Confirmed: Snapchat Hack Not A Hoax, 4.6M Usernames And Numbers Published

snapchat_uhohA site called SnapchatDB.info has saved usernames and phone numbers for 4.6 million accounts and made the information available for download. In a statement to us, SnapchatDB says that it got the information through a recently identified and patched Snapchat exploit and that it is making the data available in an effort to convince the messaging app to beef up its security. We’ve also reached out to Snapchat.
SnapchatDB said:

Our motivation behind the release was to raise the public awareness around the issue, and also put public pressure on Snapchat to get this exploit fixed. It is understandable that tech startups have limited resources but security and privacy should not be a secondary goal. Security matters as much as user experience does.

We used a modified version of gibsonsec’s exploit/method. Snapchat
could have easily avoided that disclosure by replying to Gibsonsec’s private communications, yet they didn’t. Even long after that disclosure, Snapchat was reluctant to taking the necessary steps to secure user data. Once we started scraping on a large scale, they decided to implement very minor obstacles, which were still far from enough. Even now the exploit persists. It is still possible to scrape this data on a large scale. Their latest changes are still not too hard to circumvent.

We wanted to minimize spam and abuse that may arise from this release. Our main goal is to raise public awareness on how reckless many internet companies are with user information. It is a secondary goal for them, and that should not be the case. You wouldn’t want to eat at a restaurant that spends millions on decoration, but barely anything on cleanliness.

Earlier we speculated that SnapchatDB might be a hoax meant to call attention to the app’s security issues but, as it turns out, it’s real–at least one member of our editorial team has been affected. A reader also told us he found his own number, that of several friends and Snapchat founder Evan Spiegel in the list. On Hacker News, several people have had trouble downloading the data files (I just got an error message for both of them, but that may be because of high traffic), but a Jailbreak subreddit user who saw the list said that only numbers in some parts of the U.S. have been published so far. If you have not been able to download the list, you can use this site created by developer Robbie Trencheny to see if your username was included.

Read more at Tech Crunch

Special Report: How China’s weapon snatchers are penetrating U.S. defenses

2013-12-17T222147Z_2_CBRE9BG15ZK00_RTROPTP_2_BREAKOUT-STINGBy John Shiffman and Duff Wilson

OAKLAND, California (Reuters) – Agents from Homeland Security sneaked into a tiny office in Oakland’s Chinatown before sunrise on December 4, 2011. They tread carefully, quickly snapping digital pictures so they could put everything back in place. They didn’t want Philip Chaohui He, the businessman who rented the space, to learn they had been there.

Seven months had passed since they’d launched an undercover operation against a suspected Chinese arms-trafficking network – one of scores operating in support of Beijing’s ambitious military expansion into outer space.

The agents had allowed a Colorado manufacturer to ship He a type of technology that China covets but cannot replicate: radiation-hardened microchips. Known as rad-chips, the dime-sized devices are critical for operating satellites, for guiding ballistic missiles, and for protecting military hardware from nuclear and solar radiation.

It was a gamble. This was a chance to take down an entire Chinese smuggling ring. But if He succeeded in trafficking the rad-chips to China, the devices might someday be turned against U.S. sailors, soldiers or pilots, deployed on satellites providing the battlefield eyes and ears for the People’s Liberation Army.

Entering He’s office at 2:30 that December morning, the agents looked inside the FedEx boxes. The microchips were gone. The supervisor on the case, Greg Slavens, recoiled.

“There are a bunch of rad-chips headed to China,” Slavens recalls thinking, “and I’m responsible.'”

Read more at Yahoo!

Georgia man charged with theft for plugging in electric car

leafGEORGIA—A man in Atlanta was confronted by police when he plugged his Nissan Leaf into a school outlet “stealing” about five-cents worth of electricity. He was arrested for the “crime” ten days later.

According to ArsTechnia,

Kaveh Kamooneh plugged an extension cable from his Nissan Leaf into a 110-volt external outlet at Chamblee Middle School while his son was practicing tennis. A short time later, he noticed someone in his car and went to investigate—and found that the man was a Chamblee police officer. “He informed me he was about to arrest me, or at least charge me, for electrical theft,” Kamooneh told Atlanta’s Channel 11 News.

Sergeant Ernesto Ford of the Chamblee Police Department told News 11 that a theft is a theft and he would arrest anyone for theft.

Urbee 2, the 3D-Printed Car That Will Drive Across the Country

urbee-01-1113-mdn

It may look like a bean, but the hybrid car Urbee 2 can get hundreds of miles to the gallon—and it’s made mostly via 3D printing. In two years, it could become the first such vehicle to drive across the United States.

In early 1903, physician and car enthusiast Horatio Nelson Jackson accepted a $50 bet that he could not cross the United States by car. Just a few weeks later, on May 23, he and mechanic Sewall K. Crocker climbed into a 20-hp Winton in San Francisco and headed east. Accompanied by Bud, a pit bull they picked up along the way, the two men arrived in New York 63 days, 12 hours, and 800 gallons of fuel later, completing the nation’s first cross-country drive.

About two years from now, Cody and Tyler Kor, now 20 and 22 years old, respectively, will drive coast-to-coast in the lozenge-shaped Urbee 2, a car made mostly by 3D printing. Like Jackson and Crocker, the young men will take a dog along for the ride—Cupid, their collie and blue heeler mix. Unlike Jackson and Crocker, they will spend just 10 gallons of fuel to complete the trip from New York to San Francisco. Then they will refuel, turn around, and follow the same west-to-east route taken by Jackson, Crocker, and Bud.

Read more at Popular Mechanics

Aeroscraft – Mega Airship Back in the air in Tustin, California

aeroscraft_silver650Two days after receiving experimental airworthiness certification from the Federal Aviation Administration Aeros Corp. began flight-testing the Aeroscraft airship. For safety, the current flights are tethered, and, according to John Kiehle, communications director at Aeros, untethered flights are expected to follow within few weeks. Francis Govers of Gizmag reports.

The Aeroscraft half scale prototype is 266 ft (79 m) long and 97 ft (29.5m) wide. The final design is expected to be more than 400 feet (121m) long and be able to lift a cargo weight of 66 tons. The prototype is powered by three swiveling engines – two on the sides and one in the back – that provide both lift and thrust to lift the airship into the air and propel it forward. The rear engine gives control at low airspeeds by pushing the tail around, side to side or up and down. Two sets of wing-like control surfaces are mounted fore and aft, and two large rudders push up vertically from the tail end. These aerodynamic surfaces will be used at higher speeds (above 20 mph / 30 kph).

Read more at Defense Update

Want to be Unsene on the Internet?

SAN FRANCISCO—With recent revelations about the NSA spying and knowledge that Microsoft has left “backdoors” open for the government to enter and tamper with your computers, some may have decided to switch to the more secure Linux operating system.

Linux has advantages. Better security is the main feature. Depending on the version—called “distros” in Linux lingo; short for distribution—you can set up more effective firewalls. You can get programs that alert you when certain unwanted activities are going on in your computer. Linux has less problems with viruses. This is probably due to the fact that hackers are not so much interested in Linux as they are Microsoft. Because Microsoft equals Bill Gates.

One disadvantage of Linux is that it is a bit unwieldy for most computer users. They have neither the time nor the inclination to explore yet another operating system. Some cities have Linux Users Groups that may help, but that still takes time out of their schedule. Some distros are helping, such as Ubuntu, by making more user-friendly graphic interfaces.

Another is that much hardware is only Microsoft or MAC friendly unless the company has developed an alternative driver. That you may have to find and download.

There is a new open-source start-up which is seeking funding through Indiegogo. This group, associated with Chris Kitze of Beforeitsnews, has a web email and Skype alternative called Unsene. It is currently in the Beta web version and free. It will eventually ship as a program and Android and iPhone versions are planned.

The premium service is intended to allow for more features depending on the amount donated. Eventually it will be $47 per year, but people donating now will get a lifetime version for $37.

The full security features only work with Google Chrome. Beforeitsnews explains, “The text messaging and chat work with all browsers, but the audio and video calling and the encrypted file sharing require WebRTC, a new technology that is only available on Chrome. Support for Safari, IE and Firefox is expected soon. The Chrome browser is available for free download from Google.”

This program claims military-style encryption. “The service offers a basic level of encryption (AES256) and advanced encryption (xAES up to 4096 bits) and we’ve got some additional tricks up our sleeve for extremely secure encryption.”

See Also: Stop the Spying in Your Inbox

House legislation may unlock cell phones once again

Unlocking-cell-phones-how-to-do-300x224WASHINGTON—Before January of this year, people could unlock cell phones in order to utilize whatever phone service they chose. After January 1st, that option was locked-out. That is to say that you could no longer unlock your cell phone and had to buy a new cell phone to switch services. Although unlocked cell phone are still sold through several stores and Internet sources.

That could change if legislation submitted by Representative Bob Goodlatte (R-VA6) passes.

The Unlocking Consumer Choice and Wireless Competition Act, H.R. 1123, would repeal Paragraph (3) of section 201.40(b) of title 37 of the Code of Federal Regulations, amended by the Library of Congress in October of 2012, to allow consumers to unlock cell phones. Cell phones were locked based on Copyright infringement.

This would, of course, allow consumers to switch services without having to purchase new phones. The Bill, with 8 cosponsors, was referred to the Subcommittee on Courts, Intellectual Property, And The Internet on the 15th.

It is expected that cell phone industry lobbyists will be out in force.

Unlocking cell phones is now illegal in the U.S., making it harder to switch carriers

Law took effect Jan. 26

The law’s been around for 15 years. Last year, the Library of Congress ruled unlocking a phone without the carriers permission violates copyright law.The ruling took effect Saturday.—FOX News Charlotte

Unlocked cell phones offer consumers more options, especially when it comes to mobile devices and service providers, but a new federal law criminalizes the fairly-common cell phone trick.

In October, The Library of Congress reached a ruling that made unlocking cell phones illegal. The new law kicked in on Jan. 26.

According to CNN, the new law applies only to phones purchased after January 26.

Read more and see video at RTV6

Urine-powered generator unveiled at international exhibition

Four African girls have created a generator that produces electricity for six hours using a single liter of urine as fuel.

The generator was unveiled at last week’s Maker Faire in Lagos, Nigeria, by the four teens Duro-Aina Adebola, Akindele Abiola, and Faleke Oluwatoyin, all age 14, and Bello Eniola, 15.

So how exactly does the urine-powered generator work?

  • Urine is put into an electrolytic cell, which separates out the hydrogen.
  • The hydrogen goes into a water filter for purification, which then gets pushed into the gas cylinder.
  • The gas cylinder pushes hydrogen into a cylinder of liquid borax, which is used to remove the moisture from the hydrogen gas.
  • This purified hydrogen gas is pushed into the generator.

Yahoo! News