×
Cellphones

Apple's War Against Jailbreaking Now Makes Perfect Sense 321

An anonymous reader writes "Apple has always been extremely anti jailbreaking, but it might now have a good reason to plug up the exploits. As Hardware 2.0 argues, Apple's new iOS 7 Activation Lock anti-theft mechanism which renders stolen handsets useless (even after wiping) unless the owner's Apple ID is entered relies on having a secure, locked-down OS. Are the days of jailbreaking iOS coming to a close?" I can see a whole new variety of phone-based ransom-ware based on this capability, too.
Privacy

Majority of Americans Say NSA Phone Tracking Is OK To Fight Terrorism 584

An anonymous reader writes "While the tech media has gone wild the past few days with the reports of the NSA tracking Verizon cell usage and creating the PRISM system to peer into our online lives, a new study by Pew Research suggests that most U.S. citizens think it's okay. 62 percent of Americans say losing some personal privacy is acceptable as long as its used to fight terrorism, and 56 percent are okay with the NSA tracking phone calls. Online tracking is fair less popular however, with only 45 percent approving of the practice. The data also shows that the youth are far more opposed to curtailing privacy to fight terror, which could mean trouble for politicians planning to continue these programs in the coming years."
Piracy

Sharing HBO Go Accounts Could Result In Prison 221

coolnumbr12 writes "In a recent New York Times article called 'No TV? No Subscription? No Problem?' Jenna Wortham noted how she used, 'the information of a guy in New Jersey that I had once met in a Mexican restaurant.' Dave Their of Forbes admitted that he used his sister's boyfriend's father's account in exchange for his Netflix information. But this is stealing under the Computer Fraud and Abuse Act, which makes it a misdemeanor with a maximum one-year prison sentence to 'obtain without authorization information from a protected computer.' It is also a violation of the Digital Millennium Copy Act because it is knowingly circumventing a protection measure set up to prevent someone from watching content like 'Game of Thrones' without paying. Forbes points out that a crafty prosecutor could also claim that using an HBO Go password without paying is a form of identity theft."
Privacy

What Can You Find Out From Metadata? 341

cervesaebraciator writes "In the wake of recent revelations from Edward Snowden, apologists for the state security apparatus are predictably hitting the airwaves. Some are even 'glad' the NSA has been doing this. A major point they emphasize is that the content of calls have remained private and it is only the metadata that they're interested in. But given how much one can tell from interpersonal connections, does the surveillance only represent a 'modest encroachments on privacy?' It is easy enough to imagine how metadata on phone calls made to and from a medical specialist could be more revealing than we'd like. But social network analysis can reveal far more. Duke sociologist Kieran Healy, in a light-hearted but telling article, shows how one father of the American Revolution could have been identified using the simplest tools of social network analysis and only a limited dataset."
Patents

Ask Personal Audio's James Logan About Patents, Playlists, and Podcasts 99

James Logan founded MicroTouch Systems in the 80s and served on the on the Board of Directors of Andover.net, the company that acquired Slashdot back in 1999, but it is the company he founded in 1996, Personal Audio, that has garnered him much attention recently. Personal Audio sued Apple in 2009 for $84 million, claiming infringement on patents for downloadable playlists. Apple eventually lost the case and a jury ordered them to pay $8 million in damages. More recently, Personal Audio has filed suit against several prominent podcasters claiming that “Personal Audio is the owner of a fundamental patent involving the distribution of podcasts.” The EFF challenged the patents calling the company a patent troll saying, "Patent trolls have been wreaking havoc on innovative companies for some time now." The vice president of licensing for the Texas company counters that the EFF is working for "large companies against a small business and a couple of inventors," adding "Every defendant calls every plaintiff a patent troll. I've heard IBM called a patent troll. It's one of those terms everyone defines differently." Mr. Logan has agreed to answer your questions about his company and his patents. As usual, ask as many as you'd like, but please, one question per post.
United States

USA Calling For the Extradition of Snowden 955

Taco Cowboy writes "Edward Snowden, the leaker who gave us the evidence of US government spying on its people is under threat of being extradited back to the U.S. to face prosecution. Some people in Congress, including Republican Peter King (R-NY), are calling for his extradition from Hong Kong to face trial. From the article: 'A spokesman for the director of national intelligence, James Clapper, said Snowden's case had been referred to the justice department and US intelligence was assessing the damage caused by the disclosures. "Any person who has a security clearance knows that he or she has an obligation to protect classified information and abide by the law," the spokesman, Shawn Turner, said.'"
United Kingdom

British Foreign Secretary on Surveillance Worries: '"Law Abiding Citizens Have N 404

Bruce66423 writes "The government minister in charge of GCHQ, the UK's equivalent of the NSA, has used those immortal words, 'Only terrorists, criminals and spies should fear secret activities of the British and US intelligence agencies.' From the article: '...In an interview on the BBC’s Andrew Marr Show on Sunday, Mr Hague refused to say whether the British government knew of the existence of Prism before it emerged last week. “I can’t confirm or deny in public what Britain knows about and what Britain doesn’t, for obvious reasons,” he said. However, he implied that the revelations had not taken him by surprise.'" While many are concerned about the reach of PRISM overseas, the Finnish Foreign Minister says he plans to continue using Outlook for email.
Earth

Scientists Explain Why Chairman of House Committee On Science Is Wrong 476

Lasrick writes "Michael Oppenheimer and Kevin Trenberth take apart Rep. Lamar Smith's (R-Tex.) Washington Post op/ed on climate science saying: 'Contrary to Smith's assertions, there is conclusive evidence that climate change worsened the damage caused by Superstorm Sandy. Sea levels in New York City harbors have risen by more than a foot since the beginning of the 20th century. Had the storm surge not been riding on higher seas, there would have been less flooding and less damage. Warmer air also allows storms such as Sandy to hold more moisture and dump more rainfall, exacerbating flooding.'"
Privacy

NSA WhistleBlower Outs Himself 860

An anonymous reader writes "The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defense contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell. The Guardian, after several days of interviews, is revealing his identity at his request. From the moment he decided to disclose numerous top-secret documents to the public, he was determined not to opt for the protection of anonymity. 'I have no intention of hiding who I am because I know I have done nothing wrong,' he said."
Communications

NSA Surveillance Heat Map: NSA Lied To Congress 385

anagama writes "NSA officials have repeatedly denied under oath to Congress that even producing an estimate of the number of Americans caught up in its surveillance is impossible. Leaked screenshots of an NSA application that does exactly that, prove that the NSA flat out lied (surprise). Glenn Greenwald continues his relentless attacks with another bombshell this time exposing Boundless Informant. Interestingly, the NSA spies more on America than China according to the heat map. Representative Wyden had sought amendments to FISA reauthorization bill that would have required the NSA to provide information like this (hence the NSA's lies), but Obama and Feinstein demanded a pure reauthorization of FISA, which they got at the end of 2012." And if you don't mind that you might have your name on yet another special list, you might enjoy this Twitter-based take on the ongoing news.
Education

MIT President Tells Grads To 'Hack the World' 86

theodp writes "On Friday, MIT President L. Rafael Reif exhorted grads to 'hack the world until you make the world a little more like MIT'. A rather ironic choice of words, since 'hack the world' is precisely what others said Aaron Swartz was trying to do in his fateful run-in with MIT. President Reif presumably received an 'Incomplete' this semester for the promised time-is-of-the-essence review of MIT's involvement in the events that preceded Swartz's suicide last January. By the way, it wasn't so long ago that 2013 commencement speaker Drew Houston and Aaron Swartz were both welcome speakers at MIT."
Government

In Praise of the King: 1.7M Social Media Comments In Thailand 104

An anonymous reader writes with this excerpt from Prachatai.com: "Thailand's Rangers Task Force 45, in response to Army policy, has put its troops to the task of promoting and protecting the monarchy in cyber space, claiming to have posted 1.69 million comments on webboards and social media during a 4-month period of last year ... According to the video clip, the Army Chief has approved the establishment of an army internet network to promote and protect the monarchy by monitoring websites and webboards which have content alluding to the monarchy and countering them by posting comments which worship the institution. ...The unit's military operations personnel provide the troops with information, or what to post, and set them targets for the number of posts they must complete."
Government

What Charles G. Koch Can Teach Us About Campaign Finance Data 238

Lasrick writes "Lee Drutman is a political scientist with the Sunlight Foundation who does terrific work. In this article, he attempts to trace campaign donations made by one of the Koch Brothers and discovers just how difficult it is to do: 'The case of Charles G. Koch is a nice lesson in just how hard it is to determine who is breaking and who is abiding by campaign finance limits. It's hard to make accurate tallies of individual aggregate campaign contributions when the Federal Elections Commission doesn't require donors to have a unique ID, and when campaigns don't always reliably report donor names. Given this, it is unclear how the FEC would even enforce its own aggregate limit rules. The FEC's spokesperson told me that while the FEC welcomes complaints, it does not typically take enforcement initiative."'
Canada

Canadians, Too, Should Demand Surveillance Answers 81

An anonymous reader writes "Privacy and surveillance have taken centre stage this week with the revelations that U.S. agencies have been engaged in massive, secret surveillance programs that include years of capturing the meta-data from every cellphone call on the Verizon network (the meta-data includes the number called and the length of the call) as well as gathering information from the largest Internet companies in the world including Google, Facebook, Microsoft, and Apple in a program called PRISM. Michael Geist explains how many of the same powers exist under Canadian law and that it is very likely that Canadians have been caught up by these surveillance activities."
The Almighty Buck

Apple Files Patent For Digital Wallet and Virtual Currency 84

another random user writes "Apple has applied for a patent on a combined virtual currency and digital wallet technology that would allow you to store money in the cloud, make payments with your iPhone, and maybe communicate with point-of-sale terminals via NFC. The patent application, published [Thursday] by the U.S. Patent and Trademark Organization, details how iPhone users could walk into a store, pay for goods with their phone, and walk out with their merchandise. Though Apple is late to the virtual wallet game, that doesn't seem to stop them trying to patent the process. There does not appear to be anything in the patent application which describes something that can't already be done."
Privacy

Inside PRISM: Why the Government Hates Encryption 457

Lauren Weinstein writes "Now, what's really going on with PRISM? The government admits that the program exists, but says it is being 'mischaracterized' in significant ways (always a risk with secret projects sucking up information about your citizens' personal lives). The Internet firms named in the leaked documents are denying that they have provided 'back doors' to the government for data access. Who is telling the truth? Likely both. Based on previous information and the new leaks, we can make some pretty logical guesses about the actual shape of all this. Here's my take."
Encryption

Seeking Fifth Amendment Defenders 768

Bennett Haselton writes with his take on a case going back and forth in U.S. courts right now about whether a defendant can be ordered to decrypt his own hard drives when they may incriminate him. "A Wisconsin defendant in a criminal child-pornography case recently invoked his Fifth Amendment right to avoid giving the FBI the password to decrypt his hard drive. At the risk of alienating fellow civil-libertarians, I admit I've never seen the particular value of the Fifth Amendment right against self-incrimination. So I pose this logical puzzle: come up with a specific, precisely defined scenario, where the Fifth Amendment makes a positive difference." Read on for the rest of Bennett's thoughts.

Slashdot Top Deals