31 Years of the Digest ... founded August 21, 1981
The Telecom Digest for October 16, 2012
====== 31 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Bill Horne and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using any name or email address
included herein for any reason other than responding to an article
herein, you agree to pay a hundred dollars to that person, or email address
Addresses herein are not to be added to any mailing list, nor to be sold or given away without the explicit written consent of the owner of that address. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. - Geoffrey Welsh
See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest.
Date: Sun, 14 Oct 2012 21:34:49 -0400 From: Monty Solomon <firstname.lastname@example.org> To: email@example.com. Subject: Hands on: Securing iOS, pwning your kids with Apple Configurator 1.2 Message-ID: <firstname.lastname@example.org> Hands on: Securing iOS, pwning your kids with Apple Configurator 1.2 How I used Apple's mobile device config update for entertainment and vengeance. by Sean Gallagher Oct 14 2012 Apple recently released the latest version of Configurator, the company's management software for iOS devices, for download in the Mac App Store. Configurator version 1.2 is intended to give organizations a way to mass-configure iPads, iPhones, and even iPods with applications, settings, and security policies. It's also, as it turns out, the perfect tool to prank a teenage son, teaching him the hazards of leaving his iPad unattended and of interrupting conference calls with extended drum solos. Configurator version 1.2 is enhanced to take advantage of the enterprise management features in iOS 6. It provides all the policy configuration muscle Apple gives to mobile device management tool developers with its management interfaces, in a free Mac OS X application. That includes the ability to lock down the lock screen, put a device into "app lock" mode, making it boot straight into an application, and blocking users' access to the rest of iOS's features. All those features let you turn a device into a secure wireless kiosk, a point-of sale system, or (as I did to my son's iPad) a dedicated My Little Pony Ruckus Reader platform with an appropriately-themed lock screen. Of course, I backed all his stuff up first. I'm not that evil. ... http://arstechnica.com/apple/2012/10/hands-on-securing-ios-pwning-your-kids-with-apple-configurator-1-2/
Date: Sun, 14 Oct 2012 22:36:22 -0400 From: Monty Solomon <email@example.com> To: firstname.lastname@example.org. Subject: Facebook moves to keep phone numbers for two-factor protection private Message-ID: <email@example.com> Facebook moves to keep phone numbers for two-factor protection private Numbers used for additional security are no longer in a new reverse lookup database. by Dan Goodin Oct 14 2012 Ars Technica Facebook engineers have modified a controversial feature to prevent it from exposing the phone numbers users must provide to receive an additional level of security against account takeovers. The change, made over the weekend, tweaks a recently added reverse phone number lookup service (which, as you'd expect, allows users to enter an unknown phone number to see who it belongs to). The service no longer includes phone numbers users provide when signing up for two-factor authentication protection known as login approvals. Login approvals require users to provide a one-time password sent to their mobile device when logging into their accounts from new computers or smartphones. Previously, those numbers were automatically included in the reverse lookup database. Users who wanted to avail themselves of the two-factor protection ran the risk of exposing their phone numbers to the world at large or their Facebook friends, depending on how privacy settings were configured. ... http://arstechnica.com/security/2012/10/facebook-moves-to-keep-phone-numbers-for-two-factor-protection-private/
Date: Sun, 14 Oct 2012 22:35:21 -0400 From: Monty Solomon <firstname.lastname@example.org> To: email@example.com. Subject: FCC Relaxes The Cable Encryption Prohibition Message-ID: <firstname.lastname@example.org> FCC 12-126 Basic Service Tier Encryption, MB Docket No. 11-169 http://www.fcc.gov/document/commission-relaxes-cable-encryption-prohibition Adopted: October 10, 2012 Released: October 12, 2012 I. INTRODUCTION 1. With this Report and Order (Order), we amend our rules to allow cable operators to encrypt the basic service tier in all-digital cable systems if they comply with certain consumer-protection measures. As discussed below, this rule change will benefit consumers who can have their cable service activated and deactivated from a remote location. By allowing remote activation and deactivation, we expect our amended rules will result in benefits to both cable operators and consumers by significantly reducing the number of truck rolls associated with provisioning service and significantly reducing the need for subscribers to wait for service calls to activate or deactivate cable service. At the same time, we recognize that this rule change will adversely affect a small number of cable subscribers who currently view the digital basic service tier without using a set-top box or other equipment. If a cable operator decides to encrypt the digital basic tier, then these subscribers will need equipment to continue viewing the channels on this tier. To give those consumers time to resolve the incompatibility between consumer electronics equipment (such as digital television sets) and newly encrypted cable service, we require operators of cable systems that choose to encrypt the basic service tier to comply with certain consumer protection measures for a period of time. In addition, we note that this rule change may impact the ability of a small number of subscribers that use certain third-party equipment that is not CableCARD compatible to access channels on the basic service tier. To address this issue, we require the six largest incumbent cable operators to comply with additional requirements that are intended to ensure compatibility with certain third-party-provided equipment used to access the basic tier. ... http://transition.fcc.gov/Daily_Releases/Daily_Business/2012/db1012/FCC-12-126A1.pdf
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Bill Horne. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is moderated by Bill Horne.
43 Deerfield Road
Sharon MA 02067-2301
bill at horne dot net
This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2012 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA.
Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.