Internet Security – PJ Magic http://pjmagic.net/ Wed, 23 Nov 2022 03:06:00 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://pjmagic.net/wp-content/uploads/2021/06/icon-1-150x150.png Internet Security – PJ Magic http://pjmagic.net/ 32 32 Reinventing Mining with the Industrial Internet • The Register https://pjmagic.net/reinventing-mining-with-the-industrial-internet-the-register/ Wed, 23 Nov 2022 03:06:00 +0000 https://pjmagic.net/reinventing-mining-with-the-industrial-internet-the-register/ Infomercial Sometimes called “black gold”, coal has been a primary source of energy for nearly every industry in the world since the 18th century. This is especially true in China, which has little oil and gas but plenty of coal, making it an essential source of energy. At the same time, to advance sustainable development, […]]]>

Infomercial Sometimes called “black gold”, coal has been a primary source of energy for nearly every industry in the world since the 18th century. This is especially true in China, which has little oil and gas but plenty of coal, making it an essential source of energy.

At the same time, to advance sustainable development, the Chinese government has announced that the country’s carbon dioxide emissions will peak before 2030 and carbon neutrality will be achieved by 2060. Driven by these 2030/2060 goals, the Coal mining companies in China have nibbled on the bit to accelerate smart digital transformation for green mining ever since.

Hongliulin Coal Mine, for example, a subsidiary of Shaanxi Coal and Chemical Industry Group, is a major player in the industry. The Company’s coal mine is located in the Maowusu Desert between the Yulin region of Shaanxi Province and the city of Ordos in the Inner Mongolia Autonomous Region. It lies in the heart of the Shenfu mining area, one of the eight largest mining areas in the world. The coal mined here is transported daily by more than 1,500 heavy trucks and six dedicated trains to factories across China.

Hongliulin’s Journey to Intelligent Transformation

In line with its parent group’s strategy of harnessing technological innovation to create a world-class energy group, Hongliulin has intensified its efforts to spearhead innovative, intelligent and state-of-the-art digital coal mining. industry. Achieving this transformation is not an easy task, so to stay focused and motivated, Hongliulin has set itself three goals: intelligent collaboration, improving underground air quality, and cultivating a green ecosystem by three dimensions.

To achieve these goals, Hongliulin brought in the Huawei Coal Mine team in February 2021. Their goal was to integrate next-generation ICT technologies such as cloud computing, big data and AI into the mining of coal. coal, and then created a plan to transform their network, IT infrastructure, smart applications, and integrated management frameworks. To this end, they have invested in 24 smart mining projects or systems, including full 4G/5G and ultra-wideband (UWB) network coverage, and construction of industrial video ring networks and fifth-generation fixed network. (F5G).

Additional upgrades have been made to cybersecurity protection; a modular data center; deployment of the cloud computing platform; an integrated management and control platform; an intelligent operations management system; a smart campus; a fully mechanized coal mining system; and an intelligent disaster prevention system. Many of these systems have already been commissioned.

Standardization wins

Of all the solutions provided by Huawei to Hongliulin, the digital cloud platform powered by the Huawei Cloud Stack running on the Industrial Internet network was the most important. Previously, Hongliulin invested heavily in digital transformation, but the results were disappointing due to a lack of standardization. For example, the company deployed many systems, but their APIs were not unified. This meant that much of the data generated lacked a unified format and could not be imported quickly, while data silos made it difficult to connect. The company has long suffered from these problems.

Huawei Cloud Stack Supports Hongliulin Coal Mine

Huawei Cloud Stack Supports Hongliulin Coal Mine – Click to Expand

Fortunately, Huawei Cloud Stack has helped Hongliulin unify on standard APIs, break down data silos, consolidate data assets, create digital twins, and improve collaboration to pave the way for smart mining. . This turnaround used a number of technologies. The Huawei Cloud Stack used IoT technology from Huawei Cloud for example, which could be adapted to APIs running on different protocols from different vendors.

It could also be used in conjunction with a converged industrial network based on 5G, F5G OptiX and an IP radio access network (IP RAN), flexibility which has enabled the connection of more than 2,600 Hongliulin devices.

The Huawei Cloud Stack used the ROMA Connect application and Huawei Cloud’s data integration platform to import data from more than 35 operational technology (OT) production systems and more than 10 IT support systems in a unified data lake. Centralized management was provided by Huawei Cloud’s FusionInsight big data platform, which enabled more than 100 million records to be imported into the data lake every day, while consolidating more than 100 devices and 45 system models.

Huawei Cloud’s AI-powered Pangu data mining model provides intelligent labeling and machine learning in a few taps where the model makes predictions based on a few training examples. It covers more than 1,000 mining scenarios, including transportation, mining, transport, communication, drainage and coal washing, and has helped Hongliulin reduce its development workload by 90%.

Huawei engineers took four months to identify the Hongliulin devices and import their data into lakes using Huawei Cloud Stack. They have helped Hongliulin build what he says is China’s first-ever smart coal mine based on Industrial Internet Architecture, and develop many smart applications such as integrated management and control platform, smart ventilation, smart transport, smart campus and disaster prevention.

The end result is a robust platform for integrated management, effective decision making, and service delivery.

Integrated management and control platform based on Industrial Internet Architecture

Integrated management and control platform based on Industrial Internet Architecture – Click to enlarge

Improved visibility and security

Hongliulin’s integrated management and control platform is powered by digital twins – a technology that replicates and simulates entire mining processes to predict how they will behave during data collection and analysis operations to make the whole system safer and more efficient. The simulation showcases the 138 km² Hongliulin coalfield on a 3D dashboard, allowing operators to remotely control autonomous machinery from a room above ground instead of having to work in a hazardous environment below the surface . It gives operators significant visibility of the entire mining picture with just a few mouse clicks, including how coal is mined and transported to the ground and whether shears, crushers, haul trucks and conveyors stand-alone functions as ordered.

The digital twin also enables autonomous analysis, decision-making and collaborative control over the various mining systems. For example, dispatchers can make remote video and voice calls on the surface, and underground miners can quickly assign tasks. Prior to its deployment, around 100 miners in three rotating shifts were needed to cover the peak periods of fully mechanized mining. Now, with real-time monitoring and centralized remote control, more than 40% fewer miners are needed, underground workload has been reduced, and worker safety has been significantly improved.

Operators remotely controlling autonomous machines from an above ground control room

Operators remotely controlling autonomous machines from an above ground control room – Click to enlarge

More effective workforce management

Underground coal mining generally goes through different stages, from exploration and drilling (the construction of shafts and tunnels) to mining and transportation. Traditionally, tasks, issues, and incidents were assigned, reported, and investigated verbally or in writing by staff, which was slow and inefficient. Now, Hongliulin’s intelligent operation management system has digitized coal mining operations on all fronts, including labor, machinery, materials, methods, environments, and measurements. It provides real-time operational information and has improved worker safety.

This system allows managers to quickly distribute tasks to workers in line and uses AI to replace manual foreign object inspection at specific times with a smart 24-hour inspection schedule. In doing so, it reduces the time a worker typically has to spend underground is around 2 hours, improving overall efficiency by 30%.

Together with partners such as Huawei Cloud, Hongliulin plans to continue driving its smart digital transformation while reinventing the coal mining industry using the power of technological innovation.

Sponsored by Huawei.

]]>
Which internet security suite is the best? https://pjmagic.net/which-internet-security-suite-is-the-best/ Sat, 19 Nov 2022 19:00:00 +0000 https://pjmagic.net/which-internet-security-suite-is-the-best/ In our age of cyber addiction, it has never been more crucial to have a reliable form of antivirus software installed on your devices. But the antivirus market is now huge, and it’s hard to decide which provider is right for you. So let’s compare two major antivirus programs, McAfee and Norton, to see which […]]]>

In our age of cyber addiction, it has never been more crucial to have a reliable form of antivirus software installed on your devices. But the antivirus market is now huge, and it’s hard to decide which provider is right for you. So let’s compare two major antivirus programs, McAfee and Norton, to see which is best suited to your preferences.


Norton vs. McAfee: Price

photo of price tag on black background

Antivirus programs these days can be expensive, and different packages can cost you more than you need. Let’s cover basic McAfee and Norton prices to see how much you really need to pay.

Both Norton and McAfee have different subscription plans with different features, benefits, and limitations. First, let’s look at the increasing prices of McAfee plans for a one-year subscription:

  • Basic: $29.99.
  • More: $39.99.
  • Premium (or Total Protection): $49.99.
  • Advanced: $89.99.

Here is a list of the different prices of Norton’s plans (also in ascending order):

  • Antivirus Plus: $19.99.
  • Standard: $39.99.
  • Deluxe: $49.99.
  • Select and LifeLock: $99.99.

As you can see, Norton’s most basic antivirus plan is the cheapest, at just £19.99 for the year. But McAfee’s basic plan isn’t far off that, at $29.99 per year. The more advanced plans have additional tools and features, which is why the prices increase quite significantly in some cases. Depending on how you use your devices, some plans may be more suitable for you than others. We will then discuss the features offered by each type of plan.

Norton vs. McAfee: Features

padlock graphic with circuits pattern on blue background

We’ll cover each antivirus plan one by one, so you know which one is right for you.

First, you have McAfee’s basic plan. This can only be used on one device and offers a firewall, password manager, identity monitoring, virus protection, protection score, web protection, file shredder and support on line. Additionally, you can use McAfee’s virtual private network (VPN) service with the basic plan, as well as all higher plans. It’s a good deal if you’re looking for antivirus and VPN tools combined.

The Plus and Premium (or Total Protection) plans are quite similar but can be used on more devices (five for the former and unlimited for the latter). The Premium plan also offers personal data cleaning scans, but not the full cleaning feature, although that’s where the differences end. Overall, you won’t get much more in the Plus and Premium plans except for a higher device limit.

All of the extra features come with the McAfee Advanced plan, which costs almost double the price of the next plan. With McAfee Advanced, you’ll have access to credit monitoring and reporting, wallet loss protection, identity restoration support, and full-service personal data sanitization. This is in addition to any features added by lower plans.

The most basic Norton plan, called AntiVirus Plus, can be used on a single device and offers protection against viruses, malware, ransomware, and hacks. The next plan, Standard, can be used on three devices and has VPN and dark web monitoring in addition to the features added by the previous plan. With Deluxe, you’ll also get a parental control tool and be able to use Norton on five devices.

The latest plan, known as Select and LifeLock, costs twice the price of Deluxe but can be used on 10 different devices and offers LifeLock, an identity protection service. You can pay for the Select and LifeLock plan on an annual or monthly basis.

Both antivirus vendors also offer additional tools, such as McAfee’s Safe Family and Norton’s Computer Tune Up, in addition to their antivirus plans. These will cost extra, although prices vary from tool to tool.

Both Norton and McAfee have highly effective malware protection levels, both at over 95%, so you can rest easy knowing your devices are effectively protected.

Norton vs. McAfee: Customer Service

graphic of man using headset on computer

It’s natural for software to malfunction, and sometimes it can be difficult to navigate. This is why customer service is important for antivirus users.

Fortunately, Norton and McAfee offer a range of customer support options. If you have a question or problem, you can contact Norton and McAfee by phone, live chat, and email. Both providers also have an FAQ page for common queries. If you run into a problem at an odd hour, Norton and McAfee offer their 24/7 live chat, so there’s always someone there to help.

Additionally, both providers offer additional support if you’d rather try to fix the problem yourself first. McAfee offers customer service knowledge articles and a series of how-to webinars for many issues and questions. Norton, on the other hand, offers a range of getting started guides and helpful notes, as well as a forum where you and other users can post or answer questions.

Norton vs. McAfee: ease of use

man using laptop outdoors

If you’re not particularly tech-savvy, some antivirus programs can be a little tricky to use. But don’t worry, you won’t have this problem with Norton and McAfee. Both providers offer a clean, simple and user-friendly interface that can be understood by almost anyone. However, Norton’s settings can be a bit trickier for novices compared to McAfee.

But overall, with clear main panels that can be navigated easily, you’ll probably understand Norton and McAfee’s interfaces very quickly. Still, if you are confused, you can head to the providers’ help pages or contact customer support.

Which is better: Norton or McAfee?

In terms of basic plans, Norton is the best choice here. It offers the same features as McAfee’s basic plan, but for a lower cost. So if you’re just looking for standard virus protection, Norton is a great choice.

But that doesn’t mean McAfee is below average. This service is a bit more expensive but offers great security features and unlimited device usage on its two top-tier plans. McAfee and Norton also have very high protection ratings, so you won’t be at much higher risk with either program.

However, if you’re determined to use a VPN, note that McAfee’s cheapest plan offers this feature, while Norton doesn’t. You’ll pay $39.99 for VPN protection with Norton, but only $29.99 with McAfee.

Both Norton and McAfee are solid antivirus programs

Although Norton has established itself as the best value antivirus software, both vendors are high quality. There’s no doubt that McAfee and Norton can provide solid levels of protection for their users, along with an array of useful additional features in their various plans. If you want to protect your device, these are both great options, despite their slight differences.

]]>
Cybersecurity Minister Clare O’Neil announces several reforms to protect personal data after Medibank data leaks https://pjmagic.net/cybersecurity-minister-clare-oneil-announces-several-reforms-to-protect-personal-data-after-medibank-data-leaks/ Sun, 13 Nov 2022 01:19:43 +0000 https://pjmagic.net/cybersecurity-minister-clare-oneil-announces-several-reforms-to-protect-personal-data-after-medibank-data-leaks/ Cybersecurity Minister Clare O’Neil said Australia needed to “wake up from the cyber slumber”, pointing to a series of reforms designed to protect personal data, including making ransom demands illegal. Key points: The feds are considering making it illegal to pay ransoms Clare O’Neil says payments are fueling ransomware activity She says data retention laws […]]]>

Cybersecurity Minister Clare O’Neil said Australia needed to “wake up from the cyber slumber”, pointing to a series of reforms designed to protect personal data, including making ransom demands illegal.

A day after calling online hackers ‘scumbags’ while announcing a new cybersecurity task force, Ms O’Neil said there were compelling reasons to make it illegal for companies to try to get out of trouble.

“The idea that we’re going to trust these people to delete data that they’ve taken down and maybe copied a million times over is frankly silly,” she told Insiders on Sunday.

The federal government supported Medibank’s decision not to pay a $15 million ransom to prevent the disclosure of customer data.

“We stand strong as a country against this, we don’t want to fuel the ransomware business model,” Ms O’Neil said.

The Australian Federal Police (AFP) revealed on Friday that Russian cybercriminals were behind the Medibank hack, which led to the publication of highly sensitive customer data on the dark web.

Privacy laws a ‘national vulnerability’

Stricter regulation could also extend to data retention, which Clare O’Neil described as a “national vulnerability”.

Former Optus and Medibank customers who hadn’t been with the companies for a decade were caught up in the hacks.

The hackers demanded a ransom which they said was $1 per customer. (PA: Rick Rycroft)

“What we need to make sure is that companies only keep data for when it’s actually needed,” she said.

Data retention is part of a review of the Privacy Act currently being undertaken by Attorney General Mark Dreyfus.

Minister admits having trouble jailing cybercriminals

]]>
Wuzhen Summit kicks off with blatant technology display and focuses on building community with shared future in cyberspace https://pjmagic.net/wuzhen-summit-kicks-off-with-blatant-technology-display-and-focuses-on-building-community-with-shared-future-in-cyberspace/ Thu, 10 Nov 2022 07:15:00 +0000 https://pjmagic.net/wuzhen-summit-kicks-off-with-blatant-technology-display-and-focuses-on-building-community-with-shared-future-in-cyberspace/ BEIJING, November 10, 2022 /PRNewswire/ — China kicked off the 2022 World Internet Conference (WIC) Wuzhen Summit in Wuzhen Water Town, East China zhejiang provinceWednesday, as delegates of China the most renowned Internet companies and the leaders of foreign cyber companies met again to discuss key topics related to the online industry, such as cyberspace […]]]>

BEIJING, November 10, 2022 /PRNewswire/ — China kicked off the 2022 World Internet Conference (WIC) Wuzhen Summit in Wuzhen Water Town, East China zhejiang provinceWednesday, as delegates of China the most renowned Internet companies and the leaders of foreign cyber companies met again to discuss key topics related to the online industry, such as cyberspace governance and industrial digitization.

With the on-site display of technology-supported interactive games and eye-catching technologies, multiple sub-forums, and an emphasis on building a community with a shared future in cyberspace, this year’s Wuzhen Summit has a lot of familiarity with the one from last year. But many new highlights are also emerging, such as the growing number of applicants and a first-ever cloud-based exhibition hall for presenting exhibitions throughout the year, reflecting the growing influence of the summit or, more generally, China the Internet industry in the world.

Chinese President Xi Jinping sent a congratulatory letter to the summit on Wednesday.

In the letter, Xi noted that China is willing to work with countries around the world to chart a global digital development path that includes the joint building and sharing of digital resources, a vibrant digital economy, effective digital governance, a thriving digital culture, effectively guaranteed digital security and mutually beneficial digital cooperation.

Accelerated efforts should be made to build a community with a shared future in cyberspace, bringing wisdom and strength to world peace and development as well as the progress of human civilization, Xi said.

The summit is the first annual meeting of the World Internet Conference, a beijing– international organization whose headquarters were inaugurated in July.

Summit on site

Attendees were filled with emotion and happiness when talking about the feelings of attending the Wuzhen Summit, especially under the impact of the lingering COVID-19 pandemic and the world facing many factors. unstable and to new challenges this year such as economic slowdown, geo – political tensions and technological struggle between major countries.

“Wuzhen has witnessed the development of China the internet industry which is changing day by day”, Wu Yunkunchairman of Chinese cyberspace security service provider Qianxin Group, who attended WIC for the fourth time, told the Global Times, noting that he pays particular attention to topics concerning internet security, scientific innovation and the talent development.

Wan Lin, CEO of Cainiao Network, also attended this year’s WIC. Wan told the Global Times that Chinese companies have always made progress in building a community with a shared future in cyberspace, including improving the hardware base and software facilities.

But with the changes in the macroeconomic environment and the global situation, many companies are thinking about how to adjust their own strategies to adapt to industry changes, Wan noted, adding that he is keen to see and hear from new ideas and thoughts on this topic.

Guan Zhou, a senior official with the Global System for Mobile Communications Association (GSMA), said it was his first time to the Wuzhen summit since the coronavirus outbreak, and he felt both strange and familiar, Zhejiang Daily reported, adding that Guan pays close attention to 5G development topics.

This year, more than 2,000 representatives from over 120 countries and regions gathered at WIC 2022 under the theme “Towards a Shared Digital Future in a Connected World — Building a Community with a Shared Future in Cyberspace”, including tech giant Chinese delegates like BAT (Baidu, Alibaba and Tencent), executives of the Russian cybersecurity company Kaspersky, as well as many talents and Internet experts.

The Light of Internet Expo, a side event to WIC 2022 that opened on Tuesday, is still attracting a lot of attention this year. Many visitors actively participated in technology displays at this year’s expo, such as an interactive metaverse digital human dance game offered by China Mobile. Robot exhibits, such as a wearable exoskeleton robot presented by the China Electronic Technology Group Corporation (CETC), also attract public attention.

Zhang Yongthe CEO of Alibaba Group, said in a speech at the Wuzhen Summit on Wednesday that Alibaba will always root itself in the real economy, actively participate in building a community of shared destiny in cyberspace, do good use of digital technology to help medium and small businesses, and accelerate the arrival of industrial change, according to the media.

Chinese responsibilities

Experts noted that China The emphasis on building a community with a shared future in cyberspace shows the nation’s responsibility as an economic power to emphasize cooperation rather than decoupling.

Zhang Xiaorong, Director of beijingbased at Cutting-Edge Technology Research Institute, said countries around the world have very different interests and values ​​in cyberspace. For Chinait aims to propose new ideas for the search for a governance model based on global consensus.

“The internet is a common space for human activities, and a community with a shared future in cyberspace means coexistence in cyberspace,” he told the Global Times.

But Zhang stressed that while pursuing its own interests and values, every country should also respect and take into account the legitimate interests and value choices of other countries, and promote the common development of all countries in the process of pursuing its own. own development.

Liu Dingdinga veteran independent technology analyst, also told the Global Times that China has made great achievements on the fight against monopolies and other Internet-related issues, and the country can share these successful experiences with the world for reference, under the circumstances where the relevant laws and regulations keep pace with the times. ‘opening procedures.

the Internet development

Although China the online economy has reached a kind of crossing point under the tightening of regulatory management as well as in an increasingly complicated global environment, the country’s Internet sector again recorded rapid growth last year, with many emerging internet technologies like cloud computing and big data jumping to global top ranks, while the industrial scale of cyberspace security services market jumped 15.8% year on year last year, according to a report published by the Internet Society of China in September.

A blue book for the Global Internet Conference was released Wednesday at the Wuzhen Summit. According to the report, China ranks second in the world in terms of Internet development after the United States.

China The State Council Information Office also released a white paper on Monday. According to the newspaper, the value of China the digital economy had reached 45.5 trillion yuan by 2021, representing 39.8% of its GDP.

Experts noted that China The development of the Internet has been a great contribution to the global economy at a time when many countries are facing risks of economic downturn.

“Whether in terms of software, hardware, commodities or services, Chinese companies are exporting resources to the global development of cyberspace,” Liu said, adding that the rise of TikTok is also an example. of China Hit.

Zhang said there should be two directions for China Internet development: make breakthroughs in core innovation and key industry linkages, and establish themselves in overseas markets.

Shen also said that the industrial development in Chinasuch as information technology and the digital economy, has reached a “plateau”, which means steady but relatively slow growth, and a new cycle of explosive growth will be based on further accumulation, expansion and improvement.

SOURCE World Time

]]>
Troubleshoot Wi-Fi and Internet Connection Issues in macOS Ventura https://pjmagic.net/troubleshoot-wi-fi-and-internet-connection-issues-in-macos-ventura/ Mon, 07 Nov 2022 21:15:37 +0000 https://pjmagic.net/troubleshoot-wi-fi-and-internet-connection-issues-in-macos-ventura/ Some users are reporting Wi-Fi issues and other internet connectivity issues after updating to macOS Ventura 13. Problems can range from slow Wi-Fi connections or reconnections, random Wi-Fi disconnects or Wi-Fi not working at all, or internet connectivity not working after updating a Mac to macOS Ventura. Network connectivity issues seem to appear randomly for […]]]>

Some users are reporting Wi-Fi issues and other internet connectivity issues after updating to macOS Ventura 13. Problems can range from slow Wi-Fi connections or reconnections, random Wi-Fi disconnects or Wi-Fi not working at all, or internet connectivity not working after updating a Mac to macOS Ventura. Network connectivity issues seem to appear randomly for some users after installing almost every macOS update, and Ventura is no exception.

We’ll explain how to fix Wi-Fi connection issues in MacOS Ventura so you’ll be back online in no time.

Troubleshooting Wi-Fi and Internet Connection Issues in macOS Ventura

Some of these troubleshooting methods and tips will involve modifying system configuration files. So you should back up your Mac with Time Machine or your backup method of choice before you begin.

1: Disable or remove third-party firewall/network filtering tools

If you are using third-party firewall or network filtering tools, such as Little Snitch, Kapersky Internet Security, McAfee, LuLu, or similar, you may experience Wi-Fi connection issues on macOS Ventura. Some of these apps may not yet be updated to support Ventura or may not be compatible with Ventura. So turning them off can often fix network connectivity issues.

  1. Go to the Apple menu  and choose “System Settings”
  2. Go to “Network”
  3. Choose “VPN and filters”
  4. In the “Filters and Proxies” section, identify any content filters and remove them by selecting and clicking the – minus button, or changing the status to “Disabled”.

Disable Network Filters on MacOS Ventura

You must restart the Mac for the change to take full effect.

If you rely on a firewall or third-party filtering tools for specific reasons, you should ensure that you download any available updates for these applications as soon as they become available, as running earlier versions may result in compatibility issues with macOS Ventura, affecting your network connection.

2: Delete current Wi-Fi preferences in macOS Ventura and reconnect

Deleting current Wi-Fi preferences, restarting, and setting up Wi-Fi can fix common network issues on a Mac. This will involve deleting Wi-Fi preferences, which means you’ll need to reconfigure any customizations you’ve made to TCP/IP networking or similar.

  1. Quit all active applications on the Mac, including System Settings
  2. Disable Wi-Fi by going to the Wi-Fi menu bar (or Control Center) and flipping the Wi-Fi switch to the off position
  3. Open the Finder in macOS, then go to the “Go” menu and choose “Go to Folder”
  4. Enter the following file system path:
  5. /Library/Preferences/SystemConfiguration/

  6. Press return to navigate to this location, now locate and select the following files in this SystemConfiguration folder
  7. com.apple.wifi.message-tracer.plist
    NetworkInterfaces.plist
    com.apple.airport.preferences.plist
    com.apple.network.eapolclient.configuration.plist
    preferences.plist

    Recycle Bin Network Preferences

  8. Drag these files to the desktop (to serve as a backup)
  9. Restart the Mac by going to the  Apple menu and choosing Restart
  10. Once the Mac restarts, go back to the Wi-Fi menu and turn Wi-Fi back on
  11. From the Wi-Fi menu, select the Wi-Fi network you want to connect to, connecting to it as usual

At this point, Wi-Fi should work as expected.

3: Try starting the Mac in Safe Mode and using Wi-Fi

If you’ve done the above and are still having Wi-Fi issues, try starting the Mac in Safe Mode and using Wi-Fi on it. Booting in Safe Mode temporarily disables Login Items , which may help to further resolve the internet connectivity issue. Starting a Mac in Safe Mode is easy but differs between Apple Silicon and Intel Macs.

  • For Intel Macs, restart the Mac and hold down the SHIFT key until you log into the Mac
  • For Apple Silicon Macs (m1, m2, etc.), shut down the Mac, allow it to shut down for 10 seconds, then press and hold the POWER button until the Options screen appears. Now hold down the SHIFT key and choose “Continue in Safe Mode” to start the Mac in Safe Mode

After booting the Mac in Safe Mode, you will find that many customizations and preferences are temporarily set aside in Safe Mode, but this can help you troubleshoot issues on the Mac. Try using Wi-Fi or internet from safe mode, if it works in safe mode but not in normal boot mode, there is a high chance that a third-party app or configuration is disrupting internet functionality (like the aforementioned network filters, login items, etc.), and you’ll want to try uninstalling these types of filtering apps, including third-party antivirus or firewall apps.

To exit safe mode, simply restart the Mac as usual.

Have you restored your Wi-Fi and Internet connectivity in macOS Ventura? What trick worked for you? Have you found another troubleshooting solution? Let us know your experiences in the comments.

]]>
TikTok admits staff in China can access Europeans’ data https://pjmagic.net/tiktok-admits-staff-in-china-can-access-europeans-data/ Sat, 05 Nov 2022 13:00:00 +0000 https://pjmagic.net/tiktok-admits-staff-in-china-can-access-europeans-data/ Open internet supporters were relieved last month when a US candidate beat a Russian challenger in an election to lead the International Telecommunications Union, a major international standards body responsible for cross-border communications. During this time, however, we examined the fragility of the global internet infrastructure and the vulnerability of crucial undersea cables. Researchers see […]]]>

Open internet supporters were relieved last month when a US candidate beat a Russian challenger in an election to lead the International Telecommunications Union, a major international standards body responsible for cross-border communications. During this time, however, we examined the fragility of the global internet infrastructure and the vulnerability of crucial undersea cables.

Researchers see evidence that the new US legal climate for abortion access fosters a culture of community monitoring, a feature of authoritarian states in which neighbors and friends are encouraged to report possible wrongdoing . And surveillance is also on the increase in football stadiums around the world. The eight stadiums used during the 2022 World Cup in Qatar, for example, will be equipped with more than 15,000 cameras to monitor spectators and perform biometric scanning.

The more secure and “memory safe” programming language Rust is making inroads in the tech industry, raising hopes that many common vulnerabilities could eventually be anticipated and eliminated. In the meantime, we’ve got a roundup of the biggest vulnerabilities you can – and should! – correct now.

And there’s more. Each week, we highlight news that we haven’t covered in depth ourselves. Click on the titles below to read the full stories. And stay safe there.

There is no longer a question of whether TikTok staff in China can access Europeans’ data. The company announced this week that it plans to update its privacy policy to explicitly list China as one of the countries where workers can access European Union user data, such as location data. that users choose to share. TikTok’s policy update comes amid a year-long investigation by the Irish Data Protection Commission, which is reviewing its data transfer policies under the Irish General Data Protection Regulation. EU. The investigation is part of Western governments’ scrutiny of the video-sharing platform, which some US officials have called a national security threat due to the often close relationship between Chinese companies. and the Beijing government. TikTok, which is owned by Chinese company ByteDance, says in its announcement that its updated privacy policy aims to “include greater transparency about how we share user information outside of Europe and how we collect user location information”. The new policy comes into effect on December 2.

Liz Truss is going through a tough time. Shortly after her historically brief stint as British Prime Minister, the Mail on Sunday reported that agents working on behalf of Russia hacked into her personal mobile phone when she was foreign minister. The breach would have allowed these Russian agents to intercept messages between Truss and officials from other countries, including messages about Ukraine. The Mail the report further claims that former Prime Minister Boris Johnson and Cabinet Secretary Simon Case removed the breach. With the breach still unconfirmed, Labor officials are calling for an “urgent investigation” into their Tory opponents. “There are extremely important national security issues raised by an attack like this by a hostile state that will have been taken extremely seriously by our intelligence and security agencies,” the party’s interior secretary said. Labor Party, Yvette Cooper, last weekend. “There are also serious security questions about why and how this information was leaked or published at this time, which also need to be urgently investigated.”

Another of Jack Dorsey’s entrepreneurial creations faces new heat this week. According to a Forbes investigation, the Cash app is helping to fuel sex trafficking in the United States and elsewhere. Based on police records, “hundreds of court records” and claims from former Cash App employees, the investigation revealed widespread use of Cash App in sex trafficking and other crimes. The company, which is owned by Dorsey-led Block Inc., says it “does not condone illegal activity on Cash App” and has staff dedicated to working with law enforcement. Meanwhile, the National Center for Missing and Exploited Children says that although rival payment platforms such as PayPal provide the center with guidance on potential child abuse facilitated by their services, Forbes writes: “Block never provided advice.”

The US Treasury Department said this week that US financial institutions facilitated ransomware payments totaling nearly $1.2 billion in 2021, a 200% increase since 2020. The report landed in the middle from an international White House summit aimed at combating the rise of ransomware, a type of malware that allows attackers to encrypt a target’s files and hold them for ransom until the victim pays. Himamauli Das, acting director of the Treasury Department’s Financial Crimes Enforcement Network, said in a statement that “Ransomware, including attacks by Russian-linked actors, remains a serious threat to our national and economic security. While $1.2 billion in payouts is bad enough, that figure doesn’t take into account the costs and other financial consequences that come with a ransomware attack outside of the payout itself.

]]>
Rantz: Auditor’s Office Censors Online Political Speech, Calls Election Day Voting ‘Disinformation’ https://pjmagic.net/rantz-auditors-office-censors-online-political-speech-calls-election-day-voting-disinformation/ Wed, 02 Nov 2022 00:36:02 +0000 https://pjmagic.net/rantz-auditors-office-censors-online-political-speech-calls-election-day-voting-disinformation/ Thurston County Auditor’s Office Mary Hall coordinated with local and federal authorities to remove constitutionally protected speech from social media sites and YouTube. He considers it “unsafe” to tell voters to submit their ballots on Election Day and even proactively searches for content to flag and censor. In an Oct. 6 Facebook post, the office […]]]>

Thurston County Auditor’s Office Mary Hall coordinated with local and federal authorities to remove constitutionally protected speech from social media sites and YouTube. He considers it “unsafe” to tell voters to submit their ballots on Election Day and even proactively searches for content to flag and censor.

In an Oct. 6 Facebook post, the office account called election misinformation “the biggest problem facing free and fair elections.” The message asked voters to “protect our republic” by emailing the so-called disinformation messages to the office. It says the auditor “will work with our state and federal partners to respond.”

Emails obtained by the Jason Rantz Show on KTTH show that Hall staff attempted to remove, censor or otherwise report online content from Facebook and YouTube. The office works through the Center for Internet Security (CIS) of the Department of Homeland Security and the Office of the Secretary of State (OSOS).

Meet the government censor

Emmett O’Connell is an Outreach and Education Specialist for the Thurston County Auditor’s Office. He is also a small donor to Thurston County Democrats, according to records obtained by the Public Disclosure Commission. Part of his “awareness” at IEC involves reporting content they don’t like – including content about out-of-county elections.

On October 17, 2020, O’Connell emailed CIS a screenshot of a Facebook post in a then-public group. It showed a photo of a white truck with a postal ballot box lodged in the bed. The poster read, “seems legit,” along with an emoji of a woman crossing her arms.

O’Connell saw this as misinformation that needs to be addressed.

“We have confirmed with the Grays Harbor County Auditor’s Office that this urn was being transported by them from Pierce County. This is being shared as if the ballot box had been stolen,” O’Connell wrote to CIS.

But the message is political commentary and unquestionably protected speech. He didn’t even comment on election security. But O’Connell didn’t see the post as harmless. He interpreted it as “infamous”.

“From our perspective, the implication was obvious that something nefarious was going on with the box. The comment thread made it clear that the public reading the post thought the urn was stolen,” O’ said. Connell at the Jason Rantz Show on KTTH.

(Screenshot obtained by The Jason Rantz Show)

The auditor’s office reported the message

Two days after his email to CIS, the post was flagged by Facebook. A CIS representative informed O’Connell of the action.

“Facebook has reviewed the content and flagged the message: ‘Official ballot boxes are secure and reliable. You can confirm official locations with your local election office. (Source: Bipartisan Policy Center) Facebook also added a link to “Get Voting Information.”

Who determines what constitutes election disinformation? With regard to free speech, should government officials – who may have a reason to silence legitimate critics of the office under the auspices of combating “misinformation” – influence social media companies to to act ?

“Our partners at OSOS and DHS ask us to report election misinformation. What happens to the message after that, whether it includes a larger context or removes the message, depends on the platform itself,” O’Connell told The Jason Rantz Show on KTTH.

This assertion is obviously misleading. The intent is to flag or remove content, otherwise O’Connell or the listener might simply post in the thread whatever context they feel is missing. They could also post their own commentary on the story, without engaging in third-party censorship.

(Screenshot obtained by The Jason Rantz Show)

Chasing Glen Morgan

O’Connell also challenged government watchdog Glen Morgan on October 29, 2021.

Morgan posted a YouTube video with a “homeless whistleblower” who he said exposed apparent voter fraud. O’Connell was not a fan and reported the video to CIS and Google, which owns YouTube. He offered several rebuttals of the video’s claim.

“Thank you for letting us know about this report. Have you heard from Google yet?” an IEC electoral operations analyst wrote O’Connell.

O’Connell replied that he had not yet received a response. The CIS staff member then offered more contacts at Google, as well as people at Facebook, to contact.

“We sent the disinformation report to the Google contacts you suggested, but we haven’t heard or seen any further action. Is there anything else we can do?” O’Connell asked CIS.

Morgan tells The Jason Rantz Show on KTTH that Google never took any action against his video.

“Here’s the thing, they only want to step in if they think the story doesn’t glorify the office or promote their agenda,” Morgan explained.

(Screenshot obtained by The Jason Rantz Show)

Contesting the Elections in Washington

Washington allows voters to mail their ballots on Election Day, as long as they are postmarked by 8 p.m. Voters can also place their ballots in a ballot box or deliver them to a county election office by the 8 p.m. deadline. O’Connell, however, considers some of this information to be misinformation.

“Also, take for example the ‘cast your ballot on Election Day’ narrative that we see circulating now. This is a very dangerous disinformation narrative; this makes it more likely that a ballot will be rejected for being delivered late. The last pick-up time on many mailboxes is 3 p.m. on Election Day. We close drop boxes promptly at 8 p.m.,” O’Connell explained. “49.63% of ballots rejected in the August primary were rejected because they were returned late. And, because of the trend results, we know that more conservative voters tend to vote late anyway. By encouraging even more late voting, it could mean even more ballot rejections. »

Waiting until Election Day to vote might be a bad strategy, as the Jason Rantz Show on KTTH argued, but it’s definitely not misinformation. I pressed O’Connell to explain.

“We want every ballot to count, we assume that any encouragement to vote late means it is more likely that the ballot will be submitted after the deadline. Nearly half of the rejected ballots in the August primary were because they were returned late, some even left on top of drop boxes after they closed,” he said. he answered.

That’s quite the intention assumption. It also shows the dangers of government censorship.

(Screenshot obtained by The Jason Rantz Show)

Assumptions are not facts

To “assume” a message means that the Thurston County Auditor’s Office is acting on information that has not been presented. The Office of the Auditor does not correct misinformation. They attempt to silence or influence information that they do not support. And at least one staff member reporting content is donating to a local Democratic group that could benefit from removing some political content.

CIS is not intended to censor or flag protected speech. And a spokesperson for the OSOS office explains that it “was not directly involved in attempting to remove the county-specific posts from social media or actions of that nature.”

O’Connell and Hall work to influence the election. They may think they’re doing it for the right reasons, but that doesn’t make it appropriate. They use the power of government to influence companies that may not see it the way they see it, but are not looking to do battle with an adversary that has a lot of power to regulate it. What if O’Connell or Hall were wrong? There is no mechanism for a voter to correct erroneous information from the verifier. And we don’t have a government agency to back our claims with the social media giants.

The auditor’s office can very easily post comments or corrections on threads they see or on their own social media accounts. They can reach out to the media to amplify their corrections in ways that Washingtonians cannot. The way to fight protected speech that you don’t like — or speech that’s factually inaccurate — is to use more speech.

Listen to the Jason Rantz Show weekday afternoons from 3:00 p.m. to 6:00 p.m. on KTTH 770 AM (HD Radio 97.3 FM HD-Channel 3). Subscribe to the podcast. Follow @JasonRantz on Twitter, instagramand Facebook. Check back frequently for more news and analysis.

]]>
The election that saved the internet from Russia and China https://pjmagic.net/the-election-that-saved-the-internet-from-russia-and-china/ Sun, 30 Oct 2022 11:00:00 +0000 https://pjmagic.net/the-election-that-saved-the-internet-from-russia-and-china/ While Bogdan-Martin’s victory was significant, the down races also seemed to indicate a rejection of this expanded ITU mandate. A Russian incumbent lost its place on the ITU’s radio regulatory board, while Russia was barred from a seat on a wider regulatory board. Iran, which runs one of the most extensive and authoritarian internet filtering […]]]>

While Bogdan-Martin’s victory was significant, the down races also seemed to indicate a rejection of this expanded ITU mandate. A Russian incumbent lost its place on the ITU’s radio regulatory board, while Russia was barred from a seat on a wider regulatory board. Iran, which runs one of the most extensive and authoritarian internet filtering systems in the world, also lost its seat on the council.

While China has fared better, its support has dropped significantly. In 2018, Houlin Zhao was elected general secretary without contest – in 2022, a Chinese candidate came third in a race for a lower position, only narrowly securing him a place on the board.

Some of these successes are undoubtedly the result of American re-engagement; the Trump White House first announced a plan in 2017 to prioritize organizations like the ITU, which had been ignored by Washington for years, in order to counter China’s growing success in such forums international. Over the past year, President Joe Biden has campaigned vigorously for Bogdan-Martin’s candidacy.

Geopolitics – and Russia’s war on Ukraine, in particular – has undoubtedly helped reshape the leadership of the ITU.

When Bella Cherkesova, a Russian deputy minister, rose to address the conference, she railed against the United States and its allies. “Recently, at the request of some countries, we have faced the politicization of the work of the Union,” said Cherkesova, lamenting that a full third of Russian delegates were refused visas and could not attend the conference and that other Russian officials have not been appointed to various administrative posts.

Cherkesova went on to praise Moscow’s promotion of the internet. “Russia provides security, protection of public order, health and morals of the population on the Internet,” she said.

In a duel speech, one of Ukraine’s ITU representatives offered a poignant counterpoint. “Representatives of the aggressor country are also here talking about progress and standards,” Yurii Shchyhol, chairman of Ukraine’s State Service for Special Communications and Information Protection, told the conference. “We have to defend ourselves.”

Shchyhol added that Russia had “weaponized” the core technology that the ITU is responsible for regulating and developing. “Today, seven months after the invasion, we understand that the Russian Federation also sought to destroy the connection in Ukraine,” Shchyhol continued, listing various ways Russia allegedly violated ITU rules.

While think tanks like CSIS and the Heritage Foundation have encouraged American engagement at the ITU to focus on the fight against China, analysts more intimately involved with the ITU say the fight is more complicated and , they say, this month’s meeting lacked ambition.

In its analysis of the proposals submitted for discussion at the conference, the Internet Society, a nonprofit organization that promotes open technology, expressed disappointment that ITU had not codified more formal cooperation with organizations such as ICANN, nor makes additional space for researchers and non-governmental organizations.

Knodel of the Center for Democracy & Technology, who was also part of the US delegation, says inviting advocates like her has “made the ITU much more open than it once was. However, non-governmental stakeholders are far from welcome in the ITU, which in the age of the Internet stands in stark contrast to the governance forums that are largely responsible for standardizing the Internet and cooperation necessary for the implementation of its decentralized concept.

While states like China “are coming up with more technical designs that centralize control and oversight,” Knodel says, even many of those discussions were avoided at the last conference.

Other important issues, such as how to manage the fees paid to the countries that run the fiber optic cables that form the backbone of the Internet – which could reduce the incomes of the poorest countries – have also not not been resolved.

Knodel says that with this new ITU leadership in place, the priority going forward should be determining “how to expand meaningful access to the Internet rather than erode it.”

]]>
Anchore Expands Federal Footprint with Award of $1.58M Tactical Funding Contract https://pjmagic.net/anchore-expands-federal-footprint-with-award-of-1-58m-tactical-funding-contract/ Thu, 27 Oct 2022 13:30:00 +0000 https://pjmagic.net/anchore-expands-federal-footprint-with-award-of-1-58m-tactical-funding-contract/ A recent contract, new customer installations and market listings further strengthen Anchore’s presence in the federal market. SANTA BARBARA, Calif., October 27, 2022 /PRNewswire/ — Today Anchor announced a $1.58M tactical funding award to extend its Phase II Small Business Innovation Research (SBIR) contract with the United States Air Force (USAF) Platform 1 (P1) program. […]]]>

A recent contract, new customer installations and market listings further strengthen Anchore’s presence in the federal market.

SANTA BARBARA, Calif., October 27, 2022 /PRNewswire/ — Today Anchor announced a $1.58M tactical funding award to extend its Phase II Small Business Innovation Research (SBIR) contract with the United States Air Force (USAF) Platform 1 (P1) program. The Tactical Funding Award consists of providing 12 months of work in critical areas that leverages Anchore’s deep expertise and institutional knowledge to advance P1 goals. With this award, Anchore and P1 will deliver innovative new capabilities to secure software supply chains.

“It’s important now, perhaps more than ever, to be proactive about software supply chain security to stay ahead of current and emerging threats. Anchore’s role in this contract award is to continue to develop technology that identifies and illuminates the ever-changing software components that are used to compose critical infrastructure across a wide range of programs,” said Dan Nurmi, CTO of Anchore. “We are proud to partner with the P1 team and happy to see this contract continue into the future to help secure our nation’s critical software systems.”

“Anchore’s partnership with P1 continues to advance software security across the Department through innovative technical solutions and modern, industry-standard security practices,” said Col. Timothee Helfrich, Senior Materiel Manager, Cyber ​​Systems Group, USAF. “The mission of P1 is to transform the way the Department of Defense (DoD) delivers combat capabilities through innovative frameworks, a collaborative culture, and secure software. Adversaries attempt to compromise our national defense on a daily basis, and the software supply chain is a growing attack vector. At P1, safety isn’t an afterthought, it’s the first thought. Anchore’s industry-standard Software Bill of Materials (SBOM) formats help Iron Bank publish SBOMs for broad consumption and track unexpected drifts to mitigate supply chain risks for the Department of Health. ‘Air Force. »

In the Executive Order on Improving the Nation’s Cybersecurity, President Biden is encouraging federal agencies to mandate the use of SBOM as a best practice for understanding dependencies and software components to prevent malicious activity. Anchore’s software supply chain solutions automate compliance checks with predefined policy packs for US government standards, including DoD, Defense Information Systems Agency STIG, CISA, FedRAMP, NIST, and Center for Internet benchmarks Security.

Additionally, Anchore’s software container scanning capabilities are included in the US DoD Container Hardening Guide and Guide to building and deploying container images to help federal agencies maintain a strong security posture when working with containerized applications.

Expansion of the federal footprint

Anchore technology is deployed across a large number of DoD agencies and programs. Anchore’s solutions are used specifically to identify and remediate critical vulnerabilities and malware, ensure strict adherence to government compliance standards, and improve the overall security of these critical aircraft and warships, conventional weapons systems and nuclear facilities, major intelligence centers and software factories. .

Anchore available in the federal market

As Anchore continues to work with federal agencies, its offerings are now available for purchase on the online government marketplaces of GSA Advantage and Second Generation IT Coverage Purchase Agreements (2GIT). Anchore’s software supply chain security solutions can be purchased through contract vehicles at pre-negotiated rates and terms, making it easy for federal agencies to procure solutions to implement proactive security measures. cyber hardening and software supply chain security.

For more information on Anchore’s secure public sector solution that automates compliance with stringent government security standards, visit Anchore.com.

About Anchore

Anchore is a leader in software supply chain security and enables organizations to protect applications from attack. Anchore technology incorporates continuous security and compliance checks into every step of the software development process. Large enterprises and government agencies use Anchore solutions to generate comprehensive software bills of materials, identify vulnerabilities, identify malware, and uncover unprotected credentials that can lead to hacks and ransomware. With an API-centric approach, Anchore solutions integrate with the tools developers already use to detect issues earlier, saving time and reducing the cost of remediating vulnerabilities.

Anchore is recognized on the Forbes 2022 list of America’s Top Startup Employers. To find out more visit Anchore.com.

Media Contact:
Brandie Gerrish
presse@ancre.com

SOURCE Anchor

]]>
After Ukraine, the Biden administration turns to Musk’s satellite internet for Iran https://pjmagic.net/after-ukraine-the-biden-administration-turns-to-musks-satellite-internet-for-iran/ Sat, 22 Oct 2022 14:01:58 +0000 https://pjmagic.net/after-ukraine-the-biden-administration-turns-to-musks-satellite-internet-for-iran/ (CNN) – The White House has entered into talks with Elon Musk on the possibility of setting up SpaceX’s Starlink satellite internet service in Iran, several officials familiar with the discussions told CNN. The conversations, which have not previously been reported, come as the Biden administration seeks ways to support the Iranian protest movement that […]]]>

(CNN) – The White House has entered into talks with Elon Musk on the possibility of setting up SpaceX’s Starlink satellite internet service in Iran, several officials familiar with the discussions told CNN.

The conversations, which have not previously been reported, come as the Biden administration seeks ways to support the Iranian protest movement that exploded just over a month ago following the death of Mahsa Amini, 22 years, in suspicious circumstances after being detained by the morality of the country. police.

The White House sees Starlink’s compact, easy-to-use technology as a potential solution to the Iranian regime’s aggressive efforts to restrict activists’ internet access and communications.

“We have our foot on the accelerator to do everything in our power to support the aspirations of the Iranian people,” a senior administration official told CNN. “It’s our policy, period. At the same time, it is very much an Iranian girl-led movement that is spreading to other aspects of society. And we don’t want to eclipse their movement in any way.

If a plan passes, it would be the second big theater this year – along with Ukraine – where the US government has turned to Starlink to help deliver crucial telecommunications services, even as questions swirl around Musk’s reliability in his dealings with the US government.

“It’s a loose cannon that we can never predict,” said a senior US defense official familiar with the government’s talks with Musk and SpaceX over Ukraine.

Concerns about Musk’s unpredictable tendencies intensified after CNN first reported last week that Musk’s company, SpaceX, had quietly asked the Pentagon to pay tens of millions of dollars a month to fund Starlink in Ukraine and lighten SpaceX. In response to this report, Musk then abruptly announced on Twitter that he had withdrawn the funding request.

The Pentagon said this week that talks with SpaceX over Ukraine were underway, after documents obtained by CNN showed that SpaceX warned the Pentagon last month that it could no longer fund or maintain Starlink in Ukraine. “For an undetermined time”.

SpaceX says providing Starlink services in Ukraine has cost it $80 million so far and by the end of the year the costs will exceed $100 million. SpaceX did not respond to CNN’s request for comment.

A solution or a risk for Iranian militants?

The needs of Iranian protesters and Ukrainian soldiers, and how they would use Starlink, are very different. And experts warn that while Starlink in Ukraine has been critical to battlefield successes, getting Starlink into Iran would be a much bigger and potentially more dangerous challenge.

The situation with Starlink and Ukraine does not appear to have deterred the White House from suing Starlink, which uses satellites to deliver Internet service to compact ground terminals. SpaceX has about 3,000 such satellites currently in orbit and about 20,000 ground terminals in Ukraine.

President Joe Biden has wanted to be more optimistic and openly supportive of Iranian protesters than his former boss, President Barack Obama, who chose to largely stay away from an Iranian protest movement that erupted in 2009. Biden said in a statement Oct. 3 that his administration “stands with Iranian women and all Iranian citizens who inspire the world with their bravery” and is trying to make it easier for Iranians to access the internet.

“We are interested in finding ways to ensure that the Iranian people can access the internet on their phones and everywhere else,” the senior administration official said. “And so Starlink is an option, but it’s not the only option.”

It is unclear whether the administration has offered to pay for the installation of Starlink terminals in Iran. In its letter to the Pentagon in September, SpaceX said it could no longer donate Starlink terminals to Ukraine or pay for its continued service and requested that the Pentagon bear Ukrainian government funding and military use. from Starlink, which SpaceX says will cost more than $120 million for the rest of the year and could cost nearly $400 million for the next 12 months.

Some US officials hope that Starlink ground terminals will one day become as prevalent in Iran as satellite dishes. The technology is also technically banned by the regime, but is nonetheless plentiful across the country, the sources noted. Currently, there are “very few” Starlink terminals already operating in Iran, Musk said in a tweet Last week.

But there are several glaring problems with this plan. Chief among them is that Starlink’s satellites require physical terminals on the ground to connect, and their signals might be easy to detect. Smuggling the units across the border into Iran is only the first challenge, before they are hypothetically used by unruly protesters under the harsh gaze of Iran’s security services.

“I’m really concerned about the lack of knowledge about security or even how people can hide these signals,” said Amir Rashidi, director of internet security and digital rights at Miaan Group, who was forced to fleeing Iran after the 2009 protests. “It’s going to be really risky for Iranians to use it on a large scale.”

Rashidi said more instructional materials are needed, in Farsi, to help protesters understand how to better cover their tracks and use equipment safely. He argues that more investment is needed in circumvention tools and the work of the UN’s International Telecommunications Union.

US-backed efforts, he said, carry significant risks.

“As soon as we are arrested, the first charge is that you are a spy, you work for the CIA, you work for a British intelligence service,” he said. “If the US government is involved in the distribution, that would be another crime in the eyes of the Iranian government and people could be charged with it, really tough and tough charges.”

“Why didn’t we understand this sooner? »

While support for protesters’ means of communication is an area where the administration believes it can take concrete action, one criticism of the administration is that it is only now being seriously addressed.

“Why didn’t we understand this sooner? a person involved in the talks told CNN. “We put so much effort into the JCPOA [nuclear deal]. It is in the continuing interest of national security to get rid of this regime. Here’s how: Empower those democrats on the ground in Iran and the best way to do that is to find ways to support technology like that in the country, and we haven’t done that, we’ve failed.

The senior administration official told CNN that at this time the JCPOA is “not on the agenda.” National Security Council coordinator for strategic communications John Kirby echoed that on Thursday, telling reporters that “we are way off the Iranians in terms of getting back to the deal.”

“What we are focused on is making sure we hold the regime accountable for how it treats protesters in the country,” he said.

The White House, government technologists and Musk and his team are still working, however, to address the biggest challenges with Starlink and other communications technologies, officials said.

“When it comes to more active USG involvement, without going into specific technologies, we always consider whether a technology would put those who use it at risk of being identified and harmed by their government from a one way or another,” the senior administration official said. . “All elements of the Biden administration are in tune with this.”

The official also touted the benefits of a policy shift made by the Biden administration last month in an effort to extend internet services to Iranians. The license issued by the Treasury Department would give US tech companies greater freedom to operate in a highly sanctioned Iran.

“The beauty of the D-2 general license is that it allows private companies to decide for themselves what products and services to offer in Iran,” the official said.

Musk’s unpredictability on Ukraine raises concerns

Musk said if the terminals can enter Iran, SpaceX has already activated the signal. But the way he has acted in talks around Ukraine has only added to concerns about the sweeping influence the world’s richest man can now wield over some of the world’s biggest conflicts. .

Last weekend, Musk tweeted“Damn it…even if Starlink continues to lose money and other companies receive billions of taxpayer dollars, we will continue to fund the Ukrainian government for free,” he wrote on Saturday. Then on Monday, he said unequivocally, “SpaceX has already withdrawn its request for funding.”

Earlier this week, Pentagon press secretary Brig. Gen. Pat Ryder told reporters that the department “continues to discuss various issues with SpaceX, including Starlink,” adding that the Pentagon has not yet paid anything for Starlink.

At the same time, there are numerous reports of Starlink outages along the frontline as Ukraine pushes into Russian-occupied areas. A person familiar with discussions with SpaceX told CNN that Ukraine needs to proactively request that the service be activated when an area is taken over.

On Thursday, Ukrainian Defense Minister Oleksiy Reznikov expressed confidence that Starlink funding would continue, telling Politico, “I know we won’t have a problem.” If the funding doesn’t come from SpaceX, he said, he expects the Pentagon, Europe and private donors to step in.

Musk pointed to Ukrainian officials’ public praise for SpaceX and Starlink — a senior Ukrainian official, Mykhailo Fedorov, called Musk “among the world’s top private donors supporting Ukraine” — as evidence that he is not trying to undermine the Ukrainians’ fight.

When someone tweeted on Tuesday that Musk was “trying to put both sides of the conflict on the same level as possible, to avoid a one-sided situation”, calling it “Peace at the lowest cost”, Musk replied: “Exactly .”

Still, concerns remain about Ukraine’s reliance on Starlink.

“Ukraine needs Musk’s technology, but they don’t know if he will continue to support them,” said a person familiar with Ukraine’s talks with SpaceX.

Conflict connectivity researcher and expert John Scott-Railton called Starlink’s success in Ukraine “great marketing,” but the question of how to ultimately support Iranian protesters’ means of communication “is a huge challenge, and it’s much harder to see how this could be solved by Starlink devices.

“Aid efforts should be based on understanding how Iranians communicate, the risks they face, and the censorship circumvention technologies they are used to using. We should be committed, but beware of quick-fix ideas.

]]>