Computing woo

From RationalWiki - Reading time: 22 min

Style over substance
Pseudoscience
Icon pseudoscience.svg
Popular pseudosciences
Random examples
We need the best
Technology
Icon Tech Portal.svg
Programming for Dummies

Computing woo refers to a range of pseudoscientific practices and urban legends associated with computing, especially computer security.

Technical support[edit]

The world of technical support is a magical place. User[Who?] beliefs include:

  • IT watches everything.[1][better source needed]
  • IT watches nothing.[2] A weirdly large number of people think it's ok to access porn on their work computers, for instance.[3]
  • Users control their computers and tech support has no responsibility.[4] It's common for tech support and software companies to blame users for how their computers are configured or customised ("The user broke it"), but research shows this is largely the fault of brittle software design (where even the slightest difference from developers' or adminstrators' ideal systems causes disaster) that causes significant problems for businesses.[5]
  • Users do not control their computers, most likely because Russian botnets or IT does. Research has shown users are often excessively paranoid about viruses, hacking, and other attacks on their computers, and will blame innocuous computer behavior on external attacks ("It's running a bit slow, it must have been hacked!"). A 2019 study found that in many cases users and experts were in agreement about causes of common computer problems, but "when users perceived attacks, experts were often likely to disagree".[6]
  • Technicians can understand user requests via telepathy. To be fair, IT often has advanced background information gathering tools and supporting data that is indistinguishable from magic to many users.[more detail please] But often users and IT departments are painfully unable to communicate.
  • Apple Inc. products don't need technical support because they're so easy to use and so reliable.[7]

Programming[edit]

Technicians and software developers, many of whom consider themselves rational logical thinkers, are not immune from all kinds of sloppy thinking and superstitions. And among most people there is little conception what's involved in programming, to the point that the moviegoing public can accept the idea that a sufficiently good programmer can write a virus for a completely alien operating system, in a completely alien language, and have it work right the first time.[note 1]

Heisenbugs[edit]

HeisenbugsWikipedia are issues that never seem the same when you attempt to study them. Often it appears that the computer is doing this to spite the programmer or simply following Murphy's Law, but there are sound reasons why sometimes programs work differently in the wild than they do when a programmer is attempting to analyse or debug them: subtle changes in timing caused by software or hardware debuggers, differences between debug and release builds, differences between test systems and the computers onto which the end product is deployed, even changes in the electrical characteristics of hardware when a debugger is attached.[8]

Cargo cult programming[edit]

Cargo cult programmingWikipedia is the style of programming where you do something that worked before without understanding why it worked or indeed any real understanding of programming, software, systems, or technology.[9] In the olden days, people built cathedrals by a variety of informal techniques, including rules of thumb, copying existing buildings, and trial and error (rebuilding if the product fell down), but these days we have civil engineers. Sadly, software is still often developed according to 14th century principles.

"It works on my machine"[edit]

Some programmers and IT have a tendency to assume that because code will run on one computer, that if it doesn't run on another one, that the other one is broken. It's usually the opposite. If you have code that runs on your personal computer but not on other machines, it is probably doing something dangerous that should cause segmentation faults or similar, but somehow is being allowed to do it. Alternatively, it may be set up in a way that is peculiar to the settings and file system on your machine.

Internationalization[edit]

There are numerous cases where misconceptions about names, time, addresses, maps, gender and more can cause problems.[10] There are many reasons why something which seems reasonable to a white, male, English-speaking programmer near the Greenwich meridian might not work for other people. On the other hand, of course, certain of these supposed "misconceptions" are hard requirements in the context of the software. For example, Icelandic government software may require that Icelandic names are used, as the Icelandic government has that requirement as well, and absolutely reject strings with characters foreign to Icelandic from being used as names.

  • Names. Not everybody has two names, for instance in Indonesia where mononyms are common.[11] Even in western Europe, not everybody has a middle name, while other people have lots. Some names consist of multiple words (Lloyd George, Anne Marie), or start with a lower-case letter (de Witt), or have internal capitals (MacGregor). In many countries family names come before personal names (e.g. Hungary, Japan, China). For the reasons given, sorting names is really hard, and different languages have different alphabetization rules (regarding non-Latin characters, particles like "von" and "de", and which name to sort by). Many names aren't written in the standard Latin alphabet or the official character set of whatever country you're programming in. Some people have two different names (professional and personal, or different names in different languages - even in the UK where some people may use both English and Gaelic forms of their name) or no canonical name. People have commonly-used nicknames. People may be known by a middle name rather than their first name. Some people have really long names but others have single-letter names. Two different people can have exactly the same name. People change names (and this isn't unusual, particularly for women). Parents don't always have the same surname as their children. Any of these is a potential problem with any system that requires you to enter a name in a specific format, which processes names, or which attempts to judge what is a valid name.[12]
  • Gender. These days a binary choice between male and female just won't cut it. And some people even change their gender, which causes problems for systems that were built on the assumption that everybody continues with one of 2 options from birth. It also doesn't pay to make assumptions about sexuality, although this might be limited to crappy dating applications which don't recognise that bisexual people exist.
  • It helps if software can handle multiple time zones, and cases where people move between time zones, as well as daylight saving time (which starts and ends at different dates in different places). Some nations have timezones that aren't a whole number of hours off from GMT (e.g. India).[13] Also leap years and maybe even leap seconds (not important in a diary but more crucial in GPS). And what happens when your program is running when daylight savings time begins or ends? Surely nobody will be using software at 1 in the morning? And tell your grandchildren to remember the Y2K bug in the 2090s.
  • Some organisations such as the US Postal Service attempt to rigidly enforce street address formats.[14] However in other parts of the world there is little standardization, so software which assumes a particular address structure will die horribly. Even in the UK, some houses have only a name not a number or don't have a street (e.g. a farm or other rural property), not all flats (apartments) have numbers (in Scotland elaborate descriptors such as 1F2 for first floor flat 2 can be used), units on industrial estates often have a unit number and a street number, multiple towns have the same name or almost the same name[15], different sides of the same road have different names, sometimes you get 2 neighbouring villages with the same street, and some addresses have lots of parts or are really long. In other countries where many properties don't have a number or street name it's even worse. And what happens when a new house or postcode district is built?
  • Some people, particularly those born in poorer or war-torn countries, may not know their age or date of birth.[16] This will cause problems if you try to use dates of birth to disambiguate between different people (you have 5 Muhammed Alis all born on Jan 1st?) Not everybody has a social security number or National Insurance number or whatever else you want to use to uniquely identify people; and social security numbers don't map 1:1 with people.[17]
  • Language. Some countries use multiple languages. Conversely, the same language may differ between countries (e.g. UK vs US English), or be written in different ways (multiple rounds of Chinese character simplification in the PRC ignored in Taiwan and elsewhere).[18] Different speakers of the same language have different accents and dialects, which causes problems for speech recognition.[19] The same text translated into a different language is often a different length, a mundane problem that can be a nightmare for programmers and user interface designers. Characters in different languages can be confused for each other and general-purpose international character encoding schemes like Unicode are so complicated that it's pretty much impossible to avoid vulnerabilities, which is a particular problem in URLs where you may end up going to the wrong website and give all your personal information to hackers.[20]

BadBIOS[edit]

BadBIOSWikipedia is firmware malware that was created by Ruiu ... in his head. Individuals like Ruiu are extremely concerned about malicious firmware from hackers and the NSA to the point of literal paranoia.

Origin[edit]

According to Ruiu (@dragosr on twitter), BadBIOS is a rootkit that can infect computers without bluetooth, ethernet, or Wi-Fi. Instead it can infect other computers by emitting "ultrasonic sound [...] from the device's loudspeakers". Computers nearby somehow pick up the sound via the speakers and thus get infected. Ruiu suspected his computers were infected with BadBIOS once his computers were acting strange.[21] Ruiu later provided data dumps of his BIOS only to have experts reveal it was normal data. Ruiu then countered stating that the malware probably erased itself whenever he tried to make a data dump.[22] While these claims are not outside the realm of science fiction, Ruiu has not provided a silver bullet, only speculation. Despite this, his reputation seems to be intact somehow.

Years later, Ruiu came to the conclusion that BadBIOS can also contaminate USBWikipedia, through some way of knowing...[23]

The subreddit[edit]

Yep, /r/badBIOS/ is a subreddit for a malware that probably never existed! Unsurprisingly, it's inhabited by some users who think that one weird thing in a computer means infected malware. These people are generally paranoid, judging by the threads:

  • User thinks hackers infected his ... mp4 file because it got corrupted.[24] OP blatantly states they used a dirty electricity filter to evade hacking. Ironically, his means to evade being hacked is the reason why he thinks he got hacked — having poor connection to an external device can disconnect a device when it's not ready, resulting in corrupted file.[citation needed]
  • A user claims that they're picking up ultrasonic sound ... must be badBIOS![25] Ultrasonic sound is just high-frequency sound above the human hearing range. There are other (plausible) sources of such frequencies such as bats or some electric appliances, like certain kinds of TV.
  • "Neuroimaging tech will soon be able to decode our thoughts"[26] An example of just how paranoid this subreddit is.

Truth to it[edit]

Despite Ruiu's paranoia, there is truth to the madness:

  • Through an "internal NSA catalog", the NSA performs firmware attacks through backdoors thus confirming proof that such attacks do exist. Unlike BadBIOS, these attacks are actually detectable and actually have documentation; however, certain tools in the catalog require tools priced as high as $250,000 USD, something not to be wasted on the average Joe. Despite this discovery, it doesn't confirm Ruiu's brain fart that has no evidence.[27][28][29][22]
  • In the paper Journal of Communication, Michael Hanspach and Michael Goetz showed that BadBIOS is possible but only at 20 bps.[30]
  • It is possible for computers to communicate data via ultrasound. For example, the Cisco Proximity videoconferencing software uses ultrasound to coordinate computers and VTC equipment in conference rooms. [31]

Deep web[edit]

See the main article on this topic: Deep web

Cargo cult paranoid computer security practices are often advocated by naive internet denizens and trolls towards even more naive newcomers. High profile attacks aimed at Tor hidden services Operation OnymousWikipedia as well as large attacks on users such as the FBI's legally dubious network investigation malware[32] has created an association of insecurity and surveillance associated with what is in fact one of the most secure and surveillance-resistant networks ever created.

Prospective explorers often ask if they should put tape over their webcam or use TailsWikipedia in order to 'safely' explore the dark web. They will fixate on how technological configurations can secure their machines, but are entirely clueless about vectors such as password reuse, identity segregation or how to verify safety of file downloads.

Such common misconceptions stem from limited public understanding of threat modellingWikipedia, privacy and practical computer security. As such, there is a massive market for bloggers and YouTube charlatans such as Takedownman to offer off-the-shelf tips which increase the user's feeling of security.

Every day, an intrepid dark web explorer will read that the US Navy funded the initial creation of the Tor network and fancy themselves the next Edward Snowden by disseminating this information.[33]

Hackers and viruses[edit]

Russian Orthodox Leader Sprays Holy Water on Government Computers to Magically Stop WannaCry Attack.[34] Or maybe to keep their missiles from crashing into the Firmament.
Criminal hackers don't wear balaclavas except when it's cold or they are being ironic. Also, typing with gloves on is really annoying.[citation NOT needed]

Due to the low understanding of what hackers do and how viruses and malware works, it has been a relatively accepted trope for someone to claim their account was hacked as a get-out-jail-free card in the event of certain drug-fuelled rants and dramas.[35]

Some computer users will attribute changes to their computer to malevolent forces in a method comparable to astrology when it comes to rationalising changing and intermittent issues.

Of course, in a video gaming context, anyone who is better than you is a hacker.

There is a small number of 'anti-updaters', an anti-vaccination movement-like contingent of people arguing against automatically updating applications due to the misplaced belief that significant numbers of people care to manually review and install all patches.[36][37] Patches and updates are generally good, except maybe if you're working with the CIA.[38] Yes, there are occasions where an update breaks something that was working before or causes other mischief, but by and large updates are something you want: they fix problems and improve the security of your system.

Cryptography[edit]

See the main article on this topic: Cryptography

Depending on who you ask, encryption can be anything from the largest piece of social good modern mathematics has ever produced to a dangerous weapon utilised by terrorists[39] and child abusers[39] in order to evade justice which must be carefully controlled.

In the early days of strong cryptography, the US government attempted to issue export bans, classifying the technology as akin of munitions.[40] While such bans were overturned in 1992, it wasn't until the rise of ubiquitous personal computing that governments would once again characterize mathematics as a dangerous tool.

The 2010s saw an increased call from politicians[Who?] around the world to backdoorWikipedia common encryption software.[41] From the encrypted-by-default iPhone[42] through to bans on WhatsAppWikipedia[43] in Brazil[44] and proposed and later withdrawn in the UK,[45] governments around the world remain convinced they can create a secure back door into software to counter criminals; however, it's not like backdoors are only exclusive to government agencies.

Said statements could be considered rhetoric to coerce tech giants deeper into mass surveillance programs, and less charitably as mathematical denialism from senior elected officials.

Monitoring your Internet usage[edit]

How much do your teachers, coworkers, employers, or other people really know about what you do online?

"The Internet" is really an inter-network, or a network of networks.[note 2] Your home Internet, the free WiFi at a coffee shop, your campus or work networks, etc. are all networks that talk to other networks. When you view a website, check your email, or chat with your friends, your computer achieves that by sending traffic from your network to someone else's, and routing it through every network in between.

Anyone with control of the network can try to figure out what kind of traffic you're sending, where it's going, and what's in it. The modern Internet is moving toward HTTPSWikipedia by default, which is an attempt to make things more secure. If your browser reports that your connection is "secure" or "insecure", it's talking about HTTPS specifically. It doesn't mean that there's no chance that anyone can intercept what you're doing. By analogy, you're writing letters to a friend, and passing them through the hands of a series of strangers. By agreement, everyone has agreed not to tamper with the contents of the letter. HTTPS lets you seal the letter from (most) prying eyes, but does nothing to hide which friend you're mailing.

There are good reasons for network administrators to monitor what goes into or out of their networks. If someone downloads and runs malware from an unsafe site, it puts the whole network at risk. If an employee does something illegal with their computers, their employer might be implicated. Few admins should have any kind of interest in spying on individual users, but every good admin has an interest in a safe and healthy network.

Email security[edit]

Who can read your email? Whoever provides you with email services, for starters. Microsoft read a blogger's Hotmail inbox in 2012, suspecting a software leak.[46] Ironically, around this same time, Microsoft was running the ScroogledWikipedia ad campaign, attacking Gmail for using inbox contents to serve up targeted ads. It also defended its own right to read your mail.[47]

Email alternatives such as Slack might also expose even direct messages to your boss.[48]

Secure email and instant-messaging tools do exist, but no security system is absolute.

Web filtering[edit]

Web filtering is a magical solution to all the world's problems. Simply by stopping people (particularly children, but also library patrons) reaching the wrong website you can prevent sexual depravity bringing about the fall of modern civilisation, and prevent terrorism. Companies including Impero, Future Digital, and Securus sell "anti-radicalisation software" which prevents children reading about Islamist terrorism'.[49] According to online security company Akamai, British law requires schools and universities to consider the use of such software.[50] Whether Akamai is an unbiased source of legal advice is for you to judge.

The traditional use of such software is to block access to pornography online, but such filters are pathetically useless. A British newspaper report complained that one filter blocked searches for "sex education" but allowed explicit searches in Spanish; it concluded they provide false security and could be easily circumvented (as anybody who knows anything about children could tell you). More seriously, anti-porn filters may discourage children from talking to their parents and actually promote porn addiction: "Filters can also encourage secrecy, deception and shame – key conditions for nurturing dependency or even potential addiction."[51] Because the naughtiness is half the reason why porn is appealing. There is also the simple solution of getting around a porn filter by getting a friend to let you watch porn at their house.

Web filters also rarely if ever consider the blocking of pornography or jihadism to be their first priority. The majority of their efforts go to the blocking of websites offering alternative proxies and websites offering translation software. The former because it allows people to easily and perhaps even unintentionally bypass these filters and the latter because they often allow for diverse translations of the thing that people want to be censored and thus increase exponentially the work required to censor everything. Even more worrying is that some have them by default, meaning that no matter what you do, you won't be able to access Babelfish.[52]

You'll be glad to know that the best in the business who have a firm place in the international market are currently selling their software to dictatorships that want to avoid their citizens reading about any information that might potentially harm the way the government is perceived by its citizens. [53] On the plus side, since these governments are spending their time with censoring internet traffic and they will never be able to fully do so anyway, this is often accompanied with a more uncensored traditional press and television. However, one might still question why democratic governments support something that is partially marketed to dictators.

CVE misuse[edit]

CVE (Common Vulnerabilities and Exposures) is a system developed to create unique identifier codes to facilitate exact communications about vulnerabilities and to enable the synchronization of different vulnerability databases, as well as to evaluate the interoperability of vulnerability database tools and services.[54] While CVEs are an useful tool for their intended purpose, some laymen sometimes confuse it for a some kind of statistic while arguing for their favorite or against their disfavored software. Some security experts have written public postings against that kind of misuse, citing the heavy reporting biasWikipedia of the non-statistic.[55][56]

Password strength and bad mathematics[edit]

Through 20 years of effort, we've successfully trained everyone to use passwords that are hard for humans to remember, but easy for computers to guess.
—xkcd[57]

Most security tips for password work if you're trying to avoid someone discovering it through brute force, that is, trying every combination of letters and numbers, starting at 000000 all the way to ZZZZZZ. Any system whose password is solely composed of numbers will be incredibly easy to brute force. However, as most systems allow passwords with any combination of alphanumeric characters, plus special characters such as empty spaces, exclamation, interrogation, parenthesis, ampersand and others, brute forcing every possible combination of those is mathematically unfeasible, as each character position has 26 lowercase + 26 uppercase alphabet characters + 10 numeric digits + 30 or more special characters. That means that a 6-character long password has a total of 92 ^ 6, or over 606 billion combinations, while a 7-character long one will have over 55 trillion combinations. Amazing numbers, but the reality is different.

Forcing users to mix upper case, lower case, a number and a special character is good in theory, but users are humans, and humans are terrible at remembering things, especially if they're "nonsense". *EEg38*G(&X83f2zzB is, under any measure, a very strong and secure password, but near impossible for any human to remember it without writing it down somewhere, not to mention time consuming to type out. Thus, people will often opt for something if not memorable, at least guessable, such as P4$$word. Coming up with a password that uses all those things is usually frustrating, trying to remember a dozen different ones is even worse, which leads to one very common problem: password reuse. This is the main reason hackers use passwords from previous leaks first, because the chance of them working on at least one account is high. Once the password is cracked, the attacker will use that same combination of username/email + password everywhere they can think of and, in many cases, will successfully invade.

123456 is still the most common password found in leaks and "password" is often in the top 10.[58][59] Perusing said lists will show a distinct lack of those enforced mixed characters passwords but, when they do show up, they're almost always "easy to remember" or easy to type, because they're either g00dPa$$w0rD or 1qaz!QAZ (keyboard walk), as can be seen in a 2017 list of the top 100k most common passwords.[60][note 3] QWEqwe123!@# certainly looks secure but, in reality, is not, since a quick glance immediately shows how to type it out. It's easy to remember and quick to type and hackers will expect a number of accounts to use that password or some permutation, such as qwe123QWE!@# or 123!@#qweQWE, it's easy for a computer to guess every different permutation. Reuse of these types of password will be high for the simple fact that people will prefer to remember only 1 instead of a dozen, and "guessing" which they used for which site.

While correcthorsebatterystaple itself is no longer secure, the principle is still valid and more likely to result in a secure password. Using a passphrase instead of a password, allowing all types of character without forcing the user to mix them all, can result in very secure and easy to remember passwords.[note 4] Unfortunately, many places have an upper limit on how long your password can be, such as no more than 20 characters, while others won't let you use some special characters common in Latin languages, such as Cedil, which is great for attackers, since it reduces the number of variables they have to consider when attempting to crack.

Misc[edit]

  • Internet — The internet is not a big truck.[please explain] Nor is it literally a series of tubesWikipedia — though that's actually not a terrible analogy. Trump could possibly attempt to 'close up' the internet for the US, crippling its economy, but not for the world.[61][please explain]
  • Advertising — You're not the site's 1,000,000th visitor, nor you're going to win a last generation iPhone just by answering some generic questions, and that nice Nigerian royal may not be as honest as his introductory email claimed. Also, advertiser technology has not yet predicted pregnancies,[62] though Facebook probably knows if you're gay.[63]
  • Digital Rights Management — you cannot secure information that must leave via the analogue hole.
  • BiometricsWikipedia — An established trope in science fiction, many consumers and technologists are eager to replace their passwords with fingerprints in a delusion that this is somehow a more 'futuristic' mode of authentication. When asked what they will do if their fingerprints are leaked (or worse, fingers cut off) their answer is to simply change their... oh.
  • Tech support scammers - scammers will either phone vulnerable people and ask for money and/or access to their computers, or else will display a spurious pop-up message saying there's an error and asking you to telephone them. This is not how computers work. In either case, the goal is to get you to pay them money for services that are unnecessary or don't exist. Scammers usually claim to be connected with Microsoft, and Microsoft specifically warns against this scam.[64]
  • FBI or CIA warning scams - don't believe it if your computer pops up a message or email saying something like "Hey you, we're the FBI and we know you've been looking at naughty websites! Send us money now!" This is not how the FBI operates, but if you're looking at child pornography or are simply feeling a bit paranoid or clueless, it can entice you to click on a dodgy link and download a nasty virus.[65]
  • Laptops make men sterile - a powerful, overheating laptop directly atop your ballsack may temporarily affect sperm production, but it will not make you permanently sterile, and any effects on your testicles will go away once you turn your laptop off.[66]

Things that are not computing woo[edit]

Whilst common computing misconceptions are numerous, often too many serious issues are written off[citation needed][Who?] as such including:

Government mass surveillance capabilities[edit]

Government mass surveillanceWikipedia capabilities have been revealed by the likes of Edward Snowden, particularly with regards to the NSA in the US and GCHQ in Britain.[67] The US government has incorporated backdoors and vulnerabilities in servers and routers exported from the US overseas, while warning about the danger in products from Chinese tech companies.[68] Multiple backdoors allowing access by government agencies have been found in Cisco networking products, some apparently put in place at the request of the CIA, some allegedly (according to Cisco) without Cisco's knowledge.[69]

However not all these stories are true. There is a lot of paranoia about what Chinese companies ZTE and Huawei might do to hack or monitor western telecoms networks, but little evidence that they have done anything (although there is legitimate concern that their programmers are idiots).[70] In 2018 financial news service Bloomberg ran a series of stories about Chinese companies putting a tiny secret hacking chip on computer mother boards, but these stories rapidly unraveled with no evidence of any specific product that was actually affected.[71][72]

Backdoors[edit]

Insecure backdoors into software and operating systems pose a serious threat.[73] Some politicians, particularly in the UK Conservative Party, have repeatedly called for communications software such as WhatsApp to include a backdoor that allows governments to decrypt and view all communication for purposes of fighting terrorism and other crimes, despite warnings from civil liberties and computer securities experts that this is a very dangerous thing to do.[74] Such schemes risk introducing vulnerabilities due to their complexity, and there is also the danger that an encryption key meant for trusted governments could become available to criminals or foreign states.[75] If a repressive government was able to read all communications it would allow a massive crackdown on dissent and free speech.

The debate is complicated by erroneous claims that software such as WhatsApp already incorporates backdoors (in reality it generally incorporates bugs rather than intentional backdoors).[76]

Financial based cybercrime[edit]

For example CardingWikipedia, online banking fraud, and much more.[more detail please]

Child pornography[edit]

The online trade in child pornography, which unfortunately is very real.

Sextortion[edit]

SextortionWikipedia based cybercrime, where users are blackmailed based on explicit photographs, which can be obtained by hacking computers to gain control of webcams[77]; stealing existing photos from computers, secure online file storage sites, or email services; or social engineering (e.g. pretending to be a sexy person of the appropriate sex and getting someone to send nudes or do things on webcam).[78] This has been the subject of myths about surveillance and calls for everybody to tape over their webcams, but the government and other people can't access your camera remotely assuming you follow good computer security practices. You have to actually do something stupid like visit a dodgy website or download questionable software, but sometimes there is reason to cover your webcam.[66]

Passwords[edit]

The dangers of password reuse, a mundane but fundamental flaw with password-based computer security. A 2018 report suggested business employees in some sectors could have up to 191 passwords needed for different services, and if they reuse them across multiple services, then if one system is compromised, all the rest with the same password are compromised too. The problem is, people can't remember 191 different passwords.[79]

Doxing[edit]

See the main article on this topic: Doxing

Darknet[edit]

Darknet commercial operations selling a large amount of drugs, a lot of stolen data and a small amount of weapons.[citation needed]

Smart appliances listening in[edit]

Your 'smart' TV[80], Barbie[81], console[82] smart phone assistant[83] recording your conversations.

Ransomware[edit]

RansomwareWikipedia, where hackers take control of a computer system and claim they will release it upon receipt of a ransom (often in the form of Bitcoins), is an increasing problem, even for US state governments.[84]

Data privacy[edit]

Tech giants selling your data to advertisers[85]

Cyberwarfare and cyber espionage[edit]

CyberwarfareWikipedia and cyber espionageWikipedia see military operations, spycraft, and propaganda carried out online rather than through traditional channels. Russia is a pioneer but other countries are trying hard to catch up.[86] Including:

See Also[edit]

External links[edit]

Notes[edit]

  1. As seen for instance in Independence Day.
  2. Hence the abbreviation of "Inter-net(work)".
  3. Roughly 38k of those 100k are purely numeric. Just in case you were wondering just how insecure they are.
  4. It won't guarantee security because people are lazy, so a list of most common passphrases would likely be very similar to a list of "most memorable quotes"

References[edit]

  1. i read your email
  2. Bastard Operator From Hell
  3. Politicians and Porn: 10 Great Internet Fails, Rolling Stone
  4. Bring your own device
  5. [Do Not Blame Users for Misconfigurations], Tianyin Xu et al, SOSP’13, Nov. 3–6, 2013. ACM 978-1-4503-2388-8/13/11. http://dx.doi.org/10.1145/2517349.2522727
  6. A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats,Mahmood Sharif et al, Computing Systems Proceedings (CHI 2019), May 4ś9, 2019, Glasgow, Scotland UK. ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/3290605.3300308
  7. Do you believe these IT support myths?, Dial A Geek blog, July 24, 2017
  8. See the Wikipedia article on Heisenbug.
  9. See the Wikipedia article on Cargo cult programming.
  10. Falsehoods Programmers Believe
  11. See the Wikipedia article on Indonesian names.
  12. [1], Kalzumeus, June 17, 2010
  13. India. timeanddate.com
  14. Delivery Address, USPS
  15. Britain's doppelganger place names, Daily Telegraph
  16. Thousands of foreigners given New Year's Day as date of birth, The Daily Telegraph, 29 Jan 2009
  17. How Many Social Security Numbers Do You Have?, CNBC, 12 Aug 2010
  18. See the Wikipedia article on Chinese Character Simplification Scheme.
  19. In the world of voice-recognition, not all accents are equal, The Economist, 15 Feb 2018
  20. Unicode trick lets hackers hide phishing URLs, The Guardian, 19 Apr 2017
  21. http://www.theregister.co.uk/2013/11/01/breaking_badbios
  22. 22.0 22.1 http://www.infoworld.com/article/2891692/security/does-the-latest-nsa-hack-prove-badbios-was-real.html
  23. http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/
  24. https://www.reddit.com/r/badBIOS/comments/5d02yn/hacking_of_a_mp4_song/
  25. https://www.reddit.com/r/badBIOS/comments/5a8rj7/sound_analyzer_pro_app_detected_near_ultrasound/
  26. https://www.reddit.com/r/Futurology/comments/55o2ua/neuroimaging_tech_will_soon_be_able_to_decode_our/
  27. http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html
  28. http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
  29. http://www.infoworld.com/article/2609678/security/nsa-s-backdoors-are-real----but-prove-nothing-about-badbios.html
  30. http://www.theregister.co.uk/2013/12/05/airgap_chatting_malware/
  31. https://deakin.service-now.com/kb_view_customer.do?sys_kb_id=92f777a2c5da8200ac47161ad6f6c410
  32. FBI crack Tor and catch 1,500 visitors to biggest child pornography website on the dark web
  33. Tor: Overview
  34. http://www.patheos.com/blogs/friendlyatheist/2017/05/16/russian-orthodox-leader-sprays-holy-water-on-government-computers-to-stop-wannacry-attack/
  35. This Is The Most Epic Brand Meltdown On Facebook Ever
  36. https://alessandrorossini.org/anti-updaters-it-equivalent-anti-vaxxers/
  37. https://www.troyhunt.com/dont-tell-people-to-turn-off-windows-update-just-dont/
  38. https://www.theverge.com/2017/8/24/16197694/cia-fake-software-update-hacking-wikileaks-vault-7
  39. 39.0 39.1 http://www.theverge.com/2016/1/12/10749806/encryption-debate-fbi-terrorism-going-dark
  40. Export of cryptography from the United States
  41. https://www.theguardian.com/technology/2015/jul/08/fbi-chief-backdoor-access-encryption-isis
  42. Here's Why Apple Is Going To War Over FBI 'Backdoor' Order
  43. http://www.nytimes.com/2015/11/17/world/europe/encrypted-messaging-apps-face-new-scrutiny-over-possible-role-in-paris-attacks.html?_r=0
  44. WhatsApp officially un-banned in Brazil after third block in eight months
  45. WhatsApp, Snapchat and iMessage could be banned in the UK: Should you be worried about the Communications Data Bill?
  46. BBC: Microsoft admits reading Hotmail inbox of blogger
  47. CNN: Microsoft defends its right to read your email
  48. NBC: Slack updates privacy policy: Employers can read 'private' DMs without telling workers
  49. Schools monitoring pupils' web use with 'anti-radicalisation software', The Guardian, 10 Jun 2015
  50. The Prevent Duty – What’s it all about?, Bloxx, Akamai
  51. Why online porn filters were doomed to failure, Martin Daubney, Telegraph, 25 Jul 2014
  52. http://sethf.com/anticensorware/smartfilter/greatestevils.php
  53. https://paper-bird.net/tag/blue-coat/
  54. https://cve.mitre.org/about/index.html
  55. https://blog.rapid7.com/2018/04/30/cve-100k-by-the-numbers/
  56. https://www.tripwire.com/state-of-security/vulnerability-management/no-cve-details-not-just-prove-android-security-stinks/
  57. Password strength. xkcd.com.
  58. Nordpass' top 200 most common passwords of 2021.
  59. See the Wikipedia article on Wikipedia:10,000 most common passwords.
  60. 2017 list of the top 100k most common passwords, compiled by OWASP.
  61. Donald Trump thinks he can call Bill Gates to 'close up' the internet
  62. Did Target Really Predict a Teen’s Pregnancy? The Inside Story
  63. Facebook knows you’re gay before your mother does, IT World, International Data Group, March 12, 2013
  64. Protect yourself from tech support scams, Microsoft, 3 Jun 2019
  65. Fake FBI Warning Emails, David Emery, Thought.co, May 25, 2019
  66. 66.0 66.1 Fact or Fiction? The Top 5 Laptop Myths, Reviewed, December 19, 2013, Updated October 02, 2014
  67. NSA File Decoded, The Guardian, 1 Nov 2013
  68. Glenn Greenwald: how the NSA tampers with US-made internet routers, The Guardian, 12 May 2014
  69. Backdoors Keep Appearing In Cisco's Routers, Tom's Hardware, July 19, 2018
  70. UK report blasts Huawei for network security incompetence, Tech Crunch, 28 Mar 2019
  71. The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies, Bloomberg, 4 Oct 2018
  72. The Cybersecurity World Is Debating WTF Is Going on With Bloomberg’s Chinese Microchip Stories, Motherboard, Vice, Oct 9 2018
  73. Ironic Windows Vulnerability Shows Why Backdoors Can’t Work, Wired, Aug 2019
  74. Calls for backdoor access to WhatsApp as Five Eyes nations meet, The Guardian, 30 July 2019
  75. WhatsApp And Other Encryption Under Threat After 'Five Eyes' Demand Access, Forbes, 30 July 2019
  76. Encrypted messaging platform WhatsApp denies “backdoor” claim, Tech Crunch, 13 Jan 2017
  77. Has someone hacked your webcam? Here’s how to stop cyber-snoopers, USA Today, 1 Mar 2018
  78. See the Wikipedia article on Sextortion.
  79. The dangers of password reuse, and how to avoid it, Delaney Computer Services
  80. Not in front of the telly: Warning over 'listening' TV
  81. Privacy fears over 'smart' Barbie that can listen to your kids
  82. Mandatory Kinect on Xbox One raises privacy concerns
  83. Apple’s hired contractors are listening to your recorded Siri conversations, too, The Verge, 26 July 2019
  84. Ransomware Attacks Are Testing Resolve of Cities Across America, New York Times, 22 Aug 2019
  85. The price of free: how Apple, Facebook, Microsoft and Google sell you to advertisers
  86. See the Wikipedia article on Cyberwarfare by Russia.
  87. Fake news can poison your computer as well as your mind
  88. See the Wikipedia article on Commission on Elections data breach.
  89. See the Wikipedia article on 2016 United States election interference by Russia.
  90. 2016 Presidential Campaign Hacking Fast Facts, CNN, 26 Dec 2016

Licensed under CC BY-SA 3.0 | Source: https://rationalwiki.org/wiki/Computing_woo
12 views | Status: cached on October 29 2024 21:15:40
↧ Download this article as ZWI file
Encyclosphere.org EncycloReader is supported by the EncyclosphereKSF