This is a private preprint server. Papers published here have not been published in any academic journals or certified by peer-review. Papers posted here may be used, attributed, or redistributed as long they are cited and unmodified. All papers © InterLinkedRxiv Preprints 2022. This repository has no affiliation with arXiv.
Jan 2022 Albert, N.
This essay discusses some of the historic and contemporary parallels and differences between public communications infrastructure – specifically, public telephones – and public transportation, with a focus on light rail in the United States.
Suggested Citation: Albert, N.: The Case for Public Communications Infrastructure (01/14/2022). Available at https://public.interlinked.us/5
Potential Strategies For Mitigating The Detrimental Effects of the Implementation of the National Suicide Hotline Designation Act of 2020
Oct 2020 Albert, N.
This open letter discusses potential strategies of mitigating negative impacts of the F.C.C. ordered implementation of 9-8-8 shortcode access and reviews their varying benefits and disadvantages and provides recommendations to the State of Wisconsin. This letter was reviewied by the head of the Wisconsin Public Service Commission, who responded with feedback and commentary on each potential solution. Due to the WI PSC's working load with scheduled dockets, the PSC ultimately declined to dedicate any resources towards mitigating impacts.
Suggested Citation: Albert, N.: Letter to Wisconsin Public Service Commission (10/27/2020). Available at https://public.interlinked.us/4
Whitepaper: Potential privilege escalation vulnerability via the file system when Lynx web browser is accessed through guest shell applications
Oct 2020 Albert, N.
This whitepaper discusses an unintended configuration-based (non-technical) vulnerability that allows guest users in a poorly secured shell application to exploit loose security restrictions in the Lynx text-based web browser to bypass security mechanisms and access sensitive system information, allowing malicious users to potentially obtain root access to a system and compromise the entire machine. The vulnerability stems from default security settings in the Lynx browser that allow full system access. The factors that allow a successful exploit to occur are discussed as well as several possible mitigations.
Suggested Citation: Albert, N. Whitepaper: Potential privilege escalation vulnerability via the file system when Lynx web browser is accessed through guest shell applications (10/11/2020). Available at https://public.interlinked.us/3
Whitepaper: Unintended lateral movement by privileged users through VoIP switches utilizing Centralized Directories for Interswitch Routing
Oct 2020 Albert, N.
This whitepaper discusses an unintended configuration-based (non-technical) vulnerability that allows privileged users of a peer-to-peer VoIP network relying on a centralized directory for the purposes of interswitch routing to move laterally from switches participating in the peer-to-peer network to private switches that do not necessarily have a public presence, which may be potentially undesired behavior. The vulnerability stems not from any particular technical vulnerabilities but from operational and configurational oversights. The most common attack vector is likely to be a variant of DNS rebinding attack. The factors that allow a successful exploit to occur are discussed as well as several possible mitigations.
Suggested Citation: Albert, N. Whitepaper: Unintended lateral movement by privileged users through VoIP switches utilizing Centralized Directories for Interswitch Routing (10/6/2020). Available at https://public.interlinked.us/2
Sep 2020 Albert, N.
We conduct surveys of the general populous in order to gauge current public sentiments with regards to telephone dialing habits and preferences. We analyze the results collected from these surveys in aggregate and compare them with each other. We observe that there continues to be a strong public favoring of traditional seven-digit dialing and that opposition to ten-digit dialing remains widespread. We additionally find that this continues to be the case in spite of proposals or implementations of public safety initiatives that have stipulated ten-digit dialing be required in certain circumstances. Our results concur with previous studies conducted in this domain that were conducted in the context of number relief, suggesting that historical trends, while potentially less pronounced than they once were, remain valid in the modern era.
Keywords: telecommunications, telephone dialing, landline telephony, wireline telephony, number relief
Suggested Citation: Albert, N. Public Telephone Dialing Habits and Preferences (9/24/2020). Available at https://public.interlinked.us/1