2013-11-30

#Qubes #Xen vs Dragos Ruiu's #badBIOS

6: co.cyb/sec/qubes/Xen vs Dragos Ruiu's #badBIOS:
me to qubes-devel 5:41am:
. reading about the #badBIOS infection,
blog.erratasec.com/2013/10/badbios-features-explained.html
I was surprised to learn that all computing accessories
(mouse, trackpad, hub, keyboard, and of course
 flash drives) could have a software-programmable firmware
and this could be infected with malware that could spread
to your next computer if attached to dom0 .
. I was also concerned that a new flash drive malware
-- Dragos Ruiu's #badBIOS --
could infect a next machine without even being mounted;
is this a new threat that xen has yet to adapt to?

#superfood #slowcarb trehalose

30: web.health/trehalose:
. trehalose is a sugar(sucrose) substitute,
that has a moderate glycemic index,
and various medical benefits .

2013-11-22

AquaBounty salmon #gmo #fishoil

news.pol/healthcare/gmo#AquaBounty salmon:
. the new gmo fish has an elevated potential
to be allergy-causing, [ consumersunion.org ]
and elevated levels of the IGF-1 growth hormone,
which is linked to colon, prostate and breast cancers;
but how much of that risk
would be in the fish's oil?

2013-10-31

2013-10-01

NSA backdoors all encryption software

9.18: news.cyb/sec/NSA backdoors all encryption software:
fierce government it`NSA backdoor:
. the NSA's SIGINT (signals intelligence) Enabling Project
covertly influences or overly leverages
the policies, standards and specifications
of the global cryptography marketplace
to make commercial public key technologies
more crackable by the cryptanalytic capabilities
being developed by the NSA and DOD's
Central Security Service.
. it has used a quarter billion dollars yearly
for at least the past 2 years .

2013-09-26

NSA's globalized internet security

9.26: news.cyb/sec/NSA's globalized internet security:
Sept. 25, 2013, Army Gen. Keith B. Alexander,
Cybercom commander, and director of NSA,
at the National Press Club
or 4th Annual Cybersecurity Summit .

. in the past year, we saw more than 300
distributed denial-of-service attacks
on Wall Street.
We saw destructive attacks against
Saudi Aramco and RasGas [Co. Ltd.],
and against South Korea .

. U.S. Cyber Command (Cybercom)
has activated the headquarters for
one of its 3 Cyber Force branches:
Cyber National Mission Force,
that defends the nation;
Cyber Protection Force
defends DOD's information environment.
and Cyber Combat Mission Force
will provide assistance to the military
to implement cyber counterattacks .
Cybercom teams are now fully operational
and working side by side with NSA
to defend the nation.
The Army, Navy and Marines
trained about a third of the force in 2013
and they will train a third in 2014
and another third in 2015.

2013-09-19

teachers DMT & schizophrenia

13: news.psy/Jan Kounen`Other Worlds (Ayahuasca):
. my notes from watching co.youtube#8Recon8
Jan Kounen`Other Worlds (Ayahuasca).

. Ayahuasca is a herbal form of DMT
which can totally separate the mind from body;
the body is a refuge:
a truly free mind can be in hell
just as easily as in heaven;
but the body is there to arbitrate
to mercifully limit experience .

USA intel has SOA on High-Security Internet

9.11: news.cyb/sec/USA intel has SOA on High-Security Internet:
Sept. 11, 2013
Al Tarasiuk, intelligence community CIO
and assistant director of national intelligence .
. the IC ITE ( Intelligence Community
Information Technology Enterprise )
is a new IT environment that will
vastly improve information sharing
across the intelligence community .

. consolidating IT across the community
was driven by budget considerations.
But today,
it's more than an efficiency play on IT:
intelligence integration,
information sharing and safeguarding .
. that translates into 3 goals:
1: effectiveness,
2: security
3: efficiency .
"In the past, these were mutually exclusive,
but now we'll have more of all 3 goals
because of cloud technologies,
and a [SOA (service-oriented architecture)]
or "service-provider-based business architecture"
providing an IC cloud not on the Internet,
but privately hosted on TS|SCI networks
(top secret / Sensitive Compartmented Information)
[18:
. high-security wide-area networks are
connected by Tesla beam transmissions,
which unlike fiber optic cable,
can be transmitted wirelessly,
and are very difficult to intercept .
. the govt denies this technology even exists,
but they've used it to communicate with submarines,
and a chinese-american collaboration is developing it .]