


  • Support Independent Tech #media By Investing in Hacker Noon Right Now
    https://hackernoon.com/support-independent-tech-media-by-investing-in-hacker-noon-right-now-151

    Support Independent Tech Media By Investing in Hacker NoonWe at Hacker Noon have created a successful tech blog, providing free stories for readers, quality free distribution for writers, a community-driven editorial line and high performing campaigns for sponsors.Photo CreditOur equity crowdfunding campaign has achieved $676k+ raised from 566 investors. The campaign is still live, and if you’re reading this site right now, I implore you to consider owning a portion of this site. Your investment can help us grow into the #1 independent tech blog on the web and keep us free of platform dependence. All platform dependence and venture investment create bias and vested interest. We want to amplify voices based on merit of their work and their story.We believe NOW is the best time for you to (...)

    #hackernoon #independent-tech-media #independent-media #mediatech


  • I suck at being altruistic…can I still be a civic #hacker?
    https://hackernoon.com/i-suck-at-being-altruistic-can-i-still-be-a-civic-hacker-57dee4ab5a1?sou

    In short, yes.So I’ll share my story briefly.I’ve always been asked why I do what I do. Since I was younger, my ability to empathize and to understand what someone else was feeling has been strong.I was always the neutral party in friend groups and was grateful to have never been bullied to the extent that I some of my dear friends experienced. My role was always to connect but also defend those who needed a shield. I wanted to build space for them to be themselves without external pressures. Just seemed so unfair.I’m sure that little Sarah will agree that my current role as a civic hacker and social entrepreneur aligns with who I’ve been. I’m still connecting and building protective spaces for our communities to take charge of the good we want to see.I watched this last year and I loved what (...)

    #altruism #civic-hacker #life-lessons #hacker-for-good


  • It took seven miles to pull over a Tesla with a seemingly asleep dr...
    https://diasp.eu/p/8120162

    It took seven miles to pull over a Tesla with a seemingly asleep driver

    The driver was arrested for drunk driving. Article word count: 293

    HN Discussion: https://news.ycombinator.com/item?id=18575586 Posted by okket (karma: 34842) Post stats: Points: 92 - Comments: 105 - 2018-12-01T06:42:19Z

    #HackerNews #asleep #driver #miles #over #pull #seemingly #seven #tesla #took #with

    Article content:

    [1]The Tesla Model S.

    The California Highway Patrol on Friday [2]pulled over a Tesla Model S that was traveling down the road—but whose driver appeared to be asleep at the wheel. The vehicle was traveling southbound on Highway 101 in Palo Alto.

    Officers said that they were unable to get the manʼs attention.

    "One of the officers basically ended up going in front of the vehicle and basically (...)


  • Poverty in America: Greater Than Statistics Indicate (https://www.b...
    https://diasp.eu/p/8117473

    Poverty in America: Greater Than Statistics Indicate

    To continue, please click the box below to let us know you’re not a robot.

    HN Discussion: https://news.ycombinator.com/item?id=18571426 Posted by occamschainsaw (karma: 284) Post stats: Points: 130 - Comments: 155 - 2018-11-30T18:44:58Z

    #HackerNews #america #greater #indicate #poverty #statistics #than

    Article content:

    To continue, please click the box below to let us know youʼre not a robot.

    HackerNewsBot debug: Calculated post rank: 138 - Loop: 282 - Rank min: 100 - Author rank: 48