Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Interview: Ask Christopher "moot" Poole About 4chan and Social Media

samzenpus posted 4 hours ago | from the go-ahead-and-ask dept.

Social Networks 146

Having started 4chan when he was 15, Christopher Poole, better known as "moot", is indirectly responsible for almost every meme you've ever seen. The group "Anonymous" originated on 4chan and has since engaged in a number of well-publicized publicity stunts and distributed denial-of-service attacks. Thanks to users gaming the system, moot was famously voted the world's most influential person of 2008 in an open internet poll conducted by Time magazine. He is an advocate of online anonymity and speaks on the importance of privacy online to foster creativity and open discussion. moot has agreed to answer your questions about 4chan, social media, and privacy. As usual, ask as many as you'd like, but please, one per post.

Tox, a Skype Replacement Built On 'Privacy First'

Soulskill posted yesterday | from the pet-rock-also-built-on-privacy-first dept.

Communications 168

An anonymous reader writes: Rumors of back door access to Skype have plagued the communication software for the better part of a decade. Even if it's not true, Skype is owned by Microsoft, which is beholden to data requests from law enforcement. Because of these issues, a group of developers started work on Tox, which aims to rebuild the functionality of Skype with an emphasis on privacy. "The main thing the Tox team is trying to do, besides provide encryption, is create a tool that requires no central servers whatsoever—not even ones that you would host yourself. It relies on the same technology that BitTorrent uses to provide direct connections between users, so there's no central hub to snoop on or take down."

Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos

samzenpus posted yesterday | from the gates-are-open dept.

Privacy 295

swinferno writes with news about the leak of hundreds of private celebrity photos over the weekend. Hundreds of revealing pictures of female celebrities were leaked overnight after being stolen from their private collections. Hunger Games actress Jennifer Lawrence, Kirsten Dunst, and pop star Ariana Grande were among the celebrities apparently shown in the pictures, which were posted on infamous web forum 4chan. It's unclear how the images were obtained, but anonymous 4chan users said that they were taken from celebrities' iCloud accounts. The accounts are designed to allow iPhone, iPad, and Mac users to synchronize images, settings, calendar information, and other data between devices, but the service has been criticized for being unreliable and confusing. Earlier this year, Jennifer Lawrence herself complained about the service in an interview with MTV.

Microsoft Defies Court Order, Will Not Give Emails To US Government

Soulskill posted 2 days ago | from the you-didn't-say-pretty-please dept.

Microsoft 403

schwit1 sends this excerpt from a report about Microsoft: Despite a federal court order directing Microsoft to turn overseas-held email data to federal authorities, the software giant said Friday it will continue to withhold that information as it waits for the case to wind through the appeals process. The judge has now ordered both Microsoft and federal prosecutors to advise her how to proceed by next Friday, September 5.

Let there be no doubt that Microsoft's actions in this controversial case are customer-centric. The firm isn't just standing up to the US government on moral principles. It's now defying a federal court order. "Microsoft will not be turning over the email and plans to appeal," a Microsoft statement notes. "Everyone agrees this case can and will proceed to the appeals court. This is simply about finding the appropriate procedure for that to happen."

Judge Allows L.A. Cops To Keep License Plate Reader Data Secret

Soulskill posted 3 days ago | from the you-can-trust-us dept.

Privacy 108

An anonymous reader writes: A Los Angeles Superior Court judge has ruled that the Los Angeles Police Department is not required to hand over a week's worth of license plate reader data to the American Civil Liberties Union (ACLU) and the Electronic Frontier Foundation (EFF). He cited the potential of compromising criminal investigations and giving (un-charged) criminals the ability to determine whether or not they were being targeted by law enforcement (PDF). The ACLU and the EFF sought the data under the California Public Records Act, but the judge invoked Section 6254(f), "which protects investigatory files." ACLU attorney Peter Bibring notes, "New surveillance techniques may function better if people don't know about them, but that kind of secrecy is inconsistent with democratic policing."

The Executive Order That Led To Mass Spying, As Told By NSA Alumni

samzenpus posted 4 days ago | from the I-see-you dept.

United States 180

An anonymous reader writes with this Ars piece about the executive order that is the legal basis for the U.S. government's mass spying on citizens. One thing sits at the heart of what many consider a surveillance state within the US today. The problem does not begin with political systems that discourage transparency or technologies that can intercept everyday communications without notice. Like everything else in Washington, there's a legal basis for what many believe is extreme government overreach—in this case, it's Executive Order 12333, issued in 1981. “12333 is used to target foreigners abroad, and collection happens outside the US," whistleblower John Tye, a former State Department official, told Ars recently. "My complaint is not that they’re using it to target Americans, my complaint is that the volume of incidental collection on US persons is unconstitutional.” The document, known in government circles as "twelve triple three," gives incredible leeway to intelligence agencies sweeping up vast quantities of Americans' data. That data ranges from e-mail content to Facebook messages, from Skype chats to practically anything that passes over the Internet on an incidental basis. In other words, EO 12333 protects the tangential collection of Americans' data even when Americans aren't specifically targeted—otherwise it would be forbidden under the Foreign Intelligence Surveillance Act (FISA) of 1978.

Mozilla Rolls Out Sponsored Tiles To Firefox Nightly's New Tab Page

timothy posted 5 days ago | from the now-how-much-would-you-pay? dept.

Firefox 171

An anonymous reader writes Mozilla has rolled out directory tiles, the company's advertising experiment for its browser's new tab page, to the Firefox Nightly channel. We installed the latest browser build to give the sponsored ads a test drive. When you first launch Firefox, a message on the new tab page informs you of the following: what tiles are (with a link to a support page about how sponsored tiles work), a promise that the feature abides by the Mozilla Privacy Policy, and a reminder that you can turn tiles off completely and choose to have a blank new tab page. It's quite a lot to take in all at once.

DoT Proposes Mandating Vehicle-To-Vehicle Communications

Soulskill posted about a week ago | from the car-talk dept.

Transportation 261

schwit1 sends word that the Dept. of Transportation's National Highway Traffic Safety Administration has given notice of a proposal (PDF) for a new car safety standard that would require vehicle-to-vehicle communication equipment in all new passenger cars and light trucks. The NHTSA thinks this will facilitate the development of new safety software for vehicles. They estimate it could prevent over 500,000 crashes (PDF) each year. "Some crash warning V2V applications, like Intersection Movement Assist and Left Turn Assist, rely on V2V-based messages to obtain information to detect and then warn drivers of possible safety risks in situations where other technologies have less capability. ... NHTSA believes that V2V capability will not develop absent regulation, because there would not be any immediate safety benefits for consumers who are early adopters of V2V." The submitter notes that this V2V communication would include transmission of a vehicle's location, which comes with privacy concerns.

850 Billion NSA Surveillance Records Searchable By Domestic Law Enforcement

Unknown Lamer posted about a week ago | from the you're-a-criminal dept.

Privacy 207

onproton (3434437) writes The Intercept reported today on classified documents revealing that the NSA has built its own "Google-like" search engine to provide over 850 billion collected records directly to law enforcement agencies, including the FBI and the DEA. Reporter Ryan Gallagher explains, "The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies." The search engine, called ICREACH, allows analysts to search an array of databases, some of which contain metadata collected on innocent American citizens, for the purposes of "foreign intelligence." However, questions have been raised over its potential for abuse in what is known as "parallel construction," a process in which agencies use surveillance resources in domestic investigations, and then later cover it up by creating a different evidence trail to use in court.

Systems That Can Secretly Track Where Cellphone Users Go Around the Globe

samzenpus posted about a week ago | from the oh-watching-the-places-you'll-go dept.

Businesses 76

cold fjord writes with this story about the proliferation of companies willing to sell tracking information and systems. Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people's travels over days, weeks or longer ... It is unclear which governments have acquired these tracking systems, but one industry official ... said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. "Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world," said Eric King, deputy director of Privacy International.

Airbnb To Hand Over Data On 124 Hosts To New York Attorney General

Soulskill posted about a week ago | from the quasi-legal-operations-sometimes-have-consequences dept.

Businesses 149

Peer-to-peer lodging service Airbnb has agreed to hand over data on 124 of its hosts in New York as part of an investigation by the state's Attorney General into the operation of illegal hotels. The AG first requested data for almost all of Airbnb's hosts in the state, but after "legal wrangling," that number was whittled down to the current 124. The data in question will be unredacted personal information, meaning names and addresses. In a blog post, Airbnb's David Hantman said, "nothing about these hosting profiles suggests [the Attorney General] is after anyone but individuals who may be flagrantly misusing our platform." Airbnb is confident that the targets of this request are hosts considered to be "bad actors," but they don't explain what classifies somebody as a "bad actor."

Sources Say Amazon Will Soon Be Targeting Ads, a la Google AdWords

timothy posted about two weeks ago | from the cookies-are-delicious dept.

Google 83

According to The Register (citing a paywalled WSJ article), a new face in targeted ads is emerging (according to "people familiar with the matter") to compete with Google, and it's Amazon. They already have a vast, mineable collection of data about customers' buying, listening and viewing habits, so exploiting personalized ads seems a natural follow-on. According to the report, the ad system would replace Google as ad vendor on Amazon itself, and "It is also apparently hoping to beef up its ad placement business on other sites as part of Amazon's strategy to carve its way into Google's multi-billion-dollar AdWords' empire." Pretty soon Amazon will able to just save me time by ordering the things I would have ordered based on ads that they themselves have placed.

NSA Agents Leak Tor Bugs To Developers

Soulskill posted about two weeks ago | from the right-hand-thinks-the-left-hand-is-a-jerk dept.

Encryption 116

An anonymous reader writes: We've known for a while that NSA specifically targets Tor, because they want to disrupt one of the last remaining communication methods they aren't able to tap or demand access to. However, not everybody at the NSA is on board with this strategy. Tor developer Andrew Lewman says even as flaws in Tor are rooted out by the NSA and British counterpart GCHQ, other agents from the two organizations leak those flaws directly to the developers, so they can be fixed quickly. He said, "You have to think about the type of people who would be able to do this and have the expertise and time to read Tor source code from scratch for hours, for weeks, for months, and find and elucidate these super-subtle bugs or other things that they probably don't get to see in most commercial software." Lewman estimates the Tor Project receives these reports on a monthly basis. He also spoke about how a growing amount of users will affect Tor. He suggests a massive company like Google or Facebook will eventually have to take up the task of making Tor scale up to millions of users.

Tor Browser Security Under Scrutiny

Soulskill posted about two weeks ago | from the shouldn't-we-be-funding-this-better dept.

Encryption 80

msm1267 writes: The keepers of Tor commissioned a study testing the defenses and viability of their Firefox-based browser as a privacy tool. The results (PDF) were a bit eye-opening since the report's recommendations don't favor Firefox as a baseline for Tor, rather Google Chrome. But Tor's handlers concede that budget constraints and Chrome's limitations on proxy support make a switch or a fork impossible.

Your Phone Can Be Snooped On Using Its Gyroscope

Unknown Lamer posted about two weeks ago | from the phone-can-be-snooped-on-by-everything dept.

Cellphones 96

stephendavion (2872091) writes Researchers will demonstrate the process used to spy on smartphones using gyroscopes at Usenix Security event on August 22, 2014. Researchers from Stanford and a defense research group at Rafael will demonstrate a way to spy on smartphones using gyroscopes at Usenix Security event on August 22, 2014. According to the "Gyrophone: Recognizing Speech From Gyroscope Signals" study, the gyroscopes integrated into smartphones were sensitive enough to enable some sound waves to be picked up, transforming them into crude microphones.

German Intelligence Spying On Allies, Recorded Kerry, Clinton, and Kofi Annan

Soulskill posted about two weeks ago | from the turnabout-is-fairly-played-out dept.

Government 170

cold fjord writes: According to Foreign Policy, "The revelation that Germany spies on Turkey, a NATO member, should dispel any notion that spying on allies violates the unwritten rules of international espionage. ... For nearly a year, the extent of NSA surveillance on German leaders ... has drawn stern rebuke from the German political and media establishment. ... Merkel went so far as to publicly oust the CIA station chief in Berlin. 'Spying among friends is not at all acceptable,' Merkel said. ... [C]alls made by Secretary of State John Kerry and former Secretary of State Hillary Clinton were accidentally recorded. ... 'It's a kind of delightful revelation given the fact that the Germans have been on their high horse.' Christian Whiton, a former ... State Department senior advisor, added that the report on German spying is a perfect example of why rifts over intelligence among allies should be handled quietly and privately." The Wall Street Journal adds, "Cem Özdemir, the head of the Green party and a leading German politician of Turkish descent, told Spiegel Online it would be 'irresponsible' for German spies not to target Turkey given its location as a transit country for Islamic State militants from Europe." Further details at Spiegel Online and The Wall Street Journal."

Phoenix Introduces Draft Ordinance To Criminalize Certain Drone Uses

Soulskill posted about two weeks ago | from the no-using-drones-to-attack-mexico dept.

Crime 199

Fubar writes: Two city council members from Phoenix, AZ are introducing "draft language" for public discussion that would make it illegal to use a drone to film people without their knowledge. The council members are worred about privacy of people in their own yards, even including the requirement that law enforcement obtain a warrant for drone surveillance. A violation of the ordinance would be a Class 1 misdemeanor, which carries up to a $2,500 fine and six months in jail.

Why Chinese Hackers Would Want US Hospital Patient Data

timothy posted about two weeks ago | from the makes-great-gift-wrapping-too dept.

China 171

itwbennett (1594911) writes In a follow-up to yesterday's story about the Chinese hackers who stole hospital data of 4.5 million patients, IDG News Service's Martyn Williams set out to learn why the data, which didn't include credit card information, was so valuable. The answer is depressingly simple: people without health insurance can potentially get treatment by using medical data of one of the hacking victims. John Halamka, chief information officer of the Beth Israel Deaconess Medical Center and chairman of the New England Healthcare Exchange Network, said a medical record can be worth between $50 and $250 to the right customer — many times more than the amount typically paid for a credit card number, or the cents paid for a user name and password. "If I am one of the 50 million Americans who are uninsured ... and I need a million-dollar heart transplant, for $250 I can get a complete medical record including insurance company details," he said.

Hackers Steal Data Of 4.5 Million US Hospital Patients

Unknown Lamer posted about two weeks ago | from the security-through-whoops dept.

Security 111

itwbennett (1594911) writes Community Health Systems said the attack occurred in April and June of this year, but it wasn't until July that it determined the theft had taken place. Working with a computer security company, it determined the attack was carried out by a group based in China that used 'highly sophisticated malware' to attack its systems. The hackers got away with patient names, addresses, birthdates, telephone numbers and Social Security numbers of the 4.5 million people who were referred to or received services from doctors affiliated with the company in the last five years. The stolen data did not include patient credit card, medical, or clinical information.

EFF's Cell Phone Guide For US Protesters

Soulskill posted about two weeks ago | from the do-not-use-your-cell-phone-as-a-projectile-weapon dept.

Electronic Frontier Foundation 82

An anonymous reader writes: The Electronic Frontier Foundation has updated its guide for protecting yourself and your cell phone at a protest. In addition to being extremely powerful tools (real-time communication to many watchers via social media, and video recording functionality), cell phones can also give authorities a lot of information about you if they confiscate it. The EFF is trying to encourage cell phone use and prepare people to use them. (The guide is based on U.S. laws, but much of the advice makes sense for other places as well.) Here are a few small snippets: "Start using encrypted communications channels. Text messages, as a rule, can be read and stored by your phone company or by surveillance equipment in the area. ... If the police ask to see your phone, tell them you do not consent to the search of your device. Again, since the Supreme Court's decision in Riley, there is little question that officers need a warrant to access the contents of your phone incident to arrest, though they may be able to seize the phone and get a warrant later. ... If your phone or electronic device was seized, and is not promptly returned when you are released, you can file a motion with the court to have your property returned."

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>