“The log4j vulnerability is the most serious vulnerability I have seen in my decades-long career,” Jen Easterly, U.S. Cybersecurity and Infrastructure Security Agency director, said in a Thursday interview on CNBC.
"#Log4j is a chunk of code that helps software applications keep track of their past activities. Instead of reinventing a “logging” — or record-keeping — component each time developers build new software, they often use existing code like log4j instead. It’s free on the Internet"
"A few weeks ago, the cybersecurity community realized that by simply asking the program to log a line of malicious code, it would execute that code in the process, effectively letting bad actors grab control of servers that are running #log4j."
"Huge swaths of the computer code that modern life runs on use Java and contain log4j. Cloud storage companies such as Google, Amazon and Microsoft, which provide the digital backbone for millions of other apps, are affected."
"So are giant software sellers whose programs are used by millions, such as IBM, Oracle and Salesforce. Devices that connect to the Internet such as TVs and security cameras are at risk as well."
"That doesn’t mean everything will be hacked, but it just got a lot easier to do so — just as if the locks on half of the homes and businesses in a city suddenly stopped working all at once."
"the vulnerability is straightforward to take advantage of. In the Minecraft video game, it’s as easy as typing a line of malicious code into the public chat box during a game."
"The vulnerability also gives hackers access to the heart of whatever system they’re trying to get into, cutting past all the typical defenses software companies throw up to block attacks. Overall, it’s a cybersecurity expert’s nightmare."
"Computer programmers and security experts have been working night and day since the vulnerability was publicized to fix it in whatever piece of software they’re responsible for... “Some of the people didn’t see sleep for a long time, or they sleep like three hours, four hours."
"Hackers have been working just as hard as the security experts to exploit log4j before the bug gets patched... Hackers have already tried to use it to get into nearly half of all corporate networks around the world..."
"Keep an eye out for an influx of phishing messages in the coming days ... If you get an email saying that your account has been compromised or your package failed to deliver, don’t open any links or attachments."
"The best thing regular computer users can do is make sure the apps they use are updated to their most recent versions... Developers will be sending out patches over the coming days to fix any #log4j issues, and downloading those quickly will be important."
• • •
Missing some Tweet in this thread? You can try to
force a refresh
BEST SECURITY PROVISION
Preprinted #handmarkedpaperballots are required in the polling place!! This is something many of us fought for
Voting systems that can print on ballots after they are cast are prohibited - but the provision is weak. It can be "through mechanical means or through independently verified protections." I believe that means it is allowed, but you have to check if it's happening. Not great.
The voter's privacy must be maintained. That's great!
2. "It started out a good day. The day before I celebrated my 14th anniversary with my husband. The cherry blossom tree we planted in the backyard was exploding in pink taffy balls, and the smell of the lilies he got me floated through the living room as I walked to my desk."
3. "From there it went downhill pretty quickly ... For the last 2 years, I have been trying to protect New York voters, and voters across the country from a particularly “bad” type of voting machine known as a “hybrid”.
3. Rhode Island “a state for sale” “bribery of voters with cash at the polls.”
(p. 136)
Adams County OH, (p. 143)
Terre Haute IN (P. 147- 149)
10th Congressional District of PA “wholesale fraud” (1918) (p. 154)
Iowa (p. 157)
Texas (p. 223)
Georgia (p. 282) “extensive fraud”
2. I think most of us could use a refresher on #BloodySunday. That includes me. I found a good detailed description at the Encyclopedia of #Alabama.encyclopediaofalabama.org/article/h-1876 ""Bloody Sunday" refers to the March 7, 1965, civil rights march"
3. The march was supposed to go 'from Selma to the capitol in Montgomery to protest the shooting death of activist Jimmie Lee Jackson. The roughly 600 marchers were violently driven back by Alabama State Troopers, Dallas County Sheriff's deputies, and a horse-mounted posse"
#HR1#S1#Amendments - all passed today
includes a new amendment to study #Blockchain voting
amendment #39
Directs the Election Assistance Commission (@EACgov) to conduct a study regarding the use of blockchain technology to enhance voter security in Federal elections.
44
Requires a sufficient number of ballot marking machines equipped for individuals with disabilities, as defined by the Election Assistance Commission in consultation with the Access Board and the National Institute of Standards and Technology, for all in person voting options.
9. Bourdeaux (GA)
...ensures that the number of drop boxes and geographical distribution of drop boxes provide a reasonable opportunity for voters to submit their ballot; permits for the security of drop boxes through remote or electronic surveillance. #HR1#S1#Amendments
#SolarWinds hack. Thread. 1. Dominion Voting Systems, a voting machine vendor used in #Election2020, is a Solar Winds client. It does not use Orion, the product at the center of the hack. via attorney Paul Lehto
3. "early signs indicate the reach of the stealthy supplychain attack will have substantial aftershocks; #SolarWinds claims to have 300,000 customers, inc. /National Security Agency all 5 branches of the U.S. military & entities in /health tech telecommunications media & finance"