Hello Listers,<div id="yMail_cursorElementTracker_1477324797361">I have been keenly following the latest DDoS developments and its interesting how the once futuristic concept (IoT) - now here with us, is starting to shape Internet security debates.</div><div id="yMail_cursorElementTracker_1477325194685"><br></div><div id="yMail_cursorElementTracker_1477324985176">Just an update; one of the companies whose devices were used in the attacks is recalling its devices:</div><div id="yMail_cursorElementTracker_1477325071896">Link: <a id="linkextractor__1477325094130" data-yahoo-extracted-link="true" href="http://thehackernews.com/2016/10/iot-camera-mirai-ddos.html?m=1">Chinese Electronics Firm to Recall its Smart Cameras recently used to Take Down Internet</a><div id="lEnhancr_1477325096386" class="yahoo-link-enhancr-card yahoo-link-enhancr-cardSize-medium yahoo-link-enhancr-cardType-@yenhancr yahoo-link-enhancr-cardCategory-  ymail-preserve-class ymail-preserve-style" style="max-width: 400px; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; position: relative;" contenteditable="false" data-url="http://thehackernews.com/2016/10/iot-camera-mirai-ddos.html?m=1" data-type="LINK_ENHANCR_ATTACHMENT_TYPE_INLINE" data-category="" data-embed-url="" data-size="medium" mapping_anchor_id="linkextractor__1477325094130">
                       <a href="http://thehackernews.com/2016/10/iot-camera-mirai-ddos.html?m=1" style="text-decoration:none !important; color: #000 !important;" class="yahoo-enhancr-cardlink" target="_blank" rel="noreferrer">
                           <table class="card-wrapper yahoo-ignore-table" cellpadding="0" cellspacing="0" border="0" style="max-width:400px;">
                               <tbody><tr>
                               <td width="400">
                                   <table class="card yahoo-ignore-table" cellpadding="0" cellspacing="0" border="0" width="100%" style="max-width:400px;">
                                       <tbody><tr>
                                           <td class="card-primary-image-cell" style="background:#000 url('https://s.yimg.com/lo/api/res/1.2/ZHa3aOyzXn0Zj2znECVEWw--/Zmk9ZmlsbDt3PTQwMDtoPTIwMDthcHBpZD1pZXh0cmFjdA--/https://4.bp.blogspot.com/-qggBzzLy1RM/WA4sTnxw_rI/AAAAAAAAp7o/2gnqvx8LjmEmym18owTBVueicGj6WFSlQCLcB/s1600/china-iot-camera-mirai-ddos-attack.png.cf.jpg') no-repeat center center;background-size:cover;height:200px;position:relative;" background="https://s.yimg.com/lo/api/res/1.2/ZHa3aOyzXn0Zj2znECVEWw--/Zmk9ZmlsbDt3PTQwMDtoPTIwMDthcHBpZD1pZXh0cmFjdA--/https://4.bp.blogspot.com/-qggBzzLy1RM/WA4sTnxw_rI/AAAAAAAAp7o/2gnqvx8LjmEmym18owTBVueicGj6WFSlQCLcB/s1600/china-iot-camera-mirai-ddos-attack.png.cf.jpg" bgcolor="#000000" valign="top">

                                               <!--[if gte mso 9]><v:rect fill="true" stroke="false" style="width:400px;height:218px;position:absolute;top:0;left:0;"><v:fill type="frame" color="#000000" src="https:&#x2F;&#x2F;s.yimg.com&#x2F;lo&#x2F;api&#x2F;res&#x2F;1.2&#x2F;ZHa3aOyzXn0Zj2znECVEWw--&#x2F;Zmk9ZmlsbDt3PTQwMDtoPTIwMDthcHBpZD1pZXh0cmFjdA--&#x2F;https:&#x2F;&#x2F;4.bp.blogspot.com&#x2F;-qggBzzLy1RM&#x2F;WA4sTnxw_rI&#x2F;AAAAAAAAp7o&#x2F;2gnqvx8LjmEmym18owTBVueicGj6WFSlQCLcB&#x2F;s1600&#x2F;china-iot-camera-mirai-ddos-attack.png.cf.jpg"/></v:rect><![endif]-->

                                               <table class="yahoo-ignore-table" cellpadding="0" cellspacing="0" border="0" valign="top" style="width:100%;">
                                                   <tbody><tr>
                                                       <td style="background:transparent url('https://s.yimg.com/nq/storm/assets/enhancrV2/12/overlay-tile.png') repeat left top;height:200px;" background="https://s.yimg.com/nq/storm/assets/enhancrV2/12/overlay-tile.png" bgcolor="transparent" valign="top">

                                                           <!--[if gte mso 9]><v:rect fill="true" stroke="false" style="width:400px;height:218px;position:absolute;top:-18px;left:0;"><v:fill type="pattern" color="#000000" src="https://s.yimg.com/nq/storm/assets/enhancrV2/12/overlay-tile.png"/><v:textbox inset="0,0,20px,0"><![endif]-->

                                                           <table class="yahoo-ignore-table" height="185" style="width:100%;height:185px;min-height:185px;">
                                                               <tbody><tr>
                                                                   <td class="card-richInfo2" style="text-align:left;text-align:left;padding:15px 0 0 15px;vertical-align:top;">
                                                                   </td>
                                                                   <td class="card-actions" style="text-align:right;padding:15px 15px 0 0;vertical-align:top;">
                                                                       <div class="card-share-container"></div>
                                                                   </td>
                                                               </tr>
                                                           </tbody></table>

                                                           <!--[if gte mso 9]></v:textbox></v:rect><![endif]-->
                                                       </td>
                                                   </tr>
                                               </tbody></table>
                                           </td>
                                       </tr>
                                       <tr>
                                           <td>
                                               <table class="card-info yahoo-ignore-table" align="center" cellpadding="0" cellspacing="0" border="0" style="background:#fff;position:relative;z-index:2;width:95%;max-width:380px;border:1px solid #e0e4e9;border-bottom:3px solid ;margin-top:-40px;margin-left:auto;margin-right:auto;">
                                                   <tbody><tr>
                                                       <td style="background-color:#ffffff;padding:16px 0 16px 12px;vertical-align:top;">
                                                       </td>

                                                       <td style="vertical-align:middle;padding:16px 12px;width:99%;">
                                                           <h2 class="card-title" style="font-size: 16px; line-height:19px; margin:0 0 4px 0;font-family:'Helvetica Neue', Helvetica, Arial, sans-serif;">Chinese Electronics Firm to Recall its Smart Cameras recently used to Take Down Internet</h2>
                                                           <p class="card-description" style="font-size:11px;line-height:15px;color:#999;">Chinese Electronics Firm Hangzhou Xiongmai Technology to recall its vulnerable smart products whose Internet connected cameras were hacked by Mirai  botnet to take down the Internet with massive ddos attack.</p>
                                                       </td>

                                                       <td style="text-align:right;padding:16px 12px 16px 0;">
                                                       </td>
                                                   </tr>
                                               </tbody></table>
                                           </td>
                                       </tr>
                                   </tbody></table>
                               </td>
                               </tr>
                           </tbody></table>
                       </a>
                   </div></div><div id="yMail_cursorElementTracker_1477325096332"><br></div><div id="yMail_cursorElementTracker_1477325096332">Bonface Witaba</div><div id="yMail_cursorElementTracker_1477325122152"><br></div><div id="yMail_cursorElementTracker_1477325076053"><div id="yMail_cursorElementTracker_1477324758639"><div id="ymail_android_signature"><a href="https://overview.mail.yahoo.com/mobile/?.src=Android">Sent from Yahoo Mail on Android</a></div> <br> <blockquote style="margin: 0 0 20px 0;"> <header style="font-family:Roboto, sans-serif; color:#6D00F6;"> <div>On Sun, 23 Oct, 2016 at 21:24, kictanet-request@lists.kictanet.or.ke</div><div><kictanet-request@lists.kictanet.or.ke> wrote:</div> </header> <div style="padding: 10px 0 0 20px; margin: 10px 0 0 0; border-left: 1px solid #6D00F6;"> <div id="msgSandbox_AAhMyAoAACjDWA0AbQTCwJ2BkZrg_TEXT" class="msgSandbox" style="padding: 1.5em 0.5em 0.5em 1.2em; word-wrap: break-word;">Send kictanet mailing list submissions to<br>    <a ymailto="mailto:kictanet@lists.kictanet.or.ke" href="javascript:return">kictanet@lists.kictanet.or.ke</a><br><br>To subscribe or unsubscribe via the World Wide Web, visit<br>    <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>or, via email, send a message with subject or body 'help' to<br>    <a ymailto="mailto:kictanet-request@lists.kictanet.or.ke" href="javascript:return">kictanet-request@lists.kictanet.or.ke</a><br><br>You can reach the person managing the list at<br>    <a ymailto="mailto:kictanet-owner@lists.kictanet.or.ke" href="javascript:return">kictanet-owner@lists.kictanet.or.ke</a><br><br>When replying, please edit your Subject line so it is more specific<br>than "Re: Contents of kictanet digest..."<br><br><br>Today's Topics:<br><br>   1. Re: Fwd: Who to Blame for the Attack on the Internet - The<br>      answer is You, me and everyone else is in between<br>      (Rosemary Koech-Kimwatu)<br><br><br>----------------------------------------------------------------------<br><br>Message: 1<br>Date: Sun, 23 Oct 2016 21:22:46 +0300<br>From: Rosemary Koech-Kimwatu <<a ymailto="mailto:chemukoechk@gmail.com" href="javascript:return">chemukoechk@gmail.com</a>><br>To: KICTAnet ICT Policy Discussions <<a ymailto="mailto:kictanet@lists.kictanet.or.ke" href="javascript:return">kictanet@lists.kictanet.or.ke</a>><br>Subject: Re: [kictanet] Fwd: Who to Blame for the Attack on the<br>    Internet - The answer is You, me and everyone else is in between<br>Message-ID:<br>    <CAApgMtyMgNGGvkx0yX-AW+5rZT6hgb+<a ymailto="mailto:XuNkQq-rQ_ZxNoaNDBA@mail.gmail.com" href="javascript:return">XuNkQq-rQ_ZxNoaNDBA@mail.gmail.com</a>><br>Content-Type: text/plain; charset="utf-8"<br><br>I agree, we must critically analyse the risk exposure we place ourselves in<br>as we enthusiastically embrace IOT.<br><br>It is a wake up call because for once we realise that our cameras, fridges<br>and printers can be used as weapons of mass destruction. In as much as this<br>whole thing sounds like a script from a dooms day sci-fi thriller we must<br>accept that it is a new reality which must adequately prepare ourselves for.<br><br>>From a regulatory point of view, we must lobby to ensure that all IOT<br>devices have very strict security standards, just like those required of<br>all other sensitive technological infrastructure.<br><br>Kind regards,<br><br>Rosemary Koech-Kimwatu.<br><br>On 23 Oct 2016 19:13, "Ali Hussein via kictanet" <<br><a ymailto="mailto:kictanet@lists.kictanet.or.ke" href="javascript:return">kictanet@lists.kictanet.or.ke</a>> wrote:<br><br>> Dear listers<br>><br>> Cross-posting intentional<br>><br>> In the last few days the blogosphere and social media in general has been<br>> abuzz with the DDoS attack that brought down popular sites like Amazon and<br>> a Twitter.<br>><br>> Have you wondered what role YOU could have played in this attack? Well, it<br>> turns out we are all not so innocent..Read on..<br>><br>><br>> *From:* "FORTUNE Data Sheet" <<a ymailto="mailto:fortune@email.fortune.com" href="javascript:return">fortune@email.fortune.com</a>><br>> *Date:* 22 October 2016 at 10:18:07 PM EAT<br>> *To:* <<a ymailto="mailto:ali@hussein.me.ke" href="javascript:return">ali@hussein.me.ke</a>><br>> *Subject:* *Who to Blame for the Attack on the Internet*<br>> *Reply-To:* "Fortune" <reply-fec915777065057a-20_HTML-56937916-7213333-13@<br>> email.fortune.com><br>><br>><br>> [image: twitter share]<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd89a63bd3156595a18fb76a8e422aaad43de21b2717f74c0298abd3271ecf3af79" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd89a63bd3156595a18fb76a8e422aaad43de21b2717f74c0298abd3271ecf3af79</a>><br>> [image: facebook share]<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd86111430ea32dfe4cf2a46a8c835438ac1bf1b2c9a9ff0ee1f73f10bdca2a0859" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd86111430ea32dfe4cf2a46a8c835438ac1bf1b2c9a9ff0ee1f73f10bdca2a0859</a>><br>> FOLLOW<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8a6aadcbdb98150198f4606ea4883e7630eff2f1504cd37df275c9eb18d440934" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8a6aadcbdb98150198f4606ea4883e7630eff2f1504cd37df275c9eb18d440934</a>><br>> subscribe<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e3c7a0604f4495fd5d26a056bbd18bc05009bd4dacbf312f534ffecc1df15108" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e3c7a0604f4495fd5d26a056bbd18bc05009bd4dacbf312f534ffecc1df15108</a>><br>> ANON TIP<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd81f6cc120ae2be6d360b40ecec34f97fb4f534a5aecd758432ccfd316044c79db" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd81f6cc120ae2be6d360b40ecec34f97fb4f534a5aecd758432ccfd316044c79db</a>><br>> October 22, 2016<br>><br>> Our worst hacking fears came true on Friday as criminals deployed millions<br>> of everyday objects ? internet-connected cameras, printers and so on ? to<br>> launch an attack<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8ae24cd6e62c52fc5fcf166af66a4737d3963e61a8f3514ae52bb499304004b8d" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8ae24cd6e62c52fc5fcf166af66a4737d3963e61a8f3514ae52bb499304004b8d</a>><br>> on a critical part of the Internet. The attack was a success, crippling the<br>> websites of major companies like Amazon<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd85042ba44640a09611552bd50e91322658025d61cc7e69b3b6cbb61b6b6712b10" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd85042ba44640a09611552bd50e91322658025d61cc7e69b3b6cbb61b6b6712b10</a>>,<br>> Netflix<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8b6bfa06478bd79a6417b1e473eda9f9f601d9c3cb9146198d710069a46ed7a0d" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8b6bfa06478bd79a6417b1e473eda9f9f601d9c3cb9146198d710069a46ed7a0d</a>><br>> and Twitter for hours at a time.<br>><br>> We now have a handle on what happened: hackers used publicly available<br>> source code to assemble a bot-net army of internet-enabled devices, and<br>> then directed those devices to send massive waves of junk requests to a DNS<br>> provider. The attack meant the provider, New Hampshire based Dyn, could not<br>> carry out its job of acting as a switchboard for the internet, and<br>> consumers could no longer reach popular websites.<br>><br>> The compromised devices, which make up the bot-net army, are still out<br>> there and unpatched, which means other attacks are likely on the way. This<br>> makes it a good time to ask who?s to blame for this debacle. We can start,<br>> of course, by fingering the hackers themselves, who appear to have<br>> unleashed the attack with profit motives<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8d92181cd55f6c6b3f035afeb7b2ad406aa420e6b00b9bd33c3f129b554b4b83c" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8d92181cd55f6c6b3f035afeb7b2ad406aa420e6b00b9bd33c3f129b554b4b83c</a>><br>> in mind.<br>><br>> But we can also assign much of the blame to the companies whose sloppy<br>> security standards made the attack possible:<br>><br>> Wondering which IoT device types are part of the Mirai botnet causing<br>> trouble today? @briankrebs<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8b40a3a8949c758766798afbd944bd8bc0dedb5fadb33905f147a532b7f2824fb" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8b40a3a8949c758766798afbd944bd8bc0dedb5fadb33905f147a532b7f2824fb</a>><br>> has the list: <a href="https://t.co/bETefDMa4Y" target="_blank">https://t.co/bETefDMa4Y</a><br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8510b05d14ce1ef716063e0b37a5f368825eb1dba403a7cabccb90fa152755daf" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8510b05d14ce1ef716063e0b37a5f368825eb1dba403a7cabccb90fa152755daf</a>><br>><br>> ? Eric Skinner (@EricSkinner) October 22, 2016<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8be8a26a11a685b24cbc03242cb39b73d9862196fcd81d0c880aa9be0efd3d272" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8be8a26a11a685b24cbc03242cb39b73d9862196fcd81d0c880aa9be0efd3d272</a>><br>><br>> //platform.twitter.com/widgets.js<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd866493dc7c47e363e222e27f0a9dae8dcfc668c5e7d81279b8f909398ecfa2793" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd866493dc7c47e363e222e27f0a9dae8dcfc668c5e7d81279b8f909398ecfa2793</a>><br>><br>> We need laws that allow civil and/or criminal penalties for companies that<br>> sell systems this insecure <a href="https://t.co/Gj4S5Hj0xV" target="_blank">https://t.co/Gj4S5Hj0xV</a><br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e220a1a259bbec7f41da1aa079fc112b411d410da32a20ca1b84b5a98756e9fa" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e220a1a259bbec7f41da1aa079fc112b411d410da32a20ca1b84b5a98756e9fa</a>><br>><br>> ? Christopher Mims (@mims) October 22, 2016<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd82b5f0a9985d53b548e0f94dbafc8f4f5cb20a1b378d5f36d69fbb519da1778c3" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd82b5f0a9985d53b548e0f94dbafc8f4f5cb20a1b378d5f36d69fbb519da1778c3</a>><br>><br>> //platform.twitter.com/widgets.js<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd866493dc7c47e363e222e27f0a9dae8dcfc668c5e7d81279b8f909398ecfa2793" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd866493dc7c47e363e222e27f0a9dae8dcfc668c5e7d81279b8f909398ecfa2793</a>><br>><br>> A list of alleged culprits<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8c27958954642dc875648b88e49e7f2b6eba9dfe705c8e0e91122c2af4e59efb7" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8c27958954642dc875648b88e49e7f2b6eba9dfe705c8e0e91122c2af4e59efb7</a>>,<br>> compiled by security researcher Brian Krebs, include familiar names like<br>> Panasonic, Samsung and Xerox<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd89b9c2ea8fb6dfa9c953537cb2ba5793314c1fd9c9931596afda266b84b66574c" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd89b9c2ea8fb6dfa9c953537cb2ba5793314c1fd9c9931596afda266b84b66574c</a>><br>> printers. The names also include lesser known makers of routers and<br>> cameras, which reportedly made up the bulk of the bot-net army.<br>><br>> It?s a good bet these companies are scrambling to update their product<br>> lines in a way that requires users to change the passwords (widespread use<br>> of default passwords are the main reason the devices got hacked in the<br>> first place). But it?s not fair to lay the entire blame squarely on the<br>> companies. Part of the responsibility should also lie with lawmakers and<br>> regulators, who have failed to create a safety system to account for the Internet-of-Things<br>> era<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8fa41254767352c180d4e2b79d111f07ae739deffc33eaa5e845a252e6a53ef80" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8fa41254767352c180d4e2b79d111f07ae739deffc33eaa5e845a252e6a53ef80</a>><br>> we are now living in.<br>><br>> Finally, it?s time for consumers to acknowledge they have a role in the<br>> attack too. By failing to secure the internet-connected devices, they are<br>> endangering not just themselves but the rest of the Internet as well. No<br>> one think it?s acceptable for consumers to be clueless when they operate<br>> products like automobiles or propane tanks ? so why is it okay for them to<br>> be careless with routers and security cameras?<br>><br>> On another note, there?s other security news this week, including a couple<br>> cool fin-tech features by Robert, which can read about below. Thanks as<br>> always for reading. And, for heaven?s sake, lock down your devices.<br>><br>> Jeff Roberts<br>><br>> @jeffjohnroberts<br>><br>> <a ymailto="mailto:jeff.roberts@fortune.com" href="javascript:return">jeff.roberts@fortune.com</a><br>><br>> *Welcome to the Cyber Saturday edition of Data Sheet, *Fortune?*s* *daily<br>> tech newsletter. *Fortune* reporter Robert Hackett here. You may reach me<br>> via Twitter<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd816fc246a0753a1689ad4a092c67c98ddbdd5af6c16c66801f615285420b379a2" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd816fc246a0753a1689ad4a092c67c98ddbdd5af6c16c66801f615285420b379a2</a>>,<br>> Cryptocat<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd850b38c007e565f3a845bc7eadce31b6f919ecd2403d45cddfd8d86eb385e43c1" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd850b38c007e565f3a845bc7eadce31b6f919ecd2403d45cddfd8d86eb385e43c1</a>>,<br>> Jabber<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8b5882fd27b213153972fd3b7eda143569a2d9b7fee2ed6fdf706e5f1cad1092d" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8b5882fd27b213153972fd3b7eda143569a2d9b7fee2ed6fdf706e5f1cad1092d</a>><br>> (see OTR fingerprint on my about.me<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd889235418310da4cb397ae441f60644f24f65c9999c5dd0d5fdd53ba76dcc7f36" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd889235418310da4cb397ae441f60644f24f65c9999c5dd0d5fdd53ba76dcc7f36</a>>),<br>> PGP encrypted email (see public key on my Keybase.io<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8a107f886a95135a1ca5dddb8eb6e6508a69be3f5ef0f478acfe0024e5586bd97" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8a107f886a95135a1ca5dddb8eb6e6508a69be3f5ef0f478acfe0024e5586bd97</a>>),<br>> Wickr<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8a73c56e73f96e3640c0be90b9a0cfd39acccda0fd376e13dc0612da02fabd7f1" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8a73c56e73f96e3640c0be90b9a0cfd39acccda0fd376e13dc0612da02fabd7f1</a>>,<br>> Signal<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8611d65f6926f7e9d6538ef8d680d45e8fc54f34bcae359675f3f45bf558ff268" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8611d65f6926f7e9d6538ef8d680d45e8fc54f34bcae359675f3f45bf558ff268</a>>,<br>> or however you (securely) prefer. * *Feedback welcome.*<br>><br>> <<a href="http://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/8484/fort/newsletter_fortunedatasheet&sz=300x250&t=pos%3D1%26tile%3D1%26day=sat&c=17511756937916" target="_blank">http://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/8484/fort/newsletter_fortunedatasheet&sz=300x250&t=pos%3D1%26tile%3D1%26day=sat&c=17511756937916</a>><br>> .<br>> THREATS<br>><br>> *Meet Coinbase 2.0. *In 2012, Coinbase was one of the early cool kids of<br>> the bitcoin scene. Four years later, the company is barely mentioning<br>> bitcoin as it carries out a full pivot into a digital brokerage service for<br>> a wide range of money. (Fortune<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd83e9621187a3d691c6f4c41aabf2d4faf0d5dc5152edf8b6da43454601c951242" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd83e9621187a3d691c6f4c41aabf2d4faf0d5dc5152edf8b6da43454601c951242</a>><br>> )<br>><br>> *Facial recognition stops a Facebook burglar*: Social media<br>> companies announced they have broken ties with a controversial company that<br>> scans their streams to identify faces for police departments. But it turns<br>> out Facebook has itself used the company to stop an intruder in CEO Mark<br>> Zuckerberg's office. (The Verge<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd872d08c4febcfa90bb7f070383e530dad152d68503da80a24b8157083f49e31f6" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd872d08c4febcfa90bb7f070383e530dad152d68503da80a24b8157083f49e31f6</a>><br>> )<br>><br>> *Ripple rocks it.* Meanwhile, another fin-tech darling is riding<br>> high. Ripple announced a successful trial with 12 big banks that could<br>> lower settlement costs for cross-border currency transactions by 60<br>> percent. (Fortune<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8b926c40f3baacb9509a95234fae1d2f70cf4fa9c19bc24dc340cd54d0c8fd1d1" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8b926c40f3baacb9509a95234fae1d2f70cf4fa9c19bc24dc340cd54d0c8fd1d1</a>><br>> )<br>><br>> *How Russia doxxed the DNC*: Everyone not named Donald Trump is by now<br>> acknowledging that the hack of Democratic party emails was carried out by<br>> Russia. But just what did this entail? An Esquire feature reveals how the<br>> work was a years-long, meticulously planned operation. (Esquire<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8dadfb4f35711468176f11820de50ff6be26dd753a0e64af554a8a6fd6a3055bd" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8dadfb4f35711468176f11820de50ff6be26dd753a0e64af554a8a6fd6a3055bd</a>><br>> )<br>><br>> *I forgive you, Yahoo.* How do customers react when you suffer the<br>> largest cyber-security breach in history? Apparently, they shrug. Yahoo<br>> said user numbers are about the same since the breach. Alas, it looks like<br>> the company's merger-mate won't be so forgiving ? Verizon is making noises<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e4ce3f73f27ada49e7c1450b2e03e196d2a71f92f1b8ab350ea46b1755e41456" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e4ce3f73f27ada49e7c1450b2e03e196d2a71f92f1b8ab350ea46b1755e41456</a>><br>> about bailing. (Fortune<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd834cd00f045ab4d96adac353fddd504810baa905548183cba4974550041879262" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd834cd00f045ab4d96adac353fddd504810baa905548183cba4974550041879262</a>><br>> )<br>><br>><br>> *Share today's Data Sheet with a friend: *<a href="http://fortune.com/newsletter/" target="_blank">http://fortune.com/newsletter/</a><br>> datasheet/<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd84b1f87e4e839e7aab2e21caa83d4fa97e79f41444df0383204cf11a1cc0ee37a" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd84b1f87e4e839e7aab2e21caa83d4fa97e79f41444df0383204cf11a1cc0ee37a</a>><br>><br>> *Looking for previous Data Sheets? Click here<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8324b9b0652d59711abbd7b378938881457bb23ab299da7f6cb46a3e7471c8909" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8324b9b0652d59711abbd7b378938881457bb23ab299da7f6cb46a3e7471c8909</a>>.*<br>> .<br>> ACCESS GRANTED<br>><br>> *Mmmm, blockchain. Robert has a fascinating look at how Wal-Mart and IBM<br>> are using fin-tech tools to track pork safety in China:  *<br>><br>> Walmart plans to use technology developed by the Hyperledger Project, an<br>> open source software project that builds blockchain tools and is based out<br>> of the Linux Foundation...<br>><br>> The blockchain in question, a private database co-developed by IBM, is<br>> designed to provide the retailer with a way to indelibly record a list of<br>> transactions indicating how meat has flowed through a commercial network,<br>> from producers to processors to distributors to grocers?and finally, to<br>> consumers. *Read more on Fortune.com<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8214e52c722f93a27eeab0e7ef33b17942ab3fbfc4d5465af9955d7968ab07503" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8214e52c722f93a27eeab0e7ef33b17942ab3fbfc4d5465af9955d7968ab07503</a>>*<br>> .<br>> FORTUNE RECON<br>><br>> 97% of Java Apps Harbor a Known Security Hole<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e1819d20aff867b635a2761cfc2ae0bbcbfacc2cd929d3b5ad83d2df674cb9ec" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e1819d20aff867b635a2761cfc2ae0bbcbfacc2cd929d3b5ad83d2df674cb9ec</a>><br>> by Robert Hackett<br>><br>> Microsoft Cloud Warrant Cases Move Closer to Supreme Court<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd834cada4c548652662c55f9f90aef84f03fe10a2e5e32ee8dd737fa18bf627ee5" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd834cada4c548652662c55f9f90aef84f03fe10a2e5e32ee8dd737fa18bf627ee5</a>>by<br>> Jeff John Roberts<br>><br>> This Badge Blocks Your Face in Social Media Photos<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8d6392e04b370ce749473b6e72fb49e3bade58f5edc22db32eab5c73b967922e9" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8d6392e04b370ce749473b6e72fb49e3bade58f5edc22db32eab5c73b967922e9</a>><br>> by Maddie Farber<br>><br>> Half of US Adults' Faces Are Being Scanned by Law Enforcement<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd82a95103426d7e9e538ca57f33f09309e9078db3d043dc508bbc5dfbd96e9d4e3" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd82a95103426d7e9e538ca57f33f09309e9078db3d043dc508bbc5dfbd96e9d4e3</a>><br>> by Jeff John Roberts<br>><br>> NSA Contractor Accused of Stealing Data Will Face Espionage Charges<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8c896e751142b7100ba647179dff103fc7c3f9f21678ae8c890020389f122f021" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8c896e751142b7100ba647179dff103fc7c3f9f21678ae8c890020389f122f021</a>><br>> Fortune/Reuters<br>> .<br>><br>> <<a href="http://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/8484/fort/newsletter_fortunedatasheet&sz=300x250&t=pos%3D2%26tile%3D2%26day=sat&c=17511756937916" target="_blank">http://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/8484/fort/newsletter_fortunedatasheet&sz=300x250&t=pos%3D2%26tile%3D2%26day=sat&c=17511756937916</a>><br>> .<br>> ONE MORE THING<br>><br>> If you want to hack a high profile target, spear-phishing is still the<br>> best bet. But just how do you carry it out? In the case of General Colin<br>> Powell and DNC Chair John Podesta, it was a plain old "Gmail" message.<br>> Here's an up close look at what *not* to click. (*Motherboard*)<br>> .<br>> EMAIL Robert Hackett <<a ymailto="mailto:robert.hackett@fortune.com" href="javascript:return">robert.hackett@fortune.com</a>><br>> subscribe<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e3c7a0604f4495fd5d26a056bbd18bc05009bd4dacbf312f534ffecc1df15108" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8e3c7a0604f4495fd5d26a056bbd18bc05009bd4dacbf312f534ffecc1df15108</a>><br>> share: [image: TW]<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd89a63bd3156595a18fb76a8e422aaad43de21b2717f74c0298abd3271ecf3af79" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd89a63bd3156595a18fb76a8e422aaad43de21b2717f74c0298abd3271ecf3af79</a>> [image:<br>> FB]<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd86111430ea32dfe4cf2a46a8c835438ac1bf1b2c9a9ff0ee1f73f10bdca2a0859" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd86111430ea32dfe4cf2a46a8c835438ac1bf1b2c9a9ff0ee1f73f10bdca2a0859</a>> [image:<br>> IN]<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd857a7b351acebcc6112bfd18e0e71e9e52278ab52bc8517e046793d085568cbe3" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd857a7b351acebcc6112bfd18e0e71e9e52278ab52bc8517e046793d085568cbe3</a>><br>> .<br>> This message has been sent to you because you are currently subscribed to<br>> Cyber Saturday<br>> *Unsubscribe here<br>> <<a href="https://pages.email.fortune.com/page.aspx?qs=1550dccf35ce5f7448636ad41dbb8a1de5abd7376b905facc427531013ad946e1b2e2f13cacbc49f37f69f41fc505b55992a42e7a0a08d7eff4e2a61213e3583c7575c5c47080276466dad8ecc8c455f" target="_blank">https://pages.email.fortune.com/page.aspx?qs=1550dccf35ce5f7448636ad41dbb8a1de5abd7376b905facc427531013ad946e1b2e2f13cacbc49f37f69f41fc505b55992a42e7a0a08d7eff4e2a61213e3583c7575c5c47080276466dad8ecc8c455f</a>>*<br>><br>> Please read our Privacy Policy, or copy and paste this link into your<br>> browser:<br>> *<a href="http://www.fortune.com/privacy" target="_blank">http://www.fortune.com/privacy</a><br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8ba2d82a44785b34fc598c6f5a04f82650446952675a8b115c8460ae65928c990" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8ba2d82a44785b34fc598c6f5a04f82650446952675a8b115c8460ae65928c990</a>>*<br>><br>> For Further Communication, Please Contact:<br>> FORTUNE Customer Service<br>> 3000 University Center Drive<br>> Tampa, FL 33612-6408<br>><br>><br>><br>><br>><br>> *Advertising Info<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8ba2d82a44785b34fc598c6f5a04f82650446952675a8b115c8460ae65928c990" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8ba2d82a44785b34fc598c6f5a04f82650446952675a8b115c8460ae65928c990</a>><br>> | Subscribe to Fortune<br>> <<a href="https://click.email.fortune.com/?qs=7d1cb97b08a54cd8f27fcb1e2398e728028f06c3c314ae7f9c376ae40843d8d0ab9870faf81a26e3" target="_blank">https://click.email.fortune.com/?qs=7d1cb97b08a54cd8f27fcb1e2398e728028f06c3c314ae7f9c376ae40843d8d0ab9870faf81a26e3</a>>**Ali<br>> Hussein*<br>> *Principal*<br>> *Hussein & Associates*<br>> +254 0713 601113<br>><br>> Twitter: @AliHKassim<br>><br>> Skype: abu-jomo<br>><br>> LinkedIn: <a href="http://ke.linkedin.com/in/alihkassim" target="_blank">http://ke.linkedin.com/in/alihkassim</a><br>><br>><br>> "Discovery consists in seeing what everyone else has seen and thinking<br>> what no one else has thought".  ~ Albert Szent-Gy?rgyi<br>><br>> Sent from my iPad<br>><br>> Begin forwarded message:<br>><br>><br>> _______________________________________________<br>> kictanet mailing list<br>> <a ymailto="mailto:kictanet@lists.kictanet.or.ke" href="javascript:return">kictanet@lists.kictanet.or.ke</a><br>> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>><br>> Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/" target="_blank">https://lists.kictanet.or.ke/</a><br>> mailman/options/kictanet/chemukoechk%40gmail.com<br>><br>> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform<br>> for people and institutions interested and involved in ICT policy and<br>> regulation. The network aims to act as a catalyst for reform in the ICT<br>> sector in support of the national aim of ICT enabled growth and development.<br>><br>> KICTANetiquette : Adhere to the same standards of acceptable behaviors<br>> online that you follow in real life: respect people's times and bandwidth,<br>> share knowledge, don't flame or abuse or personalize, respect privacy, do<br>> not spam, do not market your wares or qualifications.<br>><br>-------------- next part --------------<br>An HTML attachment was scrubbed...<br>URL: <<a href="https://lists.kictanet.or.ke/pipermail/kictanet/attachments/20161023/be817bef/attachment.html" target="_blank">https://lists.kictanet.or.ke/pipermail/kictanet/attachments/20161023/be817bef/attachment.html</a>><br><br>------------------------------<br><br>Subject: Digest Footer<br><br>_______________________________________________<br>kictanet mailing list<br><a ymailto="mailto:kictanet@lists.kictanet.or.ke" href="javascript:return">kictanet@lists.kictanet.or.ke</a><br><a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br><br><br>------------------------------<br><br>End of kictanet Digest, Vol 113, Issue 47<br>*****************************************<br></div> </div> </blockquote></div></div>