Technology

Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - 19 hours 39 min ago
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - 19 hours 39 min ago
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - 19 hours 39 min ago
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - 19 hours 39 min ago
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - 19 hours 39 min ago
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - 19 hours 39 min ago
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - 19 hours 39 min ago
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - 19 hours 39 min ago
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - 19 hours 39 min ago
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - 19 hours 39 min ago
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - 19 hours 39 min ago
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








Security Company Tries To Hide Flaws By Threatening Infringement Suit

Slashdot - 19 hours 39 min ago
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License. The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Read more of this story at Slashdot.








We rode a $10,000 hoverboard, and you can too

Engadget - 19 hours 39 min ago
It's impossible to talk about hoverboards without invoking a particular movie title, so we're not even going to try: Remember that awesome scene from Back to the Future Part II? It's one step closer to reality: A California startup just built a real,...

GrabTaxi Raises $65 Million To Increase The Competition With Uber In Southeast Asia

TechCrunch - 19 hours 58 min ago
 You’d be forgiven for thinking that the taxi app war is exclusively a U.S. phenomenon, such is the fierce battle between Uber and Lyft, but similar rivalries are actually ongoing across other parts of the world. The battle is heating up in Southeast Asia today, after GrabTaxi — a Malaysia-headquarted company that is active in six countries — announced a $65 million… Read More

A Look At Orion's Launch Abort System

Slashdot - Mon, 10/20/2014 - 11:40pm
An anonymous reader writes: With the construction of Orion, NASA's new manned spacecraft, comes the creation of a new Launch Abort System — the part of the vehicle that will get future astronauts back to Earth safely if there's a problem at launch. The Planetary Society's Jason Davis describes it: "When Orion reaches the apex of its abort flight, it is allowed to make its 180-degree flip. The capsule of astronauts, who have already realized they will not go to space today, experience a brief moment of weightlessness before the capsule starts falling back to Earth, heat shield down. The jettison motor fires, pulling the LAS away from Orion. ... Orion, meanwhile, sheds its Forward Bay Cover, a ring at the top of the capsule protecting the parachutes. Two drogue chutes deploy, stabilizing the wobbling capsule. The drogues pull out Orion's three main chutes, no doubt eliciting a sigh of relief from the spacecraft's occupants."

Read more of this story at Slashdot.








Audi RS 7 proves it needs no driver to go racing

Engadget - Mon, 10/20/2014 - 11:12pm
Audi's execs must have toasted to their autonomous car's success this weekend, because the self-driving RS 7 has successfully conquered the Hockenheimring racing circuit in Germany. While the company's announcement doesn't get into specifics, it says...

32 Cities Want To Challenge Big Telecom, Build Their Own Gigabit Networks

Slashdot - Mon, 10/20/2014 - 10:26pm
Jason Koebler writes: More than two dozen cities in 19 states announced today that they're sick of big telecom skipping them over for internet infrastructure upgrades and would like to build gigabit fiber networks themselves and help other cities follow their lead. The Next Century Cities coalition, which includes a couple cities that already have gigabit fiber internet for their residents, was devised to help communities who want to build their own broadband networks navigate logistical and legal challenges to doing so.

Read more of this story at Slashdot.








32 Cities Want To Challenge Big Telecom, Build Their Own Gigabit Networks

Slashdot - Mon, 10/20/2014 - 10:26pm
Jason Koebler writes: More than two dozen cities in 19 states announced today that they're sick of big telecom skipping them over for internet infrastructure upgrades and would like to build gigabit fiber networks themselves and help other cities follow their lead. The Next Century Cities coalition, which includes a couple cities that already have gigabit fiber internet for their residents, was devised to help communities who want to build their own broadband networks navigate logistical and legal challenges to doing so.

Read more of this story at Slashdot.








32 Cities Want To Challenge Big Telecom, Build Their Own Gigabit Networks

Slashdot - Mon, 10/20/2014 - 10:26pm
Jason Koebler writes: More than two dozen cities in 19 states announced today that they're sick of big telecom skipping them over for internet infrastructure upgrades and would like to build gigabit fiber networks themselves and help other cities follow their lead. The Next Century Cities coalition, which includes a couple cities that already have gigabit fiber internet for their residents, was devised to help communities who want to build their own broadband networks navigate logistical and legal challenges to doing so.

Read more of this story at Slashdot.








32 Cities Want To Challenge Big Telecom, Build Their Own Gigabit Networks

Slashdot - Mon, 10/20/2014 - 10:26pm
Jason Koebler writes: More than two dozen cities in 19 states announced today that they're sick of big telecom skipping them over for internet infrastructure upgrades and would like to build gigabit fiber networks themselves and help other cities follow their lead. The Next Century Cities coalition, which includes a couple cities that already have gigabit fiber internet for their residents, was devised to help communities who want to build their own broadband networks navigate logistical and legal challenges to doing so.

Read more of this story at Slashdot.