Chinese Great Firewall (website access blockade and. content filter for internet traffic) was leaking data! It's a fascinating discovery of security and privacy vulnerability in a large-scale technical censorship system. "Traffic with no relation to China could be leaked".
Chinese firewall leaked memory due to a buffer overrun. "DNS injection devices had a parsing bug that would, under certain conditions, cause them to include up to 125 bytes of their own memory in the forged DNS responses they sent"
The conference chairs found that this research is ethically sensitive but decided that the benefits of publishing outweigh the risks. It's good that such research work is possible and is being accepted and presented, too! So the process works. gfw.report/publications/n…
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Unsealed documents indicating significant Russian interference in domestic U.S. affairs. The thematic propaganda themes are interesting. Modern technologies in use to spread content & analyze its reach, including psychological operations.
Targeted ads also in use. And to remind you, all of this comes from U.S. Department of Justice. justice.gov/archives/opa/m…
There was also a project directed at societies in France and Germany. The goal was to generate domestic tensions. They also tried to fuel discontent using Poland-Germany issue of II World War reparations theme. They tried to place a wedge between US and EU countries.
My book “PROPAGANDA: from disinformation and influence to operations and information warfare” treats the subject adequately, comprehensively, broadly, expertly. How does information influence work? Offence & defence. Expert arrangement of the subject. blog.lukaszolejnik.com/propaganda-my-…
It was a lot of work (research, analysis, write ups). I am satisfied with the outcome! My practical experience was very helpful. The work bridges the gap between cybersecurity and information(al) security, exploring the links in-between.
It explains how “disinformation is not new” is not the case! I’m posting table of contents! First, introduction of course, followed by terminology to tidy the landscape. I lay out the technology background, including modern ones like AI/LLM, or how to build a Propaganda Factory.
Apple AI announcement is interesting. In this thread, I analyze the security and privacy of Private Cloud Compute (PCC). Preliminary summary: trust is necessary. It is not pure on-device processing. Transparency is unclear now.
They put loads of effort into this design. Technically, it probably can’t be made much better. Cloud servers perform computations in a way that does not retain any user data after processing, enhancing security.
Data must never be available to anyone other than the user. PCC does not intend to save any user data. It is used to make the request and output the answer.
For example, entirely hypothetically, Russia could stage a false-flag cyber operation "as Ukraine". On itself. An operation that would evidently cross the war threshold, which is very simple to do with cyber. Then "legally" respond.
It may then be evidently and completely "legal" to self-defend, including by sending a tank division for an invasion, possibly with airborne support, why not.
It should also then be "understandable" to many Western States, because they already said that a significant cyberattack may necessitate a classical military-kinetic response. Russia could even argue that they are simply doing what the West has previously devised...
Our latest paper on technology standardisation is out in @PolicyR! Thanks @teirdes for the fabulous co-op. Some people doubt that values-inspired technology design is possible. We show that not only it is possible, but values already influence technology. policyreview.info/pdf/policyrevi…
"Values" not only guide the building of technologies in aspects such as privacy or cybersecurity, accessibility, freedom of expression, or censorship. There are past examples of political-technology clashes/interventions, too. On-demand decryption or OS changes are examples.
"Human, moral, and European values are clearly linked to technology ... We stress that the presence of politics in the technology sphere is already a reality.". True story! With examples from the U.S. and France.
It turns out that wireless charging leaks private data. It leaks information about websites visited by the user. " allows accurate website fingerprinting on a charging smartphone". Information leaked depends on the battery level. Cool work! #GDPR#ePrivacyarxiv.org/pdf/2105.12266…
"Below approximately 80% state of charge, both wired and wireless charging side-channels observed in this experiment do not leak information. ... consistently classify traces with a battery state 90%". Privacy-preserving advice: have less than 80% battery charge? :-)