I'm too verbose for twitter...
7882 stories
·
31 followers

Microsoft made a $349 hardware client to connect to Cloud PCs

1 Comment

Accessing and securing the cloud is a necessity for companies and Microsoft has taken another step by announcing the Windows 365 Link device. According to Microsoft, "it enables desk-based users to work securely on a familiar Windows desktop in the Microsoft Cloud with responsive, high-fidelity experiences."

Windows 365 Link is a small, lightweight device that Microsoft claims can immediately wake from sleep, boot up in seconds and locally process video conferencing solutions like Microsoft Teams. It doesn't store local data or apps, has security baseline policies enabled and doesn't allow for individuals to disable security features. Plus, logging in requires Microsoft Entra ID along with the Microsoft Authenticator app or USB security keys.

Microsoft's new device also works with dual 4K monitors, an audio port, four USB ports, an ethernet port, Bluetooth 5.3 and Wi-Fi 6E. The Windows 365 Link is currently available in preview but should come to select areas in April 2025 for $349. 

This article originally appeared on Engadget at https://www.engadget.com/computing/accessories/microsoft-made-a-349-hardware-client-to-connect-to-cloud-pcs-133027364.html?src=rss



Read the whole story
kazriko
1 day ago
reply
When a computer capable of running most of this software is also $349...
Colorado Plateau
Share this story
Delete

The US power grid has added over 20 gigawatts of battery storage since 2020

1 Comment

There has been an extraordinary increase in battery storage installations in the US over the past several years, a trend that's transforming the nation's power grid. Altogether, the US has added over 20 gigawatts of battery storage capacity to its electric grid since 2020, according to recent data from the...

Read Entire Article

Read the whole story
kazriko
21 days ago
reply
But how long can it maintain an output of 80 gigawatts? I don't see a time measurement on their energy storage value. Is it 80 gigawatt-hours?
Colorado Plateau
Share this story
Delete

Hyperdevotion Noire: Goddess Black Heart coming to Switch on February 13, 2025 in Japan

1 Comment
Compile Heart will release a Switch version of Neptunia series spin-off strategy RPG Hyperdevotion Noire: …

Source

Read the whole story
kazriko
27 days ago
reply
Funny, I just finished this on Vita. Personally, I didn't enjoy it much and probably won't play anything else in the series.
Colorado Plateau
Share this story
Delete

Can poppy seeds make you fail a drug test?

1 Share
From: ReasonTV
Duration: 0:51

While poppy seeds can become contaminated with trace amounts of opium, scientists agree it’s physically impossible to eat enough to actually high. But drug tests are crazy sensitive. Alleged false positives from poppy seeds have led to infuriating stories like people who lost their jobs or moms who had their babies taken away by CPS. #science #factcheck #parenting

Read the whole story
kazriko
27 days ago
reply
Colorado Plateau
Share this story
Delete

Intel could have beaten AMD to 64-bit transition but wrongly chose not to, engineers reveal

1 Comment

Intel had a solution ready to add 64-bit features to the "classic" 32-bit x86 ISA, but the company chose to push forward with the Itanium operation instead. A new snippet of technology history has recently emerged from a year-old Quora discussion. Intel's former "chief x86 architect," Bob Colwell, provides a...

Read Entire Article

Read the whole story
kazriko
29 days ago
reply
Well, yes, this has been well known before. Intel's been trying to rid itself of x86 for a long time, and thought that Itanium was the way forward, instead of yet another patch on top of x86 to make it 64 bit.

I think VLIW was a bit silly though for a CPU, and am not sure why they decided to go that way for Itanium.
Colorado Plateau
Share this story
Delete

Chinese Hackers Used U.S. Government-Mandated Wiretap Systems

1 Share
A shadowy hacker, in a hood, working on a laptop against the backdrop of an American flag, partially rendered in streams of binary code. | DPST/Newscom

For as long as law enforcement has sought a way to monitor people's conversations—though they'd only do so with a court order, we're supposed to believe—privacy experts have warned that building backdoors into communications systems to ease government snooping is dangerous. A recent Chinese incursion into U.S. internet providers using infrastructure created to allow police easy wiretap access offers evidence, and not for the first time, that weakening security for anybody weakens it for everybody.

Subverted Wiretapping Systems

"A cyberattack tied to the Chinese government penetrated the networks of a swath of U.S. broadband providers, potentially accessing information from systems the federal government uses for court-authorized network wiretapping requests," The Wall Street Journal reported last week. "For months or longer, the hackers might have held access to network infrastructure used to cooperate with lawful U.S. requests for communications data."

Among the companies breached by the hacker group, dubbed "Salt Typhoon" by investigators, are Verizon, AT&T, and Lumen Technologies. The group is just one of several linked to the Chinese government that has targeted data and communications systems in the West.

While the Journal report doesn't specify, Joe Mullin and Cindy Cohn of the Electronic Frontier Foundation (EFF) believe the wiretap-ready systems penetrated by the Chinese hackers were "likely created to facilitate smooth compliance with wrong-headed laws like CALEA." CALEA, known in full as the Communications Assistance for Law Enforcement Act, dates back to 1994 and "forced telephone companies to redesign their network architectures to make it easier for law enforcement to wiretap digital telephone calls," according to an EFF guide to the law. A decade later it was expanded to encompass internet service providers, who were targeted by Salt Typhoon.

"That's right," comment Mullin and Cohn. "The path for law enforcement access set up by these companies was apparently compromised and used by China-backed hackers."

Ignored Precedents

This isn't the first time that CALEA-mandated wiretapping backdoors have been exploited by hackers. As computer security expert Nicholas Weaver pointed out for Lawfare in 2015, "any phone switch sold in the US must include the ability to efficiently tap a large number of calls. And since the US represents such a major market, this means virtually every phone switch sold worldwide contains 'lawful intercept' functionality."

Two decades ago, that mandatory wiretapping capability was subverted by hackers targeting Vodafone Greece. They intercepted phone conversations of the country's prime minister and high political, law enforcement, and military officials, among others.

Which is to say that nobody appears to have learned anything between the 2004 hacking of government-mandated wiretapping capabilities at a Greek telecom and the 2024 hacking of government-mandated wiretapping capabilities at U.S. internet service providers. Well, unless we're counting the Chinese hackers. They seem to have learned quite a bit from the earlier experience.

It should be needless to say, but let's say it anyway: this was all predictable and preventable.

'The Problem With Backdoors'

"The problem with backdoors is known—any alternate channel devoted to access by one party will undoubtedly be discovered, accessed, and abused by another," David Ruiz of the internet security firm Malwarebytes Labs wrote in 2019. He noted that cybersecurity researchers had been making that argument for years. They've been repeating themselves for years because their warnings appear to fall on deaf ears.

Even some believers in backdoors on specific devices concede that building wiretapping into whole communications systems is too dangerous to contemplate. A 2019 paper from the Carnegie Endowment for Peace's Encryption Working Group thought "some forms of access to encrypted information, such as access to data at rest on mobile phones, should be further discussed," but cautioned that compromising the security of what it called "data in motion" (communications networks) "would create a massive target for criminal and foreign intelligence adversaries."

Such foreign intelligence adversaries, for instance, as hackers sponsored by the Chinese government to penetrate U.S. internet firms.

So, just how dangerous was the Salt Typhoon hack?

'A Potentially Catastrophic Breach'

"The widespread compromise is considered a potentially catastrophic security breach," adds The Wall Street Journal. "It appeared to be geared toward intelligence collection."

China's state-sponsored hackers are continuously targeting U.S. infrastructure, including water-treatment facilities and the electricity grid. They've also penetrated pipeline systems. "The PRC's targeting of our critical infrastructure is both broad and unrelenting," FBI Director Christopher Wray warned in April, referring to the People's Republic of China.

The U.S. Cybersecurity and Infrastructure Security Agency cautions that "PRC state-sponsored cyber actors are seeking to pre-position themselves on information technology (IT) networks for disruptive or destructive cyberattacks against U.S. critical infrastructure in the event of a major crisis or conflict with the United States."

And yes, the U.S. government is probably returning the favor by hacking systems in China and elsewhere. But that will be cold comfort if the lights go out here because the feds essentially rolled out the red carpet for foreign infiltration of American networks.

The debate over information security has raged for years with people like Edward Snowden pointing out that law enforcement agencies can't be trusted with access to our communications, or to abide by the rules that theoretically define when and how they can snoop. Now we know that they aren't competent custodians of wiretapping systems that privacy advocates warned were open invitations to bad actors.

Salt Typhoon may have done enormous damage to American security by penetrating internet systems relied on by private individuals, businesses, utilities, and government agencies. If it leads to the end of government-mandated backdoors that offer easy access to hackers, some good could come of this.

The post Chinese Hackers Used U.S. Government-Mandated Wiretap Systems appeared first on Reason.com.

Read the whole story
kazriko
39 days ago
reply
Colorado Plateau
Share this story
Delete
Next Page of Stories