Twitter and Facebook were paralyzed this past week by DDOS (distributed denial of service) attacks. As I understand it, those attacks are still ongoing. In this Wired Epicenter blog post by Eliot Van Buskirk, open source advocates propose that the only real solution to this vulnerability is to engage in another DDOS: "distributed delivery of service." As Bittorent is to filesharing, the thinking goes, so would an open microblogging network be to 140-character thought-blips.
“The total failure of Twitter during the DDoS attacks highlights the fact that, with Twitter, we're relying on a single service for mass communication of this type,” said open microblogging supporter and Ektron CTO Bill Cava. “Most everyone understands it's ridiculous to expect one service to provide email support to the world. The same is true for micro messaging. The reality is, it can’t and won’t continue this way for too much longer.”
Open Source 'Twitter' Could Fend Off the Next Twitpocalypse (wired.com Epicenter blog, thanks, Matt Katz)
The OpenMicroBlogging standard already exists -- it’s just that Twitter’s not playing along, possibly because it could lose market share if the open standard succeeds before it manages to monetize its service. One platform that adheres to the Open MicroBlogging (OMB) standard is Laconi.ca, an open-source Twitter-style network launched by Status.net on July 2 of last year (others include OpenMicroBlogger and Google’s Jaiku).
Laconi.ca, which seems to have gained more traction than the other two OMB platforms, forms the backbone of Identi.ca — an open-source Twitter clone with features Twitter lacks (image uploading, trackbacks, native video playback, OpenID) that lets you post updates to its own network as well as Twitter and Facebook. Status.net will soon add the ability to follow Twitter and Facebook feeds using the corresponding APIs, so users will soon be able to make Identi.ca their default short messaging communications hub -- even if those services won’t use the open standard.
When security firm Sucuri investigated the source of a 50,000-request/second DDoS attack on a jewelry shop, they discovered to their surprise that the attacks originated on a botnet made of hacked 25,500+ CCTV cameras in 105 countries.
In Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?, security researchers from Penn, Dartmouth and USC conducted an excellent piece of ethnographic research on health workers, shadowing them as they moved through their work environments, blithely ignoring, circumventing and sabotaging the information security measures imposed by their IT […]
In a new paper, researchers from Ben-Gurion University demonstrate a fiendishly clever procedure for getting data off of airgapped computers that have had their speakers removed to prevent acoustic data-transmission: instead of playing sound through the target computer’s speakers, they attack its fans, varying their speeds to produce subtle sounds that humans can barely notice, […]
Folks used to rely on alarms to protect their home – and before that, the family dog. Now, anyone looking to guard their homes can choose from some high-tech options, including the Amaryllo iCamPRO FHD Home Security Camera (now just $219 in the Boing Boing Store).In fact, this 2015 CES “Best of Innovation” award-winner boasts so many features, it’s […]
If you want a quality vaping experience, it’s usually going to cost you. Vaporizers that deliver a fast, controlled burn will set you back up to $300, which is why the FEZ Vaporizer (now just $99) is an absolute steal.The FEZ dry herb pen does everything that more expensive models handle at a reduced price. It heats up […]
Taking pictures can be challenging. There are a million factors that can influence each shot you take – and unless you’re a trained photographer, you often just focus, click…and cross your fingers.Of course, you can take some of the ambiguity out of your picture-taking with this Hollywood Art Institute Photography Course & Certification package, now […]