>Hackers appear to have targeted a US location tracking firm Gravy Analytics. It collects information through smartphones, including peoples' precise movements, and then provides it to other companies or governments.
So... those companies sold their customers' data to Gravy Analytics? You know, Cambridge Analytica style? And these hackers just siphooned data from this tracking company?
>He also told Sky News the apps named in the leak weren't necessarily working with Gravy Analytics.
>Instead, he said, software development kits used in the apps appeared to be sending off users' location data.
So... those companies used SDKs from Gravy Analytics which secretly phoned home users' data to this tracking company?
Not sure what's worse, but if this is really the case, it highlights deep flaws in the way major companies evaluate their "software supply chain".
Also, from a more technical standpoint, single API calls following an established specification (assuming that's what those SDK actually do) should be favored over SDKs. If you send a POST containing certain data, there's no way the destination gets other data from you, unless your HTTP client is vulnerable and can somehow be attacked by the company who owns those APIs.
>Either that incident or the continuing hostilities in Ukraine (which are likely to last another year at least) will cause the economy to tank again, screwing up the markets to a fair degree.
I'm not an economist or a diplomat, but I would argue that a serious Taiwan incident may be worse than continuing hostilities in Ukraine from an economic standpoint.
First, because the surprise effect is probably relevant. We have been dealing with the situation in Ukraine for a while. We know trades with Russia are very limited, European countries know they can't get reliable gas supply from Ukraine, and so on. Yes, things may get worse, and Western countries might send more (or less) money and aid to Ukraine, but at least we have already covered our bases. When it comes to Taiwan, if something significant happens, it will probably affect the semiconductor business, which goes from CPUs and GPUs to photovoltaics, all things that are highly relevant to our economy.
Also, China itself is much richer than Russia, so a prolonged China-Taiwan conflict may last for a really long time.
I wonder if this mindset is also applied, for example, to the rest of the military. Does the Army regularly practice land navigation? I know they get at least one landnav class, but it is a perishable skill. If you don't practice, you'll soon forget about it.
I guess this could also be useful to civilians. Being able to do stuff without relying too much on electronics.
We do tip, but occasionally, only if we believe something about that meal was really great, and there's no set percentage.
Also, there are no tip jars. What happens is the server brings the check to you, and you can tip the server by giving money directly to them. Of course, this doesn't mean the owner cannot pocket the tips, but it does give a feeling that the tip is more likely to reach the servers only.
That said, the eBPF verifier has robust security guarantees and runs on every load. So arbitrary mem access for example isn't possible. Qtap runs exclusively on your nodes, so you control what it captures and where that data goes. Our paid offering provides more functionality with a Control Plane solutions that provides dashboards, alerting, and live config updates. However, all sensitive information, like captured http bodies, are uploaded to a S3 compliant bucket that you control. This could be S3, Minio, or anything else that supports the S3 API. We never see this information.
It's intentionally designed for deployment within your infra and abides by the security policies you set within your org.
Could you expand on this? I haven't seen anything on your company website that suggests detection of this kind of stuff. Also, could you explain how this could be detected? Through another eBPF program?