New submitter SkinnyFatSmoothNeck writes "I'll be taking a long train ride in the coming month and I'm looking for ideas and recommendations on anti-theft devices to be used for carry-on luggage. The obvious precautions are always taken: never letting the bag out my sight, wrapping the bag strap around my leg while stowed and so on. But as this is a long ride, there will be a couple of nights involved. The first thing that came to my mind is a two-part device that triggers based on a specified proximity and is controlled from a remote (ie.: the device would be placed inside the bag and trigger a loud alarm if it strays outside of range). Perhaps a more advanced, albeit more expensive, device could also include GPS tracking. But beyond that, what other creative, ingenious or downright sensible solutions do you have to offer?"
Please create an account to participate in the Slashdot moderation system
An anonymous reader writes "Google on Friday announced yet another security improvement for Chrome 25. In addition to killing silent extension installation, the omnibox in Google's browser will send all searches over a Secure Sockets Layer (SSL) connection. Chrome already does this for users who are signed in to Google: when they search from the address bar, their queries are sent over HTTPS. As of Chrome 25, however, the same will happen for users who aren't signed in to Google."
An anonymous reader writes "The Scientific and Technical Research Council of Turkey (TÜBITAK) has put a stop to the publication and sale of all books in its archives that support the theory of evolution, daily Radikal has reported. The books have long been listed as “out of stock” on TÜBTAK's website, but their further publication is now slated to be stopped permanently. Titles by Richard Dawkins, Alan Moorehead, Stephen Jay Gould, Richard Levontin and James Watson are all included in the list of books that will no longer be available to Turkish readers. In early 2009, a huge uproar occurred when the cover story of a publication by TÜBITAK was pulled, reportedly because it focused on Darwin’s theory of evolution."
An anonymous reader writes "You don't necessarily have to a hacker to be viewed as one under federal law. ProPublica breaks down acts of 'hacktivism' to see what is considered criminal under the Computer Fraud and Abuse Act. It points out that both Aaron Swartz and Bradley Manning were charged under the CFAA. Quoting: 'A DDoS attack can be charged as a crime under the CFAA, as it “causes damage” and can violate a web site’s terms of service. The owner of the site could also file a civil suit citing the CFAA, if they can prove a temporary server overload resulted in monetary losses. ... The charges for doxing depend on how the information was accessed, and the nature of published information. Simply publishing publicly available information, such as phone numbers found in a Google search, would probably not be charged under the CFAA. But hacking into private computers, or even spreading the information from a hack, could lead to charges under the CFAA.'"
An anonymous reader writes "Dozens of volunteers who anonymously donated their genomic data to a public database for medical research have been identified by a team led by Yaniv Erlich, a former computer security researcher turned geneticist. Erlich's team matched Y chromosomal markers in genomes compiled by the 1000 Genomes Project with non-anonymous genomic databases, for example some assembled from contributions by family tree enthusiasts (abstract). After finding a match on a presumed relative of the study participant, the researchers pieced together the relative's family tree through search engines and the like, until they were able to identify the participant based on gender, age, place of birth, and other supposedly 'non-identifying' information associated with the genome. The names of the identified participants have not been released."
patiwat writes "A Thai court has convicted a man for censoring himself. In a 2010 anti-government rally, Yossawarit Chuklom said several people were against the dissolution of Abhisit Vejjajiva's government. He mentioned a few names, and then put his hand over his mouth and said he wasn't brave enough to continue. A court ruled that he would have mentioned King Bhumibol Adulyadej — thus earning him a conviction for insulting the King, who is constitutionally banned from any political role."
ananyo writes "Mathematicians plan to launch a series of free open-access journals that will host their peer-reviewed articles on the preprint server arXiv. The project was publicly revealed in a blog post by Tim Gowers, a Fields Medal winner and mathematician at the University of Cambridge, UK. The initiative, called the Episciences Project, hopes to show that researchers can organize the peer review and publication of their work at minimal cost, without involving commercial publishers. 'It’s a global vision of how the research community should work: we want to offer an alternative to traditional mathematics journals,' says Jean-Pierre Demailly, a mathematician at the University of Grenoble, France, who is a leader in the effort. Backed by funding from the French government, the initiative may launch as early as April, he says."
McGruber writes "The Transportation Security Administration (TSA) has ended a contract with Rapiscan, a unit of OSI Systems Inc., manufacturer of about half of all of the controversial full-body scanners used on air passengers. TSA officials claim that Rapiscan failed to deliver software that would protect the privacy of passengers, but the contract termination happened immediately after the TSA finally got around to studying the health effects of the scanners, and Congress had a hearing on TSA's 'Scanner Shuffle'."
Freddybear writes "Congresswoman Zoe Lofgren proposes a change to the Computer Fraud and Abuse Act (CFAA) which would remove the felony criminal penalty for violating the terms of service of a website and return it to the realm of contract law where it belongs. This would eliminate the potential for prosecutors to abuse the CFAA in pursuit of criminal convictions for simple violations of a website's terms of service."
Qedward writes with this except from Computerworld UK: "Germany should change a law to enable public administrations to make their software available as free and open source, a German parliamentary committee has advised. German public administrations currently are not allowed to give away goods, including software, said Jimmy Schulz, a member of Parliament and chairman of the Interoperability, Standards and Free Software Project Group. The current law prohibits governments from being part of the development process in the free software community, he said. 'This is a clear disadvantage because it cuts off all benefits obtained from free software, such as being cost-efficient and state-of-the-art,' he said. Besides a recommendation that the government should explore whether the law can be changed for software, the group also called for the use of open standards in order to make sure that everybody can have access to important information, Schulz said. 'We also called for public administrations in general to make sure that new software is created as platform independent as possible,' he added. While the project group is not in favour of giving priority to one type of software over another, it said in its recommendation to the Parliament earlier this week that free and open source software could be a viable alternative to proprietary software." I think a fair rule is that, barring extraordinary and demonstrated need, all tax dollars for software should go only for the development of software for which source is available gratis to all taxpayers, and that secret-source software makers are free to change to fit this requirement any time they'd like to have their software considered for a bid.
Frequent contributor Bennett Haselton writes with some strong cautions on a Facebook "feature" that lets you search for random phone numbers and find the accounts of users who have registered that number on their Facebook profile. This has privacy implications that are more serious than searching by email address. Especially in light of the expanding emphasis that Facebook is putting both on search qua search and on serving as a VoIP intermediary (not to mention the stream of robocalls that the FCC is unable to stop), this might make you think twice about where your phone number ends up. Read on for Bennett's description of the problem and some possible solutions.
mask.of.sanity writes "The Department of Homeland Security has taken charge of pushing medical device manufacturers to fix vulnerable medical software and devices after researchers popped yet another piece of hospital hardware. It comes after the agency pushed Philips to move to fix critical vulnerabilities found in its popular medical management platform that is used in a host of services including assisting surgeries and generating patient reports. To date, no agency has taken point on forcing the medical manufacturers to improve the information security profile of their products, with the FDA even dubbing such a risk unrealistic (PDF)."
Nerdolicious writes "Ars Technica reports that the ACLU has received a response from the FBI after a formal legal complaint was filed to release documents related to warrantless GPS tracking data. But, as you can see from the two memos the ACLU posted to its website, they have unsurprisingly been redacted to uselessness, consisting almost entirely of large black blocks covering full pages."
Marcion writes "Journalists and commentators are now questioning the role of Massachusetts prosecutors Carmen Ortiz and Stephen Heymann in the suicide of Aaron Swartz and whether they levied disproportionate charges in order to boost their own political profiles, despite being warned he was a suicide risk. Meanwhile White House petitions to remove Ortiz and Heymann have already received tens of thousands of signatures. Should these prosecutors be investigated for their actions regarding Swartz?"
New submitter schneidafunk writes with news that the White House is raising the signature requirement for petitions from 25,000 to 100,000. From the source: "When we first raised the threshold — from 5,000 to 25,000 — we called it 'a good problem to have.' Turns out that 'good problem' is only getting better, so we're making another adjustment to ensure we’re able to continue to give the most popular ideas the time they deserve. ... In the first 10 months of 2012, it took an average of 18 days for a new petition to cross the 25,000-signature threshold. In the last two months of the year, that average time was cut in half to just 9 days, and most petitions that crossed the threshold collected 25,000 signatures within five days of their creation. More than 60 percent of the petitions to cross threshold in all of 2012 did so in the last two months of the year."