“I forward this file to you for review. Please open and view it.”
Ever since Google launched its new Google+ social network, we and others have pointed out that the search giant clearly has more in mind than just providing a nice place for people to share photos of their pets. For one thing, Google needs to tap into the “social signals” that people provide through networks such as Facebook so it can improve its search results. There’s a larger motive, too: As Chairman and former Chief Executive Officer Eric Schmidt admitted during an interview in Edinburgh over the weekend, Google is taking a hard line on the real-name issue because it sees Google+ as an “identity service” or platform on which it can build other products.
Sen. Roberto Arango, an anti-gay Republican who represents the capital of San Juan for the island’s governing party, presented his letter of resignation after the photos on Grindr were leaked to the press.
Can you guess why without clicking the link?
The LA Times, and most people who denounce these spending "inefficiencies," have the causation backwards: fighting Terrorism isn’t the goal that security spending is supposed to fulfill; the security spending (and power vested by surveillance) is the goal itself, and Terrorism is the pretext for it. For that reason, whether the spending efficiently addresses a Terrorism threat is totally irrelevant.
Security researchers have discovered a counterfeit web certificate for Google.com circulating on the internet that gives attackers the encryption keys needed to impersonate Gmail and virtually every other digitally signed Google property.
The forged certificate was issued on July 10 to digitally sign Google pages protected by SSL, or secure sockets layer. It was issued by DigiNotar, a certificate authority located in the Netherlands. The forged certificate is valid for *.google.com, giving its unknown holders the means to mount transparent attacks on a wide range of Google users who access pages on networks controlled by the counterfeiters.
Google and Mozilla have responded to the forgery by preparing updates to Chrome, Firefox and other software programs that take the highly unusual step of blocking all certificates issued by DigiNotar while the forgery is being investigated.
This one apparently was used by the Iranian government. Diginotar is used by the Dutch government for a lot of their (legit) certificates, it’ll be interesting to see which parts of the government are hit by these emergency patches.