China to slap additional tariffs on $16 bln worth of U.S. goods

Stock alert… short Walmart and most US retailers, LOL!

BEIJING/WASHINGTON, Aug 8 (Reuters) – China is slapping additional tariffs of 25 percent on $16 billion worth of U.S. imports from fuel and steel products to autos and medical equipment, the Chinese commerce ministry said, as the world’s largest economies escalated their trade dispute.

The tariffs will be activated on Aug. 23, the ministry said, the same day that the United States plans to begin collecting 25 percent extra in tariffs on $16 billion of Chinese goods.

The United States published its final list of goods subject to the new tariffs on Tuesday.

China’s final list announced on Wednesday differs from an earlier draft it published in June, which included crude oil. The number of categories of goods subject to tariffs rose to 333 from 114 in the June draft, although the total value is unchanged.

The U.S. action that prompted the Chinese retaliation was the latest by President Donald Trump to put pressure on China to negotiate trade concessions, after Washington imposed tariffs on $34 billion in goods last month. China has vowed to retaliate with equivalent tariffs against any U.S. action.

“This is a very unreasonable practice,” the Chinese commerce ministry said of the U.S. action on Wednesday as it rolled out China’s counter-tariffs.

To compensate for the gap on its tariff list caused by the exclusion of crude oil, China added fish meal, wood waste, paper and paper waste, metal scraps, and various types of bicycles and cars, among other products.

China media praises tone, outcome of Trump-Xi summit
U.S. President Donald Trump and China’s President Xi Jinping arrive at a state dinner at the Great Hall of the People in Beijing on November 9, 2017.
More

Last week, China proposed additional tariffs on another $60 billion of U.S. goods after Trump raised planned tariffs on $200 billion worth of Chinese imports to 25 percent from 10 percent.

So far, China has now either imposed or proposed tariffs on $110 billion of U.S. goods, representing the vast majority of its annual imports of American products. Big-ticket U.S. items that are still not on any list are crude oil and large aircraft.

A spokeswoman for the U.S. Trade Representative’s office could not immediately be reached for comment on China’s retaliation announcement or whether this would trigger Trump’s next round of threatened tariffs on $200 billion worth of Chinese goods.

USTR is conducting a public comment period for those tariffs, which could reach 25 percent, due to end Sept. 5. It would take a few more weeks to revise the list and make programming changes at U.S. Customs and Border Protection to begin collecting the duties.

Gary Hufbauer, a senior fellow and trade expert at the Peterson Institute for International Economics in Washington, said he expected that there would be little to stop further escalation of the U.S.-China tariff war as both sides dig into entrenched positions.

“My expectation is that U.S. tariffs on $250 billion of imports from China will be in effect about a month prior to the November U.S. elections. That’s soon enough to be used by Trump as a rallying argument, but late enough so that adverse effects will not occur before January 2019. Of course, China will retaliate, probably dollar for dollar,” Hufbauer said.

China, however, would run out of U.S. imports to levy, as it bought only $130 billion worth of American goods last year. It would likely have to impose penalties on U.S. companies doing business in China to make up the difference.

(Reporting by Ryan Woo in Beijing and David Lawder in Washington, D.C; Additional reporting by Stella Qiu in Beijing, Brenda Goh in Shanghai, Lee Chyen Yee in Singapore and Twinnie Siu in Hong Kong and Susan Heavey in Washington, D.C.; Editing by Clarence Fernandez and Catherine Evans)

Hacker News: How to Hack WiFi Password Easily Using New Attack On WPA/WPA2

how to hack wifi password software free download

Looking for how to hack WiFi password OR WiFi hacking software?

Well, a security researcher has revealed a new WiFi hacking technique that makes it easier for hackers to crack WiFi passwords of most modern routers.

Discovered by the lead developer of the popular password-cracking tool Hashcat, Jens ‘Atom’ Steube, the new WiFi hack works explicitly against WPA/WPA2 wireless network protocols with Pairwise Master Key Identifier (PMKID)-based roaming features enabled.

The attack to compromise the WPA/WPA2 enabled WiFi networks was accidentally discovered by Steube while he was analyzing the newly-launched WPA3 security standard.

This new WiFi hacking method could potentially allow attackers to recover the Pre-shared Key (PSK) login passwords, allowing them to hack into your Wi-Fi network and eavesdrop on the Internet communications.

How to Hack WiFi Password Using PMKID

how to hack wifi password software

According to the researcher, the previously known WiFi hacking methods require attackers to wait for someone to log into a network and capture a full 4-way authentication handshake of EAPOL, which is a network port authentication protocol.

Whereas, the new attack no longer requires another user to be on the target network to capture credentials. Instead, it is performed on the RSN IE (Robust Security Network Information Element) using a single EAPOL (Extensible Authentication Protocol over LAN) frame after requesting it from the access point.

Also Read: How to Hack WPA2 WiFi Protocol Using KRACK Attack

Robust Security Network is a protocol for establishing secure communications over an 802.11 wireless network and has PMKID, the key needed to establish a connection between a client and an access point, as one of its capabilities.

Step 1 — An attacker can use a tool, like hcxdumptool (v4.2.0 or higher), to request the PMKID from the targeted access point and dump the received frame to a file.

$ ./hcxdumptool -o test.pcapng -i wlp39s0f3u4u5 –enable_status

Step 2 — Using the hcxpcaptool tool, the output (in pcapng format) of the frame can then be converted into a hash format accepted by Hashcat.

$ ./hcxpcaptool -z test.16800 test.pcapng

Step 3 — Use Hashcat (v4.2.0 or higher) password cracking tool to obtain the WPA PSK (Pre-Shared Key) password, and Bingo!

$ ./hashcat -m 16800 test.16800 -a 3 -w 3 ‘?l?l?l?l?l?lt!’

That’s the password of the target wireless network, cracking which may take time depending on its length and complexity.

“At this time, we do not know for which vendors or for how many routers this technique will work, but we think it will work against all 802.11i/p/q/r networks with roaming functions enabled (most modern routers),” Steube said.

Since the new WiFi hack only works against networks with roaming functions enabled and requires attackers to brute force the password, users are recommended to protect their WiFi network with a secure password that’s difficult to crack.

This WiFi hack also does not work against next-generation wireless security protocol WPA3, since the new protocol is “much harder to attack because of its modern key establishment protocol called “Simultaneous Authentication of Equals” (SAE).”

Also Check: Wi-Fi Hacking and Penetration Testing From Scratch Training Course.

Have something to say about this article? Comment below or share it with us on FacebookTwitter or our LinkedIn Group.
%d bloggers like this: