31 Years of the Digest ... founded August 21, 1981

Add this Digest to your personal   or  

The Telecom Digest for November 27, 2012
Volume 31 : Issue 278 : "text" Format
Messages in this Issue:
Re: Why passwords have never been weaker-and crackers have never been stronger (Pete Cresswell)
So You're a Good Driver? Let's Go to the Monitor (Monty Solomon)
Courts Divided Over Searches of Cellphones (Monty Solomon)

====== 31 years of TELECOM Digest -- Founded August 21, 1981 ======

Telecom and VOIP (Voice over Internet Protocol) Digest for the Internet. All contents here are copyrighted by Bill Horne and the individual writers/correspondents. Articles may be used in other journals or newsgroups, provided the writer's name and the Digest are included in the fair use quote. By using any name or email address included herein for any reason other than responding to an article herein, you agree to pay a hundred dollars to that person, or email address owner.
Addresses herein are not to be added to any mailing list, nor to be sold or given away without the explicit written consent of the owner of that address. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome.

We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime.  - Geoffrey Welsh


See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest.


Date: Mon, 26 Nov 2012 09:42:24 -0500 From: Pete Cresswell <PeteCress@invalid.telecom-digest.org> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Why passwords have never been weaker-and crackers have never been stronger Message-ID: <mtv6b8h6lf7s8d3lrshtut28ohrl3i44ja@4ax.com> Per Monty Solomon: >The ancient art of password cracking has advanced further in the past >five years than it did in the previous several decades combined. Can anybody comment on the specifics/methodology of this improvement? - - Pete Cresswell ***** Moderator's Note ***** It has become easier to "crack" passwords by guessing them: samples of passwords entered by users show that user are prone to using the names of relatives, pets, or objects in their immediate vicinity when they have to enter a new password. Common substitutions, such as using "leet speek", a patois once popular with the online hacking community, are also included in the lists used for "dictionary" attacks. Bill Horne Moderator
Date: Mon, 26 Nov 2012 09:05:27 -0500 From: Monty Solomon <monty@roscom.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: So You're a Good Driver? Let's Go to the Monitor Message-ID: <p062408feccd92752b54f@[10.0.1.10]> So You're a Good Driver? Let's Go to the Monitor By RANDALL STROSS November 24, 2012 LAST week, under my car's dashboard, I installed a small wireless gadget that would monitor my driving. I wanted to see how it felt to have my driving behavior captured, sent to an insurance company and analyzed. More drivers, seeking discounts on auto insurance, are voluntarily doing just that. Insurers are offering these discounts as they aim to abandon the crude proxies they have long used to guess the likelihood that a particular policyholder will have an accident. These have included age, sex, marital status, miles driven (as reported by the driver) - and even credit scores, which can penalize those guilty of driving while poor. Driving data is collected with a device that policyholders must be persuaded to install; it connects to the car's computer system via a diagnostic port found in all cars since 1996. Such "user-based insurance," the name for individualized pricing based on data collected from a vehicle, is spreading. Drivewise from Allstate is in 10 states; Drive Safe and Save, from State Farm, is in 16, with 11 more to be added next month; and Snapshot, from Progressive, is in 43. Progressive was the first in the field, in 1998, when it started offering Houston customers a device that had to be professionally installed. Six years later, it introduced a device in three states that could be plugged in by the customer, but had to be unplugged at regular intervals and connected to a PC to upload the data. Wireless transmission came next. ... http://www.nytimes.com/2012/11/25/business/seeking-cheaper-insurance-drivers-accept-monitoring-devices.html ***** Moderator's Note ***** Would it affect my rates if an insurance company figured out that I was stopping at the V.F.w. for a drink on my way home from work? come to think of it, Route 128 (the arterial road around boston, sometimes called "I-95" by Barneys) has a 55 MPH speed limit posted, but I'd get run over if I didn't do at least 65. Is that a significant risk? If I was elected to the Legilature, would I want it known that I wasn't at the statehouse most of the time? Would I want it known that I didn't have a transponder? I wonder what having a mistress would do to my rates: could someone influence my votes by offering to disclose where I was on a particular date at a particular time? Bill Horne Moderator
Date: Mon, 26 Nov 2012 09:09:37 -0500 From: Monty Solomon <monty@roscom.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Courts Divided Over Searches of Cellphones Message-ID: <p062408ffccd92815e31e@[10.0.1.10]> Courts Divided Over Searches of Cellphones By SOMINI SENGUPTA November 25, 2012 Judges and lawmakers across the country are wrangling over whether and when law enforcement authorities can peer into suspects' cellphones, and the cornucopia of evidence they provide. A Rhode Island judge threw out cellphone evidence that led to a man being charged with the murder of a 6-year-old boy, saying the police needed a search warrant. A court in Washington compared text messages to voice mail messages that can be overheard by anyone in a room and are therefore not protected by state privacy laws. In Louisiana, a federal appeals court is weighing whether location records stored in smartphones deserve privacy protection, or whether they are "business records" that belong to the phone companies. ... http://www.nytimes.com/2012/11/26/technology/legality-of-warrantless-cellphone-searches-goes-to-courts-and-legislatures.html
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Bill Horne. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is moderated by Bill Horne.
Contact information: Bill Horne
Telecom Digest
43 Deerfield Road
Sharon MA 02067-2301
339-364-8487
bill at horne dot net
Subscribe: telecom-request@telecom-digest.org?body=subscribe telecom
Unsubscribe: telecom-request@telecom-digest.org?body=unsubscribe telecom
This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then.  Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!

URL information: http://telecom-digest.org


Copyright (C) 2012 TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.

Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.

End of The Telecom Digest (3 messages)

Return to Archives ** Older Issues