IDG Contributor Network: Recent VPN hacks reveal transparency issues within the industry and its supply chain

Consumers are no doubt becoming increasingly aware about the safety and security of their online activity after many highly publicized studies have shown an uptick in online data theft. According to the Federal Trade Commission, there were 3 million reports of identity theft alone in 2018.Even though these threats — and the rash of data breaches — continue to grab headlines, consumers still are connecting to public wifi despite the threats and are joining other unsafe networks while traveling. More cautious or tech-savvy individuals know to turn to virtual private networks (VPNs) as a way to safely connect online, and as VPNs become more mainstream, some project the VPN market can grow to more than $35 billion by 2022. We’ve even seen some vendors to capitalize by creating flashy TV commercials that insinuate that they are consumers’ digital doorman. To read this article in full, please click here

IDG Contributor Network: Recent VPN hacks reveal transparency issues within the industry and its supply chain

Consumers are no doubt becoming increasingly aware about the safety and security of their online activity after many highly publicized studies have shown an uptick in online data theft. According to the Federal Trade Commission, there were 3 million reports of identity theft alone in 2018.Even though these threats — and the rash of data breaches — continue to grab headlines, consumers still are connecting to public wifi despite the threats and are joining other unsafe networks while traveling. More cautious or tech-savvy individuals know to turn to virtual private networks (VPNs) as a way to safely connect online, and as VPNs become more mainstream, some project the VPN market can grow to more than $35 billion by 2022. We’ve even seen some vendors to capitalize by creating flashy TV commercials that insinuate that they are consumers’ digital doorman. To read this article in full, please click here

The Week in Internet News: India Sets Record for Longest Internet Shutdown in a Democracy

The longest ever: The 130-day-plus shutdown of the Internet in the Indian region of Kashmir is now the longest ever in a democracy, the Washington Post notes. The Kashmir Chamber of Commerce estimates $1.4 billion in losses due to the shutdown. Meanwhile, the Indian government is stepping up its shutdown efforts in response to protests across the country, TechCrunch reports. The protests are largely focused on a new citizenship law, which creates a path to citizenship for immigrants of all the major religions except Islam.

Another encryption fight: There’s a battle brewing over the encryption of Internet traffic being pushed by Google and Cloudflare, the ACLU says in a blog post. Some U.S. telecom carriers are calling on Congress to stop the encryption efforts. The blog post has a good explanation of the technical issues, while taking sides in the debate.

New standards for the IoT: Amazon, Apple, Google, and the Zigbee Alliance are working on a new open-source networking standard for home Internet of Things connected devices, ZDNet reports. The Connected Home over IP standard aims to make it easier for various IoT devices to communicate with each other.

Protesting social media bill: Thousands of people in Continue reading

Is AI the Antidote to Network Complexity?

While 5G and industrial IoT are still years from maturity, that's not stopping companies from...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

This $387 Azure certification prep bundle is currently on sale for $29

Modern tech companies require more computing power than ever before, so many of them are turning to cloud services like Microsoft Azure to meet their needs. As such, becoming cloud-certified is a necessity if you want to pursue today’s highest-paying IT jobs. With this 4-course bundle, you can become an Azure master for just $29. To read this article in full, please click here

How do RFC3161 timestamps work?

RFC3161 exists to demonstrate that a particular piece of information existed at a certain time, by relying on a timestamp attestation from a trusted 3rd party. It's the cryptographic analog of relying on the date found on a postmark or a notary public's stamp.

How does it work? Let's timestamp some data and rip things apart as we go.

First, we'll create a document and have a brief look at it. The document will be one million bytes of random data:

 $ dd if=/dev/urandom of=data bs=1000000 count=1  
1+0 records in
1+0 records out
1000000 bytes transferred in 0.039391 secs (25386637 bytes/sec)
$ ls -l data
-rw-r--r-- 1 chris staff 1000000 Dec 21 14:10 data
$ shasum data
3de9de784b327c5ecec656bfbdcfc726d0f62137 data
$

Next, we'll create a timestamp request based on that data. The -cert option asks the timestamp authority (TSA) to include their identity (certificate chain) in their reply and -no_nonce omits anti-replay protection from the request. Without specifying that option we'd include a large random number in the request.

 $ openssl ts -query -cert -no_nonce < data | hexdump -C  
Using configuration from /opt/local/etc/openssl/openssl.cnf
00000000 30 29 02 01 01 30 21 30 09 06 05 2b 0e 03 Continue reading

The Saga of T-Mobile US and Sprint’s Quest to Merge

While there have been many twists and turns in the 20 months since the deal was announced, the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

First Half 2019 Transparency Report and an Update on a Warrant Canary

First Half 2019 Transparency Report and an Update on a Warrant Canary

Today, we are releasing Cloudflare’s transparency report for the first half of 2019. We recognize the importance of keeping the reports current, but It’s taken us a little longer than usual to put it together. We have a few notable updates.

First Half 2019 Transparency Report and an Update on a Warrant Canary

Pulling a warrant canary

Since we issued our very first transparency report in 2014, we’ve maintained a number of commitments - known as warrant canaries - about what actions we will take and how we will respond to certain types of law enforcement requests. We supplemented those initial commitments earlier this year, so that our current warrant canaries state that Cloudflare has never:

  1. Turned over our encryption or authentication keys or our customers' encryption or authentication keys to anyone.
  2. Installed any law enforcement software or equipment anywhere on our network.
  3. Terminated a customer or taken down content due to political pressure*
  4. Provided any law enforcement organization a feed of our customers' content transiting our network.
  5. Modified customer content at the request of law enforcement or another third party.
  6. Modified the intended destination of DNS responses at the request of law enforcement or another third party.
  7. Weakened, compromised, or subverted any of its encryption at the request of law Continue reading

Is VMware Winning the Cloud Wars?

In its most recent quarter VMware saw hybrid cloud and SaaS representing more than 13% of its total...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Containers Today Recap: The Future of the Developer Journey

There was amazing attendance at Containers Today in Stockholm a couple of weeks ago. For those who were unable to make it, here is a quick overview of what I talked about at the event in my session around the future of the developer journey. 

Before we talk about what we think will change the journey, we need to think about why it changes. The fundamental goal of any change to the way of working for developers should be to reduce the number of boring, mundane and repetitive tasks that developers have to do or to allow them to reach new customers/solve new problems. Developers create amazing value for companies and provide solutions to customers’ real world problems. But if they are having to spend half of their time working out how to get things into the hands of their customers, then you are getting half the value.

Developer Evolution

The role of developers has changed a lot over the last ~40 years. Developers no longer deploy to mainframes or in house hardware, they don’t do waterfall deployments and not many of them write in machine code. Developers have to now think about web languages and ML, work in Continue reading

NTT DoCoMo Trials Homegrown 5G RAN

Japan has a long history of designing and building its own radio access network (RAN) equipment for...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Nvidia’s Mellanox Deal Gains EU Stamp

Nvidia's $6.9 billion quest to acquire Mellanox inched a little closer to completion after the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Microsoft, Ericsson Connect Clouds to Connect Cars

The collaboration will provide a “a comprehensive connected vehicle platform at scale to the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Stop SIS – Self-Inflicted Spam

Last month I ran across a great blog post by Jed Casey (@WaxTrax) about letting go of the digital hoard that he had slowly been collecting over the years. It’s not easy to declare bankruptcy because you’ve hit your limit of things that you can learn and process. Jed’s focus in the article is that whatever he was going to try and come up with was probably out of date or past its prime. But it got me to thinking about a little project that I’ve been working on over the past few months.

Incoming!

One of the easy ways to stay on top of things in the industry is to sign up for updates. A digest email here and a notification there about new posts or conversations is a great way to stay in-the-know about information or the latest, greatest thing. But before you know it you’re going to find yourself swamped with incoming emails and notifications.

I’ve noticed it quite a bit in my inbox this year. What was once a message that I would read to catch up became a message I would scan for content. That then became a message that I skipped past Continue reading

Weekly Wrap: Fortinet Leapfrogs Cisco With 21,000 SD-WAN Customers

SDxCentral Weekly Wrap for Dec. 30, 2019: The SD-WAN space has become a numbers game; Google Cloud...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Rebooting Network Devices with Ansible

blog_Rebooting-Network-Devices-with-Ansible

With the Red Hat Ansible Automation Platform release in November, we released over 50 network resource modules to help make automating network devices easier and more turn-key for network engineers.  In addition to the new resource modules, Andrius also discussed fact gathering enhancements in his blog post, which means with every new resource module, users gain increased fact coverage for network devices.  For this blog post I want to cover another cool enhancement that may have gone unnoticed. This is the ability for network devices to make use of the wait_for_connection module.  If you are a network engineer that has operational Ansible Playbooks that need to reboot devices or take them offline, this module will help you make more programmatic playbooks to handle disconnects.  By leveraging wait_for_connection network automation playbooks can look and behave more like playbooks for Linux or Windows hosts.

 

Table of Contents

Comparing wait_for and wait_for_connection

Dealing with prompts

Using reset_connection in combination

Where to go next?

 

Comparing wait_for and wait_for_connection 

There are two great modules that can wait for a condition to be met, wait_for and the wait_for_connection.  I highly recommend against using the pause module if you Continue reading

Deutsche Welle Spotlights Tanzania’s Kondoa Community Network

Nearly half of the world lacks Internet access. But in rural Africa, the number is much higher: 86% of people are unconnected, with fewer women having access than men.

Deutsche Welle, Germany’s public broadcaster, shares the story of the Kondoa Community Network, a joint project of the Internet Society Tanzania Chapter and the University of Dodoma, that’s helping to close the digital divide. It’s connecting schools and community centers – and making a difference to young women.

Listen


Want to hear more?
Last year, Deutsche Welle profiled three additional community networks in Zimbabwe, the Republic of Georgia, and South Africa. Read about the community networks and listen to their stories!

The Internet is for everyone. Learn more about community networks and join the global movement to help close the digital divide!


Images ©Internet Society/Nyani Quarmyne/Panos Pictures

The post Deutsche Welle Spotlights Tanzania’s Kondoa Community Network appeared first on Internet Society.