Two years ago, major websites such as Wikipedia and Reddit blacked out their services as a form of digital protest against SOPA, the infamous Stop Online Piracy Act . . . Eventually, the widespread outrage over the bill was acknowledged and Congress knocked it off. Various forms of SOPA attempted to make a comeback since the original proposal back in 2011, but none have made it through. Now, though, SOPA might be making a comeback, but in a much sneakier fashion.In other words, the old SOPA policies would be administered on a voluntary basis, meaning the rule of law on the issue would be outsourced to the arbitrary policies of copyright fundamentalists.
On Thursday, the House Judiciary Committee met to discuss copyright reform, but rather than redesign SOPA, it is instead taking the more sinister route of voluntary commitments from individual entities to comply with a ruleset similarly sinister to SOPA.
Hundreds of open source packages, including the Red Hat, Ubuntu,
and Debian
distributions of Linux, are susceptible to attacks that circumvent the most widely used technology to prevent eavesdropping on the Internet, thanks to an extremely critical vulnerability in a widely used cryptographic code library.
The bug in the GnuTLS library makes it trivial for attackers to bypass secure sockets layer (SSL) and Transport Layer Security (TLS) protections available on websites that depend on the open source package. Initial estimates included in Internet discussions such as this one indicate that more than 200 different operating systems or applications rely on GnuTLS to implement crucial SSL and TLS operations, but it wouldn't be surprising if the actual number is much higher. Web applications, e-mail programs, and other code that use the library are vulnerable to exploits that allow attackers monitoring connections to silently decode encrypted traffic passing between end users and servers.
The bug is the result of commands in a section of the GnuTLS code that verify the authenticity of TLS certificates, which are often known simply as X509 certificates.
distributions of Linux, are susceptible to attacks that circumvent the most widely used technology to prevent eavesdropping on the Internet, thanks to an extremely critical vulnerability in a widely used cryptographic code library.
The bug in the GnuTLS library makes it trivial for attackers to bypass secure sockets layer (SSL) and Transport Layer Security (TLS) protections available on websites that depend on the open source package. Initial estimates included in Internet discussions such as this one indicate that more than 200 different operating systems or applications rely on GnuTLS to implement crucial SSL and TLS operations, but it wouldn't be surprising if the actual number is much higher. Web applications, e-mail programs, and other code that use the library are vulnerable to exploits that allow attackers monitoring connections to silently decode encrypted traffic passing between end users and servers.
The bug is the result of commands in a section of the GnuTLS code that verify the authenticity of TLS certificates, which are often known simply as X509 certificates.