|
US Wants Its Own Secure and Self-Destructing Messaging App -- And It's Willing to Pay |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
US Wants Its Own Secure and Self-Destructing Messaging App -- And It's Willing to Pay Par Slashdot Your Rights OnlineLe [2016-04-25] à 20:27:12
Présentation : Long time reader schwit1 writes The Defense Advanced Research Projects Agency DARPA , an agency within the Department of Defense historically known for creating the Internet itself, has published a call for companies to submit proposals to build a robust messaging platform that the military could use for secure communication of everything from intelligence to procurement contracts. Troops on the ground in denied communications environments would have a way to securely communicate back to HQ and DoD back office executives could rest assured that their logistics system is efficient, timely and safe from hackers, according to the DARPA proposal. The request for proposals, reported earlier by the UK's Telegraph outlet, also says that the messaging platform should incorporate a customized blockchain, the distributed ledger technology that underpins the digital currency bitcoin, for recording messages and contract information. The proposal says such a distributed ledger would allow the military to conduct its business in a more efficient and secure fashion.Motherboard's Lorenzo Franceschi-Bicchierai reports that DARPA is willing to pay people to make this app. This project falls under the rules of the Small Business Technology Transfer STTR program. During the first phase, according to the program's rules, successful applicants might be awarded no more than 150,000 for one year. The companies and researchers who are part of phase one can then be eligible for a phase two award of up to 1 million for two years. Lastly, during phase three, the company or companies can pursue commercialization, and receive no funds from the federal government. Share on Google Read more of this story at Slashdot.
Les derniers articles du site "Slashdot Your Rights Online" :
- FBI Director Suggests iPhone Hacking Method May Remain Secret - City Installs Traffic Lights In Sidewalks For Smartphone Users - Tesla Will Install More Energy Storage With SolarCity In 2016 Than The US Installed In 2015 - Symantec Cruz and Kasich Campaign Apps May Expose Sensitive Data - New 'Tunneling' State of Water Molecules Discovered by Scientists - Your Pay Is About To Go Up - Software Audits How High-Tech Software Vendors Play Hardball - Swedish ISP Vows to Protect Users From a Piracy Witch Hunt - US Wants Its Own Secure and Self-Destructing Messaging App -- And It's Willing to Pay - Spy Chief Complains That Edward Snowden Sped Up Spread of Encryption By 7 Years
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|