30 Years of the Digest ... founded August 21, 1981
The Telecom Digest for July 21, 2012
====== 30 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Bill Horne and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using any name or email address
included herein for any reason other than responding to an article
herein, you agree to pay a hundred dollars to that person, or email address
Addresses herein are not to be added to any mailing list, nor to be sold or given away without the explicit written consent of the owner of that address. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. - Geoffrey Welsh
See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest.
Date: Thu, 19 Jul 2012 21:56:47 -0400 From: danny burstein <firstname.lastname@example.org> To: email@example.com. Subject: wherefore/whencefore Central Office outage reports Message-ID: <Pine.NEB.firstname.lastname@example.org> We just had a central office outage - which wasn't storm related -, that knocked out tens of thousands of lines, both wired and the cellular network. Oh, and DSL. And lots of cascading issues. Including clobbering a 911 PSAP. Took 15 or so hours to restore. [a] Anyway... could someone point me to what reports (if any...) the ILEC and other groups - such as the cellcos - are supposed to make in these deregulated days and where I could either view them or make FOIL requests? - I realize there might be a bit of a time lag, but I'd like to start the process. Thanks. [a] http://www.themorningsun.com/article/20120719/NEWS01/120719712/power-outage-disables-phones
Date: Fri, 20 Jul 2012 00:25:29 -0400 From: Monty Solomon <email@example.com> To: firstname.lastname@example.org. Subject: Shared Mobile Data Plans: Who Benefits? Message-ID: <email@example.com> Shared Mobile Data Plans: Who Benefits? By BRIAN X. CHEN JULY 19, 2012 Verizon and AT&T, the two biggest carriers in the United States, are offering shared data plans, which will allow customers to pay for a single pool of data and share it across multiple smartphones, tablets and laptops. The concept of sharing sounds like a nice idea in principle, but the costs of these plans can tell a different story. The pricing for the carriers' shared plans is nearly identical. After doing the math, it turns out that shared data plans are a good value only for a specific type of customer: A high-income family with several data-hungry devices and chatty kids who send lots of text messages. In other words, the plans offer the most value for people who already spend a lot to squeeze as much out of their wireless service as possible, and are not so useful for frugal, casual customers. "There are very few subsets of people where this will actually be impactful," says Schwark Satyavolu, chief executive of Truaxis, a company that offers tools for consumers to manage their utility bills. Here's a quick breakdown of the math. ... http://bits.blogs.nytimes.com/2012/07/19/shared-data-plans-verizon-att/
Date: Thu, 19 Jul 2012 15:26:01 -0400 From: tlvp <mPiOsUcB.EtLlLvEp@att.net> To: firstname.lastname@example.org. Subject: Covert FBI Power to Obtain Phone Data Faces Rare Test Message-ID: <email@example.com> In today's "Latest News from Sophos Security" I read: > Telecom firm says "No" to FBI surveillance demands > In a case that has been cloaked in secrecy, a phone company > is fighting an FBI request to access customer records. The phone company involved may not be identified, under the obligatory nondisclosure requirements of the applicable NSL (National Security Letter) issued early last year, but the full Sophos commentary, at http://nakedsecurity.sophos.com/2012/07/19/telecom-fbi-surveillance/ , and yesterday's WSJ article breaking the news more than a year later, at http://online.wsj.com/article_email/SB10001424052702303567704577519213906388708-lMyQjAxMTAyMDEwNzExNDcyWj.html make chilling reading. -- Avant de repondre, jeter la poubelle, SVP.
Date: Thu, 19 Jul 2012 12:32:35 -0400 From: Monty Solomon <firstname.lastname@example.org> To: email@example.com. Subject: Apple tries to block iOS in-app purchase hack, fails Message-ID: <firstname.lastname@example.org> Apple tries to block iOS in-app purchase hack, fails Summary: Apple is working hard to fight the hacking of its In-App Purchase program for iOS. So far though, the company's attempts have not deterred Russian developer Alexey Borodin who apparently wants Cupertino to fix the underlying problem rather than just trying to block his in-appstore.com service. By Emil Protalinski July 16, 2012 Last week Russian developer Alexey Borodin hacked Apple's In-App Purchase program for all devices running anything from iOS 3.0 to iOS 6.0 (the In-App Purchase program requires iOS 3.0 or later), allowing iPhone, iPad, and iPod touch users to circumvent the payment process and essentially steal in-app content. Apple confirmed the workaround and said it was investigating the issue. Ever since, Cupertino has been working hard to stop the attack, but it has yet to succeed. ... Last but certainly not least, Cupertino is transmitting its customers' Apple IDs and passwords in clear text (Apple assumed it would only ever be communicating with its own server). The following information is transferred from your device to Borodin's server: app restriction level, app id, version id, device guid, in-app purchase quantity, in-app purchase offer name, app identifier, app version, your language, and your locale. Whoever operates in-appstore.com could easily be gathering everyone's iTunes login credentials (as well as unique device-identifying data) in a classic man-in-the-middle attack. ... http://www.zdnet.com/apple-tries-to-block-ios-in-app-purchase-hack-fails-7000000985/
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Bill Horne. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is moderated by Bill Horne.
43 Deerfield Road
Sharon MA 02067-2301
bill at horne dot net
This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2012 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA.
Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.