ChaseDream

标题: 【Native Speaker每日综合训练—40系列】【40-08】科技 Black Hat [打印本页]

作者: cherry6891    时间: 2014-8-11 22:55
标题: 【Native Speaker每日综合训练—40系列】【40-08】科技 Black Hat
内容:cherry6891   编辑: cherry6891

公益申请,每月一名  

Stay tuned to our latest post! Follow us here ---> http://weibo.com/u/3476904471

Part I: Speaker

Cyber Currencies Get Boost from High-Profile Endorsements
Virtual currency was on the ropes earlier this year. Bitcoin, the preeminent peer-to-peer online payment system, saw its value slashed by more than half after its largest exchange was hacked and shut down. Yet the fortunes of cryptocurrency have recently rebounded.

Apple used to block programs from its App Store that managed or otherwise dealt in bitcoin and its ilk. Now, though, Apple will allow iOS developers to support the use of certain cyber coinage. Apple has yet to say which of the dozens of cyber currencies out there it will now honor.

Meanwhile, satellite TV provider Dish Network will soon start letting its 14 million household subscribers pay their monthly bills using bitcoin. And rapper 50 Cent is accepting bitcoin as payment for his latest album. By the way, at this moment’s exchange rate, 50 Cent would also be known as 0.00075 Bitcoin. Not as catchy.

Such high-profile endorsements should help bring cyber tokens closer to the mainstream, even though there’s a risk that they’ll go down in value once you buy them. Still, U.S. consumers might be open to the idea. They’ve been hooked on a virtual currency for decades. It’s called credit cards.

source: Scientific American
http://www.scientificamerican.com/podcast/episode/cyber-currencies-get-boost-from-high-profile-endorsements1/

[Rephrase 1, 1:24]
作者: cherry6891    时间: 2014-8-11 22:55
Part II: Speed

Black Hat: Google Glass Can Steal Your Passcodes
Footage of people unlocking their phones can be used to steal mobile passcodes even if the typing can’t be seen.
By Tom Simonite on August 7, 2014


Time2
Criticism of Google Glass has often focused on the way its camera makes surreptitious video recording too easy. Now researchers have shown that footage captured by the face-mounted camera could also pose a security threat.

Software developed by the researchers can automatically recover the passcodes of people recorded on video as they type in their credentials, even when the screen itself is not visible to the camera. The attack works by watching the movement of the fingers to work out what keys they are touching. It also works on footage from camcorders, webcams, and smartphones, but Glass offers perhaps the subtlest way to stage it.

The work suggests that “shoulder surfing”—stealing passwords or other data by watching someone at a computer—could become more of a threat as digital cameras and powerful image processing software become more common.

In tests where people stood three meters away from the camera, the software was around 90 percent accurate at capturing four-character-long strings typed on the iPhone’s QWERTY keyboard. The researchers say that the method could theoretically reconstruct a short e-mail or SMS.

“With Glass it’s very sneaky,” says Qinggang Yue, a grad student at the University of Massachusetts, Lowell, who carried out the research with colleagues Xinwen Fu and Zhen Ling.

When Yue met with MIT Technology Review at the Black Hat security conference, where he had presented his findings on Wednesday, he glanced around the busy press room and instantly identified a handful of people pecking away on touch screens that might be vulnerable to such an attack.

Yue has also shown that video footage can be used to recover passcodes at some distance. In one set of experiments, a camcorder held by someone at a first-floor window was used to successfully capture the passcode of someone using an iPad just over 43 meters away. “With a long-focal-length camera it could be much further,” says Yue.[316 words]

Time3
To capture a passcode, the software must identify the position and orientation of a device’s screen as well as the position of a person’s fingertips tapping on it. Yue and colleagues used machine learning to train software to tackle both those problems. The software runs on a PC, so footage captured with Google Glass must be downloaded to extract any passcodes.

The software automatically finds a device captured in a piece of footage. It then identifies the position of its screen’s four corners, and tracks the velocity of a person’s fingertip.

The researchers are currently testing ways to defend against such software-enhanced shoulder surfing. One countermeasure involves randomly swapping the keys on a standard keypad around, so that software can’t correctly translate each tap. Another involves having buttons drift around instead of staying fixed to a standard grid.[138 words]

source:MIT Technology Review
http://www.technologyreview.com/news/529896/black-hat-google-glass-can-steal-your-passcodes/


Car Security Is Likely to Worsen, Researchers Say
In-car applications and wireless connectivity are a boon to hackers who take aim at cars.
By Robert Lemos on August 8, 2014


Time4
As more cars come with wireless connectivity and in-car apps, more of them will be vulnerable to potentially dangerous hacking, two well-known researchers warned at the Black Hat security conference in Las Vegas on Wednesday.

In a study of nearly 20 different vehicles, Charlie Miller, a security engineer with Twitter, and Chris Valasek, director of vehicle security research with security services firm ioActive, concluded that most control systems were not designed with security in mind and could be compromised remotely. The pair created cybersecurity ratings for the vehicles, which will be published in a paper later this week.

When you are looking to buy a car, you can pick up a magazine and it will tell you, ‘Here are the safety features of this car,’” Valasek said. “Why can’t we, as the security industry, start making reports that say, ‘These cars have good cybersecurity and these cars don’t have good cybersecurity’?”

As the automotive industry has added more digital control systems and embedded computers, vehicles have become easier to hack. In 2011, researchers from the University of Washington and the University of California San Diego analyzed  a midpriced sedan, discovering that it could be compromised via either a disk inserted in its CD player, the diagnostic equipment used by mechanics, or a cellular connection.[214 words]

Time5
Since then, other research groups have studied car security and demonstrated ways to take control of brakes, acceleration, and other functions. High-end vehicles often have computerized control of the brakes and acceleration, for collision prevention and intelligence cruise control, and automated steering to allow self-parking and the ability to remain centered in a lane.

Attacks on automotive control systems involve three steps, according to Valasek and Miller. An attacker must first find a way to exploit a vehicle system, then use that vulnerability to send a command to the electronic control unit (ECU), and finally get the ECU to execute the command.

Because of the proliferation of wireless access in vehicles, especially Bluetooth and cellular connectivity, remote execution is increasingly possible. The feasibility of sending commands to the electronic control units that manage different vehicle functions depends on the design of the car.

Car companies need to design their systems to detect exploitation attempts and prevent security from being compromised, Miller said: “You want to make each of these three steps harder for the attacker.”

But with car manufacturers competing on features, the addition of in-car applications from navigation to streaming music could leave more vehicles vulnerable, Miller added. “In-car apps and desktop-like features pose huge upcoming threats,” he said.

Designing security into vehicles is especially important because applying software patches is problematic. Updating the software in a car means bringing the vehicle to a dealer for service, a step that most owners will not take.

When you get [recall] notices in mail, you ignore them,” Valasek said. “It is going to be really hard, if a real live exploit comes out, to patch the problem.”
[276 words]

source:
http://www.technologyreview.com/news/529681/black-hat-car-security-is-likely-to-worsen-researchers-say/


Most Smartphones Come with a Poorly Secured Back Door
A system designed to let carriers remotely install software on phones, or change their settings without a user noticing, is open to abuse.
By Tom Simonite on August 7, 2014


Time6
A powerful remote-control system installed on most smartphones could be used by hackers to secretly take control of many devices, allowing theft of data or eavesdropping on communications.

Wireless carriers install the mechanism, known as ODM, in phones, tablets, and even cars as a way to distribute software updates and make configuration changes. Researchers with the computer security company Accuvant uncovered a series of flaws with ODM that could be exploited to gain the same remote-control powers.

In their tests, the Accuvant researchers could take over devices made by Apple and other major manufacturers. They gained the power to install any software on the devices, which would allow them to steal sensitive data. “An attacker can take full control,” said Mathew Solnik, a research scientist at Accuvant who presented the research at the Black Hat computer security conference Wednesday with colleague Marc Blanchou.

The attacks could also be used to reconfigure settings on a device—for example, to cause all data to flow via a server designed to collect communications. Many such settings are installed into a devices “baseband” and are more or less impossible to erase. “Even if you ‘factory reset,’ you still can’t get rid of it,” says Solnik.

An estimated two billion cellular devices around the world have the ODM protocol installed, according to the researchers. Somewhere between 70 and 90 percent of those devices have been equipped with the same software package, made by Red Bend Software of Waltham, Massachusetts, to handle the remote-control functionality.

Despite its crucial role, that package hasn’t been updated substantially since 2004, said Solnik. He and Blanchou performed their proof-of-principle attacks using a suite of flaws found in that software, as well as in the design of the ODM protocol itself.

An attack requires either using a carrier’s infrastructure to communicate with phones or using a base station of your own. That’s easier than it might sound. Accuvant’s researchers were able to use off-the-shelf hardware and an open-source software package to create a system that would connect to phones within a 30-foot radius at relatively low cost (see “Build Your Own Cellular Network”). “With a single silent message, someone who is not your carrier can access the full functionality of your device,” said Solnik.

Android devices were found to be most vulnerable. The researchers could take over Apple devices only on Sprint’s network. Fully unlocked devices bought directly from a phone manufacturer were the most secure, because most didn’t have ODM software installed.

Accuvant disclosed its findings 90 days ago to Red Bend, the device manufacturers, and the wireless carriers affected. Several, including Red Bend, have already released patches to fix the problems, although it is unknown how widely they have been distributed.

Solnik believes attacks via ODM will remain possible even after those patches are applied. Flaws discovered in the way the ODM protocol connects to a device can’t be fixed until the industry agrees on a new design, he says.

The problems uncovered by Accuvant could also be of interest to law enforcement and surveillance agencies, which increasingly use malware to collect data. In the United States, it has become common for them to use mobile base stations to intercept text messages, phone calls, and data sent by nearby phones. Solnik told MIT Technology Review the same technology could be used as a platform for attacks like those he developed. For example, it could silently push malware onto phones. “It would be a similar type of device,” he said. [580 words]

source:
http://www.technologyreview.com/news/529676/black-hat-most-smartphones-come-with-a-poorly-secured-back-door/



作者: cherry6891    时间: 2014-8-11 22:55
Part III: Obstacle

Bitcoin Transaction Malleability – Lies Decrypted
One week. Four headline events. Culprit: Transaction Malleability. Although the media grouped the events under the single banner of Transaction Malleability, a closer look reveals that the three incidents involving Mt.Gox, a DDoS attack, Silk Road 2.0 and the Bitcoin client were in fact each unique and in two cases not even related to transaction malleability at all.
To understand Transaction Malleability we have to define some terms:

Malleability – the quality of being pliable without breaking – often used in reference to metals, but in this context it simply means “changeable without breaking the transaction”

Hash – a hash function is an algorithm that maps data of arbitrary length to data of a fixed length. The fixed length data so obtained is called a hash and it is irreversible, ie. the original data cannot be deduced from it’s hash.

Signature – a digital signature is a mathematical scheme for demonstrating the authenticity of a digital message, document, or in this case, a digital transaction. Bitcoin uses public and private key pairs to encrypt transactions and digitally sign them.

Transactions and Malleability
The transaction id that we’re familiar with is a hash of all of the components that make up a Bitcoin transaction. The transaction components include various facts (transaction amount, date, target address, etc), as well as, digital objects such as encryption signatures and what are referred to as “inputs”. Transaction inputs contain information about previous transactions involving the same bitcoins currently being spent. To protect this data from tampering, hashes of certain components are calculated and signed – amongst them the transaction inputs, whose signature (called “input.scriptSig”) is also used to sign the entire transaction and this produces the hash we know as the transaction id.

Since it is not logically possible for a signature to sign itself (chickens and eggs!), a final signature will always be an appendage – an attached but separate part of the digital package (in this case a transaction) it has signed. Whilst the transaction as a whole, or in part, cannot be changed without breaking validity in relation to the signature, the signature can be changed. The extent to which the signature can be changed before the change breaks validity in relation to the transaction is what is referred to as “Malleability”.

So, given a transaction and its accompanying valid digital signature, it is possible for someone to generate an equivalent signature, but with the caveat that the transaction id hash will also change in response. When injected into the network, both the original and malleated version of the transaction are equally “real” as far as the nodes on the network are concerned. Remember that the transaction itself has not changed. In fact, a change to any aspect of the transaction other than the input.scriptSig would render the entire transaction invalid and it would be rejected by network nodes. Since nothing about the transaction inputs or outputs (amount, timestamp, target address) has changed, our malleated transaction may be included in a block by a miner, thereby being confirmed, and the receiving party will get paid. The equally valid original transaction will in this case be picked up as an attempt to double spend and the network will reject it. Hence, transaction malleability does not pose a security threat on the network and it’s exploitation does not make double-spending possible in the normal protocol flow.

Transaction Malleablity score: 1/10
Whereas the Bitcoin protocol and standard wallet are able to function correctly in the face of malleated transactions – which kind of renders “malleation” pointless – the scenario changes quite drastically when we consider a non-standard wallet that has failed to make provision for transaction malleability in its design. If a custom wallet were to, say, use transaction id as a primary identifier when looking to the network for transaction confirmation, then malleation would compromise its ability to do so.

Miners have no preference (or ability to distinguish) between an original transaction and its malleated version, so it is a matter of fate as to which one gets mined first and thus confirmed on the network. Confirmation is made by transaction id: whichever version of the transaction confirms first, that will be the txn id referenced in each subsequent confirmation. If the original version confirms first then all is well: the recipient gets paid and the custom wallet will see the confirmation by looking for the transaction id in the blockchain. However, were the malleated transaction  confirmed first, then the scenario for the custom wallet becomes an exception: although the receiver would have been paid (and the malleated version of the transaction confirmed); the custom wallet will not see confirmation of the original trxnid it sent out. Combine this with a support policy of resubmitting payment of unconfirmed transactions and you can see the exploit:
A person withdraws bitcoins from their Mt.Gox account to their private wallet and at the same time injects a malleated version of the transaction into the network. If the malleated version is confirmed first then it would be certain that Mt.Gox will not receive confirmation of the original. The person then emails support: “I withdrew 10BTC yesterday – it left my account but i never received it…” Support staff look for confirmation of the transaction and don’t find it, although the BTC had clearly left the customer’s account. And, so, they resubmit payment – but not via the same transaction id or transaction inputs – but a completely new transaction spending different coins!

Had Mt.Gox only used the same inputs as used in the original unconfirmed transaction, that would have registered on the network as a double-spend and would have set off some alarm bells. That this definitely happened at Mt.Gox can be deduced from both their actions and statements during the past several months. The extent to which this affected them is unknown, but it certainly was severe enough to halt all BTC withdrawals, risk customer defection and leave them to watch their exchange for BTCUSD get traded into the ground.

Distributed Denial of Service (DDoS) Attack
Transaction Malleablity score: 7/10

After Mt.Gox publicized the issue of malleability, and word got about of their wallet not taking it into account, it was only a matter of time before some opportunists turned it on the Bitcoin network. The attackers took full advantage of the transaction malleability issue and opened the flood gates. Poor custom wallet implementations at Bitstamp and BTC-e were immediately shown up and their suspension of BTC withdrawals indicated that they were using transaction id to verify confirmations.

The Bitcoin developers offered support in the IRC channels and soon the DDoS attack was circumvented and BTC withdrawals were resumed. Note that the DDoS affected those exchanges that had poor wallet implementations – the Bitcoin network remained unscathed thanks to proper implementation of the standard Bitcoin QT wallet.

Bitcoin QT Wallet Client
Transaction Malleablity score: 0/10
The client was not handling the display of attempted double-spend gracefully and during the past week this issue came to the fore. The score here is zero because the wallet is implemented with transaction malleability in mind and the bug being fixed for the upcoming release is merely a display bug. Due to the complexity of the Bitcoin protocol’s encryption and signature model, the developers only expect to eliminate this issue after a few years. In IRC, Jeff Garzik said in response to a question about whether transaction malleability can be solved:

Silk Road 2.0
Transaction Malleablity score: 0/10

The spin that transaction malleability caused all client funds to be stolen from the Silk Road mainframe is so thin that no-one even bothers to debate it!
[1262 words]
source:
http://www.cryptocoinsnews.com/news/bitcoin-transaction-malleability/2014/02/16


作者: vivianpdn    时间: 2014-8-11 23:02
啊哈,sofa~~~明天再来拜

-------------------------------------------------------------

2'38
1)today software is more vulnerable to passcodes .
2)"shoulder surfing"--more common in losing private information.
3)video footage is make it possible to recover passcodes.

50''
1)scientists have found ways to solve the problem of capturing passcodes.
2)they are testing ways to defend against shoulder surfing.

1'41
1)cars are equipped with wireless connectivity,which is more vulnerable to potentially hacking.
2)vehicles are now getting easier to hack.

1'50
1)other research groups are illustrate ways to take control of functions such as brakes and acceleration.
2)design security into vehicles are important because applying software is problematic.

3'36
1)remote-control system in smartphones is more vulnerable to hacker.
2)though ODM protocal device is play a crucial in security,the package has not been updated substantially since 2004.
3)Androids found to be most vulnerable to hackers.

作者: charming9386    时间: 2014-8-11 23:28
晚安
作者: 菜农人民    时间: 2014-8-11 23:38
speaker:
Although virtual currencies was on the ropes, the fortune of such tokens were rebounded. like Apple who support programs of payment of cyber coinage in apple shop, DN let its users pay their bills by bitcoin. Even rapper accepted bitcoin.

Time2:3:14
Time3: 1:33
Time4: 2:19
Time5: 3:02
Time6: 6:33

作者: cynthia0114    时间: 2014-8-12 00:00
所以每天的阅读任务是在这里回帖吗?
作者: 疏离无罪    时间: 2014-8-12 00:55
先占~~~~~~~
感觉这个要成第一个被删的回帖了
作者: ZOEYZHANG114    时间: 2014-8-12 03:09
thank you sooo much
作者: yding49149    时间: 2014-8-12 04:54
2'01
49'
1'02
1'08
2'38
7'04
作者: herocool66    时间: 2014-8-12 07:06
今天的听力真的听了好几遍才听懂- - 越障基本失败了。。。看来以后还是要多多看科技文。非常感谢楼主大神!~
Speakers:
Cyber currencies get boost from high-profile endorsements.
Time-2
A grad student found that Google Glass can steal our passcodes.
Time-3
How the software work and some measures we can take to defend against the software.
Time-4
A instuction about the cybersecurity ratings for the vehicles will be published because more cars come with control systems.
Time-5
Attacks on automotive control systems involve three steps.
In-car apps would make the security more vulnerable.
The design of security systems is important and updating is problematic.
Time-6
Mainidea:most smartphones come with a poorly secured back door.
Structure:
1)background:A syetem on most smartphnoes can be used by hackers to collect secret data
2)Research:ODM let hackers take full control of all devices.
3)Android devices are most vulnerable
4)the new patch cannot deal with the problem entirely
5)law enforcement and surveillance agencies increasingly use malware to collect data
Obstacle:
Mainidea:Bitcoin transaction malleability lies decrypted
Structure:
1)What is the Malleability,Hash and Signaature
2)Introduce transactions and Malleability
3)The scores

作者: cyndichiang    时间: 2014-8-12 07:49
Time2 2‘03’‘
Google glasses can steal passcords on your screens from many meters away

Time3 0'42''
The software needs identify the position and orientation of the fingers to steal the passcord.
countermeasures

Time4 1'22''
Cars are potentially hacked as the more embedded digital control system and apps are used widely.

Time5 2'02''
Three steps to attack a digital in-car system
In-car apps would make the security more vulnerable.
Designing security is important and updating is problematic

Time6 2'42''
Remote-control system makes smartphone more vulnerable to be hacked,
ODM protocol can easily install any apps in your smartphone and steal your personal data.
Law agencies are aware of the supervision of the security problems in the smart world.
作者: wangweiyi5332    时间: 2014-8-12 07:55
~~~~~~~~~~~占~~~~~~~~~~~~···
作者: 公元前334    时间: 2014-8-12 09:21
1:57 MIT students discover GG can detect MID passcode easily.
0:53 How GG steels the passcode, efforts to prevent it.
0:59 Car has limited cybersecurity that makes it easily to be hacked.
1:58 Three ways to hack the car. Car manufacture should take action to prevent it.
3:40 ODM opens the door to hack Smartphones.
作者: charming9386    时间: 2014-8-12 09:33
12 AUG
SPEED
01:11 [316 words]
Mainidea:Google can steal your passcodes
Structure:
         1)background
           People criticize the Google glass for stealing the passcodes,but now the footage camera also can steal the passcodes.
         2)research by MIT student
           the student conducted the research on Wednesday
         3)the footage video can also steal the passcodes at some distance

00:38 [138 words]
Mainidea:the software must detect the position and orientation of screen as well as the position of the fingertips tapping on it.
         In the mean time,the researchers are testing the ways to defend against the software.

00:51 [214 words]
Mainidea:the security of the car seems to worsen because more and more in-car apps and wireless connectivity are used
         and the cars are inclined to encounter the hacker.

01:22 [276 words]
Mainidea:In order to attack the cars,there are three steps.And many dealer will not update the software because this upstating will bring the dealer the service

02:19 [580 words]
Mainidea:most smartphones have a poor security backdoor.
Structure:
         1)background
           most remote-control smartphnoes can be used by hackers to collect secrete data.
         2)ODM system
           ODM distribute the software and can be used to remote-control power
         3)Android system also can be attacked        
           Android maybe can be found most vulnerable

Obstacle:
06:00 [1262 words]
Mainidea:Bitcoin transaction malleability lies decrypted
Structure:
          1)introduce the malleabitily
            exchange without breaking
          2)the relationship between the malleability and signature
            giving a valid transaction needs a valid digital signature
          3)the scores of varous aspects
作者: 彩蝶    时间: 2014-8-12 10:02
占座。加油完成作业。
1:43
0:57
1:03
2:14
4:20
感觉很不适合读科技的文章,真的不知道怎么概括。多读,继续努力吧。
作者: 风随心动01    时间: 2014-8-12 10:08
标题: 谢谢Cherry~
Speaker:
听美音好不习惯
-The vitrual currency was on the ropes earlier this year, but have rebounded.
-Apple plans to used it on Appstores.
-The satelliate use it as payment.
-The future of VC
作者: yaomincui    时间: 2014-8-12 10:14
speaker (其实不是听的很明白额)
the use of virtual currency
credit cards

time2
Google glass faces the criticism of security threat
many software developed now can steal the password from the user without using the camera
they steal the password through the movement of fingers
C has displayed the process to steal the password successfully from a people in short distance

time3
to capture a password, one should know the position or orientation of the device and the movement of fingers from users
to protect the users, one way to solve the problem is to disorder the keyboard and make the movement of fingers fails to connect with the information

time4
nowadays there are more and more people to have apps in their car
one research announces that the apps will lower the safety of the car and make it easier to attack
once you went to buy a car, the seller will tell you that the car in his shop is not vulnerable for attacking

time5
the attackers attack the vehicles from three aspects
the new development of security devices must make it more difficult to attack from these three ways
now the producer usually enhances the outlook of a car and also installs lots of apps in the car such as navigation function

time6
smartphone is much vulnerable to hacker because of the system ODM
it's much easier to steal the information in your phone than you thought
although the situation is crucial for ODM, they still can not solve the problem
the new patch cannot cope with the problem entirely
nowadays increasingly people would like to use xx to send messages or communicate with friends

obstacle(啊啊啊啊对这种科技文什么计算机啊电脑啊不感冒啊……看晕了)
introduction of the basic concepts
hash: disorder the information
malleability: ability without blend
signature: the scene of digital information
how the decipher the code
作者: HolliHuang    时间: 2014-8-12 10:29
来啦~~
time1-2'01
time2-0'54
time3-2'16
time4-1'33
time5-2'38
time6-6'15
作者: MAGGIEHE1993    时间: 2014-8-12 10:30
二环~~~~~~~~~~~~~~~~~谢谢楼主~~~~~~~~~~~~~
-----------------------------------------------------------------------------------------------------------
Speaker: Virtual currency was on the ropes earlier this year. But Apple still will allow iOS developers to support
         the use of certain cyber coinage. One of the satellite TV providers also will encourage the use of bitcoin.
time2: 1min 50"
       Google Glass is criticised for easily stealing others' password and vedio footage.
time3: 50"
       After learning how the software capturing a passcode, researchers are currently testing ways to defend against
       such software-enhanced shoulder surfing.
time4: 1min 30"
       As the automotive industry has added more digital control systems and embedded computers, vehicles have become
       easier to hack.
time5: 1min 43"
       Other research groups have studied car security and demonstrated ways to take control of brakes, acceleration,
       and other functions. Car companies need to desigh their systems to detect exploitation attempts and prevent
       security from being compromised.
time6: 3min 49"
       A powerful remote-control system, ODM, installed on most smartphones could be used by hackers to secretly take
       control of many devices, allowing theft of data or eavesdropping on communications.
Obstacle: 9min 34"
       这越障不太看得懂额。。。。。。

作者: slave918    时间: 2014-8-12 11:17
T2 2:34
Google glass can easily uncover the passcodes, even e-mail, by watching you taping.
An researcher suggest that many people are under that risk and google glass can do so in a long distance.
T3 1:33
The software need to identify the position and orientation of both the computer and user.
2 countermeasures.
T4 1:26
As more cars were installed digital systems, they are more prone to be hack.
The researchers made a magazine that rates the security of cars.
T5 2:04
3 steps that a hacker need to compromise the system of a car.
As the application rise, cars are under more risk.
A security method is necessary.
T6
ODM is under a great risk of being hack.
Andriod is most vulnerable.
Patches are not useful unless a new design is make.
This bug would be used by law enforcement or surveillance agencies.

作者: Dmyzywy    时间: 2014-8-12 11:22
TIMER 2:[2'10]
  critics about google glass(security threat)
  researchers-> video can recover passcodes(longer distance and undetectable way)

TIMER 3:[0'58]
  the way google glasses capture passcodes->footages+ fingertips
  solutions.

TIMER 4:[1'20]
  wireless+ in car apps->decline the security level.
  digital control system ->easy to hack.
  car companies don't pay attention to this problem.

TIMER 5:[1'37]
  researches on car security
  3 steps to attack a car.
  three aspects:1.car companies; 2.in-car applications; 3.designing security systems.

TIMER 6:[3'10]
  smart phones->easier to hack
  ODM.
  disadvantages about ODM.
  comparison between APPle and Andriod.
  will remain possible to hack ->until new techniques.

OBSTACLE:[5'06]
  to understand- first:define.
  relationship between malleabitily and transaction
  the way bitcorn-> real money and trans rate.
还讲了一些比特币的安全问题和出现问题时,B公司一些不合适的处理办法。。
不是很懂。。。
作者: cyndichiang    时间: 2014-8-12 11:50
Obstacle: 8'03''
1.definition of some terms :
Malleability n. 顺从;可锻性;展延性:The extent to which the signature can be changed before the change breaks validity in relation to the transaction
decrypt vt.破译;解释
Hash 一种算法


作者: cynthia.bai    时间: 2014-8-12 13:33
Speed

Time2: 316; 3min30
Google glass poses a security threat; its camera and corresponding software can capture the movement of fingers accurately, although the test people stand far away from the camera.

Time3: 138; 1min38
In order to capture passcode, the camera must identify:1. the position and orientation of screen. 2.position of fingertips. YUE and others solved the problems.
2 ways to avoid capture:

Time4: 214; 2min18
As more and more digital devices(wifi, apps, disks) are embedded into cars, cars face security problems. And most cars lack security control system.

Time5: 276, 3min30
The intelligence device in cars: control brake and acceleration
Hack can attack cars by 3 steps
Some wireless devices make hack easier to attack; however, car companies need to design safe cars and update software.

Time6: 580, 6min29
Flaws of ODM can cause theft data in smartphones. Tests show that ODM can fully control phones. ODM can also reconfigure settings. The most of the world’s smartphones have such software package. ODM needs either a carrier’s infra or a base station to attack phones. Unlock phones are most secure phones. Flaws related to ODM can’t be fixed

作者: vsetteacher    时间: 2014-8-12 13:59
8/11/14
1:45,google glass can be a tool for spy
55, countermeasure to shoulder surfing
1:00, automobile with more digital systems and embedded computers can be easily hacked
1:35, 3 steps to hack a car. Cars are susceptible to hacking because owners are reluctant to update software.
3:08, ODM on the phone can entail huge risk of illegal attack
Obstacle, transaction malleability can be used by attackers to stole customers’ money. DDOS attack used by bitstamp and BTC successfully stopped them.

作者: sumy217    时间: 2014-8-12 15:25
Speed
1&2:Google glass poses a security threat. And the countermeasures are given to defend against it.

3.1:20s
The cars now with wireless connectivity and incar apps can be compromised remotely.

4 How do attackers control cars through incar app and it is a real problem we should pay attention.
5.ODM in smart phone make attackers steal your secret data.
作者: daisyjin    时间: 2014-8-12 15:30
2.
The passcode maybe stolen by camera, though it is not visible.
The experiment done, Yue identifies such item.

3.
The mechanism of copying pass code by camera.
The way to deter.

4.
The research shows that with the technology, the car is more likely to be hacked.
The maker will never tell which one is not cybersecurity.
For a middle priced car, simple to hack with the network.

5.
With car automatic, three steps to control the system.
Makers need to be more care about the security. However, with the competition, they always ignore it.
With more app and update, more danger.

6.
Software with ODM, which makes the hacker easy to hack. The research done to identify.
Reveal the result, which is wildly spread.
Andrew is the weakest.

Obstacle.
Different item, with Transaction Malleability.
The definition of malleability, hash, and signature.
The change of malleability and hash do not hamper the transaction, which does not get affected.
For original malleability and transaction, no fake. But not for coped one, which may transform the monetary silently.
Different item has different transaction malleability score.
作者: 林练练    时间: 2014-8-12 16:41
1'41
57
1'21
1'36
3'27

8'14并不太明白
作者: 油桃F    时间: 2014-8-12 17:05
Speaker
Cyber currencies rebound after slump.Apple supports usage of cyber coinage.Cyber currencies get boost from high-profile endorcements.

[Time 2] 2'26
Footage captured by camara can be used to steal passcodes.

[Time 3] 1'05
Researchers are now searching for methods to defend against shoulder surfing through software.

[Time 4] 1'22
Vehicles with digital equipments can be easily hacked and the company won't talk about cybersecurity.

[Time 5] 2'15
Attackers use three steps to hack vehicles and car company should focus on these three steps to improve security.The wide use of wireless can make it possible to control vehicles through romote execution.

[Time 6] 3'57
ODM has flaws that can allow your smartphone to be controlled.Android is more vulnerable than other systems.

Obstacle
1) defination of some terms
2) Transactions and Malleability:transaction malleability cannot pose a security threat and its exploitation doesn't make double-spending possible in the normal protocol flow.
3) Mr.Gox: it was severe enough to halt all BTC withdrawals, risk customer defection and leave them to watch their exchange for BTCUSD get traded into the ground.
4) a DDoS attack: the proper implementation of the standard Bitcoin QT wallet can prevent a DDoS attack.
5) Bitcoin QT Wallet Client: the bug is being fixed for the upcoming release.
6) Silk Road 2.0: the spin is so thin.
作者: ffffionabear    时间: 2014-8-12 18:14
感谢Cherry妹纸~占位先
----无限感恩~!!进击的阅读小分队~~你的作业(  ̄ー ̄)[冷笑]  不,是你的作业~~一天不做,浑身哆嗦~~--------------------------------------
[speaker]
Bitcoin make cyber currencies back to the hot topic again.Apple now make IOS support the use of Bitcoin which Apple used to block.
[speed]
1'53
Google glass may cause a secuity threat by identifying "shoulder surfing" and then stealing someone's passcode without opening the camera.
56'
There are two ways to avoid passcode stolen.One is ransomly swapping the keys on a standard keypay,the other is having buttons drift around.
1'05
As more wireless connectivity and in-car apps come with new cars,they are easier to be hacked.
1'42
If hackers attack on a on-car system,they have to suffer three steps.First,exploit a vehide system;second,use its vulnerability to send command to ECU,and finally get the ECU to execute the command.Anyone want to improve car security should focus on those steps.
1'52
Uncertificated remote-control system installed on smartphones rise the risk of being hacked.And Android devices were proved to be the most vulnerable.
[obstacle]看不懂给跪了~~比特币真是个忧桑的话题
5'13
main idea:In fact,Bitcoin doesn't have so-called transaction malleability.It do operate well among Mt.Gox,a DDoS attack and Silk Road 2.0,but it has nothing to do with transaction malleability,it's all about the signature and the malleated version.

作者: Vickyoo    时间: 2014-8-12 19:48
1、3’22” The first paragraph tells that stealing pass codes by using google glass is much easier, while it is also possible by smartphone. The author also mentions the way it works.
2、1’40“ A software is needed to do this. Researchers give advice to how to deal with this threat.
3、2’55” The use of wireless connectivity and in-car app threaten the safety of driving, then the author use a experiment to substantiate it.The author satirize the effectiveness of car security features.
4、3’39” The cars are becoming more and more automated, it is possible that a car can run by remote control. But at the same time, the risk of attacks has also increased.
5、3’47” The toxic message can take whole control of the infected phone, especially phones with Android software. Engineers are still working on it.
6、9’58” I read it all through.
作者: pphang    时间: 2014-8-12 20:33
Speaker
bitcoin becomes popular in many aspects

Speed
[time 2] 02:01
Google Glass was found pose a threat on the security by recovering the password or text

[time 3] 00:54
countermeasures of Google Glass threat

[time 4] 01:13
as cars become more digital, they are more vulnerable to hacking

[time 5] 01:45
steps to hack the cars and advice to deal with hacking

[time 6] 03:59
carriers allow smartphone to be vulnerable to hacking

Obstacle: 09:32
definition of some terms
malleability process
score

看到科技文好艰难~被越障绊了
作者: kun5850    时间: 2014-8-12 21:02
好久没来,生疏了。。
3‘23
2’32
2‘53
1’34
2‘41
4’53
》》》
8‘54

作者: crystal9291    时间: 2014-8-12 21:14
obstacle
input the same bitcoin currently being spent-->pro the data, ISS hash
sig changed bf break validity= M
mechanism:---TM no threat, no double-spending

no preference bt original & malleated---dif sequence
--exception: M first, resubmit, double spent
would have set off alarm bells, can be deduced

DDS:relevant
attack took advantage
BQT:irrelevant
the bug was fixed bf release
SRM: irrelevant
the amount is so thin
作者: Going    时间: 2014-8-12 21:59
Speaker: Virtual currency appears in people’s life. US customers do not reject such idea.

Time 2: 2:06
Time 3: Forget..
Time 4: forget..
Time 5: 1:38
Time 6: 3:36
Obstacle: 8:48

Time 2: Webcamera can expose password of users with software, even far from a long distance
Time 3: Researches are working on defend against such software.
Time 4: Automobile industrial also exist such security risks because of control system. Manufacturers are not pay much attention to it. The data can be easily disclosed.
Time 5: Ignore data security problems in automobile industrial will cause severe problems.
Time 6: Smartphone also exist such security problems due to ODM. Even with some precautions, it does not work well. Data can be all stolen. National security and surveillance will also be affected.

Obstacle: How the transaction happen. Not understand so much..

作者: 多啦A懵Jasmine    时间: 2014-8-12 22:02
[speaker]
Cyber currency is likely to brought back to the mainstream because of high-profile endorsement.
#1.Apple will allow ios app developers to support the use of bitcoin, an online payment
#2.A network providing satellite TV now allow its 14 million subscribers to pay using Bitcoin

[Speed]
Time2 - 2'48 [316w]
Google glass poses a security threat. Video footage taken while people typing can recover passwords. Yue's experiment have proved this.
Time3 - 1'06 [138w]
Certian software can enhance shoulder surfing. Yue's team is testing ways to defend against this.
Time4 - 1'41 [214w]
With wireless connection, cars are easier to hack. M&V concluded that control system of cars are secure enough.
Time5 - 2'16 [276w]
Wireless convenience made remote-control possible. In-car apps and desktop-like features are particularly vulnerable to be attacked.
Criminals attack in three steps:
#1.exploit a control system
#2.send command to ECU
#3.ECU execute command
Car designers should make it harder to attack.
Time6 - 3'31 [580w]
Research shows flawed ODM is easy to be manipulated. Factory set and patches might not solve the problem.

[obstacle] 1262w  看不懂啊看不懂。。。
12'14
definitions of malleability, hash and signature
transaction id is a hash of all the components that make up a Bitcoin transaction
malleability shows to what extent when signature change but doesn't break the transaction validity
original transaction and malleable transaction

作者: a2360239    时间: 2014-8-12 22:20
大家是怎么记录的呀呀呀~~~
作者: shirleyyou03    时间: 2014-8-12 23:43
2'47
40"
1'23
1'52
3'57
9'26
作者: wensd1111    时间: 2014-8-13 07:59
1 A 02:21
2 A 01:10
3 A 01:25
4 A 02:14
5 A 04:12
6 A 09:22
作者: MAGGIEHE1993    时间: 2014-8-13 08:32
。。。。。。。。。。。。。。。。。。。。。。。
作者: happyxgb    时间: 2014-8-13 10:22
这篇Obstacle简直惊人!我现在有一个小疑问,为什么每天训练突然觉得理解力跟速度都有点跟不上了,好像卡在一组一组的小词组上了。 有大牛能告诉我怎么回事嘛T.T
Time 2: 01:41
Time 3: 00:47
Time 4: 01:12
Time 5: 01:47
Time 6: 03:36
Obstacle: 06:!2
Three articles in one title actually have nothing to do with malleability
Definition of three terms
How Malleability works in the transaction
One example of Mt. Gox: the sequence of entering the confirmation was wrong, resulting in transaction open to the ground.
People were trying to test their accounts and thanks to the standard Bitcoin QT wallet, the actions were circumvented.
The Silk Road is identified as so easy to spot the cause.

作者: flhuihui1001    时间: 2014-8-13 12:02
2/    2’50
the devices can be attacked by figure movement.
Should surfing – steal by watch the movement  -- is  becoming more stronger
A’s presentation in the  conference. A can identify the people whose devices are vulnerable
AT: vedio footage – can get code at distance.

3/  2’47
Need to know the screen orientation and dinger position. A software can solve this problem. It activate the final and identify the orientation , finally track the finger movement.

Defend ways: 1 swap keys  2. Button shift

4/     2’ 41
App  + wireless – make car more vulnarabel
1 resrache:  CM , CV: most security system can be comprised  2. Introduce a c rating system
2.research  2: can hack the car by CD, cellular connection

5/   3’13
Attack of auto system: 3 steps:  expoile the veicle system, comman ECU, get ECU execute the command

Celluler  connection + Bluetooth make the vunarable – depends on the design
Car company need to design a system that can defend the hacking.
The in-car app – make car vulnerable.
Security into vehicle become more imporatant.

6/   6’17
Remote control and system in phone make it easy to be attacked
ODM – has flaws
Researcher can take over the devices and steal data.
Now 2 billion device with ODM, and  70 -90% with a package software
The invader can build own network to get access to the phone.

Android is the most vulnerable one.  The full unlock mobile phone is the most security one.
R B has start the patches.

S: after patch, ODM attack can still exist.
This hole can be a problem to law institution and police.  Since they use mobile base to send message.


OBSTACLE   12.57
The M means piable without breaking the metal.  Means changeable
Signiture: math scheme    bitcome encrypt digital signature
Id:  T components: variable facts + digital objects. The signature =input and can be used in the whole T process
M: exent to change the signature but not breaking the validaty of the transactions
M: sign pose no security threat , no double spending

0/10: wallent use id as primary indicator. M compromise this.
If the wallet the original sig: paid + confirmation
If the wallet get the M version: paid + no confirmation
This risk of double spending == risky enough to stop the Bitcom withdraw

DDOS: 7/10 M
Attacjer use M poor wallet show up. But developer use IRC to prevent invaders.

QT:  0/10    bug is fexed. And the issue will only be eliminated years after.

Silk Road:  0/10  little possibility of being stolen.

作者: Starlun    时间: 2014-8-13 22:34
Speaker 太快,只过了一遍. 最后一篇只知道主题是比特币,但具体讲了什么不是很清楚。。
=========================
(2:18) Google glass would be a threat to security as well as other technical machines.

(1:00) A software can capture the pass codes. Researchers try to find ways to defend it.

(1:18) Cars with wireless and apps have high risks to be hacked.

(1:57) There are 3 steps to attack a car by hackers. The steps should be prohibited by car manufacturers.

(4:00) The smartphones can be attacked by updating software automatically and changing the setting that cannot erase to let out the secrete data and private communication.

(11:50) Explain the terms. States the process of transaction. States problems sometime will meet about different between original version and m version.
All scores for each system.




作者: psychoarya    时间: 2014-8-14 00:20
占座!!
作者: lulalei    时间: 2014-8-14 09:27
[Time2] [316 words] 1’44
Google Glass can not only make surreptitious video recording but also recover passcodes at some distance.

[Time3] [138 words] 0’48
To capture a passcode, the software must identify the position and orientation of a device’s screen as well as the position of a person’s fingertips tapping on it. The researchers are working on ways to against the software.

[Time4] [214 words] 1’06
Cars are vulnerable to potentially dangerous hacking as more cars come with wireless connection. Automatic industry should increase cybersecurity of cars.

[Time5] [279 words] 1’43
Car companies need to design their systems to detect exploitation attempts and prevent security from being compromised.

[Time6] [580 words] 3’06
ODM installed in smartphones make them easy to be hacked.



作者: leo688    时间: 2014-8-15 00:09
Part III: Obstacle


Part I: Speaker
cyber currencies got high-profile endorsements
apply bans bitcoin, but allows some other cyber coinage
D network, TV network, accepts bitcoin for monthly fee
that helps cyber coinage into mainstream

[Time 2]
2'17
Google glass could be a tool for stealing personal info such as password
long distance is also vulnerable

[Time 3]
1'00
the positions of device and fingertips tapping are critical
countermeasures, swapping

[Time 4]
1'23
cars, easier to be hacked than before
mid price sedan

[Time 5]
1'32
hacker could manipulate the control sys of car
manufacturer should design better security for car
to update the software could patch the problem

[Time 6]
2'6
smart phones are vulnerable to hack
the backdoor open
OEM, ODM targeted
Android is comparatively worse
it hard to patch the problem because of the disagreement

Part III: Obstacle
6'3
definition, Malleability, Hash, Signature
transactions and Malleability
the scores of diff platform

作者: guown    时间: 2014-8-15 12:21
Time2+Time3:03'44
Google glass, the camera climbed-on-face,can steal the password by recording the motion of your hand .
The counter action is to fluid the password.
Time4:01:57
Time5:02'37
Car become more and more velunrable while there is not the standard to measure the safe degree of car at all.
There are three steps to attack the car. The manufacture should advance the safe degree.
The app make the car stolen easily.
Time6:04'50
The phones which carry the ODM are easier open to attack.Apple &Andorid. More unclosed, easier be attacked.
The consequences are bad:1.steal the sensitive data.2. operate the app.
Even though you reset the mobile phone, the virus is still there. And there are some patches aimed at these attack point.
The problems could be of interest to law enforcement and surveillance agencies to intercept the messages.

作者: Pumpkin-GMAT    时间: 2014-8-16 14:15
Speed
Time 2 - 1:54 - 316
Researchers have developed a software that can recover the passport of people recorded on video with Google Glass.

Time 3 - 0:45 - 138
two major problems toward this software
the researchers are now attempting new ways to defend against such software.

Time 4 - 1:17 - 214
With more digital controlled system added into the cars , some researchers have found that the vehicle will be more vulnerable to potentially dangerous hacking.

Time 5 - 1:42 - 276
three steps are involved to attack automotive control system
what the car companies should do to reduce such problems.

Time 6 - 3:47 - 580
ODM could be used by hackers to secretly control may divices.

Obstacle - 11:21
这一遍几乎是完全没有读懂······

作者: YajunJessica    时间: 2014-8-16 23:46
Time2:1'42''
Time 3: 0'48''
Time4: 1'10''
Time 5: 1'49''
Time 6: 3'39''
作者: sherry8730    时间: 2014-8-17 00:32
SPEAKER:
Crypto currency have recently rebounded.
Household pay their monthly bills using bitcoin.
help bring cyber tokens closer to the mainstream

SPEED:
Time2: 2:34
Main idea: the google glass can steal your passcodes
Structure:
footage captured by the face-mounted camera could also pose a security threat
The attack works by watching the movement of the fingers to work out what keys they are touching.
video footage can be used to recover passcodes at some distance.

Time3: 1:01
Structure:
the software must identify the position and orientation of a device’s screen as well as the position of a person’s fingertips tapping on it.
defend against such software-enhanced shoulder surfing.

Time4: 2:34
Main idea:
Car security is likely to be worsen
Structure:
more of them will be vulnerable to potentially dangerous hacking
vehicles have become easier to hack with digital system.

Time5: 1:58
Structure:
other research groups have studied car security and demonstrated ways to take control of brakes, acceleration, and other functions.
Attacks on automotive control systems involve three steps
Updating the software in a car means bringing the vehicle to a dealer for service

Time6: 4:23
Main idea: smartphone is easy to be remote control
Structure:
A powerful remote-control system installed on most smartphones could be used by hackers to secretly take control of many devices
Android devices were found to be most vulnerable
ODM will remain possible even after those patches are applied.
interest to law enforcement and surveillance agencies

OBSTACLE: 8:33
Main idea;Four headline events. Culprit: Transaction Malleability.
Structure:
Malleability-Hash-Signature
Transactions and Malleability
Transaction Malleablity score: 1/10
Distributed Denial of Service (DDoS) Attack---Transaction Malleablity score: 7/10
Bitcoin QT Wallet Client---Transaction Malleablity score: 0/10
Silk Road 2.0---Transaction Malleablity score: 0/10

作者: 不学习就要饭去    时间: 2014-8-17 02:54
Time 2 02:17.54
Wiht google glass, it's easy to steal password even SMS or email contents.

Time 3 00:55.93
How it works and how to defend from this.

Time 4 01:22.84
As more and more digital control add on, vehicles are easier to be hacked.

Time 5 01:58.78
explain details about how vehicles are vulnerable to be hacked.

Time 6 04:40.66
most phones can be hacked easy and give away info like data or being eavesdrop.
ODM installed in phones could be controlled and leak info.
Even with patch, attack through ODM is still possible.

作者: jokerking    时间: 2014-8-17 11:20

spk ; the fortunes of cryptocurrency have recently rebounded. APPLE used to block virtual currency, but now Apple will allow iOS developers to support the use of certain cyber coinage. US consumer will adapt this cybermoney because they were hooked on credit card for decades.a
spd :  1.37  0.40 Now researchers have shown that footage captured by the face-mounted camera could also pose a security threat. camera can capture the finger movement to identify the passcodes of user, even in a long distance.
       1.00 as the automative industry has added more digital cotrol system and embedded computers,vehicals have become easier to hack
       1.23 hacker only take three steps to remote execute your car. but prolific in-car apps and desktop-like features pose huge upcoming threats.
       2.53  ODM has some flaw backdoor which could be used to remotely install software on phones, or change settings without a user noticing.
      
作者: liranletgo    时间: 2014-8-22 11:00
Time2:2’24
  The passage tells us that Google Glass poses a security threat because it can stealing passwords or other data by watching someone at computer.

Time3:0’57
  The rationale of Google Glass to steal passwords is revealed.Some researchers are testing ways to defend against such software.

Time4:1’26
  The paragraph talks about that car security is likely to worsen as more digital control systems and embedded computers are added to vehicles.

Time5:2’08
  Some research groups have studied car security and demonstrated ways to control many functions. And it gives many suggestions to help car company and car owners to prevent security from being compromised.

Time6:4’00
  How hackers take control of many devices to steal data is revealed.And the capacity of different systems is different when attacked.

Obstacle:8’46
  不知所云。。。
作者: AgendaChen    时间: 2014-8-23 10:36
The camera in the electrical devices such as smartphone may be automatically used to recover the passcodes of people. And a student, named Qinggang Yue, has already made an experiment to prove this.
2m16s

The student figure out a way to solve the problem that it is not east for the software to identify the position and orientation of a device's screen and the position of a person's fingertips tapping on it. However, there are some approaches that can defend agaist such software-enforced shoulder surfing
52s

Nowadays cars can be easily controlled.
1m16s

The details of how to control a car.
2m11s

The flaws discovered in the ODM can be easily used by hackers to take over the devices or reconfigure settings. And the author states views of many people to further illustrate the importance of the problem.
4m10s

看的不是很懂,感觉很多专有名词,不知道具体是什么意思。文章主要讲了比特币是如何交易的,特别是关于malleability的方面。malleatbility是指signature改变一定程度下transaction不会改变。然后是有两个版本riginal和malleated,两个版本都能够交易,但是malleated会造成一个问题:比特币扣了但是没有记录。这个问题会被黑客攻击,比较麻烦。然后举了三个比特币交易网站的例子,一个是注意到这个问题然后解决了它,因此malleability分数高;另一个注意到了但没法解决,因为系统太复杂需要好几年时间来修复;最后一个直接无视掉了这个问题。最后两个例子都是得了零分
作者: 丝袜奶茶    时间: 2014-9-11 00:15
time 2: 01:53
the google glasses can record the pin number
invisible-finger movements.
feature: less noticable than camera or cell phone
time 3 00:50
google glass can figure out the passcoade according to the fingertip. Therefore, scientist tries to make a program that can defend the shoulder surfing.
time 4 01:26
A new issue about security safety exists in car industry.
time 5 01:35
it will be hard to notice this issue. However, as long as new cars have more electronic control system, such as blutooth, self parking system, we will face
more security saftefy problem.
time 6 03:46
smartphone also faced security issues.
the hacker can use the carriers infracture to communicate with phones or base stations.
time 7




欢迎光临 ChaseDream (https://forum.chasedream.com/) Powered by Discuz! X3.3