Hosting News »

27 May, 2022 – 4:32 am |

“We made a decision to partner with GlobalSign, Europe’s longest serving Certificate Authority, as it offers the most trusted and inexpensive Code Signing and SSL security options now available in the digital certificate market,” Janmedia hosting director Alicja Baran related in an announcement. “GlobalSign’s digital certificates complement our existing product portfolio and we are anticipating […]

Read the full story »
Business News
Home » Tech News

Sensitive Data Leaked

Submitted by on 8 January, 2022 – 4:32 pm

Sensitive files like Secret Service safehouse locations, army rosters, and IRS tax returns can still be found on file-sharing networks, according to a brief to a US House of Members board on Wed.  In several cases, that’s because govt staff or contractors installed p-2-p software on their PCs without listening to which documents would be shared, Robert Boback, the Executive of Tiversa, informed the panel. Boback said his company found the Secret Service’s getaway plans for the 1st woman and motorcade routes.  ( See a chat with Tiversa about Sea One documents found on a p-2-p network this spring. ). That led some statesmen to say that new Fed. laws were important to stop inadvertent file sharing.  “I’m planning to introduce a bill,” expounded Rep Edolphus Cities , a Big Apple Left winger who heads a place oversight board.

He announced his legislation would constrain the utilization of P2P software on all PC networks controlled by the central authority or its contractors. In addition, the Fed. Trade Commission should research whether P2P programme engineers are violating the law, and the Obama administration should “undertake a national campaign to teach clients about the risks of file sharing software,” Cities recounted. ( In Apr, Towns’ board informed the FTC it had reopened an inquiry into inadvertent file sharing. ). Rep Peter Welch, a Vermont Left winger , advised a corresponding approach.

He needed to know “whether there’s some court action that should be brought to protect intellectual property, to guard youngsters from porn, to guard classified medical info, state security information.  The two-and-a-half hour hearing singled out LimeWire, which is perhaps the highest-profile P2P customer in use today. LimeWire is distributed by Manhattan-based Lime Wire LLC ( which sells a more featureful version called LimeWire Pro ) and it employs the BitTorrent and Gnutella networks.

Lime Group CEO Mark Gorton attempted to defuse some of the feedback, pronouncing “the current version of LimeWire does not share any documents by default,” and many security enhancements were added in version five of the software–released in December 2008–that were absent from version four. “It is chilling what the general public now has available to it,” Cities related. “The concept that you can study the first lady’s info, where she’s going, how she’s getting there.

Tax records, things of that nature we want to get to the base of this. Not helping was the incontrovertible fact that Gorton gave evidence at an earlier hearing in July 2007 on the same subject. “Mr Gorton, I find your sworn statement today stunning,” announced Rep Paul Hodes, a New Hampshire Democrat. “You guaranteed us 2 years back you were going to mend LimeWire.

Responded Gorton : “LimeWire doesn’t control the PCs of folk around the country. He added later : “It’s not irrational to expect folk who install file-sharing software desire to share files. Rep Bill Foster, an Illinois Left winger who’s more technically-inclined than most congressmen ( he has got a certificate in physics ), declared “the nuclear choice is to block the Gnutella protocol” on a state basis. But, Foster recognized, that wasn’t certain to work. Another choice, he revealed, would be to form a new version of the Gnutella custom.

Tags: , , , , , , , , , ,

Leave a comment!

Add your comment below, or trackback from your own site. You can also Comments Feed via RSS.

Be nice. Keep it clean. Stay on topic. No spam.

You can use these tags:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong> 

This is a Gravatar-enabled weblog. To get your own globally-recognized-avatar, please register at Gravatar.