Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

UK ISP Filter Will Censor More Than Porn

wabrandsma Re:Who will make the list? (329 comments)

The net filtering system praised by David Cameron is controlled by the controversial Chinese company Huawei, the BBC has learned.
UK-based employees at the firm are able to decide which sites TalkTalk's net filtering service blocks.

Initially, TalkTalk told the BBC that it was US security firm Symantec that was responsible for maintaining its blacklist, and that Huawei only provided the hardware, as previously reported.
However, Symantec said that while it had been in a joint venture with Huawei to run Homesafe in its early stages, it had not been involved for over a year.

TalkTalk later confirmed it is Huawei that monitors activity, checking requests against its blacklist of over 65 million web addresses, and denying access if there is a match.
The contents of this list are largely determined by an automated process, but both Huawei and TalkTalk employees are able to add or remove sites independently.

about a year ago
top

Researcher Evan Booth: How To Weaponize Tax-Free Airport Goods

wabrandsma What Israeli Airport Security Teaches the World (288 comments)

Once again, the Israelis have led the way.

Much of Tel Aviv’s Ben Gurion airport’s security protocol is achieved through a combination of comprehensive due diligence, common sense, and consistency – which, one would think would be the objective of airport authorities throughout the world. If more airport authorities were to adopt Ben Gurion’s approach, surely it would be more difficult for those intending to do harm to succeed.

http://www.internationalpolicydigest.org/2012/06/19/what-israeli-airport-security-teaches-the-world/

about a year and a half ago
top

Dutch Gov't Offers Guidance For Responsible Disclosure Practices

wabrandsma Directive ethical hacking solves nothing (37 comments)

The problem is that the definition for hacking is overly broad. If you enter an URL in the address bar, and change just a serial number in the URL, it is considered hacking. Like finding Queen Beatrix's Christmas speech before it was officially published http://www.nrc.nl/nieuws/2012/12/25/hacker-kersttoespraak-van-geen-kwaad-bewust-tijdens-strafbare-actie/ (in Dutch). Or proving access to medical files by MP Henk Krol http://nos.nl/artikel/447718-krol-vervolgd-om-hacken-dossiers.html (in Dutch).
IT journalist Brenno de Winter calls the guidance useless. "If hackers first have to report the vulnerability, they lose their anonymity without having a guarantee that they will not be prosecuted. And even if a company promises that it will not press charges, the Public Prosecutions Department can start a case." Link here: http://www.trouw.nl/tr/nl/5133/Media-technologie/article/detail/3372108/2013/01/04/Richtlijn-ethisch-hacken-lost-niets-op.dhtml (in Dutch).

about a year and a half ago
top

Ask Slashdot: Do You Find Self Tracking Useful Like Stephen Wolfram Does?

wabrandsma No (139 comments)

Self Tracking could, and thus will be influenced by the observer. With targeted ads I guess.

more than 2 years ago
top

Ask Slashdot: Dividing Digital Assets In Divorce?

wabrandsma Re:Simple... (458 comments)

You get all the 1's - she gets all the 0's

How do you divide the qubits?

more than 2 years ago

Submissions

top

Hong Kong protesters use a mesh network to organise

wabrandsma wabrandsma writes  |  2 days ago

wabrandsma (2551008) writes "from New Scientist:

Hong Kong's mass protest is networked. Activists are relying on a free app that can send messages without any cellphone connection.

Since the pro-democracy protests turned ugly over the weekend, many worry that the Chinese government would block local phone networks.

In response, activists have turned to the FireChat app to send supportive messages and share the latest news. On Sunday alone, the app was downloaded more than 100,000 times in Hong Kong, its developers said. FireChat relies on "mesh networking", a technique that allows data to zip directly from one phone to another via Wi-Fi or Bluetooth. Ordinarily, if two people want to communicate this way, they need to be fairly close together. But as more people join in, the network grows and messages can travel further.

Mesh networks can be useful for people who are caught in natural disasters or, like those in Hong Kong, protesting under tricky conditions. FireChat came in handy for protesters in Taiwan and Iraq this year."

Link to Original Source
top

DuckDuckGo joins Google in being blocked in China

wabrandsma wabrandsma writes  |  about two weeks ago

wabrandsma (2551008) writes "from Tech in Asia:

Privacy-oriented search engine DuckDuckGo is now blocked in China. On Sunday DuckDuckGo founder and CEO Gabriel Weinberg confirmed to Tech in Asia that the team has noticed the blockage in China on Twitter

Weinberg added that he has “no idea” when it happened exactly. We also cannot pinpoint an exact date, but it was accessible in China earlier in the summer. DuckDuckGo had been working fine in mainland China since its inception, aside from the occasional ‘connection reset’ experienced when accessing many overseas websites from within the country. But now the search engine is totally blocked in China. (Update 7 hours after publishing: the GreatFire index of blocked sites suggest that DuckDuckGo got whacked on September 4).

DuckDuckGo joins Google in being censored and blocked in the nation. Google, after years of being throttled by China’s Great Firewall since the web giant turned off its mainland China servers in 2010, was finally blocked totally in June this year."

Link to Original Source
top

Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

wabrandsma wabrandsma writes  |  about two weeks ago

wabrandsma (2551008) writes "from Wired:

The National Security Agency has some of the brightest minds working on its sophisticated surveillance programs, including its metadata collection efforts. But a new chat program designed by a middle-school dropout in his spare time may turn out to be one of the best solutions to thwart those efforts.

John Brooks, who is just 22 and a self-taught coder who dropped out of school at 13, was always concerned about privacy and civil liberties. Four years ago he began work on a program for encrypted instant messaging that uses Tor hidden services for the protected transmission of communications. The program, which he dubbed Ricochet, began as a hobby. But by the time he finished, he had a full-fledged desktop client that was easy to use, offered anonymity and encryption, and even resolved the issue of metadata—the “to” and “from” headers and IP addresses spy agencies use to identify and track communications—long before the public was aware that the NSA was routinely collecting metadata in bulk for its spy programs. The only problem Brooks had with the program was that few people were interested in using it. Although he’d made Ricochet’s code open source, Brooks never had it formally audited for security and did nothing to promote it, so few people even knew about it.

Then the Snowden leaks happened and metadata made headlines. Brooks realized he already had a solution that resolved a problem everyone else was suddenly scrambling to fix. Though ordinary encrypted email and instant messaging protect the contents of communications, metadata allows authorities to map relationships between communicants and subpoena service providers for subscriber information that can help unmask whistleblowers, journalists’s sources and others."

Link to Original Source
top

Google's Doubleclick ad servers exposed millions of computers to malware

wabrandsma wabrandsma writes  |  about two weeks ago

wabrandsma (2551008) writes "from The Verge:
Last night, researchers at Malwarebytes noticed strange behavior on sites like Last.fm, The Times of Israel and The Jerusalem Post. Ads on the sites were being unusually aggressive, setting off anti-virus warnings and raising flags in a number of Malwarebytes systems. After some digging, researcher Jerome Segura realized the problem was coming from Google's DoubleClick ad servers and the popular Zedo ad agency. Together, they were serving up malicious ads designed to spread the recently identified Zemot malware. A Google representative has confirmed the breach, saying "our team is aware of this and has taken steps to shut this down.""

Link to Original Source
top

Free will persists (even if your brain made you do it)

wabrandsma wabrandsma writes  |  about two weeks ago

wabrandsma (2551008) writes "from New Scientist:

The vast majority of people think we have free will and are the authors of our own life stories. But if neuroscientists were one day able to predict our every action based on brain scans, would people abandon this belief in droves? A new study concludes that such knowledge would not by itself be enough to shake our confidence in our own volition.

If people lost their belief in their own free will, that would have important consequences for how we think about moral responsibility, and even how we behave. For example, numerous studies have shown that when people are led to reject free will they are more likely to cheat, and are also less bothered about punishing other wrongdoers.

For those who argue that what we know about neuroscience is incompatible with free will, predicting what our brain is about to do should reveal the illusory nature of free will, and lead people to reject it. Experimental philosopher Eddy Nahmias at Georgia State University in Atlanta dubs this view "willusionism". He recently set out to test it.

For Nahmias, this suggests that, when it comes to free will, people are "theory-lite", which renders the fact that our behaviour is generated by the brain, whose actions can predicted like the weather, largely irrelevant. "People don't have detailed metaphysical views about what underlies free will," says Nahmias. "What people care about is that their own conscious reasoning makes a difference to their behaviour – and nothing in neuroscience suggests it doesn't.""

Link to Original Source
top

Ethical trap: robot paralysed by choice of who to save

wabrandsma wabrandsma writes  |  about two weeks ago

wabrandsma (2551008) writes "From New Scientist:

Can a robot learn right from wrong? Attempts to imbue robots, self-driving cars and military machines with a sense of ethics reveal just how hard this is

In an experiment, Alan Winfield and his colleagues programmed a robot to prevent other automatons – acting as proxies for humans – from falling into a hole. This is a simplified version of Isaac Asimov's fictional First Law of Robotics – a robot must not allow a human being to come to harm.

At first, the robot was successful in its task. As a human proxy moved towards the hole, the robot rushed in to push it out of the path of danger. But when the team added a second human proxy rolling toward the hole at the same time, the robot was forced to choose. Sometimes, it managed to save one human while letting the other perish; a few times it even managed to save both. But in 14 out of 33 trials, the robot wasted so much time fretting over its decision that both humans fell into the hole.

Winfield describes his robot as an "ethical zombie" that has no choice but to behave as it does. Though it may save others according to a programmed code of conduct, it doesn't understand the reasoning behind its actions. Winfield admits he once thought it was not possible for a robot to make ethical choices for itself. Today, he says, "my answer is: I have no idea".

As robots integrate further into our everyday lives, this question will need to be answered. A self-driving car, for example, may one day have to weigh the safety of its passengers against the risk of harming other motorists or pedestrians. It may be very difficult to program robots with rules for such encounters."

Link to Original Source
top

Treasure Map: NSA, GCHQ work on real-time 'Google Earth' internet observation

wabrandsma wabrandsma writes  |  about two weeks ago

wabrandsma (2551008) writes "from Der Spiegel:
According to top-secret documents from the NSA and the British agency GCHQ, the intelligence agencies are seeking to map the entire Internet, including end-user devices. In pursuing that goal, they have broken into networks belonging to Deutsche Telekom.

The document that Der Spiegel has seen shows a map with the name 'Treasure Map'. On the map are the names of Deutsche Telekom and NetCologne and their networks highlighted in red, where the legend says that within the networks 'access points' exist for 'technical observation'.

Treasure Map is anything but harmless entertainment. Rather, it is the mandate for a massive raid on the digital world. It aims to map the Internet, and not just the large traffic channels, such as telecommunications cables. It also seeks to identify the devices across which our data flows, so-called routers.

Furthermore, every single end device that is connected to the Internet somewhere in the world — every smartphone, tablet and computer — is to be made visible. Such a map doesn't just reveal one treasure. There are millions of them.

The breathtaking mission is described in a Treasure Map presentation from the documents of the former intelligence service employee Edward Snowden which SPIEGEL has seen. It instructs analysts to "map the entire Internet — Any device, anywhere, all the time."

Treasure Map allows for the creation of an "interactive map of the global Internet" in "near real-time," the document notes. Employees of the so-called "FiveEyes" intelligence agencies from Great Britain, Canada, Australia and New Zealand, which cooperate closely with the American agency NSA, can install and use the program on their own computers. One can imagine it as a kind of Google Earth for global data traffic, a bird's eye view of the planet's digital arteries.

The New York Times reported on the existence of Treasure Map last November. What it means for Germany can be seen in additional material in the Snowden archive that SPIEGEL has examined."

Link to Original Source
top

Patents that kill

wabrandsma wabrandsma writes  |  about 2 months ago

wabrandsma (2551008) writes "The Economist:
The patent system, which was developed independently in 15th century Venice and then in 17th century England, gave entrepreneurs a monopoly to sell their inventions for a number of years. Yet by the 1860s the patent system came under attack, including from The Economist. Patents, critics argued, stifled future creativity by allowing inventors to rest on their laurels. Recent economic research backs this up."

Link to Original Source
top

Google Flu Trends gets it wrong three years running

wabrandsma wabrandsma writes  |  about 7 months ago

wabrandsma (2551008) writes "From NewScientist:

Google may be a master at data wrangling, but one of its products has been making bogus data-driven predictions. A study of Google's much-hyped flu tracker has consistently overestimated flu cases in the US for years. It's a failure that highlights the danger of relying on big data technologies.

Evan Selinger, a technology ethicist at Rochester Institute of Technology in New York, says Google Flu's failures hint at a larger problem with the algorithmic approach taken by technology companies to deliver services we all want to use. The problem is with the assumption that either the data that is gathered about us, or the algorithms used to process it, are neutral.

Google Flu Trends has been discussed at slashdot before: When Google Got Flu Wrong."

Link to Original Source
top

Made in China: Up to a quarter of California smog

wabrandsma wabrandsma writes  |  about 8 months ago

wabrandsma (2551008) writes "What goes around comes around – quite literally in the case of smog. The US has outsourced many of its production lines to China and, in return, global winds are exporting the Chinese factories' pollution right back to the US."
Link to Original Source
top

Study Suggests Link Between Dread Pirate Roberts and Satoshi Nakamoto

wabrandsma wabrandsma writes  |  about 10 months ago

wabrandsma (2551008) writes "Two Israeli computer scientists say they may have uncovered a puzzling financial link between Ross William Ulbricht, the recently arrested operator of the Internet black market known as the Silk Road, and the secretive inventor of bitcoin, the anonymous online currency, used to make Silk Road purchases."
Link to Original Source
top

Reprogrammed bacterium speaks new language of life

wabrandsma wabrandsma writes  |  about a year ago

wabrandsma (2551008) writes "From NewScientist:
A bacterium has had its genome recoded so that the standard language of life no longer applies. Instead, one of its words has been freed up to impart a different meaning, allowing the addition of genetic elements that don't exist in nature.
The work has been described as the first step towards a new biology because the techniques used should open the door to reinventing the meaning of several genetic words simultaneously, potentially creating new types of biomaterials and drugs."

Link to Original Source
top

Matchstick-sized sensor can record your private chats

wabrandsma wabrandsma writes  |  1 year,4 days

wabrandsma (2551008) writes "From NewScientist: A sensor previously used for military operations can now be tuned to secretly locate and record any single conversation on a busy street.

Now, a Dutch acoustics firm, Microflown Technologies, has developed a matchstick-sized sensor that can pinpoint and record a target's conversations from a distance.
Known as an acoustic vector sensor, Microflown's sensor measures the movement of air, disturbed by sound waves, to almost instantly locate where a sound originated. It can then identify the noise and, if required, transmit it live to waiting ears.

Security technologist Bruce Schneier says this new capability is unwelcome – particularly given the recent claims about the NSA's success at tapping into our private lives. "It's not just this one technology that's the problem," Schneier says. "It's the mic plus the drones, plus the signal processing, plus voice recognition.""

Link to Original Source
top

"Patent troll" closes controversial podcast patent deal with SanDisk

wabrandsma wabrandsma writes  |  1 year,17 days

wabrandsma (2551008) writes "The patent company Personal Audio of James Logan has closed a licensing agreement with SanDisk. The company says that now "between a third and two thirds of all mp3 audio players" is made by the companies to which its patents have been licensed, including LG, Samsung, HTC, Motorola, Blackberry and Amazon.

In the past Logan even went "into the lion's den," fielding a question-and-answer session at Slashdot.

The digital civil rights movement Electronic Frontier Foundation wants to fight Personal Audio's podcasting patent at the US Patent and Trademark Office. The money for the procedure, about 30,000 dollars, was brought in earlier this year through crowdfunding."

Link to Original Source
top

The NSA's next move: silencing university professors?

wabrandsma wabrandsma writes  |  1 year,21 days

wabrandsma (2551008) writes "From the Guardian:

A Johns Hopkins computer science professor blogs on the NSA and is asked to take it down.

A professor in the computer science department at Johns Hopkins, a leading American university, had written a post on his blog, hosted on the university's servers, focused on his area of expertise, which is cryptography. The post was highly critical of the government, specifically the National Security Agency, whose reckless behavior in attacking online security astonished him.

On Monday, he gets a note from the acting dean of the engineering school asking him to take the post down and stop using the NSA logo as clip art in his posts. The email also informs him that if he resists he will need a lawyer.

Why would an academic dean cave under pressure and send the takedown request without careful review, which would have easily discovered, for example, that the classified documents to which the blog post linked were widely available in the public domain?"

Link to Original Source
top

Schneier: The US government has betrayed the internet. We need to take it back.

wabrandsma wabrandsma writes  |  1 year,26 days

wabrandsma (2551008) writes "Quoting Bruce Schneier in the Guardian:

The NSA has undermined a fundamental social contract. We engineers built the internet – and now we have to fix it

Government and industry have betrayed the internet, and us. This is not the internet the world needs, or the internet its creators envisioned. We need to take it back. And by we, I mean the engineering community.

Yes, this is primarily a political problem, a policy matter that requires political intervention. But this is also an engineering problem, and there are several things engineers can – and should – do."

Link to Original Source
top

Apple has received a patent on providing different levels of user access

wabrandsma wabrandsma writes  |  1 year,28 days

wabrandsma (2551008) writes "A future version of iOS may feature a unique security method that recognizes different gesture inputs to open specific sets of apps, allowing for greater control over user access.

The technology, detailed in a patent awarded to Apple on Tuesday by the U.S. Patent and Trademark Office, deals with so-called "access inputs" that determine what apps, device services and functions can be accessed by a user.

Apple's U.S. Patent No. 8,528,072 for a "Method, apparatus and system for access mode control of a device," describes a system that creates user access modes guarded by predetermined gesture inputs."

Link to Original Source
top

Microsoft forces German Windows-backdoor article offline

wabrandsma wabrandsma writes  |  about a year ago

wabrandsma (2551008) writes "Webwereld writes: Microsoft forces German Windows-backdoor article offline (in Dutch).

Microsoft is forcing through the courts to take a controversial article offline on internal concerns of the German government about Windows 8 and Trusted Computing. ZEIT Online is fighting the court order.

Microsoft has an ex-parte injunction enforced by the court of Munich on an article by ZEIT Online. This piece is about the dangers of Windows 8 and the Trusted Platform Module 2.0. This publication last week did stir dust worldwide. Monday the article was taken offline, but the publisher will defend itself against this provisional judgment.

The article has been previously discussed on Slashdot here German Government Warns Windows 8 Is an Unacceptable Security Risk"
top

SOPA died in 2012, but Obama administration wants to revive part of it

wabrandsma wabrandsma writes  |  about a year ago

wabrandsma (2551008) writes "The Washington Post writes:

You probably remember the online outrage over the Stop Online Piracy Act (SOPA) copyright enforcement proposal. Last week, the Department of Commerce’s Internet Policy Task Force released a report on digital copyright policy that endorsed one piece of the controversial proposal: making the streaming of copyrighted works a felony.

As it stands now, streaming a copyrighted work over the Internet is considered a violation of the public performance right. The violation is only punishable as a misdemeanor, rather than the felony charges that accompany the reproduction and distribution of copyrighted material."

Journals

wabrandsma has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?