×
Encryption

Tor Now Comes In a Box 150

Daniel_Stuckey writes "Tor has been in the spotlight lately as a way to keep prying eyes away from your online activities. However, to your average internet user, the covert network of relays and whatchamacallits can come off as too complex and intimidating to bother with — even as people are increasingly concerned with their online privacy in light of the NSA scandal. So goes the thinking behind Safeplug, a new hardware adapter that basically puts Tor in a box. It takes 60 seconds and 50 bucks to plug the privacy box into your router, and you're good to go, the company claims. Like anonymous browsing for dummies. The adapter comes from hardware company Pogoplug, which announced its new product yesterday and hopes it will bring Tor to the mass market by offering more consumer-friendly access. 'We want to just take what is currently available today to a more technical crowd and democratize it, making it easier to use for an average user,' CEO Dan Putterman told GigaOM."
Patents

Samsung Ordered To Pay Apple $290M In Patent Case 219

itwbennett writes "After 3 days of deliberations, a jury has ordered Samsung to pay $290 million to Apple for infringement of several of its patents in multiple Samsung smartphones and tablets. The verdict is the second victory for Apple in its multiyear patent fight against Samsung in the U.S. District Court for the Northern District of California. Last year a jury in the same San Jose courtroom ruled Samsung should pay just over $1 billion for infringement of five Apple patents in multiple Samsung phones and tablets. But afterward, Judge Lucy Koh ordered a new trial to reconsider $450 million of the damages after finding the previous jury had applied an 'impermissible legal theory' to its calculations. Thursday's verdict is the result of that new trial."
Transportation

NHTSA Tells Tesla To Stop Exaggerating Model S Safety Rating 284

cartechboy writes "There's always that kid in the class that ruins it for everyone when being graded on a curve. At the moment, that kid is Tesla and Elon Musk. Tesla's been proudly claiming the Model S is one of the safest cars in the word despite the recent fire controversy. And while it may be just that, claiming it earned 5.4 stars from NHTSA isn't pleasing the safety agency as there is no such thing as a rating higher than five. While NHTSA already released a statement indirectly to Tesla saying it doesn't release ratings higher than 5, Tesla continued to promote this fictitious rating. Now NHTSA has updated its guidelines explicitly stating safety ratings are whole numbers only and that 5 stars is the maximum advertisers can claim. If advertisers and automakers decide to disregard these rules NHTSA is threatening removal from the program or referral to state authorities for appropriate action. Basically, hey Tesla, stop making false claims."
Crime

Sweden Will Deliver Pirate Bay Co-Founder To Denmark 56

wiredmikey writes "Sweden said it will hand over Pirate Bay co-founder Gottfrid Svartholm Warg to Denmark where he is wanted for questioning on alleged hacking charges. 'It (the extradition) will take place on November 27,' the prosecutor in charge of the case, Henrik Olin, said, adding that Sweden was responding to an arrest warrant issued by Copenhagen. In June, Danish police revealed that the 30-year-old Swedish hacker is suspected of illegally downloading police files between April and August 2012. He is currently serving a one-year sentence in Sweden for hacking into the computer systems of contractors working for the national tax authority."
Government

Video Project Rescue Expert Todd Williams Talks About Healthcare.gov (Video) 276

By now, most Americans have either heard or learned firsthand that the Healthcare.gov website doesn't work right. Slings, arrows, and brickbats are being slung all over Washington, and Congressional representatives are busily thundering imprecations at all and sundry who were involved in putting Healthcare.gov together. If there have been any Congressional hearing focusing on how to fix the problems, though, we have not seen them. You'd think that our representatives would bring in people like today's interviewee, Todd Williams, who has written a book titled Rescue the Problem Project and runs a company that specializes in rescuing failed projects. What's more, Todd is just one of many Americans who have helped rescue projects that have gone awry. Hopefully our government has at least one of them working on Healthcare.gov by now, although we haven't heard that they've selected a strong turnaround manager and set him or her to work on the project -- and you'd think they would have told us if they had.
Security

Researcher Offers New Perspective On Stuxnet-Wielding Sabotage Program 46

An anonymous reader writes with this excerpt from Help Net Security: "Stuxnet, the malware that rocket the security world and the first recorded cyber weapon, has an older and more complex 'sibling' that was also aimed at disrupting the functioning of Iran's uranium enrichment facility at Natanz, but whose modus operandi was different. The claim was made by well-known German control system security expert and consultant Ralph Langner, who has been analyzing Stuxnet since the moment its existence was first discovered. He pointed out that in order to known how to secure industrial control systems, we need to know what actually happened, and in order to do that, we need to understand all the layers of the attack (IT, ICS, and physical), and be acquainted with the actual situation of all these layers as they were at the time of the attack."
Security

Microsoft Customers Hit With New Wave of Fake Tech Support Calls 201

rjmarvin writes "A new surge of callers posing predominately as Microsoft technicians are attempting and sometimes succeeding in scamming customers, convincing them their PCs are infected and directing them to install malware-ridden software or give the callers remote access to the computer. The fraudsters also solicit payment for the fake services rendered. This comes only a year after the FTC cracked down on fake tech support calls, charging six scam operators last October."
Biotech

HIV Tracking Technology Could Pinpoint Who's Infecting Who 203

Daniel_Stuckey writes "No man is an island, but evolutionarily, each person functions like one for the HIV virus. That's according to Thomas Leitner, a researcher working on a project aimed at creating technology for tracking HIV through a population. The technology, which is being studied at the Los Alamos National Laboratory, may allow people to identify who infected them with the virus, a development that could have major implications in criminal proceedings. "If you're familiar with Darwin's finches, you have a population of birds on one island and they keep moving and evolving as they spread to other islands so that each population is a little different," Leitner said. "With HIV, it's the same. Every person infected with HIV has a slightly different form of the virus. It's the ultimate chameleon because it evolves this way.""
Crime

Glut In Stolen Identities Forces Price Cut 152

CowboyRobot writes "The price of a stolen identity has dropped as much as 37 percent in the cybercrime underground: to $25 for a U.S. identity, and $40 for an overseas identity. For $300 or less, you can acquire credentials for a bank account with a balance of $70,000 to $150,000, and $400 is all it takes to get a rival or targeted business knocked offline with a distributed denial-of-service (DDoS)-for-hire attack. Meanwhile, ID theft and bank account credentials are getting cheaper because there is just so much inventory (a.k.a. stolen personal information) out there. Bots are cheap, too: 1,000 bots go for $20, and 15,000, for $250."
Privacy

Students Tracked In UK College Via RFID For 1-3 Years 64

wendyg writes "As part of redeveloping its three-site campus and without consultation with parents or the Information Commissioner, the UK's West Cheshire College installed a highly detailed tracking system using ultrawideband RFID tags handed out to its 14- to 17-year-old students. The system, which cost up approximately £1 million, was abandoned earlier this year because of escalating costs and lack of the functionality the college wanted. The college has been reluctant to answer questions, dubbing privacy campaigner and persistent questioner Pippa King 'vexatious,' and material relating to the trial has been vanishing off the Net. The law requiring parental consent for the use of biometrics in schools (for things like taking attendance and paying for meals) came into force last month. It seems it already needs to be updated."
Privacy

Vint Cerf Thinks Privacy May Be an Anomaly 145

Nerval's Lobster writes "Vint Cerf, widely considered one of the 'founders of the Internet,' told an audience at the Federal Trade Commission's Internet of Things workshop that privacy could be considered 'an anomaly.' That workshop, held Nov. 19 in Washington, DC, explored (via speeches and panel discussions) how the proliferation of sensors on everything from cars to household devices is fundamentally changing how people live and work—while raising questions of how to best maintain privacy and security in an environment where more and more things are 'watchers.' 'The technology that we use today has far outraced our social intuition, our headlights,' he added. '[There's a] need to develop social conventions that are more respectful of people's privacy.' Current social behaviors, such as instantly posting images from smartphones to social networks, can result in a whole lot of embarrassment—and maybe even penalties, if data and media happens to catch someone in the act of doing something illegal. Cerf currently works at Google as chief Internet evangelist, which would make him uniquely positioned to comment on these sorts of issues even if he hadn't co-created the TCP/IP backbone that supports the modern Web. (Back in April, he told an audience that, if he had to do it all over again, he'd construct the Internet in the mold of Software-Defined Networking — but that's a whole different, tangled discussion.)"
Patents

Software Patent Reform Stalls Thanks To IBM and Microsoft Lobbying 239

An anonymous reader writes "The Washington post reports on the progress of a piece of legislation many hoped would address the glut of meaningless software patents used as weapons by patent trolls. Unfortunately, the provision that would have helped the USPTO nix these patents has been nixed itself. The article credits IBM, Microsoft, and other companies with huge patent portfolios for the change, citing an 'aggressive lobbying campaign' that apparently succeeded. Quoting: 'A September letter signed by IBM, Microsoft and several dozen other firms made the case against expanding the program. The proposal, they wrote, "could harm U.S. innovators by unnecessarily undermining the rights of patent holders. Subjecting data processing patents to the CBM program would create uncertainty and risk that discourage investment in any number of fields where we should be trying to spur continued innovation." ... Last week, IBM escalated its campaign against expanding the CBM program. An IBM spokesman told Politico, "While we support what Mr. Goodlatte's trying to do on trolls, if the CBM is included, we'd be forced to oppose the bill." Insiders say the campaign against the CBM provisions of the Goodlatte bill has succeeded. The House Judiciary Committee is scheduled to hold a markup of the legislation Wednesday, and Goodlatte will introduce a "manager's amendment" to remove the CBM language from his own bill. IBM hailed that change in a Monday letter to Goodlatte.'"
Transportation

Texas Drivers Stopped At Roadblock, Asked For Saliva, Blood 783

schwit1 writes "Some drivers along a busy Fort Worth street on Friday were stopped at a police roadblock and directed into a parking lot, where they were asked by federal contractors for samples of their breath, saliva and even blood. It was part of a government research study aimed at determining the number of drunken or drug-impaired drivers.The National Highway Traffic Safety Administration, which is spending $7.9 million on the survey over three years, said participation was '100 percent voluntary' and anonymous. The 'participants' hardly agree."
The Courts

Warner Bros. Admits To Issuing Bogus Takedowns 199

An anonymous reader sends this quote from TechDirt: "One of the bizarre side notes to Hollywood's big lawsuit against the cyberlocker Hotfile was a countersuit against Warner Bros. by Hotfile, for using the easy takedown tool that Hotfile had provided, to take down a variety of content that was (a) non-infringing and (b) had nothing to do with Warner Bros. at all (i.e., the company did not hold the copyright on those files). In that case, WB admitted that it filed a bunch of false takedowns, but said it was no big deal because it was all done by a computer. Of course, it then came out that at least one work was taken down by a WB employee, and that employee had done so on purpose, annoyed that JDownloader could help possible infringers download more quickly."
Censorship

Chinese Gov't To Tighten Internet Controls Even Further 162

jfruh writes "The new Chinese leadership released a document outlining its vision for the country Friday, and most of the attention was paid to reforms, like plans to loosen state control of the economy and end the one-child policy. But when it comes to the Internet, the Chinese Communist government is doubling down on its restrictive policies. The document notes that social networking and instant messaging tools can rapidly disseminate information and mobilize society; the government doesn't think those are good things, and plans to bolster its regulatory systems and increase the scope of their legal authority."
Privacy

User Alleges LG TVs Phone Home With Your Viewing Habits 286

psychonaut writes "Blogger DoctorBeet discovered that his new LG television was surreptitiously sending information about his TV viewing habits, as well as the names of the files he watched on removable media, to LG's servers. There is an undocumented setting in the TV configuration which supposedly disables this behaviour, but an inspection of the network traffic between the TV and the Internet showed that the TV continues to send the data whether or not the setting is disabled. DoctorBeet contacted LG, but they shrugged the matter off, saying that it's a matter between him and the retailer he bought the TV from."
Privacy

Boston Cops Outraged Over Plans to Watch Their Movements Using GPS 409

Hugh Pickens DOT Com writes "The Boston Globe reports that the pending use of GPS tracking devices, slated to be installed in Boston police cruisers, has many officers worried that commanders will monitor their every move. Boston police administrators say the system gives dispatchers the ability to see where officers are, rather than wait for a radio response and supervisors insist the system will improve their response to emergencies. Using GPS, they say, accelerates their response to a call for a shooting or an armed robbery. 'We'll be moving forward as quickly as possible,' says former police commissioner Edward F. Davis. 'There are an enormous amount of benefits. . . . This is clearly an important enhancement and should lead to further reductions in crime.' But some officers said they worry that under such a system they will have to explain their every move and possibly compromise their ability to court street sources. 'No one likes it. Who wants to be followed all over the place?' said one officer who spoke anonymously because department rules forbid police from speaking to the media without authorization. 'If I take my cruiser and I meet [reluctant witnesses] to talk, eventually they can follow me and say why were you in a back dark street for 45 minutes? It's going to open up a can of worms that can't be closed.' Meanwhile civil libertarians are relishing the rank and file's own backlash. 'The irony of police objecting to GPS technology for privacy reasons is hard to miss in the aftermath of United States v. Jones,' says Woodrow Hartzog. 'But the officers' concerns about privacy illustrate just how revealing GPS technology can be. Departments are going to have to confront the chilling effect this surveillance might have on police behavior.'"
Stats

How Perl and R Reveal the United States' Isolation In the TPP Negotiations 152

langelgjm writes "As /. reported, last Thursday Wikileaks released a draft text of the intellectual property chapter in the Trans-Pacific Partnership Agreement. Since then, many commentators have raised alarm about its contents. But what happens when you mix the leaked text together with Perl regular expressions and R's network analysis packages? You get some neat visualizations showing just how isolated the United States is in pushing for extreme copyright and patent laws."
Google

Google to Pay $17 Million to Settle Privacy Case 109

cold fjord writes "The New York Times reports, 'Google agreed on Monday to pay $17 million to 37 states and the District of Columbia ... The case involved Google's bypassing of privacy settings in Apple's Safari browser to use cookies to track users and show them advertisements in 2011 and 2012. Google has said it discontinued circumventing the settings early last year, after the practice was publicly reported, and stopped tracking Safari users and showing them personalized ads. ... the case is one of a growing pile of government investigations, lawsuits and punishments related to privacy matters at the company. They include cases involving a social networking tool called Buzz, illegal data collection by Street View vehicles and accusations of wiretapping to show personalized ads in Gmail. '" From the DOJ, the settlement (PDF).
Bitcoin

Meet the 'Assassination Market' Creator Who's Crowdfunding Murder With Bitcoins 291

schwit1 writes "As Silk Road emerged from the 'dark-web', other sites have appeared offering services that are frowned upon by most. As Forbes reports, perhaps the most-disturbing is 'The Assassination Market' run by a pseudonymous Kuwabatake Sanjuro. The site, remarkably, is a crowdfunding service that lets anyone anonymously contribute bitcoins towards a bounty on the head of any government official–a kind of Kickstarter for political assassinations. As Forbes reports, NSA Director Alexander and President Obama have a BTC40 bounty (~$24,000) but the highest bounty — perhaps not entirely surprising — is BTC 124.14 (~$75,000) for none other than Ben Bernanke."

Slashdot Top Deals