All AWS Services GDPR ready

Today, I’m very pleased to announce that AWS services comply with the General Data Protection Regulation (GDPR). This means that, in addition to benefiting from all of the measures that AWS already takes to maintain services security, customers can deploy AWS services as a key part of their GDPR compliance plans.

Copying eID

Hello dear redditers,i am looking for a help with cloning/copying eID smart card which i am using for work. I need an extra one for working at home or if just somebody can use it to download some files to my home computer, while i am still at work. Basically it is just a chip card which always connect to server for authentication so there wont be much data on it. Is it possible?

A robot’s ransom

Like most electronic stuff, robots are not immune to cybercriminals. Last year, researchers at IOActive detected as many as 50 vulnerabilities in robots developed by the Japanese firm SoftBank. They informed the manufacturer but never heard back. So this year at the Security Analyst Summit 2018, they decided to demonstrate what can happen if a robot gets hacked.

Do not become a link in a supply chain attack

For some reason, we keep hearing variations on the same theme: “Our company is not a major player; it wouldn’t be interesting to an attacker.” However popular, it is a misconception. Here is one example of how an APT operator used a small company in a supply chain attack.

Confirmation of a US Government Probe Pushes Facebook’s Market Loss To $90 Billion

The US Federal Trade Commission has confirmed that it is investigating Facebook over its privacy practices, following recent revelations that data firm Cambridge Analytica harvested and exploited tens of millions of users’ data without their permission. From a report: Facebook’s stock renewed its downward slide, bringing the company’s total loss of market

value to around $90 billion since the scandal broke 10 days ago

BrandPost: 3 Security Features to Look for in SD-WAN Solutions

The increasing adoption of SaaS and IaaS applications and infrastructure has been a catalyst for the rapid adoption of SD-WAN architectures. Directly connecting users to SaaS/IaaS instances from branch offices using lower cost internet services to augment (or even replace) MPLS provides the highest performance and user experience.

BrandPost: Mobile coverage: How SD-WAN improves performance

More than 100,000 attendees from around the world recently descended on Mobile World Congress 2018 in Barcelona. They were able to witness many new and exciting communications technologies, including IoT, 5G, augmented reality, artificial intelligence, machine learning and SD-WAN.

Reading a VGA monitor’s configuration data with I2C and a PocketBeagle

<![CDATA[ ]]>

Have you ever wondered how your computer knows all the characteristics of your monitor— the supported resolutions, the model, and even the serial number? Most monitors use a system called DDC to communicate this information to the computer.1 This information is transmitted using the I2C communication protocol—a protocol also popular for connecting hobbyist devices. In this post, I look inside a VGA monitor cable, use a tiny PocketBeagle (a single-board computer in the BeagleBone family) to read the I2C data from an LCD monitor, and then analyze this data.

Inside a VGA cable. The cable is more complex than I expected, with multiple layers of shields. The green, red, white (sync) and blue wires are thicker and have their own shielding.

To connect to the monitor, I cut a VGA cable in half and figured out which wire goes to which pin.3 The wire (above) is constructed in an interesting way, more complicated than I expected. The red, green, blue and horizontal sync signals are transmitted over coaxial-like cables formed by wrapping a wire a spiral of thin copper wires for shielding.2 The remaining signals travel over thinner plain wires. Several strands of string form the structural center of the VGA cable, and the ten internal wires are wrapped in a foil shield and woven outer shield.

The VGA connector consists of 3 rows of 5 pins. Pins are simply numbered left-to-right with 1 through 5 in the first row, 6-10 in the second, and 11-15 in the third. (Click image for a closeup.)

The photo above shows the male VGA connector on each end of the cable. The function assigned to each pin is shown in the table below. The I2C clock (SCL) and data (SDA) are the important pins for this project. The wire colors are not standardized; they refer to my VGA cable and may be different for a different cable.

<![CDATA[ ]]>
Pin Function Wire color
1 Red Red coax
2 Green Green coax
3 Blue Blue coax
4 Reserved Shield
5 Ground Black
6 Red Ground Shield
7 Green Ground Shield
8 Blue Ground Shield
9 5V Yellow
10 Ground White
11 Reserved Shield
12 SDA Green
13 HSync White coax
14 VSync Brown
15 SCL Red

The 5 volt wire in the cable has a clever purpose. This wire allows the computer to power the EEPROM chip that provides the configuration data. Thus, the computer can query the display’s characteristics even if the display is turned off or even unplugged from the wall.

Reading the configuration data

To read the data over I2C, I used the PocketBeagle, a tiny Linux computer that I had handy. (You could use a different system that supports I2C, such as the Raspberry Pi, Beaglebone or Arduino.) I simply connected the I2C clock (SCL), data (SDA) and ground wires from the VGA cable to the PocketBeagle’s I2C pins as shown below.

Connecting a VGA cable to the PocketBeagle allows the configuration data to be read over I2C. The black wire is ground, the green wire is I2C data (SDA) and the red wire is I2C clock (SCL).

Simple Linux commands let me access I2C. First, I probed the I2C bus to see what devices were present, using the i2cdetect command. (Many devices can be connected to an I2C bus, each assigned a different address.) The output below shows that devices 30, 37, 4a, 4b and 50 responded on I2C bus 1. Device 50 is the relevant I2C device, assigned to the configuration information. Device 37 is DDC/CI, allowing monitor settings to be controlled by the computer, but I’ll ignore it for this post. Devices 30, 4a, and 4b are a mystery to me so leave a comment if you know what they are.

$ i2cdetect -y -r 1 0 1 2 3 4 5 6 7 8 9 a b c d e f 00: -- -- -- -- -- -- -- -- -- -- -- -- -- 10: -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- 20: -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- 30: 30 -- -- -- -- -- -- 37 -- -- -- -- -- -- -- -- 40: -- -- -- -- -- -- -- -- -- -- 4a 4b -- -- -- -- 50: 50 -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- 60: -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- 70: -- -- -- -- -- -- -- --