Raspberry Pi 3 推出了 Model B+ 的新版本：「Raspberry Pi 3 Model B+ on sale now at $35」。
除了 CPU 速度稍微快一些以外，另外支援了 802.11ac/5Ghz 的無線網路 (官方宣稱可以跑到 ~102Mbps，相較於先前在 2.4Ghz 只能跑到 ~35Mbps)，以及更快的有線網路 (官方宣稱可以跑到 ~315Mbps，相較於先前的 ~95Mbps)。
Raspberry Pi 3B was our first product to support PXE Ethernet boot. Testing it in the wild shook out a number of compatibility issues with particular switches and traffic environments. Gordon has rolled up fixes for all known issues into the BCM2837B0 boot ROM, and PXE boot is now enabled by default.
以及支援 PoE 直接推動整台機器：
We use a magjack that supports Power over Ethernet (PoE), and bring the relevant signals to a new 4-pin header. We will shortly launch a PoE HAT which can generate the 5V necessary to power the Raspberry Pi from the 48V PoE supply.
Note that Raspberry Pi 3B+ does consume substantially more power than its predecessor. We strongly encourage you to use a high-quality 2.5A power supply, such as the official Raspberry Pi Universal Power Supply.
所以看到這張圖時就不意外了 XDDD (風扇！)
Update：風扇那張圖的產品頁看起來在「Raspberry Pi PoE HAT」這頁 (參考下面的 comment)。
看到用鋁箔紙改善無線網路死角的文章 XDDD：「How I amplified my home's Wi-Fi with aluminum foil.」。完成品長這個樣子：
I didn't see any difference in terms of coverage, it's still the same.
在「Randomize your WiFi MAC address on Ubuntu 16.04」這邊看到作者在介紹如何在 Ubuntu 上藉由改變無線網卡的 MAC address 保護自己的隱私：
Your device’s MAC address can be used to track you across the WiFi networks you connect to. That data can be shared and sold, and often identifies you as an individual. It’s possible to limit this tracking by using pseudo-random MAC addresses.
主要應該是給 Ubuntu 的筆電使用者用...
話說 WPA2 也撐了十三年了：
WPA2 became available in 2004 and is a common shorthand for the full IEEE 802.11i (or IEEE 802.11i-2004) standard.
這次的漏洞可以參考「Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping」這邊。
PoC 稱作 KRACK (Key Reinstallation Attacks)，漏洞將會在十一月正式發表，從會議的標題名稱大概可以知道方向，是對 Nonce 下手：「Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2」。另外站台 www.krackattacks.com 已經放好，等後續的發表更新了。
對於無線網路的各種漏洞，老方法還是目前最有效的方法，也是這次的 workaround 之一：上強度足夠的 VPN。
Update：補上論文「Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2」。
Project Loon 是 Alphabet (Google 的母公司) 透過熱氣球建立網路的計畫。
這次波多黎各災後已經好幾個禮拜了，但還是有大量的基地台還是不通。於是 Project Loon 從 FCC 得到實驗性的執照，建立行動網路：「Alphabet’s Internet balloons will try to restore cell service in Puerto Rico」。
Nearly 82 percent of cell sites in Puerto Rico and 57 percent in the US Virgin Islands are out of service, the FCC said in its daily damage report yesterday. In nearly all counties in Puerto Rico, more than 75 percent of cell sites are not working, and "22 out of the 78 counties in Puerto Rico have 100 percent of their cell sites out of service." Large percentages of residents are also without cable or wireline service.
在 FCC 的公告裡提到授權了 900Mhz 頻段：「FCC GRANTS EXPERIMENTAL LICENSE FOR PROJECT LOON TO OPERATE IN PUERTO RICO」(PDF 檔但是標題是「Microsoft Word」...)。
Project Loon obtained consent agreements to use land mobile radio (LMR) radio spectrum in the 900 MHz band from existing carriers operating within Puerto Rico.
不過由於要讓使用者可以使用現有的 SIM 卡連上網，需要當地電信業者的合作，Google 目前還沒完全確認：
Alphabet hasn't announced a schedule for providing service in Puerto Rico, and the company says it is still determining whether it will be able to help.
Project Loon must be integrated with the network of a cellular company in order to provide service, and Alphabet is “making solid progress on this next step," the spokesperson said. Project Loon is part of Alphabet's X division, formerly known as "Google X."
這次 iOS 11 的無線網路與藍芽需要到 Settings (設定) 裡面才能有效關掉的設計，讓 EFF 不爽寫了一篇文章：「iOS 11’s Misleading “Off-ish” Setting for Bluetooth and Wi-Fi is Bad for User Security」。
On an iPhone, users might instinctively swipe up to open Control Center and toggle Wi-Fi and Bluetooth off from the quick settings. Each icon switches from blue to gray, leading a user to reasonably believe they have been turned off—in other words, fully disabled. In iOS 10, that was true. However, in iOS 11, the same setting change no longer actually turns Wi-Fi or Bluetooth “off.”
Unroll 在旁邊燒的時候 (參考 Uber 戰火蔓延到 Unroll)，Bose 也不甘寂寞決定跟上科技業的潮流：「Bose headphones spy on listeners: lawsuit」。
Bose 直接將他們 app 收集到的資訊拿出來賣：
Bose Corp spies on its wireless headphone customers by using an app that tracks the music, podcasts and other audio they listen to, and violates their privacy rights by selling the information without permission, a lawsuit charged.
這次打算控告的產品包括這些 (這邊提到的 Zak 是原告)：
Zak is seeking millions of dollars of damages for buyers of headphones and speakers, including QuietComfort 35, QuietControl 30, SoundLink Around-Ear Wireless Headphones II, SoundLink Color II, SoundSport Wireless and SoundSport Pulse Wireless.
The case is Zak v Bose Corp, U.S. District Court, Northern District of Illinois, No. 17-02928.
在「About the security content of iOS 10.3.1」這邊的說明：
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: An attacker within range may be able to execute arbitrary code on the Wi-Fi chip
Description: A stack buffer overflow was addressed through improved input validation.
CVE-2017-6975: Gal Beniamini of Google Project Zero
Raspberry Pi Zero 本來是沒有網路功能的，對於 IoT 應用有點綁手綁腳，現在則出了加上無線網路與藍牙的版本，Zero W：「New product! Raspberry Pi Zero W joins the family」。
本來的 Zero 是 USD$5，有無線網路與藍牙的 Zero W 要 $10，然後也有出專用的殼：
歐盟法院 (The Court of Justice of the European Union) 認為公開無線網路的營運者不需要對使用者的侵權行為負責：「EU Court: Open WiFi Operator Not Liable For Pirate Users」。
不過這是有一些前提的，法院認為應該要符合這幾個要件，營運方才不要負責。基本上完全沒有 filter 限制的無線網路會符合這些條件：
The Court further notes that in order for such ‘mere conduit’ services to be exempt from third party liability, three cumulative conditions must be met:
– The provider must not have initiated the transmission
– It must not have selected the recipient of the transmission
– It must neither have selected nor modified the information contained in the transmission.
In an effort to strike a balance between protecting a service provider from third party liability and the rights of IP owners, the Court ruled that providers can be required to end infringement.
“[T]he directive does not preclude the copyright holder from seeking before a national authority or court to have such a service provider ordered to end, or prevent, any infringement of copyright committed by its customers,” the Court found.
One such measure could include the obtaining of an injunction which would force an operator to password-protect his open WiFi network in order to deter infringement.
On a more positive note, the Court rejected the notion of monitoring networks for infringement or taking more aggressive actions where unnecessary.
“[T]he directive expressly rules out the adoption of a measure to monitor information transmitted via a given network. Similarly, a measure consisting in terminating the internet connection completely without considering the adoption of measures less restrictive of the connection provider’s freedom to conduct a business would not be capable of reconciling the abovementioned conflicting rights,” the Court concludes.