Vulnerabilities / Threats

4/5/2017
09:30 AM
50%
50%

Web Inventor Slams US-UK Internet Plans, Cites Privacy Concerns

Sir Tim Berners-Lee, recipient of the Turing Award, criticizes moves to undermine encryption and promises to fight for net neutrality.

Sir Tim Berners-Lee, inventor of the World Wide Web, has voiced concerns over recent Internet policies adopted by the US and UK, and vows to fight them, BBC News reports. Sir Tim will be conferred with the Turing Award, the most prestigious recognition in computing world, in June 2017.

Criticizing the UK's recent decision to weaken encryption, Sir Tim says: "Now I know that if you're trying to catch terrorists it's really tempting to demand to be able to break all that encryption but if you break that encryption then guess what - so could other people and guess what - they may end up getting better at it than you are."

He belittled the recent Investigatory Powers Act in the UK, saying it's "appaling" to think all ISPs should be required to spy on citizens and store their data for six months. In the US, he added, if the Federal Communications Commission attempted to reduce net neutrality, he would fight it.

Sir Tim expressed shock at US legislators' vote to scrap laws preventing the sale of user data by ISPs, saying, "We're talking about it being just a human right that my ability to communicate with people on the web, to go to websites I want without being spied on is really, really crucial."

Read the full story on BBC News.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
rayray2016
50%
50%
rayray2016,
User Rank: Apprentice
4/7/2017 | 12:58:33 AM
Twenty Motion
There should be more to be done about this
How the US Chooses Which Zero-Day Vulnerabilities to Stockpile
Ricardo Arroyo, Senior Technical Product Manager, Watchguard Technologies,  1/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He just showed up at my doorstep one day without a geotag."
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.