Cryptocurrency Groups Sue Google, Facebook, Twitter and Yandex For Advertising Ban

This is very interesting and about high time.  There is hardly any legal basis to single out the banning of cryptocurrency and ICOs when so many other questionable things are promoted on Google, Facebook and Twitter.  They could have probably gotten away with banning a few confirmed scam coins or ICOs but they’d also have to demonstrate similar action in other industries that they have never done with this.

The allegation of collusion is important and I am very curious how this plays out.  My suspicion is that these actions are voluntary.  The CEOs of these companies were essentially convinced and paid out to it by stakeholders of fiat and traditional securities.  If not that, here would be an interesting defense if they could make such a defense legally in this scenario I propose.  Of course all 3 of the major companies are based in the US and are subject to the laws of the US including being obliged to co-operate by providing the NSA backdoors for spying.  What if under the pretext of national security these companies were forced to ban cryptocurrency advertising?  It may sound far fetched but the US government even wanted to put tariffs on Canada during negotiations for NAFTA under the pre-text of National Security.

It is hard to say for sure what the truth is but I’ll be following these lawsuits as some of the truth may come out in the reply to the claim, discovery and other filings.  One thing I am sure of is that neither company came up with the idea of their own volition.  It would be another thing to prove which external force or entity is really responsible for this.  Financially it makes little sense since they all stood to profit more from the increased advertising revenue so it is very plausible that some other stakeholders made an offer they couldn’t refuse whether in the form of enticement or being obliged by law (even if falsely under the pre-text of national security).

 

Why Deleting Facebook Is Futile Unless…..

I’ve had this conversion with a lot of people over the years and what I’ve found is that the majority of people are complacent about privacy and security.  In a way it is good that some have woken up to what Facebook is and has been doing but this idea of some floated around that “I will trust Facebook until it gave me reason not to”.  This is a completely flawed idea in my opinion.  Facebook was never trustworthy and its TOS always gave it a right to violate your privacy, harvest your data for both government and marketing purposes etc… In fact Google, Gmail, Hotmail, Telegram, Whatsapp and the list goes on are free for a reason.  One, they make money by spying on you and they also provide a great backdoor to the NSA to spy on you (hopefully everyone now understand the PRISM spying network).

There were times where some would debate about the length and depth of spying by major free services but this is no longer in debate.  If you are using these freebie services and just delete Facebook alone you haven’t done enough.

Here are some steps to secure yourself and your privacy:

Delete Everything!

Seriously stop using these free chat and e-mail services and tell your friends and family that you won’t communicate via those mediums.

Secure Your E-mail

Use your very own, owned e-mail server with encryption including GnuPG to encrypt e-mails in both transit and storage.  There are providers who can get you a VPS or full Dedicated Server for this purpose.  You will probably find that your e-mail stops going missing, is fast and more reliable to boot!

Stop Using US Based Massive Cloud Servers

This could be in the form of an Amazon, Microsoft, Alibaba VPS instance but you can expect that those services will not be keeping your data private and most likely have been obliged to allow backdoor access to your server and data.

Another type of user would again be those who “store data in the Microsoft, Google or Apple Cloud”.  Stop using those services if you value your privacy.

Secure Your Chat

Everyone likes instant chat but did you ever wonder why all the traditional chat services like ICQ and MSN Messenger shutdown?  My belief is that being forced to chat on your phone makes it easier to both identify and track you but also to spy on you.  Once again top offenders are Telegram, Whatsapp and any similar ones.

To secure your chat you should run your own encrypted chat server.

These are just a few common sense things you can do to make it much more difficult to have your rights and privacy violated.  Personal and intimate moments shouldn’t be uploaded to the Cloud for corporate and government agencies to peruse!]

In general try to think in a security minded way perhaps as you would your house.  Would you feel secure at home if you knew your living quarters was shared with multiple people or that it was being spied on constantly.   Think about steps you would take to protect your house or property from intruders and spies.  Your digital house works the same way, so be sure to keep the keys and access in your control and not that of a third party which can’t be trusted.

Pablo Escobar’s Brother Trafficks an ICO and new Bitcoin Fork!

Pablo Esobar’s brother makes some very bold claims surrounding his new cryptocurrency launch.

https://www.ccn.com/pablo-escobar-brother-diet-bitcoin/

One of those claims is that Bitcoin was created by the CIA, however this may be contradicted by the fact he also claims he met a Satoshi Nakamoto of Japan.  As proof he shows a Passport bearing the same name:

satoshi-passport

Of course it is possible someone from Japan could be working for the CIA, most people don’t believe a single person created Bitcoin.  So I do think there is credence to believing a large organization such as the CIA or other resourceful and skilled group created Bitcoin (so I call this one plausible).

Some critics have said his website for his coin Diet Bitcoin was nearly copied from the original bitcoin.org and that so are the specs.  I’m going to be fair in that I don’t see how Diet Bitcoin is any worse than other Bitcoin forks such as Bitcoin Gold.  As many know I am against hardforks as I see them as counterfeiting, being confusing and just simply wrong but it also illustrates weaknesses in any currency which can be copied in such a manner (where I believe forks should be impossible to keep the network secure and ensure integrity).

 

 

My Take On WannaCry

Reading media coverage of the WannaCry, ransomware attack has been excruciatingly frustrating because little to no information was offered on how infection happens and how to protect yourself.

This issue has been a bit frustrating and unhelpful as an IT professional and user if I didn’t find the right answers there is something seriously wrong.  I couldn’t find the important information in any of the mainstream articles so certainly a novice or amateur user would have no chance of protecting themselves.

How Did WannaCry Infect and Spread?

Long version here from Malwarebytes

One of the key ways is still the oldest “phishing” trick in the book, via e-mail which many users are tricked into opening infected attachments.  This was not readily available in media coverage and this simple warning or announcement could have prevented a lot of new infections.  I believe this is a key factor that has not been discussed since many networks will be behind NAT and external SMB services would be blocked, having users on the LAN install the worm is an easy way to get inside and spread the infection to areas that are hardened on the outside.

The more technical explanation there is an exploit called “ETERNALBLUE” which was a hacking tool leaked from the NSA which exploited a weakness in Microsoft’s implementation of SMB (Server Message Block/filesharing protocol).   This has been widely reported but the simple way to prevent automatic infection through this method has not.

Once infected the worm essentially scans your LAN and then the internet to spread the infection further which quickly multiplied the damage and scope of this attack.

How to protect yourself?

  1. First and foremost is to update your Microsoft Windows regardless of OS (whether you have XP, Vista, 7, 10, 12 or any Server) because all Microsoft versions are apparently impacted by MS17-010 ETERNALBLUE/WannaCry
  2. Disable SMB/Filesharing in Windows and if that is not possible at least use firewall settings to block SMB/filesharing/CIFS.
  3. If the above is not possible you should physically unplug any impacted machines from the network (it could be a simple as disabling all ports on your network/switch or even unplugging entire switches if possible).

Who is to blame?

There is plenty of blame to go around but currently a lot of it is coming from Microsoft who is blaming users for not patching and the NSA for hoarding these exploits and not notifying them or users beforehand.

In all fairness Microsoft did issue patches for even unsupported OS’s like Vista and XP on March 14th, 2017.

Many have mused that the NSA should have at last notified Microsoft the moment they realized their hacking tools were leaked.

At the end of the day the question is how could Microsoft have left open such a serious vulnerability for so long?  Was it an intentional backdoor and was it collaboration between Microsoft and the NSA or other third parties?

Some Can’t Patch

Some systems may be running on internal networks on their own LAN but were still infected so they wouldn’t be patched.  To make matters worse the chances are these would more likely be critical data and infrastructure that are impacted in this case.

Other machines are not managed properly or remotely and are deployed with internet access making them sitting ducks for these types of attacks.

There are also some who just don’t patch because the risk to impacting existing services is too great.  Although I would argue the risk is much higher to not patch and not upgrade or migrate your applications to a more secure platform if you get hit with ransomware like this.

These Issues Are Nothing New

With the Snowden revelations many have worried that US tech companies being forced to provide backdoor access to the NSA would be vulnerable should other hackers discovery the vulnerabilities or intentional backdoors on their own, or in this case when the tools and exploits were somehow leaked.

In the wider scope of things Microsoft has seen worms of this scale in the past, it’s nothing new.  There are no worldwide protocols for notifying users or defending against such worms and this will certainly become an increasingly problem with more and more devices online especially with IoT and so many devices that are connected that we don’t think about, and that don’t get patched or may not have an easy or automatic way of updating.