Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Censorship

Turkish Hackers Target Vatican Website After Pope's Genocide Comment 245

Posted by timothy
from the robust-free-speech dept.
An anonymous reader writes Turkish hackers have brought down the official Vatican City website, following Pope Francis' statement in which he referred to mass killings of Armenians by Turks as 'genocide'. According to reports, the website www.vatican.va was first taken offline on Monday evening with a Turkish hacker, named @THTHerakles, announcing that he would continue to target the website should an official apology not be issued from the Vatican City. The hacker said that the Pope's comments were "unacceptable" for a respected religious figurehead. "Taking sides and calling what happened with the Armenians genocide is not true ... We want Pope [Francis] to apologize for his words or we will make sure the website remains offline," he added.
Government

Bolivia Demands Assange Apologize For Deliberately False Leaks To the US 160

Posted by timothy
from the well-it's-not-swatting-if-it's-the-usaf dept.
Rei writes In 2013, during Edward Snowden's brief and chaotic search for asylum that ultimately landed him in Russia, the US faced criticism for handing information to various European nations that Bolivian president Evo Morales was smuggling him out of Russia, leading to the grounding of his flight. In a new twist, in the documentary Terminal F about this time period, Wikileaks founder Julian Assange admitted that he was the one who deliberately leaked the fake information to the US government. Bolivia has been none too pleased with this news and is now demanding that Assange apologize for putting their president's life at risk.
The Internet

Republicans Introduce a Bill To Overturn Net Neutrality 440

Posted by Soulskill
from the not-neutrality dept.
New submitter grimmjeeper writes: IDG News reports, "A group of Republican lawmakers has introduced a bill that would invalidate the U.S. Federal Communications Commission's recently passed net neutrality rules. The legislation (PDF), introduced by Representative Doug Collins, a Georgia Republican, is called a resolution of disapproval, a move that allows Congress to review new federal regulations from government agencies, using an expedited legislative process."

This move should come as little surprise to anyone. While the main battle in getting net neutrality has been won, the war is far from over.
The legislation was only proposed now because the FCC's net neutrality rules were just published in the Federal Register today. In addition to the legislation, a new lawsuit was filed in the U.S. Court of Appeals for the District of Columbia Circuit by USTelecom, a trade group representing ISPs.
Businesses

New York State Spent Millions On Program For Startups That Created 76 Jobs 238

Posted by samzenpus
from the bang-for-your-buck dept.
Nerval's Lobster writes Last year, the New York state government launched Start-Up NY, a program designed to boost employment by creating tax-free zones for technology and manufacturing firms that partner with academic institutions. Things didn't go quite as planned. In theory, those tax-free zones on university campuses would give companies access to the best young talent and cutting-edge research, but only a few firms are actually taking the bait: According to a report from the state's Department of Economic Development, the program only created 76 jobs last year, despite spending millions of dollars on advertising and other costs. If that wasn't eyebrow-raising enough, the companies involved in the program have only invested a collective $1.7 million so far. The low numbers didn't stop some state officials from defending the initiative. "Given the program was only up and running for basically one quarter of a year," Andrew Kennedy, a senior economic development aide to Governor Cuomo, told Capital New York, "I think 80 jobs is a good number that we can stand behind."
Piracy

Nearly Half of Game of Thrones Season 5 Leaks Online 148

Posted by samzenpus
from the how-about-leaking-the-books-GRRM dept.
HughPickens.com writes Paul Tassi reports at Forbes that the first four episodes of the new season of "Game of Thrones", nearly half of the ten total episodes, have been leaked online to various torrent sites. The four episodes appeared to come from a screener sent to reviewers with the digital watermark blurred out and are in 480p video format, equivalent to standard-definition TV, not HD.The episodes have already been downloaded almost 800,000 times, and that figure was expected to blow past a million downloads by the season 5 premiere. Game of Thrones has consistently set records for piracy, which has almost been a point of pride for HBO. "Our experience is [piracy] leads to more penetration, more paying subs, more health for HBO, less reliance on having to do paid advertising If you go around the world, I think you're right, Game of Thrones is the most pirated show in the world. Well, you know, that's better than an Emmy."

How the leak happened isn't a mystery. Television critics typically receive the first four episodes of an HBO show before its season premiere, and "Game of Thrones" is no exception. HBO could not immediately say whether the leak could be traced to screener copies of the show. "I suspect HBO may be a bit more restrictive about handing out Game of Thrones screeners to press, given the event-like nature of the show and its reliance on keeping spoilers close to the chest," writes Tassi. "I really don't see why commentary like that needs to exist in the first place." The network can take solace in at least one thing, though. Episode four ends on a heck of a cliffhanger, and those who pirated the episodes will be in the same boat as those of us who received them legally — waiting until May to find out what happens next. "I would imagine it's more fun to just spend the next month watching week to week as nature intended, even if you are watching illegally," concludes Tassi. "Game of Thrones is one of the last true "event" shows where it's something you want to talk about Sunday night or Monday morning with friends and strangers alike."
Government

Spain's Hologram Protest: Thousands Join Virtual March In Madrid 143

Posted by samzenpus
from the toon-protest dept.
An anonymous reader writes Thousands of people marched past a parliament building in Madrid to protest a new law that they say endangers civil liberties. But none of them were actually there. From the article: "Late last year the Spanish government passed a law that set extreme fines for protesters convening outside of government buildings. In response to the controversial Citizen Safety Law, which will take effect on July 1, Spanish activists have staged the world's first ever virtual political demonstration. After months of massive flesh-and-blood protests against the so-called 'gag law', thousands of holograms last night marched in front of the Spanish parliament in Madrid."
Cellphones

The NSA Wants Tech Companies To Give It "Front Door" Access To Encrypted Data 212

Posted by samzenpus
from the let-us-in dept.
An anonymous reader writes The National Security Agency is embroiled in a battle with tech companies over access to encrypted data that would allow it to spy (more easily) on millions of Americans and international citizens. Last month, companies like Google, Microsoft, and Apple urged the Obama administration to put an end to the NSA's bulk collection of metadata. "National Security Agency officials are considering a range of options to ensure their surveillance efforts aren't stymied by the growing use of encryption, particularly in smartphones. Key among the solutions, according to The Washington Post, might be a requirement that technology companies create a digital key that can open any locked device to obtain text messages or other content, but divide the key into pieces so no one group could use it without the cooperation of other parties."
Crime

Watch DARPA Artificial Intelligence Search For Crime On the "Dark Web" 35

Posted by samzenpus
from the seek-it-out dept.
An anonymous reader shares this bit of news from DARPA. "Of late, DARPA has shown a growing interest in open sourcing its technology, even if its most terrifying creations, like army robot wildcats designed to reach speeds of 50Mph, are understandably kept private. In a week’s time, the wider world will be able to tinker with components of the military research body’s in-development search tool for the dark web. The Memex technology, named after an mechanical mnemonic dreamt up just as the Second World War was coming to a close, has already been put to use by a number of law enforcement agencies, who are looking to counter crime taking place on networks like Tor, where Hidden Services are protected by the privacy-enhancing, encrypted hosting, often for good, often for bad. In its first year, the focus at Memex has been on tracking human trafficking, but the project's scope stretches considerably wider."
Security

French Intelligence Bill: 5 Web Hosting Providers Threaten To Leave the Country 105

Posted by samzenpus
from the we're-out-of-here dept.
albert555 (3986073) writes Five popular French web hosting providers, including Gandi and OVH, said on Thursday that the new French intelligence bill might push them to leave the country (French) in order not to lose their customers. The five companies are protesting against the "real-time capture of data connection" and their analysis by the intelligence services using "+black boxes+ with blurred lines". The web hosting providers believe that this project "will not reach its goal and will potentially put every French citizen under surveillance, that will result in the destruction of a major segment of the economy of our country," by pushing their customers to turn to other less intrusive territories. If the bill is passed as it is, "we have to move our infrastructure, our investments and our employees where our customers want to work with us". The companies have provided a listing of dozen cities where they "will suppress jobs instead of creating new ones."; "These are thousands of jobs (...) that startups and large companies will also create elsewhere," they add. The press release was addressed to the French Prime Minister, Manuel Valls, and was co-signed by Gandu, OVH, IDS, Ikoula and Lomaco.
United States

NIST Solicits Comments On Electronic Authentication Guideline 7

Posted by samzenpus
from the what-do-you-think dept.
First time accepted submitter Jim Fenton writes The National Institute of Standards and Technology (NIST) is poised to make what is expected to be a major revision of Special Publication 800-63-2, Electronic Authentication Guideline. While normative only for the Federal Government, it is widely referenced elsewhere and specifies requirements to meet each of four Levels of Assurance (LOA). Should this structure change? Are there changes in technology or threats that should be considered in the revision? NIST would like to hear from you.
Encryption

U.S. Gov't Grapples With Clash Between Privacy, Security 134

Posted by Soulskill
from the politicians-who-don't-know-which-way-the-wind-is-blowing dept.
schwit1 writes: WaPo: "For months, federal law enforcement agencies and industry have been deadlocked on a highly contentious issue: Should tech companies be obliged to guarantee U.S. government access to encrypted data on smartphones and other digital devices, and is that even possible without compromising the security of law-abiding customers?"

NSA director Adm. Michael S. Rogers wants to require technology companies to create a digital key that could open any smartphone or other locked device to obtain text messages or photos, but divide the key into pieces so that no one person or agency alone could decide to use it. But progress is nonexistent:

"The odds of passing a new law appear slim, given a divided Congress and the increased attention to privacy in the aftermath of leaks by former NSA contractor Edward Snowden. There are bills pending to ban government back doors into communications devices. So far, there is no legislation proposed by the government or lawmakers to require Internet and tech firms to make their services and devices wiretap-ready."
Electronic Frontier Foundation

After EFF Effort, Infamous "Podcasting Patent" Invalidated 58

Posted by timothy
from the there-should-an-absurdity-check dept.
Ars Technica reports some good news on the YRO front. An excerpt: A year-and-a-half after the Electronic Frontier Foundation created a crowd-funded challenge to a patent being used to threaten podcasters, the patent has been invalidated. In late 2013, after small podcasters started getting threat letters from Personal Audio LLC, the EFF filed what's called an "inter partes review," or IPR, which allows anyone to challenge a patent at the US Patent and Trademark Office. The order issued today by the USPTO lays to rest the idea that Personal Audio or its founder, Jim Logan, are owed any money by podcasters because of US Patent No. 8,112,504, which describes a "system for disseminating media content representing episodes in a serialized sequence." The article points out, though, that the EFF warns Personal Audio LLC is seeking more patents on podcasting. Mentioned within: Adam Carolla's fight against these patents and our Q&A with Jim Logan.
Crime

Would-Be Bomber Arrested In Kansas; Planned Suicide Attack on Ft. Riley 297

Posted by timothy
from the well-that's-not-nice dept.
The Associated Press (as carried by the Boston Herald) reports that a 20-year old Topeka man has been arrested as he attempted to arm what he believed to be a thousand-pound bomb outside Ft. Riley, Kansas. John T. Booker Jr. is alleged to have planned an attack in conspiracy with others who were actually FBI agents; Booker's postings to Facebook in March 2014 about his desire to die as a martyr brought him to the FBI's attention, and the FBI sting operation which ended in his arrest began after these posts. Booker had been recruited by the U.S. Army in February of last year, but his enlistment was cancelled shortly thereafter.
Communications

Microsoft: Feds Are 'Rewriting' the Law To Obtain Emails Overseas 99

Posted by Soulskill
from the get-out-of-my-inbox dept.
An anonymous reader writes: The Electronic Communications Privacy Act was written in 1986. It's incredibly outdated, yet it still governs many internet-related rights for U.S. citizens. Microsoft has now challenged Congress to update the legislation for how online communications work in 2015. The company is currently embroiled in a legal battle with the government over a court order to release emails stored in a foreign country to U.S. authorities. In a new legal brief (PDF), Microsoft says, "For an argument that purports to rest on the 'explicit text of the statute,' the Government rewrites an awful lot of it. Congress never intended to reach, nor even anticipated, private communications stored in a foreign country when it enacted [the ECPA]." In an accompanying blog post, Microsoft general counsel Brad Smith wrote, "Until U.S. law is rewritten, we believe that the court in our case should honor well-established precedents that limit the government's reach from extending beyond U.S. borders. ... To the contrary, it is clear Congress's intent was to ensure that your digital information is afforded the same legal protections as your physical documents and correspondence, a principle we at Microsoft believe should be preserved."
Japan

Japanese Court Orders Google To Remove Negative Reviews From Google Maps 106

Posted by Soulskill
from the because-there's-definitely-nothing-worse-on-the-internet dept.
An anonymous reader writes: As reported by TechCrunch, the Japenese Chiba District Court issued a preliminary injunction forcing Google to delete two anonymous reviews for a medical clinic. Although negative, neither review violates Google policies. "The decision is based on a defamation suit from the clinic, a key part of which included an affidavit from the doctor who interacted with the anonymous reviewers and denied their claims." And here is the key part: "The court ruled that Google not only removes the content in Japan, but across the entire globe too." Google is currently considering it's options including an appeal.
Intel

US Blocks Intel From Selling Xeon Chips To Chinese Supercomputer Projects 229

Posted by Soulskill
from the demands-recall-of-intel-inside-stickers-too dept.
itwbennett writes: U.S. government agencies have stopped Intel from selling microprocessors for China's supercomputers, apparently reflecting concern about their use in nuclear tests. In February, four supercomputing institutions in China were placed on a U.S. government list that effectively bans them from receiving certain U.S. exports. The institutions were involved in building Tianhe-2 and Tianhe-1A, both of which have allegedly been used for 'nuclear explosive activities,' according to a notice (PDF) posted by the U.S. Department of Commerce. Intel has been selling its Xeon chips to Chinese supercomputers for years, so the ban represents a blow to its business.
Crime

Florida Teen Charged With Felony Hacking For Changing Desktop Wallpaper 626

Posted by Soulskill
from the climate-of-fear dept.
colinneagle writes: A 14-year-old middle school student in Holiday, Florida, was arrested this week and charged with "an offense against a computer system and unauthorized access," which is a felony. The student reportedly used an administrator password to log into a teacher's computer and change the background image to a photo of two men kissing.

The student also revealed his secrets after he was caught – the password was the teacher's last name, and the teacher had typed it in in full view of the students. The student said many other students used these administrators' passwords (their teachers' last names) so they can screen-share and video chat with other students. The student was briefly held in a nearby detention center, and the county Sheriff warned that other teenagers caught doing the same thing will "face the same consequences."
Privacy

The DEA Disinformation Campaign To Hide Surveillance Techniques 46

Posted by Soulskill
from the you-can-trust-us dept.
An anonymous reader writes: Ken White at Popehat explains how the U.S. Drug Enforcement Agency has been purposefully sowing disinformation to hide the extent of their surveillance powers. The agency appears to have used a vast database of telecommunications metadata, which they acquired via general (read: untargeted, dragnet-style) subpoenas. As they begin building cases against suspected criminals, they trawl the database for relevant information. Of course, this means the metadata of many innocent people is also being held and occasionally scanned. The Electronic Frontier Foundation has filed a lawsuit to challenge this bulk data collection. The DEA database itself seems to have been shut down in 2013, but not before the government argued that it should be fine not only to engage in this collection, but to attempt to hide it during court cases. The courts agreed, which means this sort of surveillance could very well happen again — and the EFF is trying to prevent that.
Encryption

'Let's Encrypt' Project Strives To Make Encryption Simple 116

Posted by Soulskill
from the reaching-for-peak-encryption dept.
jones_supa writes: As part of an effort to make encryption a standard component of every application, the Linux Foundation has launched the Let's Encrypt project (announcement) and stated its intention to provide access to a free certificate management service. Jim Zemlin, executive director for the Linux Foundation, says the goal for the project is nothing less than universal adoption of encryption to disrupt a multi-billion dollar hacker economy. While there may never be such a thing as perfect security, Zemlin says it's just too easy to steal data that is not encrypted. In its current form, encryption is difficult to implement and a lot of cost and overhead is associated with managing encryption keys. Zemlin claims the Let's Encrypt project will reduce the effort it takes to encrypt data in an application down to two simple commands. The project is being hosted by the Linux Foundation, but the actual project is being managed by the Internet Security Research Group. This work is sponsored by Akamai, Cisco, EFF, Mozilla, IdenTrust, and Automattic, which all are Linux Foundation patrons. Visit Let's Encrypt official website to get involved.
Businesses

Amazon Sues To Block Fake Reviews 126

Posted by samzenpus
from the 4-out-of-5-stars-would-review-again dept.
An anonymous reader writes Amazon has filed suit against operators of sites that offer Amazon sellers the ability to purchase fake 4 and 5 star customer reviews. The suit is the first of its kind and was filed in King County Superior Court against a California man, Jay Gentile, identified in Amazon's filings as the operator of buyazonreviews.com. The site also targets unidentified "John Does" who operate similar sites: buyreviewsnow.com, bayreviews.net, and buyamazonreviews.com. From the article: "The site buyazonreviews.com, which the suit claims is run by Gentile, didn't respond to a request for comment. But Mark Collins, the owner of buyamazonreviews.com, denied Amazon's claims. In an email interview, Collins said the site simply offers to help Amazon's third-party sellers get reviews. 'We are not selling fake reviews. however we do provide Unbiased and Honest reviews on all the products,' Collins wrote. 'And this is not illegal at all.'"