Tuesday, November 20, 2018

Java No Longer Free

 Java Release Update Notice

Has anyone seen this?  Back when Oracle purchased Sun Computers, and therefore got ahold of the rights for Java, the biggest thing everyone was afraid of was that they would start charging for it.  Here it is, and they are going to do that.  Basically what it says above is that, as of 2020, everyone will have to pay for the technology, and if you are a person who just happens to use a program they got that was written in Java (think Minecraft), well then you will have to buy it, or arrange for some kind of update arrangement with the person you got your software from (i.e. they will pay for it).

True, the long slow decline of Java has begun, and with more and more newer browsers not supporting it, and the security concerns inherent with the Java platform, this really may not be a bad thing.  But, the disruption is nevertheless real.  If you are a company using corporate mission-critical applications that rely on Java (which there are a lot of), then you will have to now budget for Java updates with Oracle.

My prediction is that this policy will help hasten the demise of Java. And that, I think, is a good thing. This is an overbearing, bloated platform that has been riddled with security holes since day 1.  All the effort to close those holes has led to a crazy patchwork of incompatibilities and technical support nightmares. Let it die let it die, let it shrivel up and die.

Thursday, November 8, 2018

Scams and The Wild Wild West of the Internet

Above is a real e-mail from my Inbox.  We all know that scams abound, and that scammers are getting smarter about them.  However, the really really really really really dumb ones like above still come through.  Poorly-worded English, and really plain ask for money without any background or research.  The fact that these e-mails are still being sent, to me, would seem to indicate that they must work at some level.  So, that leaves me to wonder, what brain-dead individuals with socially-stunted interpersonal skills would fall for such a thing that says "We awaits your contribution" from some random e-mail address that may or may not even be someone that they know?  Would it be some elderly person?  I kind of doubt that many elderly have e-mail if they don't understand the dangers of it, and who can send them letters; and if they do have e-mail, I doubt that they have much money to be able to pay any scams if they don't understand these things (they probably already lost that money through some other scam).

Recently, I began a charitable endeavor, and networked through people I know to talk to corporate task forces responsible for remitting charitable donations to the community.  On the call, they asked me how I know my contact (a VP of the company), and if I really did talk to him - because they are getting people who research their company, learn the names of executives, and use those names to say they were referred by them, to try to garner credibility for the scam.  And this isn't a really big company to begin with.  That's how aggressive and researched and intelligent some of these scammers have become.

All the more surprising to see the old "I am a prince with millions of dollars trapped in offshore accounts, and I need your help to move it" type of scam even be attempted.

Some very clever e-mails try to look legit.  For example, my wife and son got emails claiming that their e-mail was hacked, their password was such-and-such (a password they had used on some site that had actually been hacked), and that they need to transfer bitcoins to this account if they wanted to avoid their social media (all of them) and others being controlled.  This was blatantly idiotic, but had some intelligence behind it as it used an actual hacked password from somewhere else on the presumption that they use the same password everywhere.

Phone Call Scams

There are many phone call scams, too.  Again, they seem so stupid to me, that I wonder at the level of people who fall for them.  They are typically of the type that says things like "This is Card Services, we can help you lower your credit card interest rate" (hilarious they call my kids who are too young to have cards...), or "Don't hang up" (I immediately hang up).  Every once in a while, I get a call that says they are from Microsoft (in an Indian accent) and that they were notified a virus was detected on my PC (I have Macs).  So, why are these calls so prevalent today, and what can we do about them?

First, let's look at WHY these occur.  On the driving end, many of us eventually fall for these scams and it is very cheap to attempt them, so if even a small percentage of marks fall for the scam, it more than pays for itself.  On the enabling end, people are using 2 very old, ancient technologies with absolutely no or little security to communicate.  These are e-mails and telephone.

Most e-mail systems support POP and SMTP, which are mail protocols developed in the 1960s and not updated much since.  Some security has been added, but they are typically optional, and depend on each mail server being set up with those security options enabled.  For example, requiring the sender to authenticate to the server (e.g. enter a name and password) is optional when a mail server is set up.  If you look at the POP protocol, it was designed with the Internet way back, when the entire purpose of the Internet was to provide a system of interconnectedness between computers that could survive a nuclear war, and possibly an entire city being destroyed, and yet still function and route traffic.  Thus, POP relays e-mails from the originating server, through any number of intermediate servers, until it finds the destination server.  The originating server is in charge of whether or not it requires authentication, and then the e-mail goes along its merry way.  If some scam artist or criminal sets up an e-mail server, it finds other e-mail servers to relay through, and some sort of trust is established such that no real security is in place.

In order to fix this issue, it would require a whole new e-mail system that requires senders to authenticate who they are, and a trust between each mail system that each individual mail system has vetted its users for illicit activities.

Now let's look at telephone systems.  Back around the 1970's and 1980's, they were developing a Caller ID system.  In this system, if you think about how telephones worked back then, one switch the caller was connected to routed the call based on the number he dialed, to another switch, and so on until it reached the final telephone terminal.  All of these systems were over copper wires with electricity, using old "analog" signals.  They broadcast tones over these signals that were the precursors to digital, called DTMF tones, to communicate the phone number dialed to the switches.  So, on top of this ancient and very simple system, they created a protocol that would work with all these old phones, that basically says the calling phone gets to say who it is (as in "Hello, my number is 555-111-2222") and that is relayed to the receiving phone.  Absolutely no security, no way of verifying that's who it really is.  So anyone can put anything they want.  And guess what?  That's the Caller ID system still in place today, globally.  So guess what?  Anyone can say they are calling from any number, there's nothing that forces them to prove via a more secure system they are who they say they are.

Supposedly, phone companies have been working on a solution to this, but this is really where government regulation has dropped the ball and not forced them to do it by a certain date.

So, because of this massive lapse in security and regulations on behalf of the public good (thanks, Government), it's a wild west out there for scammers.  They can do anything they want and get away with it - and they have systems that generate a phone number that looks like it is local to you, and that's who it says they are calling you from.  Then, when you call it back, it is either an invalid number, or someone's phone, but they never called you.

Tips to Handle Spoof Calls

The vast majority of these calls are computerized, because that's the way to make it so cheap that it costs them almost nothing to try to find stupid, gullible people to give them their money.  So, knowing that these are stupid computers, it is pretty easy to figure out if this is a real person or a computer.  Answer it, and don't say anything.  If you were calling someone and they answered and it was total silence, what would you do?  You'd say "Hello?  Is anyone there?"  However, computers wait for someone to start talking.  Typically when you answer a phone, you say "Hello?" so it waits for some sound, and then it starts its scam.

If you don't make a noise, it will hang up shortly, and you know it was a robocaller.  If someone says something, you know it's a person.

Should you block the number?  Not likely to help.  Like I said, they can say they are calling from any number, and their software picks a random local number every call, so forget trying to block callers.

How does the phone company help?  There are apps for your phone that try to identify callers - but again, this only works for those who legitimately give their Caller ID.  This is actually a large enough list, so it is helpful.  A third-party app, Mr. Number, will identify incoming callers and show whether they are a telemarketer, debt collector, or suspected spam caller.  Similarly, your cellular carrier offers apps that do the same, and there may be some additional numbers in its registry that Mr. Number doesn't have, so I have both AT&T Call Protect and Mr. Number installed.  Contact your cellular carrier and ask them what apps they have to help protect you from unwanted spam calls.

What about long-term?  In the United States, you can contact your Congressional representatives in the House and Senate, and pester them (yes, over and over and over) to introduce and support legislation that will correct this issue.  Namely, force Internet mail providers to switch to a new system that is secure, and force phone providers to vet their caller ID and force it to be both more secure, and transparently notify users when it is not security authenticated the caller ID is genuine.

They say that "the squeaky wheel gets the grease," meaning the more you complain and say something, the more the problem you are complaining about is likely to get addressed.  Congress already knows this is a big issue, but they are slow moving, and typically need a push.  Just because I say to do it at a Federal level, doesn't mean you can't attempt something at the State level as well, but to be really effective, the FCC has to regulate it since it is by definition an interstate system.