1 min

Pinboard: Alex Jones And The Dark New Media Are On Trial In Texas

Which is what makes Jones’ trial — and his impending trip to the witness stand — so alluring. Perhaps less interesting than knowing exactly what Jones truly believes is the prospect of watching legal experts compel earnest testimony from one of the nation’s top exporters of loose facts, untruths, and partisanship. Jones’ unenviable position then ...

1 min

Pinboard: The man who passes the sentence must swing the sword – Über Drohnenangriffe | Kleinerdrei

Bei einem Drohnenangriff werden Menschen nicht in einem bewaffneten Konflikt getötet, in dem ein Staat einem anderen den Krieg erklärt hat. Das wäre zwar auch scheußlich, aber es wäre völkerrechtlich gesehen eine rechtliche Grundlage. Die getöteten Personen sind aber auch nicht von einem Gericht zum Tode verurteilt worden. Es gab keine öffentlich nachvollziehbare Beweisermittlung und ...

1 min

Pinboard: Inside Turkey’s Purge – The New York Times

The judiciary in Turkey has never been independent of ideological or political pressure, but neither has it been a broken system. The European Union and the Council of Europe spent millions of dollars training Turkish judges to follow European human rights standards. But the purge has swept out some 4,000 judges and prosecutors, including many ...

1 min

Pinboard: Meet PINLogger, the drive-by exploit that steals smartphone PINs | Ars Technica

Malicious webpages—or depending on the browser, legitimate sites serving malicious ads or malicious content through HTML-based iframe tags—can mount the attack by using standard JavaScript code that accesses motion and orientation sensors built into virtually all iOS and Android devices. To demonstrate how the attack would work, researchers from Newcastle University in the UK wrote ...

1 min

Pinboard: Hand of U.S. Leaves North Korea’s Missile Program Shaken – The New York Times

Eighty-eight percent of the launches of the North’s most threatening missiles have self-destructed since the covert American program was accelerated three years ago. Cybertools to disrupt weapons programs — that’s another use of the tools, and I make a distinction between those two,” Mr. Tillerson argued back, without specifically confirming their use against Pyongyang. Link ...

1 min

Pinboard: Why Did Microsoft Wait Six Months To Patch a Critical Word Zero-Day? – Motherboard

A source who works in the surveillance technology industry said that FinFisher buys exploits from private researchers as well as from Zerodium, a well-known exploit seller. The source, who asked to remain anonymous, said FinFisher recently offered access to an exploit subscription portal that seemed similar to what Zerodium’s predecessor, Vupen, used to offer. Zerodium’s ...

1 min

Pinboard: Trump Claims His ‚Wiretap‘ Claim Was About Susan Rice and ‚Unmasking‘ – The Atlantic

The allegation of wrongdoing was more remote. When Americans are named or participate in surveilled conversations, their names are redacted. Top officials can request that their names be unredacted, or “unmasked,” if they believe it’s necessary to understand the report. Nunes said he was worried that Trump team members had been improperly unmasked. Bloomberg View’s ...

1 min

Pinboard: The Obama Doctrine, R.I.P. – The Atlantic

Huge stockpiles of chemical agents would subsequently be shipped out of Syria for destruction, and Obama’s allies explained the sagacity of his approach by noting that President George W. Bush went to war in Iraq to neutralize weapons of mass destruction that no longer existed by the time of the 2003 invasion; Obama, on the ...

1 min

Pinboard: • Chart: The Billion-Dollar Race for Streaming Supremacy | Statista

If you think that Amazon isn’t serious about Prime Video, the company’s video streaming service included with every Prime membership, think again. According to analysts at JPMorgan, the Seattle-based e-commerce giant is set to spend $4.5 billion on video content this year. While that is still $1.5 billion shy of the $6 billion that market ...

1 min

Pinboard: Broadcom-Sicherheitslücke: Vom WLAN-Chip das Smartphone übernehmen – Golem.de

Zur Erinnerung: Mit Hilfe eines Buffer Overflow gelang es, die Firmware von Broadcom-WLAN-Chips zu exploiten, die in zahlreichen aktuellen Smartphones verbaut sind. Der WLAN-Chip ist dabei faktisch ein Mini-Computer mit eigenem Betriebssystem, unabhängig vom eigentlichen Smartphone-Betriebssystem. Damit ermöglichte der Exploit es zunächst „nur“, Code auf dem WLAN-Chip selber auszuführen. Link zur Quelle