Archive for December, 2014

The Interview Now Available In Canada Via iTunes As It Nets $15 Million Online

Posted in Commentary with tags on December 28, 2014 by itnerd

With the announcement of the controversial film “The Interview” online and in select theaters just before Christmas, some online players were absent. Notably, Netflix, Hulu and Apple. Now Apple has jumped onto the bandwagon by making “The Interview” available on iTunes. The company made a really brief statement about this to re/code:

“we’re pleased to offer ‘The Interview’ for rental or purchase on the iTunes store”

That’s it. Seriously. That’s all they said. It’s available in the US and Canada for $6 to rent and $15 to own. Very curious. I guess Apple wanted to get a piece of the pie seeing as the movie has netted about $15 million in online sales and rentals:

That handily beats the estimated $2.8 million the film earned over the same time period in theaters. However, only a relatively small sampling of independent theaters carried the film — had the major theater chains been willing to show The Interview, these numbers would likely be very different.

Sources tell The Verge that the vast majority of the film’s sales came through YouTube and Google Play Movies. The film was also available on Xbox Video and a dedicated Sony website, and as of this afternoon, Apple’s iTunes Store. The figures reported by Sony today only include sales through Saturday, so the final weekend count will be a bit larger.

Seeing as Sony is making back the $44 million the film reportedly cost via online and limited theater release, one has to wonder if other studios might try the same thing?

The Interview To Be Streamed On Various Platforms [UPDATED]

Posted in Commentary with tags on December 24, 2014 by itnerd

Sony Pictures has announced that The Interview will be on Google Play,YouTube Movies, Microsoft’s Xbox Video and its own website http://www.seetheinterview.com for $5.99. It should be available by the time you read this. Google also came out on their blog saying among other things this:

“we could not sit on the sidelines and allow a handful of people to determine the limits of free speech in another country (however silly the content might be).”

To recap, here’s how you can see The Interview:

Google Play: You can go to play.google.com to buy or rent it. Or you can watch it in the Play Movies & TV app on Android and iOS phones or tablets, or streamed via Chromecast, Roku or the Nexus Player.

YouTube: Surf to youtube.com/movies or use the YouTube app, Chromecast, Apple TV, PlayStation and Xbox.

Microsoft’s Xbox Video: Buy or rent the movie using the Xbox Video app on Xbox One, Xbox 360, Windows 8, Windows Phone 8 and XboxVideo.com.

SeetheInterview.com: If none of that is an option, it is available http://www.seetheinterview.com, which is sponsored by Sony Pictures and powered by Kernel and with payments through Stripe, a secure payment platform.

You can also see it in select theaters tomorrow.

I guess it is clear now that those hackers known as “The Guardians Of Peace” did an outstanding job of shutting this movie down. Now more people than ever will see this film.

UPDATE: This appears to be US only. At least for the time being. Ditto for seeing The Interview in Canadian movie theaters.

MacBooks Vulnerable To Being Taken Over Via Thunderbolt

Posted in Commentary with tags , on December 24, 2014 by itnerd

One of the things that set Macs apart from most other computers is the Thunderbolt port. It can be used for displays, networking, storage among other things both individually or at the same time. It’s very versatile. Sadly, it seems it can be used for one other purpose. Someone could use a modified Thunderbolt device to take over your MacBook:

The attack, dubbed Thunderstrike, installs malicious code in a MacBook’s boot ROM (read-only memory), which is stored in a chip on the motherboard. It was devised by a security researcher named Trammell Hudson based on a two-year old vulnerability and will be demonstrated next week at the 31st Chaos Communication Congress in Hamburg.

“It is possible to use a Thunderbolt Option ROM to circumvent the cryptographic signature checks in Apple’s EFI firmware update routines,” Hudson said in the description of his upcoming presentation. “This allows an attacker with physical access to the machine to write untrusted code to the SPI flash ROM on the motherboard and creates a new class of firmware bootkits for the MacBook systems.”

Malicious code installed in the MacBook boot ROM will be executed before the OS is loaded, meaning it can patch the OS kernel and have complete control over the system. It also means that reinstalling Mac OS X will not remove the bootkit and neither will replacing the hard disk drive, because the malicious code is not stored on it.

For this to work, the attacker either has to have physical access to your MacBook, or they could plant something in a Thunderbolt device. The latter is very sneaky. There’s one more thing:

The bootkit can even replace Apple’s cryptographic key stored in the ROM with one generated by the attacker, preventing any future legitimate firmware updates from Apple, the researcher said in a blog post.

Firmware updates are supposed to be signed, but the vulnerability exploited by this attack allows that mechanism to be bypassed.

That’s a massive problem. When this gets presented at the Chaos Communication Congress, Apple is going to have a fair amount of explaining to do. Hopefully, they are paying attention and quickly roll out fixes to protect their users.

The Interview To Be Screened In Select Cinemas On Christmas Day

Posted in Commentary with tags on December 23, 2014 by itnerd

Can you say “about face?”

After Sony Pictures pulled The Interview because of that devastating hack and threats of “9/11” style attacks, Sony now says it will screen the movie on Christmas Day in select theaters:

“We have never given up on releasing ‘The Interview,’ and we’re excited our movie will be in a number of theaters on Christmas Day,” Sony Entertainment Chairman and CEO Michael Lynton said in a statement.

He added that Sony is continuing to “secure more platforms and more theaters so that this movie reaches the largest possible audience.”

I’ll be blunt. It seems that Sony grew a pair and figured out that caving to “The Guardians Of Peace” was a bad idea. I am happy that the movie will be seen by the public and this group of hackers didn’t win. So apparently are the two stars of the film:

https://twitter.com/JamesFrancoTV/status/547458162182197248

Now, Sony might want to go about securing their network to keep this from ever happening again.

MobileFun Offers Up Some Last Minute Gift Ideas

Posted in Commentary with tags on December 23, 2014 by itnerd

Still looking for some last minute gift ideas? Here’s a few suggestions from online retailer MobileFun:

unnamed
The latest in the PLAYBULB range, these bulbs still have 8 days to run in their Kickstarter project, and with the estimated delivery date for backers being February 2015, MobileFun is giving customers the chance to get one early. It can be purchased on this page: http://www.mobilefun.co.uk/mipow-playbulb-rainbow-bluetooth-smart-bulb-p50931.htm
unnamed
The Spigen TEKA are a great looking set of in-ear headphones. The dynamic drivers inside provide impressively clear and rich bass and their modern look extends to the tangle-free flat cable, slim in-line remote control and carrying bag.
unnamed
The Spigen F70Q is a portable power bank that provides 7000mAh of power through two USB ports. It allows for simultaneous full speed charging of a smartphone and tablet, through one 2.1A port and one 1A port. It’s slim and light, and the same Air Cushion technology used in Spigen’s popular cases offers protection against knocks and drops.
unnamed
New from Olixar, this adapter is an ideal travel companion, letting you charge your mobile devices in over 150 countries with four interchangeable plugs. You get four USB ports, intelligently sharing 4.8A of total power output to ensure you’re always charging at full speed. The perfect solution to the Christmas family squabble for a spare charging socket!

Hotel Group Pushes FCC To Block Outside WiFi

Posted in Commentary with tags on December 23, 2014 by itnerd

I stay in a lot of hotels and in many of them the WiFi access they provide quite frankly sucks. Case in point, during my trip to the UK, I ended up using my iPhone to get online as the WiFi was unusable at times. Well, if a group of hotels have their way, they can force you to use their WiFi:

Back in August, Marriott, business partner Ryman Hospitality Properties and trade group the American Hotel and Lodging Association asked the FCC to clarify when hotels can block outside Wi-Fi hotspots in order to protect their internal Wi-Fi services.

In that petition, the hotel group asked the agency to “declare that the operator of a Wi-Fi network does not violate [U.S. law] by using FCC-authorized equipment to monitor and mitigate threats to the security and reliability of its network,” even when taking action causes interference to mobile devices.

This came about because of Marriott International blocking WiFi that didn’t belong to them. That earned the hotel chain a US $600,000 fine when the FCC found out about it. Thus they and other hotels want the rules changed in their favor.

My take? This is driven by one thing. Money. Not security, reliability, or anything else. The problem is that it takes away choice. Consider this. Hotels provide phones. Should they have the right to block cell phone services and force you to use their in room phones so that they can make a buck?

Of course not.

Providing one service on a premise does not grant one a monopoly on all ancillary services provided on that premise. The FCC needs to shoot this out of the sky and ensure that proposals like this never see the light of day again.

Hey IT Nerd! How do you know where to go to get good shots of planes landing?

Posted in Tips on December 23, 2014 by itnerd

Here’s another question that popped up in my inbox:

Good morning IT Nerd. I am interested in taking my son out to see planes land at Pearson Airport. However, I can never figure out where I need to go. Could you tell me what your secret is seeing as you do this frequently to test out phones (by the way, I like your phone reviews)? Thanks so much. 

Thanks for the question and I am glad you like my phone reviews.

My secret is an app called Flightradar24 Pro which I have for iOS. It allows me to see the flight path for planes taking off and landing at Pearson Airport in Toronto, or any other airport for that matter. I take a quick look at it before I leave for the airport to see what runway is being used for landings. That way I know where to go up front. When I arrive, I use it to see what specific types of aircraft are landing. That’s important to me as big aircraft look better in pictures and video.

To make life easier for you, here are the three best areas that you want to hang out at if you want to see planes landing at Pearson Airport in Toronto:

  • The field in the south west corner behind 1551 Enterprise Road near Dixie Road & Highway 401.
  • Director Gate road just south of the Dixie Road and Derry Road intersection.
  • The parking lot in front of 6655 Airport Road beside the Petro Canada gas station.

There are a couple of other locations that exist, but these are the best ones to see planes landing.

Happy viewing!

Uber Wants To Patent Surge Pricing

Posted in Commentary with tags on December 23, 2014 by itnerd

When this popped up in my news reader this morning, I almost spat out my coffee in disgust. Controversial ride sharing service Uber wants to patent surge pricing:

Uber applied for a U.S. patent last year for “dynamically adjusting prices for service” using mobile devices. The system measures supply (Uber drivers) and demand (passengers hailing rides with smartphones), and prices fares accordingly.

It’s one of at least 13 U.S. patent applications filed by Uber or its founders to give it an edge over potential rivals ahead of a potential initial public offering. So far, Uber hasn’t had any luck. Ten applications were initially rejected by the U.S. Patent and Trademark Office for “obviousness” or for covering something not eligible for protection.

What Uber is trying to patent is called supply and demand. Less Uber drivers and higher demand means higher prices. That’s a great way to increase their revenue seeing as Uber gets something like 25% of the fare. If anyone deserves to patent this, it’s Adam Smith who came up with this concept in the 1700’s. As a result, I would think that Uber’s attempt to patent this would get shot out of the sky by the USPTO.

Ignoring that, most businesses would avoid such a business practice because it is difficult to manage and can cause customers to be really, really pissed off at the business if they are on the wrong end of this. Just look at how people view oil companies every time the price jumps at the pump.

Bottom line: This is a #fail for Uber on multiple levels. They would be well advised to pull the plug on this patent application as well as surge pricing.

North Korean Internet Back Online For The Few Who Use It [UPDATED]

Posted in Commentary on December 23, 2014 by itnerd

Good news if you’re in North Korea! Internet access has been restored after a 10 hour outage. That’s great news for the nation of 25 million people who rely on the Internet for a variety of needs.

Oh, wait. They only have 1024 IP addresses assigned to them. That means that about 1000 people max use the Internet in that country. At least they’ll be able to watch cat videos on YouTube again.

UPDATE: North Korea have come out with a statement regarding their loss of Internet access that defies belief:

A new router from Best Buy with 802.11AC perhaps?

Hey IT Nerd! Do You Think That North Korea Is Behind The Sony Hack?

Posted in Commentary with tags , , on December 23, 2014 by itnerd

I got this in my inbox last night:

IT Nerd, let me get straight to the point. Do you think North Korea is behind the Sony hack or someone else is responsible? 

Thanks for the question.

I have nothing but a gut feeling on this…. Well, a bit more than a gut feeling… But I would say that I don’t believe that North Korea is behind the Sony hack. I will admit that North Korea does have the ability to do this sort of thing, plus they have people at arms length that are capable of doing this sort of thing as well (they’re arms length so that it gives North Korea plausible deniability). I don’t see either being responsible as this doesn’t quite fit the usual modus operandi from either of these groups. From what I do understand about North Korea and the hackers that do their bidding, they’re more of the hit and run sort. In other words, they get in, get what they are looking for and get out. They’re also in it for economic gain or to disrupt some project or goal the target has. Regardless of the end goal, they don’t broadcast what they’ve done, nor do they have fancy names for themselves. If we look at this hack, we have the “Guardians Of Peace” which is a group nobody has ever heard of. Not computer security experts, not intelligence agencies (at least not that they admit to), nobody. They’ve not only hacked Sony, they’ve released data that has embarrassed Sony and made threats of “9/11 style attacks” that their ability to pull off is dubious at best. A government who is behind a hack of this sort would not want to do any of that because it draws way too much attention to their covert hacking activities. Thus, that really casts doubt on North Korea being responsible.

So, who could be responsible? It could be hackers who are using “The Interview” and the North Korean connection as cover. After all, Sony is a company that hackers have targeted for years. So quite literally, anybody could be responsible for this. Alternately it could be a disgruntled ex-employee, though they would need the skills to pull this off. A deskside support guy isn’t going to have those skills. But maybe a network admin who has some friends with the required skill could pull this off as long as they know enough about the Sony Pictures infrastructure to make this a viable attack. What makes the latter plausible is the fact that there were significant layoffs at Sony Pictures recently. It isn’t too much of a stretch to think that someone who got separated from their job was looking for a bit of revenge. You could come up with all sorts of plausible theories on this front that would make sense. Thus it further casts doubt on the whole North Korea angle.

Now the FBI did lay out their reasoning in their press release on the subject. Here’s the key points:

  • Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks.
  • The FBI also observed significant overlap between the infrastructure used in this attack and other malicious cyber activity the U.S. government has previously linked directly to North Korea. For example, the FBI discovered that several Internet protocol (IP) addresses associated with known North Korean infrastructure communicated with IP addresses that were hardcoded into the data deletion malware used in this attack.
  • Separately, the tools used in the SPE attack have similarities to a cyber attack in March of last year against South Korean banks and media outlets, which was carried out by North Korea.

Here’s where the reasoning that’s printed above falls apart. Reusing malware code and the tools to make this attack on Sony happen is a great way for hackers to cover their tracks and they do this all the time. Just because malware “x” was used in one particular attack doesn’t mean that the same people are using it in another attack. Plus, another way for hackers to cover their tracks is to make it look like the attack is coming from someplace else. This is called spoofing and it’s not just hackers who do this. People in Canada who get access to the shows on the US version of Netflix or those who get access to BBC iPlayer from Canada make use spoofing to make themselves appear to be in the US or the UK respectively and it doesn’t take a whole lot of skill to pull that off. Thus none of this is a smoking gun that points definitively at North Korea.

While it is possible that North Korea is behind this hack, I don’t think that there’s enough evidence here to say so definitively. I think when cooler heads prevail, it will be discovered that someone else not even remotely associated with North Korea was behind this. It will be interesting to see what happens if and when that day comes.