31 Years of the Digest ... founded August 21, 1981
The Telecom Digest for September 15, 2012
====== 31 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Bill Horne and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using any name or email address
included herein for any reason other than responding to an article
herein, you agree to pay a hundred dollars to that person, or email address
Addresses herein are not to be added to any mailing list, nor to be sold or given away without the explicit written consent of the owner of that address. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. - Geoffrey Welsh
See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest.
Date: Fri, 14 Sep 2012 09:01:16 -0400 From: email@example.com (Jim Bennett) To: firstname.lastname@example.org. Subject: Re: Smartphone? Presto! 2-Way Radio Message-ID: <50532A9C.email@example.com> As seen last week in the NY Times: > > They work on iPhones, iPads, iPod Touches, Android phones and Windows > phones. You open the app, tap someone's name, hold down the big Talk > button and speak. A second after you start talking - yes, even before > you're finished - your voice bursts to life, extremely clearly, on > your friend's phone, wherever it may be in the world. > > Your buddy can respond to you by pressing his own Talk button, and > the conversation is under way. > <snip> Astounding. Yet another amazing new digital technology. Who would have ever even thought it possible? A box that magically transmits your voice using radio waves, and then, through a system of networked repeaters, it can be heard on another box at a distant location. This is absolutely the most amazing new thing I have seen in decades. We owe a debt of gratitude to the news media, which does an excellent job of keeping us informed about all this new technology. Just think how hard the previous generations had it. For example, prior to 1972 there were no Bic lighters. I am old enough to remember those times - sitting around freezing in the dark, eating uncooked food. We really have come a long way. Jim Bennett ================================================== Speaking from a secure undisclosed location.
Date: Fri, 14 Sep 2012 17:51:20 -0600 From: Bill Horne <bill@horneQRM.net> To: firstname.lastname@example.org. Subject: Re: Major outage in West Glacier, Montana Message-ID: <email@example.com> On 9/12/2012 8:48 PM, tlvp wrote: > On Wed, 12 Sep 2012 16:02:07 -0600, Bill Horne wrote: > >> The entire phone system is out of service in West Glacier, Montana > > Local copper loop, cable, satellite, cellular, Clear, Vonage and the like, > ... everything ? Everything I consider to be "phone system". When I say "out", I mean "not functioning". If I can't get a dialtone, it really doesn't matter what parts are broken, does it? > So your post to c.d.t. came in through FidoNet over s/w Ham Radio :-) ? No, it was posted via my packet radio gateway, w1ac.ampr.org, and passed onto the Internet at a ham radio station in Columbia Falls, Montana. I've never used FidoNet, but IIRC, FidoNet depends on modem links for communication, so it wouldn't have worked anyway. > Anyway, kudos for getting through, however you did it! Cheers, -- tlvp Glad I could help. Bill -- Bill Horne (Remove QRM from my address to write to me directly)
Date: Fri, 14 Sep 2012 23:50:48 -0400 From: Monty Solomon <firstname.lastname@example.org> To: email@example.com. Subject: Crack in Internet's foundation of trust allows HTTPS session hijacking Message-ID: <firstname.lastname@example.org> Crack in Internet's foundation of trust allows HTTPS session hijacking Attack dubbed CRIME breaks crypto used to prevent snooping of sensitive data. by Dan Goodin Ars Technica Sept 13 2012 A screen shot from a video showing CRIME decrypting the contents of an encrypted cookie used to authenticate a dropbox.com user account. Researchers have identified a security weakness that allows them to hijack web browser sessions even when they're protected by the HTTPS encryption that banks and e-commerce sites use to prevent snooping on sensitive transactions. The technique exploits web sessions protected by the Secure Sockets Layer and Transport Layer Security protocols when they use one of two data-compression schemes designed to reduce network congestion or the time it takes for webpages to load. Short for Compression Ratio Info-leak Made Easy, CRIME works only when both the browser and server support TLS compression or SPDY, an open networking protocol used by both Google and Twitter. Microsoft's Internet Explorer, Google's Chrome and Mozilla's Firefox browsers are all believed to be immune to the attack, but at time of writing smartphone browsers and a myriad of other applications that rely on TLS are believed to remain vulnerable. CRIME is the latest black eye for the widely used encryption protocols, which act as the Internet's foundation of trust by encrypting traffic that flows over open networks and cryptographically proving websites such as Gmail are really operated by Google rather than criminal hackers or state-sponsored spies. The specter of a new attack that could subvert one of the only widely available protections preventing the interception of sensitive e-mails and web transactions, follows revelations that both Iran and China have actively worked to defeat it so they could spy on its citizens. ... http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Bill Horne. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is moderated by Bill Horne.
43 Deerfield Road
Sharon MA 02067-2301
bill at horne dot net
This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2012 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA.
Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.