Show more
DanielTux boosted
DanielTux boosted

7 days, 7 applications running on the Librem 5 smartphone dev kit (with video).

Web browsing. Taking notes. Playing Solitaire. And that's just for starters.

Check out what's possible. And stay tuned as we showcase something new every single day.

puri.sm/posts/runs-on-the-libr

DanielTux boosted

The History of Cellular Network Security Doesn’t Bode Well for 5G

There’s been quite a bit of media hype about the improvements 5G is set to supposedly bring to users, many of which are no more than telecom talking points. One aspect of the conversation that’s especially important to get right is whether or not 5G will bring much-needed security fixes to cell networks. Unfortunately, we will still need to be concerned about these issues—and more—in 5G.

Past security flaws in the design of cell network infrastructure are being used for everything from large scale SMS spamming to enabling dragnet surveillance by law enforcement and spying in DC via cell site simulators (a.k.a. Stingrays, IMSI-catchers). Longtime cell network security researcher Roger Piqueras Jover has recently published a short but comprehensive reflection on the history of the cell security research that uncovered much of those flaws, and with it, his view of the security outlook for 5G.

Jover draws attention to how rapidly the field of cell network security research has been accelerating. It took researchers over 10 years after GSM was first standardized and deployed to find the first security flaws in the GSM (2G) protocol. For LTE (4G), it took approximately 7 years. Fast forward to the 5G standard, which was finalized  in March 2018. While there are currently no commercial implementations of 5G widely in use yet, researchers have already discovered over 6 critical security flaws in this new protocol.

Standardization efforts simply aren’t keeping up with the rapid rise of critical security flaws. The group responsible for maintaining the standards and incorporating security fixes (the 3GPP) primarily consists of big players in the telco industry, who don’t have much incentive to come up with and incorporate the critical user privacy fixes that are needed.

On the positive side, Jover points out that there are increasing efforts from researchers to explore potential fixes for many of the security problems in cell networks. In the recent past Ericsson has stepped up their efforts to fix some of the vulnerabilities in 5G’s identification and authentication procedures (i.e. the process that takes place between a mobile phone and a cell tower when each is verifying the other is who they claim to be). Similarly, researchers recently published a proof-of-concept paper proposing a PKI (public key infrastructure) & digital certificate system for the connection between mobile phones and cell towers (similar to SSL certificates and HTTPS).


Despite these efforts, for real change to take place, it must come from within: the 3GPP’s biggest players need to embrace the work required to fix the fundamental flaws that have plagued cell networks for years. Until then, our mobile devices are still vulnerable to being caught up in dragnet and targeted surveillance attacks. As it stands, 5G won’t be any sort of panacea—for increasing security, for improving wireless accessibility, or for solving the issues of broadband monopolies that contribute to each of these.

DanielTux boosted
DanielTux boosted

Want to find your way from A to B?

You should try:
maps.openrouteservice.org

I've used it a couple of times today, and it was great.

* Uses OpenStreetMap data
* Service provided by HeiGIT
* Doesn't spy on you
* Maps look great
* Effective routes
* Share with friends
* Add your own tracks
* Export to GPX plus others
* Elevation profile

You can also go to C, D, E and many more. 😉

#OSM #maps #routes #routing #FOSS #FLOSS #CrowdSourced

DanielTux boosted

Will das @IM_NRW@twitter.com wirklich die Fehler von #HessenData wiederholen und die Überwachungssoftware #Gotham von @PalantirTech@twitter.com anschaffen?

Bekommt #Palantir dann auch in #NRW Zugriff auf das eigentlich interne Behördennetz?

heise.de/newsticker/meldung/LK

bigbrotherawards.de/2019/behoe

#DAR /c

DanielTux boosted
DanielTux boosted

Read all about how Todd Weaver and Brendan Eich reject Big Tech’s efforts to weaken California’s privacy law.

puri.sm/posts/the-new-generati

DanielTux boosted

"Secure" messaging can mean something different for everyone. Ask these questions when you make choices about which messengers are right for you. eff.org/deeplinks/2018/03/thin

DanielTux boosted

Review by our friends at the Denver Post:
Google Chrome has become surveillance software. It’s time to switch. t.co/1vEfs1s01j
#privacymatters

DanielTux boosted
DanielTux boosted

RT @MartinSonneborn
600 Miilionen in den Sand gesetzt? Andi B. Scheuert kostet den Steuerzahler ja mehr als ich... Smiley! Wäre das nicht ein schöner Anlass für Ihren überfälligen Rücktritt, @AndiScheuer?
#PKWMaut

DanielTux boosted
Do., 27.06.2019 im #Bundestag:
"Abstimmung über Änderungen im #Daten­schutzrecht!"
Voraussichtliche Zeit: Irgendwann nachts!
Liveübertragung dieser "Nacht- und Nebelaktion" vermutlich Freitag, 28. Juni, 1.45 Uhr
Also: Freitag morgens um Viertel vor zwei! www.bundestag.de/dokumente/tex…
DanielTux boosted

RT @openstreetmap
Has your OSM community considered hosting State of the Map 2020? How about upgrading your regional SotM conference to the global one @sotm? Find out why you should do so :) blog.openstreetmap.org/2019/06 The call for venues deadline is 30th August 2019.

DanielTux boosted

Even if it were possible to enforce a standard of “neutrality” on social media platforms, it would be deeply foolish for Congress to do it.
eff.org/deeplinks/2019/06/sen-

DanielTux boosted

Deprecating a.out Binaries
"The thing that fascinates me about this is the insistence on continuing to support ancient features if even a single user is found who still relies on it. If even one person came forward with a valid use case for a.out, Linus would leave it in the kernel. At the same time, if no users step forward, Linus won't assume they may be lurking secretly out in the wild somewhere—he'll kill the feature." linuxjournal.com/content/depre

@purism I think you guys should get in touch with ourgoodbrands.com.
Fairphone is already there 😉
ourgoodbrands.com/get-featured

DanielTux boosted

Governments shouldn't be hosting in the public cloud:
⛔️ No control over access to your data
💽 Don’t know where your data is
💥 A single points of failure
🔕 You won’t know if you got hacked
🔪 No control over changes and features

nextcloud.com/blog/the-issue-w

DanielTux boosted
DanielTux boosted

Runs on Librem 5, Day 6 - Evince Document Reader, Opening a PDF

youtube.com/watch?v=j8YMc06RMr

Show more
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml