×
Censorship

On Eve Of Election, Australia's Conservatives Announce Mandated Filtering Policy 87

Dan B. writes "After Australia's Conservative party (LNP) quietly posted a policy [PDF] to impose mandatory internet filtering just one day prior to the country's election, local premiere internet forum Whirlpool has gone in to overdrive with the fastest 50 page thread ever. At 8:30pm, both sides of politics were busy running media releases, with the Conservatives hastily back-pedalling on the policy, and the Government attacking it, accusing them of hypocrisy after voting down their own proposed filter 3 years prior, stating there was no proof filtering works."
The Courts

Jury Finds Google Guilty of Standards-Essential Patents Abuse Against MS 278

recoiledsnake writes "A federal jury in Seattle ordered Google to pay Microsoft $14.5 million in damages for breach of contract for failing to license at reasonable terms standard essential patents covering wireless and video technology used in the Xbox game console. Motorola had demanded Microsoft pay annual royalties of up to $4 billion for use of patents that are part of the H.264 video and 802.11 wireless standards, which are baked into Windows and the Xbox video game console. Microsoft said it was willing to pay royalties but not at the 2.25 percent of the product price that Motorola sought. We previously covered Motorola's exorbitant demands."
The Almighty Buck

PayPal Freezes MailPile's Account 443

rysiek writes "Remember MailPile, the privacy-focused, community-funded FOSS webmail project with built-in GPG support? The good news is, the funding campaign is a success, with $135k raised (the goal was $100k). The bad news is: PayPal froze MailPile's account, along with $45k that was on it, and will not un-freeze it until MailPile team provides 'an itemized budget and your development goal dates for your project.' One of the team members also noted: 'Communications with PayPal have implied that they would use any excuse available to them to delay delivering as much of our cash as possible for as long as possible.' PayPal doesn't have a great track record as far as fund freezing is concerned — maybe it's high time to stop using PayPal?"
Privacy

What Marketers Think They Know About You and What They Really Do 277

mattydread23 writes "Data broker Acxiom did something a little unusual this week. It launched a service that lets you see the data they've collected on you. CITEworld writer Ron Miller checked it out, and found it to be mostly laughably inaccurate. Among the things they got wrong included his religion, his interests, and the number of kids he has. But worst? It pegged him as a Windows user."
The Courts

Court Orders Retrial In Google Maps-Related Murder Case 152

netbuzz writes "Ruling that a judge erred in blocking two computer security experts from testifying that an incriminating Google Maps search record found on the defendant's laptop was planted there, a North Carolina appeals court has ordered a new trial for ex-Cisco employee Bradley Cooper, convicted two years ago in the 2008 strangulation death of his wife Nancy. 'The sole physical evidence linking Defendant to Ms. Cooper's murder was the alleged Google Map search, conducted on Defendant's laptop, of the exact area where Ms. Cooper's body was discovered,' wrote the appeals court. 'We hold ... that erroneously preventing Defendant from presenting expert testimony, challenging arguably the strongest piece of the State's evidence, constituted reversible error and requires a new trial.'"
United Kingdom

FOI Request Reveals UK Houses of Parliament Workers' Passion For Adult Content 61

Anita Hunt (lissnup) writes "Hot on the heels of Dave Cameron's demands to make such content universally 'opt-in,' the Independent reports 'Westminster computers were prevented from accessing sex sites 114,844 times last November alone and on 55,552 in April, while February saw just 15 and in June officials blocked 397 attempts.' No explanation has been offered for the variation, although it would be interesting to know if the fall in the number of recorded/reported attempts coincides with the date the FOI request was filed."
The Almighty Buck

Martin Luther King Jr's Children In Court Over MLK IP 344

cervesaebraciator writes "Slashdot has reported before about the copyright nightmare of Dr. Martin Luther King Jr.'s 'I Have a Dream' Speech. Now, questions of intellectual property and the legacy of Dr. King have caused his children to go to court. The estate, run by King's sons, claims the rights to the intellectual property and memorabilia of Dr. King as assets. Accordingly, it has filed suit against the non-profit Martin Luther King Jr. Center for Nonviolent Change, run by King's daughter, for plans to continue using King memorabilia once a royalty-free licensing agreement expires, (which the estate says will be in September). As is the case with increasing frequency, one is left to wonder about the implications intellectual property claims have for free speech when they can be applied to so public a figure as Dr. King."
Patents

Apple Receives Patent For Accessing Sets of Apps With Different Passcodes 156

wabrandsma writes, quoting Apple Insider "The technology, detailed in a patent awarded to Apple on Tuesday by the U.S. Patent and Trademark Office, deals with so-called 'access inputs' that determine what apps, device services, and functions can be accessed by a user. Apple's U.S. Patent No. 8,528,072 for a 'Method, apparatus and system for access mode control of a device,' describes a system that creates user access modes guarded by predetermined gesture inputs." Reading the patent, it appears Apple managed to patent allowing access to some programs without a passcode from the lock screen of a device while protecting others, so e.g. you can quickly swipe to make a phone call or control your music, but have to enter a code to read your email or access your word processor documents.
Encryption

NSA-resistant Android App 'Burns' Sensitive Messages 183

angry tapir writes "Phil Zimmermann's Silent Circle, which halted its secure mail service shortly after Lavabit, has released a messaging application for Android devices that encrypts and securely erases messages and files. The application, called Silent Text, lets users specify a time period for which the receiver can view a message before it is erased. It also keeps the keys used to encrypt and decrypt content on the user's device, which protects the company from law enforcement requests for the keys." Seems similar to pieces of the Guardian Project.
Encryption

Software Developer Says Mega Master Keys Are Retrievable 136

hypnosec writes that software developer Michael Koziarski has released a bookmarklet "which he claims has the ability to reveal Mega users' master key. Koziarski went on to claim that Mega has the ability to grab its users' keys and use them to access their files. Dubbed MegaPWN, the tool not only reveals a user's master key, but also gives away a user's RSA private key exponent. 'MEGApwn is a bookmarklet that runs in your web browser and displays your supposedly secret MEGA master key, showing that it is not actually encrypted and can be retrieved by MEGA or anyone else with access to your computer without you knowing,' reads an explanation about the bookmarklet on its official page."
China

China's Secret Scientific Megaprojects 142

An anonymous reader writes "The Diplomat reports on the 2006 National Medium to Long-term Plan (MLP) for the Development of Science and Technology, China's most ambitious national science and technology plan to date. The MLP consists of sixteen megaprojects — both civilian and military — that serve as 'S&T vanguard programs designed to transform China's science & technology capabilities in areas such as electronics, semiconductors, [and] telecommunications.' Thirteen of the megaprojects are listed in the MLP, while three are classified for national security reasons. The three classified megaprojects are likely the military components of the Shenguang Laser Project (used for thermonuclear weapons), the Beidou 2 Satellite Navigation System, and the Hypersonic Vehicle Technology Project."
Government

Prankster Calls NSA To Restore Deleted E-mail 221

First time accepted submitter manu0601 writes "Since the NSA snoops, intercepts and store our e-mails forever, why not use it as a backup service? It just lacks the API to restore files, therefore this guy [YouTube video] called the NSA to ask for a backup restoration. Guess what? It did not work." After all, why should we have to pay twice for services already performed with tax dollars?
Education

What Works In Education: Scientific Evidence Gets Ignored 440

nbauman writes "According to Gina Kolata in the New York Times, The Institute of Education Sciences in the Department of Education Sciences, U.S. Department of Education, has supported 175 randomized controlled studies, like the studies used in medicine, to find out what works and doesn't work, which are reported in the What Works Clearinghouse. Surprisingly, the choice of instructional materials — textbooks, curriculum guides, homework, quizzes — can affect achievement as much as teachers; poor materials have as much effect as a bad teacher, and good materials can offset a bad teacher's deficiencies. One popular math textbook was superior to 3 competitors. A popular computer-assisted math program had no benefit. Most educators, including principals and superintendents, don't know the data exists. 42% of school districts had never heard of the clearinghouse. Up to 90% of programs that seemed promising in small studies had no effect or made achievement scores worse. For example a program to increase 7th-grade math teachers' understanding of math increased their understanding but had no effect on student achievement. Upward Bound had no effect."
Crime

Russia Issues Travel Warning To Its Citizens About United States and Extradition 369

mendax writes "The New York Times reports that the Russian government is warning its citizens to not travel to countries that have an extradition treaty with the United States, noting that 'detentions of Russian citizens in various countries, at the request of American law enforcement, have become more frequent.' The article reports the Russian foreign ministry as saying,'Experience shows that the judicial proceedings against those who were in fact kidnapped and taken to the U.S. are of a biased character, based on shaky evidence, and clearly tilted toward conviction.'"
Patents

Patent Suit Leads To 500,000 Annoyed Software Users 180

ciaran_o_riordan writes "A rare glimpse at the human harm of a software patent lawsuit: company receives 500,000 calls complaining about video quality after a video call system was forced to change to avoid a patent. That's a lot of people having a bad day. We don't usually hear these details because the court documents get ordered sealed and the lawyers only say what the companys' communication strategists allow. However, for VirnetX v. Apple, Jeff Lease decided to go the hearings, take notes, and give them to a journalist. While most coverage is focussing on the fines involved, doubling or halving Apple's fine would have a much smaller impact on your day than the removal of a feature from some software you like. Instead of letting the software patents debate be reduced to calls for sympathy for big companies getting fined, what other evidence is out there, like this story, for harm caused directly to software users?"
Microsoft

Microsoft Seeks Patent On 'Quieting Mobile Devices' 71

theodp writes "GeekWire reports on a pending Microsoft patent that proposes to give parents a centralized dashboard on their phones for remotely monitoring and setting restrictions on other family members' mobile devices. The newly-published patent application for Automatically Quieting Mobile Devices explains how parents could use the dashboard to shut down family members' devices during certain time periods, at designated locations, during specified events, and in designated quiet zones. From the patent: 'Aspects that might be disabled include any type of interactive functions and/or features of a device (except, in some examples, initiating emergency telephone calls or emergency text messages and displaying the current time/date or information related to the quiet time may still be permitted), playing games, communicating (via phone, VOIP applications, text messaging, instant messaging, and/or email), using other applications (e.g., browsers, messaging applications, social networking applications, or consuming certain content (e.g., digital media content).' Microsoft also proposes equipping parents' phones with 'biometric detection' to thwart kids who try to circumvent 'Big Mother'."
Crime

HTC Executives Arrested Over Leaked Trade Secrets 41

An anonymous reader writes "Three HTC executives have been arrested on suspicion of leaking corporate secrets. From the article: Taipei prosecutors confirmed that HTC vice president of product design Thomas Chien, research and development director Wu Chien-Hung and senior manager of design and innovation Justin Huang were arrested on Friday. Mr Chien and Mr Chien-Hung remain in custody, while Mr Huang was released on bail, prosecutors office spokesman Mou Hsin Huang said. The executives were also accused of making false commission fee claims totaling around T$10m ($221,000). No further details about the allegations were immediately available.'"
United States

AT&T Maintains Call Database For the DEA Going Back To 1987 141

Jah-Wren Ryel writes "Forget the NSA — the DEA has been working hand-in-hand with AT&T on a database of records of every call that passes through AT&T's phone switches going back as far as 1987. The government pays AT&T for contractors who sit side-by-side with DEA agents and do phone records searches for them. From the article: 'For at least six years, law enforcement officials working on a counter narcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.'"
Advertising

Facebook To Overhaul Data Use Policy 216

dryriver writes "The new Facebook advertising policy: 'Our goal is to deliver advertising and other commercial or sponsored content that is valuable to our users and advertisers. In order to help us do that, you agree to the following: You give us permission to use your name, profile picture, content, and information in connection with commercial, sponsored, or related content (such as a brand you like) served or enhanced by us. This means, for example, that you permit a business or other entity to pay us to display your name and/or profile picture with your content or information, without any compensation to you. If you have selected a specific audience for your content or information, we will respect your choice when we use it.' — Facebook also made it clear that the company can use photo recognition software to correctly identify people on the network. It said: 'We are able to suggest that your friend tag you in a picture by scanning and comparing your friend's pictures to information we've put together from your profile pictures and the other photos in which you've been tagged.' — It [Facebook] said it was also clarifying that some of that information reveals details about the device itself such as an IP address, operating system or – surprisingly – a mobile phone number. The Register has asked Facebook to clarify this point as it's not clear from the revised policy wording if a mobile number is scooped up without an individual's knowledge or as a result of it being previously submitted by that person to access some of the company's services. Importantly, Facebookers are not required to cough up their mobile phone number upon registering with the service. At time of writing, Facebook was yet to respond with comment."

Slashdot Top Deals