Networking: 5 Wifi Securty Myths and the Crypto-Solution

PC World takes on some apparently popular wifi network security myths.  Excerpt:
Wi-Fi has evolved over the years, and so have the techniques for securing your wireless network. An Internet search could unearth information that’s outdated and no longer secure or relevant, or that’s simply a myth.

We’ll separate the signal from the noise and show you the most current and effective means of securing your Wi-Fi network . . . 

It concludes with a call for encryption:

Now that we’ve dispensed with five Wi-Fi security myths, let’s discuss the best way to secure your wireless network: encryption. Encrypting—essentially scrambling—the data traveling over your network is powerful way to prevent eavesdroppers from accessing data in a meaningful form. Though they might succeed in intercepting and capturing a copy of the data transmission, they won’t be able to read the information, capture your login passwords, or hijack your accounts unless they have the encryption key . . . 

NSA Defends Its Attacks Against Anonymous Networks

The Director of National Intelligence defends the NSA's attacks against anonymous networks.  From Allthingsd:
The National Security Agency may have attempted to penetrate and compromise a widely used network designed to protect the anonymity of its users, but it was only because terrorists and criminals use it, too.

That’s the explanation from Director of National Intelligence James Clapper about the recently disclosed attacks by the NSA and its companion agency in the U.K. against The Onion Router, or Tor, a network that uses a constantly changing list of specially configured servers to relay and anonymize the Internet traffic of its users.

In a statement posted to the DNI’s blog, Clapper acknowledged NSA’s “interest in tools used to facilitate anonymous online communication.” However, media coverage of the work fails to point out that “the Intelligence Community’s interest in online anonymity services and other online communication and networking tools is based on the undeniable fact that these are the tools our adversaries use to communicate and coordinate attacks against the United States and our allies.”
Perhaps that may sound reasonable, until you realize that by "our adversaries" the NSA basically means EVERYONE, including all US citizens.  Recall this piece from the Guardian:
Since 2011, the total spending on Sigint enabling has topped $800m. The program "actively engages US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs", the document states. None of the companies involved in such partnerships are named; these details are guarded by still higher levels of classification.
Among other things, the program is designed to "insert vulnerabilities into commercial encryption systems". These would be known to the NSA, but to no one else, including ordinary customers, who are tellingly referred to in the document as "adversaries".
The NSA is the man in the middle . . .

Stop the Trans-Pacific Partnership's Attack on Open Internet

From the Electronic Frontier Foundation:
President Obama was scheduled to meet with the leaders of the other eleven countries negotiating the Trans-Pacific Partnership agreement ahead of the Asia-Pacific Economic Cooperation (APEC) meeting in Bali, supposedly to plan the “end-game” for this massive trade deal. However, he has made a sudden decision to cancel his trip, claiming that this was a casualty of the government shutdown. Obama's announcement adds to the impression that goal of completing TPP at APEC has become unobtainable and reveal how precariously the negotiations are going.
There are reports that the remaining TPP country leaders who will be attending the APEC meeting will still be convening “with the aim of hammering out a framework.” As we've also previously mentioned, smaller issue-specific intersessional meetings have also grown more frequent and gone even further underground. So while the news of his trip getting cancelled is indeed welcome news, the TPP still could be signed even as its contents remain hidden from the public.
We only know what kind of copyright enforcement provisions are in this agreement due to leaks, but what we do know for sure is that this agreement is driven by corporate interests who want to enact their own digital policy standards through an undemocratic, backdoor process. We need to spread the word about the TPP far and wide . . . 

Silk Road Shutdown an Opportunity for Black Market Internet Entrepreneurs

Nature abhors a vacuum.  With the shutdown of Silk Road, we are likely to see some copy cats spring up across the web.  From the Guardian:
Although it was certainly the most high profile, Silk Road was not the first illegal marketplace hidden within the dark web or on the open internet.
"Silk Road will almost certainly be replaced by a copycat-like site, as has been the case in carder markets where people trade fraudulent credit card information. Those kinds of places have been shut down in the past and very, very quickly replaced by others," said Rik Ferguson, vice-president of security research at Trend Micro, talking to the Guardian.
Sites similar to Silk Road already exist within the Tor network. Two stores called Atlantis and Sheep Marketplace offer illegal drugs, equipment and services akin to Silk Road.
However, some sites go further – Bitcoin-powered shop called Black Market Road, for instance, also sells illegal weapons, something Silk Road withdrew after high profile shootings in the US.

Adobe Hacked: Data on 3 Million Customers Compromised

From Adobe:
Cyber attacks are one of the unfortunate realities of doing business today. Given the profile and widespread use of many of our products, Adobe has attracted increasing attention from cyber attackers. Very recently, Adobe’s security team discovered sophisticated attacks on our network, involving the illegal access of customer information as well as source code for numerous Adobe products. We believe these attacks may be related.
Our investigation currently indicates that the attackers accessed Adobe customer IDs and encrypted passwords on our systems. We also believe the attackers removed from our systems certain information relating to 2.9 million Adobe customers, including customer names, encrypted credit or debit card numbers, expiration dates, and other information relating to customer orders. At this time, we do not believe the attackers removed decrypted credit or debit card numbers from our systems. We deeply regret that this incident occurred. We’re working diligently internally, as well as with external partners and law enforcement, to address the incident . . . 

FBI Seizes Silk Road, Arrests Operator

From The Orlando Sentinel:
U.S. law enforcement authorities have shut down "Silk Road," an anonymous Internet marketplace for illegal drugs like heroin and cocaine and criminal activities such as murder for hire, and arrested its alleged owner.

The Federal Bureau of Investigation said Wednesday it arrested Silk Road owner, Ross William Ulbricht, 29, known online as "Dread Pirate Roberts," in San Francisco on Tuesday, according to court filings.

Ulbricht, who holds an advanced degree in chemical engineering, appeared in federal court on Wednesday and a bail hearing was set for Friday.

BitTorrent: Secure Chat App on the Way?

From CNET:
The aftermath of the NSA spying revelations has people and companies scrambling for ways to create more secure communications, which has led BitTorrent to build a instant-message chat client that follows the torrenting principle of decentralized data transfer.
The first release of BitTorrent Chat is a private alpha, meaning you have to go to the BitTorrent Chat sign-up page to get an invite, which will take you to a download.  The client uses the concept of decentralized technology that's at the heart of torrents to run instant messages between people . . .