«
Expand/Collapse
3 items tagged "google and home��lighting"
Related tags:
verizon [+],
utopia [+],
utah [+],
universal service fund [+],
stockholm [+],
step [+],
net neutrality [+],
marvin ammori [+],
leap [+],
julius genachowski [+],
internet [+],
international benchmark [+],
household penetration [+],
giant leap [+],
gentle slope [+],
fiber [+],
fcc enforcement [+],
don [+],
corporate philosophy [+],
broadband [+],
america [+],
zuckerberg,
zombie,
zero day,
zero,
yellow dots,
year,
yale winds,
yale,
yahoo,
xteardown,
xss,
xperiaplay,
xml,
x google,
writers,
wristwatch,
wrap up,
wrap,
wpa wpa2,
wpa,
worldwide,
world,
workout facilities,
working,
words,
wordpress,
word war,
word,
wonk,
woes,
wiretapping,
wiretap,
wipes,
wine,
windows secrets,
windows,
wind,
win,
will ignore,
will,
wildcard,
wii fit,
wii,
wifi,
wi fi access,
wi fi,
whois web,
whmcs,
whitepaper,
whims,
whim,
while,
weeks,
websitedefender,
website audit,
website,
websense,
webkit,
webapps,
web proxy,
web password,
web monitoring,
web interface,
web giant,
web authors,
web apps,
web,
ways,
way,
wave,
watchdog,
washington monument,
washington,
warns,
warning,
warn,
ward off,
war,
wanna,
wallet,
vupen,
vulnerability research,
vulnerability reports,
vulnerability,
vulnerabilities,
vsr,
volkswagen golf,
vladimir,
virus writers,
virus vendors,
virus,
virtual security,
view,
vienna,
video streams,
video,
victimb,
version,
verge,
vendor,
vectors,
v3n0m,
using,
users,
user,
usefull info,
usa,
url,
uri spoofing,
uri,
urchin 5,
urchin,
updated,
update,
unveils,
unleashes,
unencrypted data,
undiscovered,
uk regulator,
uk mps,
uk government,
udot utah,
ubuntu,
typo,
txt,
two wheels,
two,
twitter,
tweaks,
tweak,
tv devices,
tutorial,
trojan,
triumphs,
tries,
trial,
trends,
tree,
treadmill,
transportation,
translate,
transitioned,
traget,
tracking,
track option,
track,
traceroute,
toy,
tour,
toronto,
topic,
top,
toolbar,
tool works,
tool 1,
tool,
tom stracener,
today,
toaster oven,
tip line,
time,
tie,
thyne,
threats,
thomas clauser,
this,
theharvester,
than half,
tgz,
temperature sensor,
television programs,
television,
teensiest,
ted,
tech,
team,
tavis ormandy,
targets,
target domain,
target,
tar gz,
tar,
talk,
taking security,
tags,
tablet controlled,
t ipad,
system compromise,
syhunt,
svn,
suspect,
surveillance,
surfing experience,
super nintendo,
summer,
suit claims,
sued,
subtitle,
subsidiary,
subdomains,
subdomain names,
style sheet,
style,
stuff,
study,
student data,
student,
struggling,
stresses,
street view,
street,
store,
still,
stgo,
steve lee,
step direction,
step checklist,
steffen meschkat,
stealth attack,
stealth,
status messages,
state,
startup,
stalking,
staff,
stack overflow,
stack,
stable,
ssos,
ssl certificates,
ssl,
sse,
sqli,
sql injection,
spyware,
spy,
spreading,
spotlight,
spooks,
spoofing,
spike,
sparkfun,
spamming,
spam,
space labs,
souza,
south korea,
sourceforge,
sound sensitive,
sort,
sophos products,
sophos,
sony,
solder,
social networking service,
social engineering,
snooping,
snoop,
snes,
snarfing,
snared,
sms,
smartphones,
smartd,
small claims,
small,
slides,
slaps,
slammed,
skyhook wireless,
skpr,
skipfish,
sketchup,
site,
simple hello,
simon,
signs,
signing,
side projects,
side,
showdown,
shirley,
shiny new toy,
shells,
shell,
settles,
set,
serving,
service vulnerability,
service,
server side javascript,
server side,
server,
series 3,
sensor data,
sends,
sending,
self drive car,
self,
segway,
sees,
security vulnerability,
security vulnerabilities,
security tool,
security threat,
security study,
security risks,
security research,
security patches,
security notice,
security holes,
security flaw,
security fixes,
security experts,
security credentials,
security bugs,
security alliance,
security advisory,
security advice,
security,
secure browsing,
secunia,
secrets,
sebastian thrun,
sebastian,
search queries,
search extension,
search directives,
search activity,
search,
scrutiny,
script engine,
script,
screw,
score,
scmagazine,
science fairs,
science,
sci fi,
schools,
scholar,
schmidt,
schematics,
scare,
scapy,
scanning,
scanner,
scan,
scams,
santiago chile,
santiago,
sans,
sandbox model,
sandbox,
san,
samsung,
same time,
safer use,
safari,
saber,
s system,
s market,
ryan ohara,
ryan anguiano,
ryan,
rustock,
rush,
runs,
ruby tag,
ruby,
rseau,
roy macdonald,
routeur,
router,
route,
rotors,
rooted,
roomba,
rolls,
roll,
rohit,
rogue,
robots,
robotic,
robot drives,
robot,
roboform,
road bike,
rise,
rim,
rig,
ricky sumbody,
ricky,
rick redman,
rhino,
revision,
reverse dns,
retro,
retired,
retina,
rest of the world,
responds,
researchers,
research,
requirements,
request,
report details,
report,
repairing,
renderings,
rename,
removes,
removal tool,
remotely,
remote exploit,
remote control car,
remote,
releases,
regulators,
regulator,
regular expression,
reflow,
redmond report,
redirects,
redirect,
recovering passwords,
recording,
record,
reconnaissance,
recaptcha,
reality project,
real,
read,
rapped,
rapid,
ran detailed,
raid,
ragan,
rafal los,
radio signals,
quot,
quickrecon,
quick,
question,
queries,
quad,
q media,
python script,
python,
pulls,
pullout,
pulled,
proxy,
protection chief,
protection,
protect,
proposes way,
propose,
proof of concept,
proof,
project,
programming environment,
programming competition,
program,
profiles,
profile,
processsing,
processing,
process,
probleme,
probes,
probe,
private database,
privacy suit,
privacy settings,
privacy protection,
privacy policy,
privacy policies,
privacy lawsuit,
privacy laws,
privacy law,
privacy issues,
privacy invasion,
privacy info,
privacy event,
privacy concerns,
privacy agreement,
privacy,
prius,
prior,
price,
pretty pictures,
prediction,
powermeter,
power meter,
power,
pov,
potential,
post,
ported,
porta 80,
port 31337,
port,
popup blocker,
popup,
popular science,
popular,
pop up block,
poor,
political agenda,
policy inquiries,
police raid,
police,
poisons,
poc,
plugs,
plug ins,
plots,
player,
plastic printer,
plastic,
plaster,
plain text passwords,
pitfalls,
pitches,
pirate bay,
piracy,
pinpoint,
pinger,
pin security,
pin,
pimp,
picasa,
photon,
phony,
phone,
phishing,
phish,
phil,
personal data,
pepper flash,
pentesters,
pentest,
penetration testers,
penetration,
peephole,
pdf,
pcb,
pc enthusiast,
pays,
payload,
pay,
paul blue,
paul,
patrick chambet,
patent,
patches,
passwords,
password,
party plugin,
participant organizations,
paranoid,
paper,
pakistan,
page,
pact,
packet storm,
overtakes,
oven,
out,
oscar,
oregon court,
ordered,
oracle report server,
oracle,
option,
opt,
operational web,
operating system,
opens,
opendns,
open sources,
open source project,
open source implementation,
open,
oob,
ons,
online,
on street,
old habits,
old,
offline,
official,
offers,
offer,
oct,
ocr,
o hara,
nsa,
now,
notice,
not,
nonsense,
nirav,
nintendo,
nikolai,
nfc,
nexus,
news,
new,
networked devices,
network,
net,
neat project,
nbsp,
nasties,
narc,
nabbed,
mystery,
mysql,
mvsa,
muzzle,
mutation,
must,
music service,
murdoch,
multiple,
msn,
msf,
ms security,
mr.x,
mps,
mozilla releases,
mozilla add ons,
mozilla,
moxie,
motorcycle trips,
motivated,
morse code,
morse,
months,
monopoly,
mod,
mobile version,
mobile payment solution,
mobile callers,
mitm,
misc,
miniature robot,
mini,
mime messages,
million,
military network,
mike,
might,
microwave,
microsoft claims,
microsoft,
microcontrollers,
microcontroller,
micalizzi,
metropolitan,
metro,
meterpreter,
meter,
message security,
message center,
message,
memory corruption,
memory,
member,
megaboy,
meet,
mechanical claw,
may,
math,
mass.,
mass,
marlinspike,
marketplace,
market,
maps,
mapping service,
mapping,
mapped,
map,
manipulation,
malware trail,
malware,
malicious web,
malicious hacker,
malicious,
malaysian government,
mal,
makes,
makers,
major flaw,
mail,
machine,
mac os,
mac linux,
mac,
lyk,
lying,
low cost,
low bandwidth,
lot,
loss,
los angeles,
lord,
lookup,
location,
load,
list,
links,
link,
lightsaber,
lighting market,
lighting,
light saber,
lifelike,
life,
lien,
licensing system,
licensing,
library of alexandria,
librarie,
lfi,
lets,
leon,
legislation,
legal,
leds,
led matrix,
led,
leaks,
leaked,
layout files,
layout,
lawyers,
laws,
lawmakers,
law requirements,
launched,
lastenrad,
laser turret,
laser,
lapd,
language,
labyrinth game,
labyrinth,
l. aaron kaplan,
kopete,
knocked,
knew,
kinect,
kills,
keypad,
kevin,
kenyan,
keeps,
kayak,
kaspersky,
k bounty,
justice department,
justice,
judge orders,
judge grants,
judge,
jpeg,
joomla,
joke,
joins,
johnny long,
johannesburg,
joey calca,
joe,
job,
jer,
jeff bryner,
jean michel picod,
javascript client,
javascript,
java,
japanese market,
jamal bandukwala,
jailbreak,
ivan nestlerode,
issue,
irc,
iranian,
iphone 4,
iphone,
ipad,
ip geolocation,
invitations,
invests,
investigate,
invest,
intrusion,
intro,
internet risk,
internet explorer,
interesting solutions,
intelligence,
intel,
integrity protection,
integer overflow vulnerability,
instant,
insider,
insecure,
injection,
inj,
information disclosure vulnerability,
information disclosure,
information,
infiltrate,
india,
independent watchdogs,
independent,
inclusion,
in street,
importance,
illegally,
iii,
igor,
identifies,
ibm,
hydra,
huge rise,
huge list,
https,
http,
htop,
htmlgen a,
html,
household devices,
hot topic,
hong kong,
home lighting,
home automation,
home,
holes,
hit,
history feature,
history,
hijacking,
hijack,
high risk,
high profile,
high altitude balloons,
high,
hide malware,
hidden paths,
hexacopter,
hello community,
heap,
head mounted displays,
hardware kit,
hardens,
hard time,
hard,
hangout,
handshake,
hands,
handler,
hand,
halts,
hadoop,
hacks,
hacking search,
hacking,
hackerspace,
hackers,
hacker test,
hacker challenge,
hacker attack,
hacker activity,
hacker,
hacked,
hackaday,
hack,
habits,
gus,
guru,
guide,
gui tool,
gtalk,
gt 4,
groupon,
graph,
gpu,
gps,
governments,
government surveillance,
government data,
government,
gov,
goolge,
googlee,
google yahoo,
google urchin,
google uk,
google travelling,
google translation,
google tools,
google toolbar,
google street view,
google street,
google sketchup,
google searches,
google search results,
google search,
google redirects,
google picasa,
google maps,
google hacks,
google hacking,
google gears,
google cache,
google analytics,
goodork,
golf cart,
gmail,
glue,
globe,
glass,
gglebot,
gggooglescan,
germany,
germans,
german postal service,
gears,
gchq,
gaping holes,
gambling,
gambles,
galaxy,
gaiaserver,
gadgets,
gadget world,
gadget,
gabble,
g page,
fun,
full,
ftc,
friend,
freestyle kayak,
freestyle,
free food,
free error,
fraudulent,
france,
foursquare,
four months,
four,
found,
forum search,
forgery,
forgers,
forfeits,
fools,
focus events,
focus,
florida,
floats,
flash plugin,
flash,
flap,
fix,
first,
firmware versions,
firesheep,
fires,
firefox,
fire and light,
fire,
finds,
finding,
finder,
financial times,
file,
fil,
figure,
felix,
feds,
federal,
feature address,
fbi,
fantastic forum,
false alarm,
fake,
fairs,
factor authentication,
factor,
facial recognition,
faced,
facebook,
face,
fabrice jaubert,
f king,
extractor,
extends,
expression,
exposes,
exploits,
exploited,
exploitation,
exploit,
exhibit space,
evasive,
evasion,
evalbot,
european data protection,
european,
error,
epic,
entertainment,
enlist,
enhance,
engraver,
enging,
engineered,
engineer,
engine crawler,
engine,
enforced,
end,
encrypt,
employee directories,
emergency patch,
emergency,
embedder,
emanuele,
emails,
elite,
electronic retailer,
electricity meters,
egypt,
ebay,
easier,
earth version,
earth,
eagle cad,
eagle,
e mail addresses,
dystopian visions,
dynamic link library,
dutch government,
dutch company,
dutch,
dupont,
duke,
dual boot with windows,
drug ads,
driving cars,
driver dll,
driver developers,
driven interface,
drive space,
dpapi,
download,
dos,
dorkmaster,
dork,
doors,
doomsayers,
domain,
doing the rounds,
docs,
dock,
dll,
divulges,
ditching,
ditches,
disrupts,
disrupting,
dismiss,
discrete components,
disco,
disclosure,
directed,
digital calipers,
digital,
digikey,
die hard,
dhclient,
development hardware,
development,
developers conference,
developers,
devel,
dev,
deutsche,
detection,
details,
destroy,
desktop image,
desktop,
desk,
design bugs,
design,
department,
deny,
denies,
denial of service,
denial,
demos,
demo party,
demo board,
demands,
demand,
deliberately,
deletion,
defends,
default,
decoder,
decision,
debian,
debacle,
deaf ears,
day,
dave kennedy,
database tool,
database,
data requests,
data execution prevention,
data,
darknet,
darkb,
daniel bartlett,
dae,
czech ing,
cyberattacks,
cyber attacks,
custom search engine,
custom,
curiosity,
curbs,
css,
cryptography,
cry,
cross site scripting,
cross,
critical vulnerability,
credit card numbers,
credit,
credential,
creating,
crash,
crack,
cpu,
cover art,
court demands,
couple,
cost,
corrects,
corporate,
cops,
cooking,
cookies,
controlling,
control,
continue,
contests,
contact,
console,
congress,
confirms,
condemns,
computer thief,
computer,
compromise,
compositor,
component version,
compatible board,
communications infrastructure,
communication,
comfort bus,
com,
collection,
code repository,
code execution,
code,
cnc machine,
cnc,
cloud,
clone,
clock,
client server application,
client platforms,
client,
clean,
claw,
clauser,
class action lawsuit,
clash,
claims,
claim,
circumventing,
circuit,
cia,
chromebook,
chrome version,
chrome,
chris nickerson,
chipset,
chinese web,
chinese students,
chinese schools,
chinese new year,
chinese,
china talks,
china site,
china row,
china issues,
china,
chile,
checklist,
charliex,
charlie eriksen,
charlatans,
chaosmap,
chaos communication congress,
change,
challenge,
cgi,
certificates,
certificate,
certain,
center,
censorship of the internet,
censorship,
cell,
cash and prizes,
cart,
carlos perez,
cargo bike,
cargo,
card,
car,
capable phones,
cant block,
canadian drugs,
can,
cameras,
camera rig,
camera,
calls,
california,
calca,
cad,
cache,
cable,
bypassed,
buzz,
button,
bus,
bugtraq,
bug hunters,
bug,
buffer overflow vulnerability,
buffer memory,
bruteforce attack,
browser policy,
browser makers,
browser bugs,
browser,
brown rob ragan,
british government,
british,
britain,
brings,
breach,
brass tubes,
brass,
boycott google,
boycott,
bounty programs,
bounty program,
bounty hunters,
bounty,
bouncer,
botnets,
botnet,
bot,
boston,
boss,
booty,
boosts,
book,
bonkers,
bonanza,
bof,
body,
bod,
bo,
bluray,
blogging,
blog,
blocks,
block menu,
blob,
blippy,
bling,
blasts,
blacklist,
black hat,
bit,
bipeds,
bios,
bing,
bike,
big g,
benjamin,
ben,
begins,
based buffer overflow,
bans,
banner,
bank accounts,
ball,
balance board,
bad idea,
backlash,
awus,
average person,
autonomous vehicle,
autonomous car,
autonomous,
automatic search,
authors,
authorities,
author,
authentication request,
authentication,
australian privacy commissioner,
australian,
australia,
aus,
aurora exploit,
aurora,
audio,
attracting,
attiny,
attackers,
attacker,
attack,
atari 2600,
atari,
assembly,
assembles,
assange,
aspx,
asks,
asia,
array,
arduino,
arbitrary code execution,
april fools prank,
april,
apps,
approach,
application programming interface,
applet,
apple safari,
apple pushes,
apple ipad,
apple,
appeal,
app,
api,
apache,
ants,
antonio,
antivirus software,
antivirus,
antitrust concerns,
anti virus,
anti,
answer,
anonymous,
anonplus,
anon,
anguiano,
android,
andrea,
and,
analytics,
analyticator,
amazon river,
amazon,
amateurs,
alleged,
allegations,
algorithm,
alexandria,
alexandre souza,
alert,
aircrack,
agenda,
against,
adwords,
advisory,
adsense,
adobe flash,
adobe,
admits,
adk,
addon,
add,
acts,
activists,
acronym,
accused,
accounts services,
account passwords,
access 2,
accer,
abu dhabi,
Weekly,
Visulization,
Tools,
Technologies,
Supporto,
Support,
Software,
Skype,
Requests,
Rasberry,
Pentesting,
Newbie,
Issues,
Howto,
Hardware,
Hackerspaces,
HackIt,
General,
Fixes,
FCC,
ExploitsVulnerabilities,
Discussion,
Countermeasures,
Bugs,
BackTrack,
Area,
500m,
5 million,
21c3
-
-
18:12
»
Wirevolution
Google and Verizon came out with their joint statement on Net Neutrality on Monday. It is reasonable and idealistic in its general sentiments, but contains several of the loopholes Marvin Ammori warned us about. It was released in three parts: a document posted to Google Docs, a commentary posted to the Google Public Policy Blog, and an op-ed in the Washington Post. Eight paragraphs in the statement document map to seven numbered points in the blog. The first three numbered points map to the six principles of net neutrality enumerated by Julius Genachowski [jg1-6] almost a year ago. Here are the Google/Verizon points as numbered in the blog:
1. Open access to Content [jg1], Applications [jg2] and Services [jg3]; choice of devices [jg4].
2. Non-discrimination [jg5].
3. Transparency of network management practices [jg6].
4. FCC enforcement power.
5. Differentiated services.
6. Exclusion of Wireless Access from these principles (for now).
7. Universal Service Fund to include broadband access.
The non-discrimination paragraph is weakened by the kinds of words that are invitations to expensive litigation unless they are precisely defined in legislation. It doesn’t prohibit discrimination, it merely prohibits “undue” discrimination that would cause “meaningful harm.”
The managed (or differentiated) services paragraph is an example of what Ammori calls “an obvious potential end-run around the net neutrality rule.” I think that Google and Verizon would argue that their transparency provisions mean that ISPs can deliver things like FIOS video-on-demand over the same pipe as Internet service without breaching net neutrality, since the Internet service will commit to a measurable level of service. This is not how things work at the moment; ISPs make representations about the maximum delivered bandwidth, but for consumers don’t specify a minimum below which the connection will not fall.
The examples the Google blog gives of “differentiated online services, in addition to the Internet access and video services (such as Verizon’s FIOS TV)” appear to have in common the need for high bandwidth and high QoS. This bodes extremely ill for the Internet. The evolution to date of Internet access service has been steadily increasing bandwidth and QoS. The implication of this paragraph is that these improvements will be skimmed off into proprietary services, leaving the bandwidth and QoS of the public Internet stagnant.
The exclusion of wireless many consider egregious. I think that Google and Verizon would argue that there is nothing to stop wireless being added later. In any case, I am sympathetic to Verizon on this issue, since wireless is so bandwidth constrained relative to wireline that it seems necessary to ration it in some way.
The Network Management paragraph in the statement document permits “reasonable” network management practices. Fortunately the word “reasonable” is defined in detail in the statement document. Unfortunately the definition, while long, includes a clause which renders the rest of the definition redundant: “or otherwise to manage the daily operation of its network.” This clause appears to permit whatever the ISP wants.
So on balance, while it contains a lot of worthy sentiments, I am obliged to view this framework as a sellout by Google. I am not alone in this assessment.
-
-
10:00
»
Wirevolution
Google is rumored to be ready to cut a Faustian deal with Verizon, benefitting its shareholders by selling the soul of the Internet, namely open, equal access.
If the rumors turn out to be true, Google might consider changing Point 6 of its corporate philosophy (which currently says “You can make money without doing evil“) to “We don’t care. We don’t have to.”
Update: Google and Verizon deny the rumor.
-
-
8:12
»
Wirevolution
Google announced that it is going to wire a select few communities with gigabit broadband connections. This could be huge.
Something is wrong with broadband access in the US. It was ranked 15th in the world in 2008 on a composite score of household penetration, speed and price.
Google is setting out to demonstrate a better way, though other countries already offer such demonstrations. The current international benchmark for price and speed is Stockholm at $11 per month for 100 mbps. There are similar efforts in the US, for example Utopia in Utah. One of the key features of these implementations of fiber as a utility is that the supplier of the fiber does not supply content, since this would impose a structural conflict of interest.
Google does supply content, so it will be interesting to see how it deals with this conflict. I doubt there will be any problems in the short term, but in the long term it will be very hard to resist the impulse to use all the competitive tools available; “Don’t be evil” isn’t a useful guideline to a long, gentle slope.
OK, it’s easy to be cynical, but at least Google is trying to do something to improve the broadband environment in the US, and it may be a long time before the short term allure of preferred treatment for its own content outweighs the strategic benefit of improved national broadband infrastructure. And this initiative will undoubtedly help to accelerate the deployment of fiber to the home, if only by goading the incumbents.
I touched on the issue of municipal dark fiber a while back.