Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

November 28 2016

YYY
16:07
2916 1ebe 350
Reposted frompleple pleple viapischus pischus

November 27 2016

YYY
21:11
Can you imagine the moment when you’ve just met an attractive stranger at a party, or you’re online looking for someone, anyone, but you don’t ask: ‘So, what do you do?’

We won’t have any answers until we acknowledge that work now means everything to us – and that hereafter it can’t.

— Fuck work Economists believe in full employment. Americans think that work builds character. But what if jobs aren’t working anymore? https://aeon.co/essays/what-if-jobs-are-not-the-solution-but-the-problem

November 23 2016

YYY
21:07
Craigslist, Wikipedia, and the Abundance Economy
Craigslist, Wikipedia, and the Abundance Economy
YYY
20:35

In seinem Buch The Society of Mind (deutscher Titel: Mentopolis) stellte Minsky 1986 die These auf, dass Intelligenz aus einem verwobenen Netz von unintelligenten Agenten bestehe. Erst durch die Zusammenarbeit von relativ einfachen Agenten entstehe die Intelligenz. Minsky versucht den Leser von der gewöhnlichen Vorstellung abzubringen, dass das menschliche Gehirn ein einzelnes, großes monolithisches Wesen ist, das an etwas denkt oder gerade nicht denkt. Stattdessen wird ein Modell skizziert, bei dem das Gehirn aus unzähligen, verschiedenartigen, aber relativ einfachen Agenten besteht.


https://de.wikipedia.org/wiki/Marvin_Minsky
Reposted fromdoener doener
YYY
20:28
3973 181a 350
Reposted fromlokrund2015 lokrund2015 viadoener doener

November 01 2016

YYY
21:14
https://blog.fefe.de/?ts=a6e995d3

October 25 2016

YYY
14:28

You Might Not Be Able To Read This


Early today, some party unleashed a massive DDoS attack against Dyn, a major DNS host. This led to a number of websites being completely inaccessible. DNS is the backbone of the Internet. It is the phone book that turns URLs into IP addresses. Without it, the Internet still works, but you won’t be able to find anything.

http://hackaday.com/2016/10/21/you-might-not-be-able-to-read-this/
YYY
14:26

Someone Is Learning How to Take Down the Internet

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don't know who is doing this, but it feels like a large nation state. China or Russia would be my first guesses.

First, a little background. If you want to take a network off the Internet, the easiest way to do it is with a distributed denial-of-service attack (DDoS). Like the name says, this is an attack designed to prevent legitimate users from getting to the site. There are subtleties, but basically it means blasting so much data at the site that it's overwhelmed. These attacks are not new: hackers do this to sites they don't like, and criminals have done it as a method of extortion. There is an entire industry, with an arsenal of technologies, devoted to DDoS defense. But largely it's a matter of bandwidth. If the attacker has a bigger fire hose of data than the defender has, the attacker wins.

Recently, some of the major companies that provide the basic infrastructure that makes the Internet work have seen an increase in DDoS attacks against them. Moreover, they have seen a certain profile of attacks. These attacks are significantly larger than the ones they're used to seeing. They last longer. They're more sophisticated. And they look like probing. One week, the attack would start at a particular level of attack and slowly ramp up before stopping. The next week, it would start at that higher point and continue. And so on, along those lines, as if the attacker were looking for the exact point of failure.

The attacks are also configured in such a way as to see what the company's total defenses are. There are many different ways to launch a DDoS attack. The more attack vectors you employ simultaneously, the more different defenses the defender has to counter with. These companies are seeing more attacks using three or four different vectors. This means that the companies have to use everything they've got to defend themselves. They can't hold anything back. They're forced to demonstrate their defense capabilities for the attacker.

I am unable to give details, because these companies spoke with me under condition of anonymity. But this all is consistent with what Verisign is reporting. Verisign is the registrar for many popular top-level Internet domains, like .com and .net. If it goes down, there's a global blackout of all websites and e-mail addresses in the most common top-level domains. Every quarter, Verisign publishes a DDoS trends report. While its publication doesn't have the level of detail I heard from the companies I spoke with, the trends are the same: "in Q2 2016, attacks continued to become more frequent, persistent, and complex."

There's more. One company told me about a variety of probing attacks in addition to the DDoS attacks: testing the ability to manipulate Internet addresses and routes, seeing how long it takes the defenders to respond, and so on. Someone is extensively testing the core defensive capabilities of the companies that provide critical Internet services.

Who would do this? It doesn't seem like something an activist, criminal, or researcher would do. Profiling core infrastructure is common practice in espionage and intelligence gathering. It's not normal for companies to do that. Furthermore, the size and scale of these probes -- and especially their persistence -- points to state actors. It feels like a nation's military cybercommand trying to calibrate its weaponry in the case of cyberwar. It reminds me of the US's Cold War program of flying high-altitude planes over the Soviet Union to force their air-defense systems to turn on, to map their capabilities.

What can we do about this? Nothing, really. We don't know where the attacks come from. The data I see suggests China, an assessment shared by the people I spoke with. On the other hand, it's possible to disguise the country of origin for these sorts of attacks. The NSA, which has more surveillance in the Internet backbone than everyone else combined, probably has a better idea, but unless the US decides to make an international incident over this, we won't see any attribution.

But this is happening. And people should know.

https://www.schneier.com/blog/archives/2016/09/someone_is_lear.html

October 21 2016

YYY
13:44
Play fullscreen
and some funny trash because it's Friday ;-)
YYY
11:03
YYY
11:01
Play fullscreen
Reposted byjuliKrebs

October 18 2016

YYY
21:38
Play fullscreen
Religionskritik 101
Reposted fromjuli juli

October 16 2016

YYY
19:45
3851 71b6 350
Reposted fromswissfondue swissfondue viamalschauen2 malschauen2
YYY
19:44
0847 aaf3 350
Reposted fromqb qb viamalschauen2 malschauen2
YYY
19:44

October 13 2016

YYY
09:42
http://blog.fefe.de/?ts=a900636d
Reposted byhubi hubi

October 02 2016

YYY
20:48
„Der große Feind der Liebe ist die Romantik (…) Sie lehrt uns, dass wahre Liebe ohne Worte auskommt und eine perfekte Beziehung aus einer mystischen Vereinigung zweier Seelen besteht. Das ist wenig hilfreich“
— Alain de Botton
Reposted fromjuli juli
YYY
20:48
YYY
18:28
5017 1ed6 350
Reposted fromsidus sidus

October 01 2016

YYY
10:07
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl