×
Communications

The Dismantling of POTS: Bold Move Or Grave Error? 582

New submitter TheRealHocusLocus writes "The FCC is drafting rules to formalize the process of transition of 'last-mile' subscriber circuits to digital IP-based data streams. The move is lauded by AT&T Chairman Tom Wheeler who claims that significant resources are spent to maintain 'legacy' POTS service, though some 100 million still use it. POTS, or 'Plain Old Telephone Service,' is the analog standard that allows the use of simple unpowered phone devices on the wire, with the phone company supplying ring and talk voltage. I cannot fault progress, in fact I'm part of the problem: I gave up my dial tone a couple years ago because I needed cell and could not afford to keep both. But what concerns me is, are we poised to dismantle systems that are capable of standing alone to keep communities and regions 'in-touch' with each other, in favor of systems that rely on centralized (and distant) points of failure? Despite its analog limitations POTS switches have enforced the use of hard-coded local exchanges and equipment that will faithfully complete local calls even if its network connections are down. But do these IP phones deliver the same promise? For that matter, is any single local cell tower isolated from its parent network of use to anyone at all? I have had a difficult time finding answers to this question, and would love savvy Slashdot folks to weigh in: In a disaster that isolates the community from outside or partitions the country's connectivity — aside from local Plain Old Telephone Service, how many IP and cell phones would continue to function?"
Government

Snowden Document Says Dutch Secret Service Hacks Internet Forums 162

vikingpower writes "In the ever-longer wake of the NSA scandal, much-respected Dutch newspaper NRC today reveals, in English, as mandated by the gravity of the occasion, that the Dutch secret service, the AIVD, hacks internet forums. And yes, that is gross misconduct against Dutch law. The service, whose headquarters are in Zoetermeer, did not yet comment upon the divulgence of the document from Edward Snowden's collection. Incensed Dutch parliamentarians are calling for an enquiry."
Privacy

Encrypted Social Network Vies For Disgruntled Facebook Users 162

angry tapir writes "With the look of Google Plus and Facebook-like elements, a new social network named "Syme" feels as cozy as a well-worn shoe. But beneath the familiar veneer, it's quite different. Syme encrypts all content, such as status updates, photos and files, so that only people invited to a group can view it. Syme, which hosts the content on its Canada-based servers, says it can't read it. "The overarching goal of Syme is to make encryption accessible and easy to use for people who aren't geeks or aren't hackers or who aren't cryptography experts," co-founder Jonathan Hershon said in an interview about the service." See also Diaspora.
The Internet

Woman Fined For Bad Review Striking Back In Court 249

An anonymous reader writes "Here's an update to the earlier Slashdot story about KlearGear.com 'fining' a couple for a bad review left four years earlier on RipoffReport: Not only did KlearGear report this as a bad debt to credit reporting agencies, but KlearGear is hiding behind a DomainsByProxy domain name to making finding their real identities harder. Now Public Citizen is representing the couple and is going after KlearGear for $75,000. The TV station that broke this story, KUTV, now reports that RipoffReport will likely be on the couple's side. The BBB and TRUSTe say their logos were used by KlearGear.com without permission, and credit reporting agency Experian is also investigating."
Piracy

French Court Orders Search Engines, ISPs To Block Pirate Sites 75

rtoz sends word that a French court has ordered Google, Yahoo, and Microsoft to remove 16 unauthorized video streaming sites from their search results. Many ISPs were also ordered to block access to the sites. According to TorrentFreak, "The court ruled that the film industry had clearly demonstrated that the sites in question are 'dedicated or virtually dedicated to the distribution of audiovisual works without the consent of their creators,' thus violating their copyrights. As a result the search services of Google, Microsoft, Yahoo and local company Orange are now under orders to 'take all necessary measures to prevent the occurrence on their services of any results referring to any of the pages' on these sites. Several ISPs – Orange, Free, Bouygues Télécom, SFR, Numéricable and Darty Télécom were also ordered to 'implement all appropriate means including blocking' to prevent access to the infringing sites."
Books

Unpublished J. D. Salinger Stories Leaked On Bittorrent Site 218

192_kbps writes "Catcher in the Rye author J. D. Salinger wrote the short story The Ocean Full of Bowling Balls and left depository copies with a few academic libraries with the understanding that the work would not see mass distribution until the mid-21st century. The only authorized place to read the story is in a special reading room at Princeton where electronics are not allowed and a librarian continuously babysits the reader. A PDF of the story, as well as two other unpublished stories, appeared on private bittorrent site what.cd where a huge bounty had been placed for the work. Incredibly, the uploader (or someone connected to the uploader) bought an unauthorized copy on eBay for a pittance. The file, Three Stories, is making the bittorrent rounds but can also be read on mediafire."
The Internet

Group Thinks Anonymity Should Be Baked Into the Internet Itself Using Tor 123

Hugh Pickens DOT Com writes "David Talbot writes at MIT Technology review that engineers on the Internet Engineering Task Force (IETF), an informal organization of engineers that changes Internet code and operates by rough consensus, have asked the architects of Tor to consider turning the technology into an Internet standard. If widely adopted, such a standard would make it easy to include the technology in consumer and business products ranging from routers to apps and would allow far more people to browse the Web without being identified by anyone who might be spying on Internet traffic. The IETF is already working to make encryption standard in all web traffic. Stephen Farrell believes that forging Tor into a standard that interoperates with other parts of the Internet could be better than leaving Tor as a separate tool that requires people to take special action to implement. 'I think there are benefits that might flow in both directions,' says Farrell. 'I think other IETF participants could learn useful things about protocol design from the Tor people, who've faced interesting challenges that aren't often seen in practice. And the Tor people might well get interest and involvement from IETF folks who've got a lot of experience with large-scale systems.' Andrew Lewman, executive director of Tor, says the group is considering it. 'We're basically at the stage of 'Do we even want to go on a date together?' It's not clear we are going to do it, but it's worth exploring to see what is involved. It adds legitimacy, it adds validation of all the research we've done.'"
United States

Disabled Woman Denied Entrance To US Due To Private Medical Records 784

Jah-Wren Ryel writes "In 2012, Canadian Ellen Richardson was hospitalized for clinical depression. This past Monday she tried to board a plane to New York for a $6,000 Caribbean cruise. DHS denied her entry, citing supposedly private medical records listing her hospitalization. From the story: '“I was turned away, I was told, because I had a hospitalization in the summer of 2012 for clinical depression,’’ said Richardson, who is a paraplegic and set up her cruise in collaboration with a March of Dimes group of about 12 others.'"
The Military

US Military Settles Software Piracy Claims For $50M 127

Rambo Tribble writes "The BBC reports that the U. S. government has agreed to pay software maker Apptricity $50 million to settle claims that the U.S. Army pirated thousands of copies of the firm's provisioning software. The report indicates 500 licensed copies were sold, but it came to light an army official had mentioned that 'thousands' of devices were running the software." $50 million in tax money could have paid for a whole lot of open source software development, instead.
Education

Code.org Wants Participating Students' Data For 7 Years 90

theodp writes "As part of its plan to improve computer science education in the U.S., the Mark Zuckerberg and Bill Gates-backed Code.org is asking school districts to sign a contract calling for Code.org to receive 'longitudinal student achievement data' for up to seven academic years in return for course materials, small teacher stipends, and general support. The Gates Foundation is already facing a backlash from the broader academic community over attempts to collect student data as part of its inBloom initiative. The Code.org contract also gives the organization veto power over the district teachers selected to participate in the Code.org program, who are required to commit to teaching in the program for a minimum of two school years."
Government

FOIA: NSA Contracts Stored In Paper Files, Unsearchable, Unindexed 114

v3rgEz writes "Wish you were a little more organized? Have trouble finding that archived contract when you actually need it? Don't feel too bad: The National Security Agency has the same problem, claiming that its contract database is stored manually and impossible to search by topic, category, or even by vendor in most cases."
United Kingdom

UK Gov't Plans To Censor "Extremist" Websites Via Orders To ISPs 208

Not content with blacklisting certain kinds of pornography, writes an anonymous reader, according to this news from The Guardian, "The UK government is to order broadband companies to block extremist websites and empower a specialist unit to identify and report content deemed too dangerous for online publication. The crime and security minister, James Brokenshire, said on Wednesday that measures for censoring extremist content would be announced shortly. The initiative is likely to be controversial, with broadband companies already warning that freedom of speech could be compromised."
Bitcoin

Why Bitcoin Is Doomed To Fail, In One Economist's Eyes 537

Hugh Pickens DOT Com writes "Economist Edward Hadas writes in the NYT that developers of bitcoin are trying to show that money can be successfully privatized but money that is not issued by governments is always doomed to failure because money is inevitably a tool of the state. 'Bitcoin exemplifies some of the problems of private money,' says Hadas. 'Its value is uncertain, its legal status is unclear, and it could easily become valueless if users lose faith.' Besides, if bitcoin ever really started to take off, governments would either ban it or take over the system says Hadas. The authorities might be motivated by a genuine concern about the stability of a shadow monetary system or they might act out of self-preservation because tax evasion would be too easy in a parallel economy. 'Part of the interest in virtual currencies like bitcoin is that their anonymity can provide a convenient cloak for criminal activity. Part is technological — this is a cool idea. And part is speculative — gamblers bet that bitcoin's value will increase,' concludes Hadas. 'Truly private money is an inferior alternative to the money that comes with the backing of a political authority. After all, no bank or bitcoin-emitter can be as public-minded as a government, and no private power can raise taxes or pass laws to unwind monetary excesses.'" Could be there's something good about money that can't be manipulated by law. Some people at least think there's plenty of value in Bitcoin and similar currencies, despite the risks. And those risks at present probably aren't enough to comfort the unfortunate Welsh fellow who (HT to reader judgecorp) "has realised he threw out a hard drive containing 7500 bitcoins, worth £4 million at today's prices. It is now under four feet of garbage in a landfill site the size of a football pitch."
Christmas Cheer

Free Software Foundation Announces 2013 Holiday Giving Guide 104

An anonymous reader writes "On Cyber Monday, millions of Americans will take to the Internet in search of the newest gadgets to bestow upon their loved ones. Most of these 'gifts' are trojan horses that will spy on their recipients, prevent them from doing what they want with their device, or maybe even block access to their favorite books or music. The Free Software Foundation is proud to introduce a map through this minefield: our 2013 Giving Guide. The Giving Guide features gifts that will not only make your recipients jump for joy; these gifts will also protect their freedom."
Privacy

Death and the NSA: A Q&A With Bruce Schneier 149

Daniel_Stuckey writes "Since Edward Snowden's disclosures about widespread NSA surveillance, Americans and people everywhere have been presented with a digital variation on an old analog threat: the erosion of freedoms and privacy in exchange, presumably, for safety and security. Bruce Schneier knows the debate well. He's an expert in cryptography and he wrote the book on computer security; Applied Cryptography is one of the field's basic resources, 'the book the NSA never wanted to be published,' raved Wired in 1994. He knows the evidence well too: lately he's been helping the Guardian and the journalist Glenn Greenwald review the documents they have gathered from Snowden, in order to help explain some of the agency's top secret and highly complex spying programs. To do that, Schneier has taken his careful digital privacy regime to a new level, relying on a laptop with an encrypted hard drive that he never connects to the internet. That couldn't prevent a pilfered laptop during, say, a 'black bag operation,' of course. 'I know that if some government really wanted to get my data, there'd be little I could do to stop them,' he says."
Privacy

NSA Planned To Discredit Radicals Based On Web-Browsing Habits 415

wired_parrot writes "New leaked documents show that the NSA was not only monitoring suspected radical sympathizers, but planned to discredit them based on their web-surfing habits. This includes not only evidence of porn browsing and online sexual activity, but also extortion and blackmail based on inappropriate use of funds. At the same time, the leaked document notes that very few of the targeted contacts were associated with terrorism."
EU

European Commission Outlines Steps To Restore Trust In EU-US Data Flows 75

hypnosec writes "The European Commission has outlined steps it believes will pave the way for restoring faith in EU-U.S. data flows following revelations about NSA spying activities under its PRISM program. The EC notes that spying on its citizens, companies, and leaders is unacceptable; and that citizens of U.S. and EU need to be reassured about protection of their data, while companies need to be reassured that the existing agreements between the two regions are respected and enforced. The Commission outlined a total of six areas that it believes require action including swift adoption of the EU's data protection reforms; making Safe Harbor safer; strengthening data protection safeguards in the law enforcement area; commitment from the U.S. for making use of a legal framework; addressing European concerns in the on-going U.S. reform process; and promoting privacy standards internationally."
Encryption

Intelligence Officials Fear Snowden's 'Doomsday' Cache 381

Dega704 writes with news that Edward Snowden is believed to have a collection of highly sensitive classified documents that will be released in the event he is detained, hurt, or killed. According to Reuters, "The data is protected with sophisticated encryption, and multiple passwords are needed to open it, said two of the sources, who like the others spoke on condition of anonymity to discuss intelligence matters. The passwords are in the possession of at least three different people and are valid for only a brief time window each day, they said. The identities of persons who might have the passwords are unknown." These details have caused several security experts to express skepticism, but multiple sources, including Glenn Greenwald, believe Snowden has not released all of the documents he appropriated. "U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories." Whether or not it's true, U.S. and U.K. officials clearly believe it, which can only serve to protect Snowden.
Patents

Jury Finds Newegg Infringed Patent, Owes $2.3 Million 324

Jah-Wren Ryel sends this quote from Ars: "Newegg, an online retailer that has made a name for itself fighting the non-practicing patent holders sometimes called 'patent trolls,' sits on the losing end of a lawsuit tonight. An eight-person jury came back shortly after 7:00pm and found that the company infringed all four asserted claims of a patent owned by TQP Development, a company owned by patent enforcement expert Erich Spangenberg. The jury also found that the patent was valid, apparently rejecting arguments by famed cryptographer Whitfield Diffie. Diffie took the stand on Friday to argue on behalf of Newegg and against the patent. In total, the jury ordered Newegg to pay $2.3 million, a bit less than half of the $5.1 million TQP's damage expert suggested. ... TQP's single patent is tied to a failed modem business run by Michael Jones, formerly president of Telequip. TQP has acquired more than $45 million in patent licensing fees by getting settlements from a total of 139 companies since TQP argues that its patent covers SSL or TLS combined with the RC4 cipher, a common Internet security system used by retailers like Newegg."

Slashdot Top Deals