now browsing by tag
#schoolsafety | Culver School Board Receives Project Update – WKVI Information Center | #parenting | #parenting | #kids
Several projects are ongoing at the Culver Community School Corporation. Superintendent Karen Shuman gave an update to the school board on those projects on Monday night. “Our roofing project is […]
View full post on National Cyber Security
Not happy with your expensive iPhone and wondered if it’s possible to run any other operating system on your iPhone, maybe, how to install Android on an iPhone or Linux for iPhones?
Android phones can be rooted, and iPhones can be jailbroken to unlock new features, but so far, it’s been close to impossible to get Android running on iPhones, given the mobile device hardware constraints and software limitations.
However, it’s now possible to smoothly run Android on an iPhone—thanks to a new initiative, dubbed Project Sandcastle.
Undertaken by cybersecurity startup Corellium, Project Sandcastle is the consequence of a 13-year-long developmental effort to port Android to iOS and as well as demonstrate that Apple’s much-vaunted security barriers can indeed be compromised.
“Where sandboxes set limits and boundaries, sandcastles provide an opportunity to create something new from the limitless bounds of your imagination,” the project website says. “The iPhone restricts users to operate inside a sandbox. But when you buy an iPhone, you own the iPhone hardware.”
“Android for the iPhone gives you the freedom to run a different operating system on that hardware. Android for the iPhone has many exciting practical applications, from forensics research to dual-booting ephemeral devices to combatting e-waste.”
For now, only a handful of devices, the iPhone 7, the iPhone 7 Plus, and the iPod Touch, are capable of running a customized version of Android, which comes installed with OpenLauncher and the secure Signal messaging app.
Even then, there’re a lot of restrictions, including no support for audio output, cellular modem, Bluetooth, and camera, to name a few, as shown in the chart below.
All of this is only to say that Project Sandcastle is very much a work in progress.
The hack makes use of semi-tethered Checkra1n jailbreak to bypass restrictions, which is based on the checkm8 unpatchable bootrom exploit that makes it possible to gain deeper access to iOS.
It was initially released last November and works on the iPhone 5s to iPhone X, running iOS 12.3 and newer versions.
Jailbreaking — similar to rooting on Google’s Android — is a process to escalate privileges that allows iOS users to remove software restrictions imposed by Apple, thereby making it possible to bypass the company’s walled garden to add apps and other functions, including those from unofficial app stores.
The practice, it is to be noted, also voids your device’s warranty, as it’s a violation of Apple’s End User License Agreement that you agree to every time you purchase a new iPhone.
Furthermore, due to the inherent security risks involved, Apple has steadily imposed a hardware and software lockdown of its ecosystem and made it deliberately difficult to jailbreak devices.
Furthermore, jailbreaks tend to be very specific, and very much dependent on the phone and iOS version, in order for them to be successfully replicated.
The only problem is that Checkra1n is just a temporary jailbreak, and will get wiped out once the phone reboots.
While the jailbreak at first was only possible through macOS, it gained Linux support last month, opening up the possibility of performing a jailbreak via non-Apple devices.
Thus, using the checkra1n jailbreak exploit, the Correlium team found that it’s even possible to install a semi-working version of Android on an iPhone. The result is almost equivalent to running a temporary OS on your iPhone.
Correlium’s Project Sandcastle comes as Apple sued the company last year for alleged copyright infringement by selling iOS and device virtualization software, including virtual versions of iOS devices running what Apple calls unauthorized copies of iOS.
The development also follows Apple’s announcement last year that it will distribute special iPhones with root access that are less restrictive than their consumer counterparts for security research as part of a new iOS Security Research Device program.
While Project Sandcastle is a huge achievement, it goes without saying that jailbreaking and rooting devices come with their own risks.
The efforts are on to expand the project to the other iPhones included in the jailbreak. You can give the beta a shot by following the instructions here.
The post You Can Now Run Android on an iPhone With ‘Project Sandcastle’ appeared first on National Cyber Security.View full post on National Cyber Security
Editor’s Note: Will English, The Daily News’ web developer, was a part of the immersive learning class mentioned in the article.
For three years, Ball State computer science students have worked to make their field available to the next generation of computer scientists.
Since fall 2017, Ball State computer science professor Dave Largent and his students have partnered with Northside Middle School, Burris Laboratory School and Muncie Central High School for an immersive learning program focused around teaching computer hardware and software.
The program, Largent said, encourages involvement in computer science by teaching both students and teachers alike, so teachers can continue the instruction after the project’s completion.
“Overall, the goal would be to get as many grade school and high school students exposed to computer science as possible,” Largent said.
The original idea for the project, Largent said, was based on the idea of bringing more diversity to computer science, which he called “very white male dominated.”
“As I’ve looked at possible solutions to [the lack of diversity], one of the solutions I realized was if we can educate or make young students aware of the possibility that they can be a computer scientist in the future, then that’s going to fill that pipeline more diversity,” Largent said.
The groups of Ball State students participating in the project met several problems during the semester, including the fact that some Muncie Community Schools teachers had little to no experience in computer science, said project member Corbin Creedon, senior computer science major. Some of the biggest complications in the process involved getting teachers to open up to the learning themselves.
“Something that immediately came up for specifically our group is how our teacher had no computer science background at all,” Creedon said. “He was hired in the summer, took a quick week lesson plan from Project Lead the Way (PLTW) to learn some stuff, and that was it.”
Largent’s students were also challenged to interact with the middle and high schoolers over the course of several meetings throughout the semester, during which they taught the students in both the physical construction of computers and the creation of software.
Junior computer science major Sara Bailey said her experience as a woman in the field of computer science was an important part of wanting to work with younger students.
“I also liked working with kids, and I thought, the idea of helping kids, and especially girls like younger girls get into computer science was exciting, because personally, I know that I didn’t have that much support in middle school,” Bailey said.
Bailey and her group taught the students for nine weeks. At the culmination of the course, the students were asked to assemble a final project that showcased their understanding of computer science.
For the classes near the end of the semester, that meant designing holiday decorations.
“For these nine weeks because of Thanksgiving and Christmas, [the final projects are] primarily holiday based, so one of them was [to] create a small light system to be seen in the dark, or something like that, or create a waving Santa through [an input],” Creedon said.
Going forward, Largent said he hopes to implement the project beyond the fall semester of each year.
In an immersive learning project composed primarily of computer science students, Largent said lowering the number of credits and adding a spring semester could make the project more appealing to students outside of the field.
“[Adding the spring semester] will provide continuous interactions with the schools throughout the year,” Largent said in an email. “With the reduced credit hours, I’m hopeful to include more students, and maybe even include some education majors as well, as it will be easier for them to include another small class into their schedule.”
Contact John Lynch with comments at firstname.lastname@example.org or on Twitter @WritesLynch.
The post #deepweb | <p> Immersive learning project brings computer science to MCS <p> appeared first on National Cyber Security.
View full post on National Cyber Security
Source: National Cyber Security – Produced By Gregory Evans “The saddest part of this is that the response of the Times is simply to defend their project” An interview with historian Clayborne Carson on the New York Times’ 1619 Project By Tom Mackaman 15 January 2020 Clayborne Carson is Professor of History at Stanford […] View full post on AmIHackerProof.com
Historical interpretations are often contested, and those debates often reflect the perspective of the participants. To this day, the pro-Confederate “Lost Cause” intepretation of history shapes the mistaken perception that slavery was not the catalyst for the Civil War. For decades, a group of white historians known as the Dunning School, after the Columbia University historian William Archibald Dunning, portrayed Reconstruction as a tragic period of, in his words, the “scandalous misrule of the carpet-baggers and negroes,” brought on by the misguided enfranchisement of black men. As the historian Eric Foner has written, the Dunning School and its interpretation of Reconstruction helped provide moral and historical cover for the Jim Crow system.
In Black Reconstruction in America, W. E. B. Du Bois challenged the consensus of “white historians” who “ascribed the faults and failures of Reconstruction to Negro ignorance and corruption,” and offered what is now considered a more reliable account of the era as an imperfect but noble effort to build a multiracial democracy in the South.
To Wilentz, the failures of earlier scholarship don’t illustrate the danger of a monochromatic group of historians writing about the American past, but rather the risk that ideologues can hijack the narrative. “[It was] when the southern racists took over the historical profession that things changed, and W. E. B. Du Bois fought a very, very courageous fight against all of that,” Wilentz told me. The Dunning School, he said, was “not a white point of view; it’s a Southern, racist point of view.”
In the letter, Wilentz portrays the authors of the 1619 Project as ideologues as well. He implies—apparently based on a combative but ambiguous exchange between Hannah-Jones and the writer Wesley Yang on Twitter—that she had discounted objections raised by “white historians” since publication.
Hannah-Jones told me she was misinterpreted. “I rely heavily on the scholarship of historians no matter what race, and I would never discount the work of any historian because that person is white or any other race,” she told me. “I did respond to someone who was saying white scholars were afraid, and I think my point was that history is not objective. And that people who write history are not simply objective arbiters of facts, and that white scholars are no more objective than any other scholars, and that they can object to the framing and we can object to their framing as well.”
When I asked Wilentz about Hannah-Jones’s clarification, he was dismissive. “Fact and objectivity are the foundation of both honest journalism and honest history. And so to dismiss it, to say, ‘No, I’m not really talking about whites’—well, she did, and then she takes it back in those tweets and then says it’s about the inability of anybody to write objective history. That’s objectionable too,” Wilentz told me.
The post #deepweb | <p> Historians Clash With the 1619 Project <p> appeared first on National Cyber Security.
View full post on National Cyber Security
Overview Implements security measures to safeguard information and resources against accidental or unauthorized modification, destruction or disclosure. Tests security controls through internal compliance reviews to maintain validity of the data access environment. Respond to requests for creation or modification of system and application accounts. Assist in the management of departmental applications and systems for availability and compliance. Responsibilities Communicates and …
View full post on National Cyber Security Ventures
The IT Project Manager is responsible for the effective planning and management of IT projects to meet project commitments as well as communicating with sponsors, IT teams, customers, business teams, etc. This role will spend a significant amount of time …
View full post on National Cyber Security Ventures
Description Northrop Grumman Enterprise Project Management (EPM) is an industry-leading provider of Project Management services for internal Northrop Grumman Corporation information technology, infrastructure, and software development projects. Relocation benefits may be considered for this opportunity. The qualified applicant will … View full post on National Cyber Security Ventures hacker proof, #hackerproof
View full post on AmIHackerProof.com | Can You Be Hacked?
View full post on Education Week: Bullying
#pso #htcs #b4inc
The post New Mexico to invest more in early pre-K pilot project – Education Week appeared first on Parent Security Online.
View full post on Parent Security Online