• chevron_right

      Court rules against Activision Blizzard in $23.4M patent dispute

      news.movim.eu / ArsTechnica · Wednesday, 8 May - 14:49

    Acceleration Bay says <em>World of Warcraft</em>'s networking code infringes on a patent originally filed by Boeing.

    Enlarge / Acceleration Bay says World of Warcraft 's networking code infringes on a patent originally filed by Boeing. (credit: Activision Blizzard)

    A jury has found Activision Blizzard liable for $23.4 million in damages in a patent infringement lawsuit first brought to court in 2015.

    The case centers on patents first filed by Boeing in 2000, one that describes a "distributed game environment" across a host and multiple computers and another that describes a simple method for disconnecting from such a network . Those patents were acquired in 2015 by Acceleration Bay, which accused Activision Blizzard of using infringing technology to develop World of Warcraft and at least two Call of Duty titles.

    Those accusations succeeded in court earlier this week, as a jury found a "preponderance of evidence" that the patents were infringed. The decision came following a one-week trial in which Activision Blizzard argued that its networking technology works differently from what is described in the patents, as reported by Reuters .

    Read 5 remaining paragraphs | Comments

    • chevron_right

      Counterfeit Cisco gear ended up in US military bases, used in combat operations

      news.movim.eu / ArsTechnica · Friday, 3 May - 21:58 · 1 minute

    Cisco Systems headquarters in San Jose, California, US, on Monday, Aug. 14, 2023.

    Enlarge / Cisco Systems headquarters in San Jose, California. (credit: Getty )

    A Florida resident was sentenced to 78 months for running a counterfeit scam that generated $100 million in revenue from fake networking gear and put the US military's security at risk, the US Department of Justice (DOJ) announced Thursday.

    Onur Aksoy, aka Ron Aksoy and Dave Durden, pleaded guilty on June 5, 2023, to two counts of an indictment charging him with conspiring with others to traffic in counterfeit goods, to commit mail fraud, and to commit wire fraud. His sentence, handed down on May 1, also includes an order to pay $100 million in restitution to Cisco, a $40,000 fine, and three years of supervised release. Aksoy will also have to pay his victims a sum that a court will determine at an unspecified future date, the DOJ said.

    According to the indictment [ PDF ], Aksoy began plotting the scam around August 2013, and the operation ran until at least April 2022. Aksoy used at least 19 companies and about 15 Amazon storefronts, 10 eBay ones, and direct sales—known collectively as Pro Network Entities—to sell tens of thousands of computer networking devices. He imported the products from China and Hong Kong and used fake Cisco packaging, labels, and documents to sell them as new and real. Legitimate versions of the products would've sold for over $1 billion, per the indictment.

    Read 16 remaining paragraphs | Comments

    • chevron_right

      Cloudflare Warp on Linux

      pubsub.slavino.sk / warlord0blog · Friday, 3 May - 16:57 edit

    After installing the Cloudflare Warp client on my Manjaro system, I could not get it to connect. Watching the journal, I found this: And the client shows unable to connect due to DNS lookup faliure. It has to be a systemd resolv issue, and a quick search revealed a post on Reddit. Edit the file &ellipsisRead the full post »

    Značky: #Networking, #cloudflare, #Linux

    • chevron_right

      Icinga2 and Cloudflare

      pubsub.slavino.sk / warlord0blog · Sunday, 28 April - 12:10 edit

    With Cloudflare, I wanted to host my Icinga2 instance behind a tunnel. This posed a bit of an issue as whenever I tried to submit a passive result the logs showed sslv3 alert bad certificate. I figured it’s something to do with the Cloudflare TLS getting in the way, and I was right. Between Cloudflare &ellipsisRead the full post »

    Značky: #Linux, #icinga2, #Security, #certificates, #Networking

    • chevron_right

      Cloudflare Tunnelling

      pubsub.slavino.sk / warlord0blog · Tuesday, 16 January, 2024 - 18:48 edit

    Using Cloudflare, it is possible to connect to a private internal service via a tunnel. This enables the interaction of a DNS name to get proxied through Cloudflare, and over a tunnel into your secure application – without exposing the application ports to the internet. This means none of our internal services need be published via &ellipsisRead the full post »

    Značky: #Networking, #Web, #Linux, #cloudflare

    • No chevron_right

      i2p Anonymity Network Notes ep. 1

      chunk · pubsub.toofast.vip / notes · Sunday, 26 November, 2023 - 10:51 edit · 1 minute


    https://geti2p.net/en/

    https://geti2p.net/en/docs/how/intro

    https://geti2p.net/en/docs/how/threat-model

    https://geti2p.net/en/docs/protocol

    https://geti2p.net/en/docs/transport


    "Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the originator of some communication and not the recipient, or the other way around. I2P is designed to allow peers using I2P to communicate with each other anonymously — both sender and recipient are unidentifiable to each other as well as to third parties." from https://geti2p.net/en/docs/how/intro

    "The network itself is message oriented - it is essentially a secure and anonymous IP layer, where messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP packets."

    ...

    So my next questions, in parallel to these links, is for starters what kind of encryption happens that makes tranmissions on i2p network 'anonymous' ? Then I'm curious, how does using a cryptographic hash for a destination or a host (in place of where you'd think an IP address goes, in terms of routing traffic) or an origin host provide anonymity? Or is that it's intention? I'm aware of a couple of fun i2p resources, that are way beyond my current (lack of) comprehension of the i2p network. I will share in comments.


    #notes #computing #i2p #anonymity #networking

    • chevron_right

      RIP to my 8-port Unifi switch after years and years of Texas outdoor temps

      news.movim.eu / ArsTechnica · Friday, 20 October, 2023 - 13:17 · 1 minute

    Photograph of a US-8-150W switch in situ

    Enlarge / My original US-8-150W shortly before being replaced. Don't judge my zip-tie mounting job—it held for eight years! (credit: Lee Hutchinson)

    This morning, I'd like to pour one out for a truly awesome piece of gear that did everything I asked of it without complaint and died before its time: my Unifi 8-port POE switch, model US-8-150W. Farewell, dear switch. You were a real one, and a lightning strike took you from us too soon.

    I picked up this switch back in January of 2016 , when I was ramping up my quest to replace my shaky home Wi-Fi with something a little more enterprise-y. The results were, on the whole, positive (you can read about how that quest turned out in this piece right here , which contains much reflection on the consequences—good and bad—of going overboard on home networking), and this little 8-port switch proved to be a major enabler of the design I settled on.

    Why? Well, it's a nice enough device—having 802.3af/at and also Ubiquiti's 24-volt passive PoE option made it universally compatible with just about anything I wanted to hook up to it. But the key feature was the two SFP slots, which technically make this a 10-port switch. I have a detached garage, and I wanted to hook up some PoE-powered security cameras out there, along with an additional wireless access point. The simplest solution would have been to run Ethernet between the house and the garage, but that's not actually a simple solution at all—running Ethernet underground between two buildings can be electrically problematic unless it's done by professionals with professional tools, and I am definitely not a professional. A couple of estimates from local companies told me that trenching conduit between my house and the garage was going to cost several hundred dollars, which was more than I wanted to spend.

    Read 5 remaining paragraphs | Comments

    • chevron_right

      Network-watching gadget Monitor-IO chooses a graceful, owner-friendly death

      news.movim.eu / ArsTechnica · Tuesday, 11 April, 2023 - 15:07 · 1 minute

    Monitor-IO, amidst various geeky things

    Enlarge / The Monitor-IO in its natural habitat, glowing green to let you know that everything is copacetic with the network to which it's connected. (credit: Jim Salter)

    Monitor-IO was a gadget that did one thing: live near a router and tell you how its network is doing. It did this both with detailed reports you could access from the local network and with a screen that glowed one of three colors: green for good, purple for problems, and red for dead. It could replace, or at least augment, typing a bunch of IP addresses into a browser and waiting for them to time out.

    We liked the device when we reviewed it in August 2018 , despite our broad understanding of it as a "butter-passing robot," a device that relays information you could otherwise find out on your own. It had, beyond color-coded awareness, "obvious technical chops and real, careful attention to detail" in how it measured and what it could report. However, we also noted that the $100 price made sense for a small business but "might be a bit steep" for a household on a tight budget.

    Monitor-IO seems to have run out of people willing to pay for better network awareness. In an "End-of-service" notice posted on its site , the company cites "rising costs and supply chain issues," among other "numerous headwinds." Faced with no better option, Monitor-IO is shutting down its business and monitoring service on April 15, 2023. (Support will be offered through May 30, 2023.)

    Read 5 remaining paragraphs | Comments