Thursday, September 01, 2022

TIME TO CHILL: The Forgotten Virtue: Humanitas is the Cure for Incivility

 I 'm with Niall Ferguson when he writes this


Niall Ferguson is one of the world's foremost historians. ... I learned a great deal from this brilliant essay: “The Forgotten Virtue,” by James Hankins

The Forgotten Virtue: Humanitas is the Cure for Incivility


The Forgotten Virtue

Humanitas is the cure for incivility
www.firstthings.com

The Forgotten Virtue | James Hankins

by James Hankins
29 - 37 minutes


At present there is a great deal of handwringing about civility. On campus, students in screaming packs set upon speakers or professors who have said things that the earnest young have been taught to find offensive. Other students are encouraged by university administrators to act as spies, handing in anonymous denunciations of teachers whose words are felt to harm their self-esteem. In the public sphere, certain politicians can be counted on to set off Pavlovian reactions among the online arrabbiati

✓ The enraged believe that Hitler has returned to cumber the earth once more, this time as a blond, and that the best response is to rush into the streets, block traffic, march about dressed in simulacra of female body parts, and denounce public servants during the soup course. Partisan mobs send up chants calling for leaders in the opposite party to be jailed. The expression “objective journalism” has begun to sound quaint or naive in our ears. The republic is in danger; the social fabric is fraying; the dark night of fascism is about to descend.

✓ Cynics, who still predominate in the media, see things differently. Outrage is good for business. The merchants of wrath on social media, only some of whom are Russian, generate clicks and raise funds. Apparently there really are people so little in control of their impulses that they can be induced by the injudicious tweeting of buffoons to give out their credit card details to buffoons of the opposite tendency. Supreme Court nominations are gamed on the basis of which nominee is likeliest to generate the most intemperate outbursts, raising funds for one side and losing votes for the other. It is the new technology that has made us more uncivil.

✓ Others go deeper and explain the loss of civility as the result of underlying social and cultural changes. The most compelling empirical analysis of these changes was offered by the sociologist Charles Murray in his 2012 book, Coming Apart: The State of White America, 1960–2010. On the left Murray enjoys a reputation just below that of winged Beelzebub, prince of demons, but those willing to peek into prohibited books will find much illumination in Murray’s. 

✓ Things have only gotten worse since country singer Merle Haggard hymned the “Okie from Muskogee” in 1969. The college dean is no longer respected. America is now divided into two sociocultural camps, or rather suburbs: Fishtown and Belmont. In Fishtown, people eat deep-fried cheesecake and drink beer, join the army, believe intermittently in God, and are addicted to opioids. In general they are depressed and broke. In Belmont, people eat yakitori and drink Montrachet (the t is silent), consume expensive forms of education and real estate, worship Angela Merkel, and believe in diversity and implicit racism. In general they are anxious and in debt. Fishtown and Belmont are sealed off from each other socially and hate each other. Each town tries to use politics to force its own preferences on the other. Hence the loss of civility.

Are we really less civil than we used to be, then? People of riper years tend to be laudatores temporis acti, in Horace’s phrase, “praisers of time past,” and like to claim that things were better when they were young. Sadly, that option is foreclosed to my generation of oldies, who were young during the 1960s and 70s. In fact, we are rather sniffy about the incivility of the present. “Incivility?” we say, a senile quaver in our collective voice. “Ha. In my day, young woman, bomb-throwers actually threw bombs!”

Historians, too, can always be counted on to dismiss the idea that there is anything new, or worse than before, under the sun. That’s what we ­historians do, and we are right. Yes, incivility is distressing and makes constitutional government more difficult. No, it is not worse now, not from a wider historical perspective. 

✓ For most of European history, a call for greater civility would have been slightly beside the point, since Europeans were intent on killing one another in large numbers in wars or murdering one another in the streets. The latter was an activity particularly popular during the period I study, the Italian Renaissance. Shakespeare was not making it up about the Montagues and Capulets.

We historians also make short work of the technological and sociological explanations for the present increase of incivility.

✓✓ Few of us would accept that social media and the twenty-four-hour news cycle have made incivility significantly more intense than in earlier societies. Before modern times, most political life took place in very small cities (by modern standards), which were face-to-face societies. The level of paranoia was generally much higher. The man you hated was your neighbor, who had bad breath, and his ­client the grocer had knowingly sold your wife moldy tomatoes while his cousin had done your cousin out of a job. The personal may not have been the political, but the political was definitely personal.

✓ Nor is the sociological explanation adequate. In most premodern societies, the cultural gap between elites and non-elites was huge. It began from the rather salient differences that the elites had enough to eat, had more than one suit of clothing, and could read. In the grand sweep of history, what was truly exceptional was the relative homogeneity of social mores in the America of Tocqueville. The view that modern Americans are more socially polarized than the vast majority of our ancestors is just another case of historical shortsightedness.


Machiavelli—who was a wicked counselor of princes and a second-rate historian, but a shrewd observer of humanity—had an explanation for why people think things used to be better. History is written for the victors, and writers who seek reward will celebrate the winners’ deeds and conceal their infamy. Our passions are involved when we observe the actions of our contemporaries because they affect us; not so with actions in the past. The news makes us angry and fearful by turns, while we view the past through a golden mist of memory. The great men of the past are safely dead and do not threaten us. In fact, says Machiavelli, human behavior is a constant, and there has always been about the same amount of goodness and wickedness in the world. It may well be that things are better now than in the past, but we can’t tell that. In retrospect we can see that first the Assyrians had virtù, then the Medes, then the Persians, then Rome. If we lived in one of those empires on the rise and believed the past was better, we would be wrong; if we lived in a time of decline and held the same opinion, we would be right. But in the present, we can’t tell where we are in the cycle. Machiavelli confesses that even he himself might be wrong in his belief that he lived in a time of decline. Since he in fact lived in a period when Europe was on the brink of dominating the rest of the world, one has to concede his point.

Machiavelli makes the further point, however, that a healthy skepticism about the present doesn’t mean we can’t learn from the past. Some people might think that to claim all times are equally happy or unhappy means there is nothing to be learned from the past. Machiavelli disagrees. Even though roughly equal quanta of goodness and wickedness have always been in the world, they have always been unevenly distributed. Some peoples are better at some things than others, and for longer periods of time. The Romans were good at domination, for example, and they dominated for a long time. It’s worth studying the causes of human excellence so we can try to replicate them and perhaps improve our own lives and politics. . ."

READ MORE - It takes a while? 

. . .or how about a video

essay the forgotten virtue by James hankins from lavocedinewyork.com
Duration: 30:57
Posted: Sep 24, 2020

✓ "

The Forgotten Virtue
In this article, Dr. James Hankins, a professor of Renaissance and intellectual history at Harvard University,  revives insights from the Renaissance value of humanitas—love of humanity—that a liberal arts education was intended to cultivate. Renaissance humanists understood humanitas roughly in the way we think of  civility; it  was intended to counteract our natural predisposition to immanitas, our innate human impulse to dominate and be cruel to our fellow man. Dr. Hankins’ insights have caused me to think more about the nature of true civility—as something more that merely an aesthetic penchant or conversational virtue, but as something truly moral and foundational to human community. Read the essay and let me know what you think!

Virtue Politics: Soulcraft and Statecraft in Renaissance Italy
This just-released book by Dr. James Hankins, whose work I first discovered last year via the article discussed above, offers many insights into how to bring about intellectual and moral reform in our own moment

Apr 24, 2022 · Virtue Politics Soulcraft and Statecraft in Renaissance Italy James Hankins A Times Literary Supplement Book of the Year “Perhaps the ... 

From Vice: A Taiwanese Chip Giant Is Caught Between the US and China—and It’s Thriving


O REALLY ? ? ? Well yeah...CAN 2024 GET HERE ANY FASTER? 

And say what about that so-called "Silicon Shield?? ? 

"The U.S., which accounts for nearly 65 percent of TSMC’s sales, has long considered its dependency on TSMC unsafe. To buffer against the uncertainty, Washington has convinced the company to build a new $12 billion manufacturing plant in Arizona, which is expected to churn out 5nm wafers by 2024. 

 

NOTE: Danger ahead That is a scenario no one wants to see. “Frankly, they’re in a pretty good spot,” Schneider said. “So long as we don’t have World War III.”

"The reliance of the world’s No. 1 tech power on TSMC illustrates its unmatched market dominance in making advanced semiconductors, capacities that even China counts on to support its fast-growing digital economy.

“TSMC has clearly been the global leader in a very high-end commodity: advanced chips that the world needs to help all these other industries—aerospace, autos, electronic appliances, military equipment,” Dexter Roberts, a senior fellow at the Atlantic Council, told VICE World News. “Nobody wants to see TSMC hurt.”

✓ 1

www.vice.com

A Taiwanese Chip Giant Is Caught Between the US and China—and It’s Thriving

Rachel Cheung
8 - 11 minutes

When U.S. House Speaker Nancy Pelosi visited Taiwan in early August, she vowed support for the self-ruled democracy at a time when it seemed to need it. An increasingly powerful China, which claims Taiwan as its own territory, had sought to weaken the island’s international standing, and Chinese nationalists’ calls for an invasion had grown louder. By traveling to Taipei in defiance of Beijing’s protest, Pelosi said, she wanted to demonstrate the U.S.’ commitment to help Taiwan defend its freedom.


But it quickly became clear that the unofficial U.S.-Taiwan relationship was more than just the world’s dominant power backing its weaker partner in a choice, as Pelosi herself put it, “between autocracy and democracy.” ...

On Wednesday, Arizona’s governor, Doug Ducey, visited Taiwan in hopes of wooing suppliers for the facilities in his state. Last week, Indiana Gov. Eric Holcomb also went to Taiwan to promote academic and technological ties between the democratic island and the U.S. state.

But most of TSMC’s operations are still concentrated in its sprawling facilities near Taipei, where Pelosi rubbed shoulders with its executives. They discussed the newly passed CHIPS and Science Act, which offers $52 billion in subsidies for new chip manufacturing plants on American soil. TSMC is also expected to get a piece of the pie. . .

“Nobody can control TSMC by force,” TSMC chairman Mark Liu explained in a recent interview with CNN, noting that an invasion would render the sophisticated manufacturing facility “inoperable” as it depends on real-time connection with the rest of the world, including the U.S., Europe and Japan. “From materials, to chemicals, to spare parts, to engineering software diagnoses—it’s everybody’s effort to make this factory operable,” Liu said. 

China would shoot itself in the foot if it invades Taiwan ostensibly for the chips, Schneider said. “Its entire economy would be forced back to 1990s levels of microelectronics because the fallout from such an action would lead you to be cut off from the rest of the global semiconductor ecosystem.” 

TSMC and its chip industry has given Taiwan such political and economic leverage that it has been dubbed by some as a silicon shield. 

. . .

But as Beijing, stressing the historical mission of reunification, bears down on Taiwan, there are growing fears of a day when TSMC’s supremacy would not be sufficient to deter China. That would spell trouble not just for the company and the island but also for the rest of the world, which relies on its chips to function.


“The constant backdrop is the very ugly, scary possibility that there could be military hostilities in the Taiwan Strait,” Roberts said. “Then all bets are off. Economic concerns may temporarily be off the table and it may be about whose side are you on.”

TSMC going dark would deal a critical blow to the global economy, an impact more severe than the COVID-19 pandemic. Imagine Apple unable to launch its latest iPhone and Amazon losing its web services. “Maintaining the daily operation of the business world would become an impossible task,” CLSA’s Chen said.

That is a scenario no one wants to see. “Frankly, they’re in a pretty good spot,” Schneider said. “So long as we don’t have World War III.”

READ MORE

✓ 2 Tax Evasion; Don't do that 

www.vice.com

Washington, DC Sues Tech Billionaire For Allegedly Evading $25M in Taxes by Pretending to Live in Florida

6 - 7 minutes

On Wednesday, the District of Columbia’s Attorney General Karl A. Racine announced that his office is suing MicroStrategy executive chairman and Bitcoin-boosting billionaire Michael Saylor for alleged tax fraud. The District is also suing MicroStrategy for allegedly helping Saylor evade taxes on money earned while residing in DC.

Saylor co-founded the Virginia-based software company in 1989, but in recent years has turned his attention to Bitcoin. Saylor is one of the cryptocurrency's biggest boosters and has turned MicroStrategy essentially into a vehicle for investing in the price of Bitcoin. He claims to personally own nearly 18,000 bitcoins while MicroStrategy is sitting on another 129,699, according to an August SEC filing. 

The DC AG alleges that Saylor hasn't paid "any" income taxes to the District since he started living there in 2005, avoiding at least $25 million in taxes. 

The lawsuit is happening because of a recently-passed law called the False Claims Act, which empowers whistleblowers to come forward about alleged fraud against the government, and a whistleblowing realtor that came forward to claim Saylor failed to pay income taxes. Under the law, whistleblowers can be awarded up to 30 percent of the funds collected by the District. 

"Arguably the wealthiest person in the District—Forbes estimates his net worth at $2.3 billion— he has never paid a dime in District income tax," the whistleblower's complaint, filed by realtor Tributum in April but unsealed on Wednesday, states. 

After independently investigating the claims in the whistleblower's lawsuit—for example, that Saylor has in fact long been a resident of DC—the AG's office filed its own suit against Saylor and MicroStrategy, alleging that the company helped him evade taxes. . ."

READ MORE

✓ 3

Words Do Mean Something...Let's leave it at that

 


✓ 



Anti-Trust Scrutiny // DATA CENTER ALLEY HERE IN MESA...Potential for "Harmful Practice"

 WHOA! The European Commission continues its inquiry into Microsoft's business practices. CISPE, a European cloud provider group, which includes Amazon as one of its members, told Bloomberg in a statement this week that Microsoft's new system "not only fails to show any progress in addressing Microsoft's anti-competitivee behavior but may add new dependencies that further lock in customers and arbitrarily exclude cloud infrastructure providers."


arstechnica.com

Microsoft EU cloud revisions just so happen to exclude Google, Amazon

by Kevin Purdy - Aug 31, 2022 11:16am MST
4 - 5 minutes

Move to appease EU partners bars running MS apps on competitors' infrastructure.

Microsoft says its latest cloud licensing terms are meant to give customers more flexibility and cost control—just not on Amazon, Google, or Alibaba servers.

Getty Images

Facing European antitrust scrutiny, Microsoft has made it easier to virtualize its software on non-Microsoft cloud infrastructure—just so long as that infrastructure isn't owned by notable competitors Amazon, Google, or Alibaba.

The conflict, months in the making, is striking for a company that has largely avoided the antitrust scrutiny of its rivals, and eagerly sought to distance itself from the anti-competitive complaints and government actions that beset Microsoft in the late 1990s.

Microsoft outlined the changes that would take effect on October 1 in a blog post. Nicole Dezen, chief partner officer, wrote that Microsoft "believes in the value of the partner ecosystem" and changed outsourcing and hosting terms that "will benefit partners and customers globally."

New licensing terms would make it easier for Microsoft's enterprise customers to bring Microsoft software to non-Microsoft infrastructure and scale the cost and size of theirs or their customer's Microsoft systems on their own hardware, according to Dezen's post.

But Microsoft wants to be clear about something: Its Services Provider Licensing Agreement (SPLA) was meant for customers that are offering hosting "from their own data centers," not buying Microsoft licenses to "host on others' data centers." To "strengthen the hoster ecosystem," Dezen writes, Microsoft will remove the ability to outsource to Alibaba, Amazon Web Services, Google, Microsoft's Azure cloud,  or anybody using those companies as part of their hosting.

Amazon and Google have weighed in, and they do not believe Microsoft is showing its newer, less anti-competitive side.

"Microsoft is now doubling down on the same harmful practices by implementing even more restrictions in an unfair attempt to limit the competition it faces—rather than listening to its customers and restoring fair software licensing in the cloud for everyone," an Amazon spokesperson told Reuters...

 

Endpoint Detection and Response:

 Hold it - just a few (6-7 minutes) of your valuable time ...


The researchers presented their findings last week at the Hack in the Box security conference in Singapore. Nohl said EDR makers should focus on detecting malicious behavior more generically rather than triggering only on specific behavior of the most popular hacking tools, such as Cobalt Strike. This overfocus on specific behavior makes EDR evasion "too easy for hackers using more bespoke tooling," Nohl wrote.


arstechnica.com

Organizations are spending billions on malware defense that’s easy to bypass

by Dan Goodin - Aug 30, 2022 7:04 pm UTC
6 - 7 minutes 
 
Dan Goodin / Dan is the Security Editor at Ars Technica, which he joined in 2012 after working for The Register, the Associated Press, Bloomberg News, and other publications.
 
✓ "

Last year, organizations spent $2 billion on products that provide Endpoint Detection and Response, a relatively new type of security protection for detecting and blocking malware targeting network-connected devices. EDRs, as they're commonly called, represent a newer approach to malware detection. Static analysis, one of two more traditional methods, searches for suspicious signs in the DNA of a file itself. Dynamic analysis, the other more established method, runs untrusted code inside a secured "sandbox" to analyze what it does to confirm it's safe before allowing it to have full system access.

EDRs—which are forecasted to generate revenue of $18 billion by 2031 and are sold by dozens of security companies—take an entirely different approach. Rather than analyze the structure or execution of the code ahead of time, EDRs monitor the code's behavior as it runs inside a machine or network. In theory, it can shut down a ransomware attack in progress by detecting that a process executed on hundreds of machines in the past 15 minutes is encrypting files en masse. Unlike static and dynamic analyses, EDR is akin to a security guard that uses machine learning to keep tabs in real time on the activities inside a machine or network.

Nohl and Gimenez

Streamlining EDR evasion

Despite the buzz surrounding EDRs, new research suggests that the protection they provide isn't all that hard for skilled malware developers to circumvent. In fact, the researchers behind the study estimate EDR evasion adds only one additional week of development time to the typical infection of a large organizational network. That's because two fairly basic bypass techniques, particularly when combined, appear to work on most EDRs available in the industry.

"EDR evasion is well-documented, but more as a craft than a science," Karsten Nohl, chief scientist at Berlin-based SRLabs, wrote in an email. "What's new is the insight that combining several well-known techniques yields malware that evades all EDRs that we tested. This allows the hacker to streamline their EDR evasion efforts."

Both malicious and benign apps use code libraries to interact with the OS kernel. To do this, the libraries make a call directly to the kernel. EDRs work by interrupting this normal execution flow. Instead of calling the kernel, the library first calls the EDR, which then collects information about the program and its behavior. To interrupt this execution flow, EDRs partly overwrite the libraries with additional code known as "hooks."

Nohl and fellow SRLabs researcher Jorge Gimenez tested three widely used EDRs sold by Symantec, SentinelOne, and Microsoft, a sampling they believe fairly represents the offerings in the market as a whole. To the researchers' surprise, they found that all three were bypassed by using one or both of two fairly simple evasion techniques.

The techniques take aim at the hooks the EDRs use. The first method goes around the hook function and instead makes direct kernel system calls. While successful against all three EDRs tested, this hook avoidance has the potential to arouse the suspicion of some EDRs, so it's not foolproof.

Nohl and Gimenez

The second technique, when implemented in a dynamic link library file, also worked against all three EDRs. It involves using only fragments of the hooked functions to keep from triggering the hooks. To do this, the malware makes indirect system calls. (A third technique involving unhooking functions worked against one EDR but was too suspicious to fool the other two test subjects.)

Nohl and Gimenez

In a lab, the researchers packed two commonly used pieces of malware—one called Cobalt Strike and the other Silver—inside both an .exe and .dll file using each bypass technique. One of the EDRS—the researchers aren't identifying which one—failed to detect any of the samples. The other two EDRs failed to detect samples that came from the .dll file when they used either technique. For good measure, the researchers also tested a common antivirus solution.

Nohl and Gimenez

The researchers estimated that the typical baseline time required for the malware compromise of a major corporate or organizational network is about eight weeks by a team of four experts. While EDR evasion is believed to slow the process, the revelation that two relatively simple techniques can reliably bypass this protection means that the malware developers may not require much additional work as some might believe.

"Overall, EDRs are adding about 12 percent or one week of hacking effort when compromising a large corporation—judged from the typical execution time of a red team exercise," Nohl wrote..."

READ MORE

CYBER INSECURITIES: Data Breeches, Active Exploitations, Hacks, Flaws and Hidden Malware

 Let's start somewhere - in a place far far-away...Wow!


www.bleepingcomputer.com

Hackers hide malware in James Webb telescope images

Bill Toulas
7 - 9 minutes

Hackers hide malware in James Webb telescope images

"Threat analysts have spotted a new malware campaign dubbed ‘GO#WEBBFUSCATOR’ that relies on phishing emails, malicious documents, and space images from the James Webb telescope to spread malware.

The malware is written in Golang, a programming language that is gaining popularity among cybercriminals because it is cross-platform (Windows, Linux, Mac) and offers increased resistance to reverse engineering and analysis.

In the recent campaign discovered by researchers at Securonix, the threat actor drops payloads that are currently not marked as malicious by antivirus engines on the VirusTotal scanning platform..


During testing, Securonix observed the threat actors running arbitrary enumeration commands on its test systems, a standard first reconnaissance step.

The researchers note that the domains used for the campaign were registered recently, the oldest one on May 29, 2022.

Securonix has provided a set of indicators of compromise (IoCs) that includes both network and host-based indicators."

READ MORE


  • Google Chrome bug lets sites write to clipboard without asking

    Chrome version 104 accidentally introduced a bug that removes the user requirement to approve clipboard writing events from websites they visit.

  • Ragnar Locker ransomware claims attack on Portugal's flag airline

    The Ragnar Locker ransomware gang has claimed an attack on the flag carrier of Portugal, TAP Air Portugal, disclosed by the airline last Friday. 

  • Microsoft found TikTok Android flaw that let hackers hijack accounts

    Microsoft found and reported a high severity flaw in the TikTok Android app in February that allowed attackers to "quickly and quietly" take over accounts with one click by tricking targets into clicking a specially crafted malicious link.

  • Eliminate distractions while using the web with this $40 tool

    Refocus your attention when surfing the web with a five-year subscription to Control D, on sale for $39.99 or 66 percent off.

    • BleepingComputer Deals
    • August 31, 2022
    • 07:16 AM
    • Comment 0
  • Ukraine takes down cybercrime group hitting crypto fraud victims

    The National Police of Ukraine (NPU) took down a network of call centers used by a cybercrime group focused on financial scams and targeting victims of cryptocurrency scams under the guise of helping them recover their stolen funds.

  • Hackers hide malware in James Webb telescope images

    Threat analysts have spotted a new malware campaign dubbed 'GO#WEBBFUSCATOR' that relies on phishing emails, malicious documents, and space images from the James Webb telescope to spread malware.

  • Russian streaming platform confirms data breach affecting 7.5M users

    Russian media streaming platform 'START' (start.ru) has confirmed rumors of a data breach impacting millions of users.

  • Get a lifetime subscription to Babbel for just $199 until Sep 18

    If you want to learn a new language or two or three, then Babbel may be your best bet. And particularly right now since, for a very limited time, the cost of a lifetime subscription has dropped significantly to just $199.

    • BleepingComputer Deals
    • August 30, 2022
    • 02:17 PM
    • Comment 0
  • Chinese hackers target Australian govt with ScanBox malware

    China-based threat actors have been targeting Australian government agencies and wind turbine fleets in the South China Sea by directing select individuals to a fake impersonating an Australian news media outlet.

  • Microsoft Azure outage knocks Ubuntu VMs offline after buggy update

    Microsoft Azure customers' virtual machines (VMs) running Ubuntu 18.04 have been taken offline by an ongoing outage caused by a faulty systemd update.

  • Chrome extensions with 1.4 million installs steal browsing data

    Threat analysts at McAfee found five Google Chrome extensions that steal track users' browsing activity. Collectively, the extensions have been downloaded  more then 1.4  million times.

  • Cartoon Carousel The nation’s cartoonists on the week in politics | By POLITICO STAFF 01/23/2026 05:00 AM EST

    Every week political cartoonists throughout the country and across the political spectrum apply their ink-stained skills to capture the fo...