×
Patents

Patents Vs Innovation - the Tabarrok Curve 210

New submitter Optimal Cynic writes "Slashdot likes to argue about intellectual property and patents, and it's clear that both extremes are undesirable. Dr Alex Tabarrok has tackled the question — what is the right level of patent protection? His answer is the Tabarrok Curve, which applies the Laffer Curve methodology to innovation."
Security

New EU Rules Require ISPs, Telcos To Come Clean Within 24 Hours of Data Breaches 70

hypnosec writes "Under new EU regulations ISPs and Telcos serving European customers will have to come clean within 24 hours in case of a security or data breach that leads to theft, loss, or compromise of data. Companies will have to disclose the nature and size of the breach within the first 24 hours. Whenever it's not possible to submit such data, they must provide 'initial information' within the stipulated time and full details within three days. Under the new terms the affected organizations will be required to reveal information such as information that has been compromised and the steps that have been taken or will be taken to resolve the situation. If the breach 'is likely to adversely affect' personal information or privacy, affected businesses and consumers will be notified of the breach."
Patents

Analyzing Congress's Multiple Approaches To Patent Reform 58

ectoman writes "Patent reform is becoming an unavoidable issue — and the United States Congress is taking note. But the scope and scale of the problem have prompted multiple legislative solutions, and keeping track of them all can be rather difficult. Mark Bohannon, Vice President of Corporate Affairs and Global Public Policy at Red Hat, provides an overview of four important legislative actions currently under consideration, offering clear and concise analysis of their goals and provisions. He also assesses their potential impacts. 'Given the widening attacks by PAEs [Patent Assertion Entities],' Bohannon concludes, 'it is essential that Congress work to produce meaningful legislation on at least the issues identified above in order to begin to stem the tide.'"
Australia

Australian Government Rejects Data Retention Law After Report 153

mask.of.sanity writes "The Australian Government has shelved its plans to proactively store communications data of every citizen ostensibly to assist with law enforcement and intelligence efforts. The shelving (video) comes after a scathing report by Australian parliamentarians who investigated the Government's plans, and three months ahead of a federal election in which the Government is expected to lose office."
Patents

Formlabs In Settlement Talks Over 3D Printing Patent Lawsuit 57

curtwoodward writes "Formlabs raised nearly $3 million in a month for its new Form 1 3D printer, which uses stereolithography to make precise models and other physical objects out of photoreactive liquid polymer. But 3D Systems — the publicly traded company founded by the guy who invented that process — sued the startup for patent infringement. Formlabs recently announced that it would start shipping its pre-ordered Form 1 printers, and that was no coincidence: the two companies quietly entered into settlement talks in early May, and hope to have a deal done by September."
Businesses

Personal Audio's James Logan Answers Your Questions 78

A few weeks ago you had the chance to ask James Logan, the founder of Personal Audio, about the business, the patents the company holds, and the lawsuits it has filed. James answered most of the questions in great detail. Read below to see what he has to say and what question he passed on and why.
Privacy

NSA Releases Secret Pre-History of Computers 167

An anonymous reader writes "The National Security Agency has declassified an eye-opening pre-history of computers used for code-breaking between the 1930s and 1960s. The 344 page report, entitled It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis (pdf), it is available on the Government Attic web site. Government Attic has also just posted a somewhat less declassified NSA compendium from 1993: A Collection of Writings on Traffic Analysis. (pdf)"
Privacy

Wikileaks Aiding Snowden - Chinese Social Media Divided - Relations Strained 629

cold fjord writes "Despite the US cancelling his passport, Edward Snowden continues his travels aided by Wikileaks, and is leaving a trail of strained diplomatic relations in his wake. It appears China gifted the issue to Russia. From Yahoo: 'Lawyer Albert Ho, ... a Hong Kong legislator ... told reporters he was approached by Snowden several days ago, and that the American had sought assurances ... whether he could leave the city freely if he chose to do so... Snowden later told Ho an individual claiming to represent the Hong Kong government had contacted him and indicated he should leave the city, and wouldn't be stopped ... Ho said he believed the middleman was acting on Beijing's orders.' From the NYT: Julian Assange, ...said in an interview ... 'that he had raised Mr. Snowden's case with Ecuador's government and that his group had helped arrange the travel documents.' From WSJ: 'Edward Snowden has generated more than a million posts on one of China's biggest social media platforms... Sina Weibo, a popular Chinese microblogging service, exploded with activity on Sunday as Mr. Snowden left ... Mr. Snowden was hailed as a hero ... last week, but posts on Sunday and Monday were divided... "All crows are black," said a number of users, citing an Chinese old saying, to describe both American and Chinese government's surveillance programs. ... "Snowden has helped China so much. Why did we let him go?" said one ... Some suggested that China should keep Mr. Snowden as a weapon against repeated accusations of China hacking U.S. companies. More extreme users complained that China is "too soft on the U.S." "Russia is a real strong country to accept him," ... Another popular term: "hot potato," reflecting relief that Hong Kong wouldn't have to stand against U.S. efforts to take him into custody. Some users criticized Mr. Snowden for fleeing.' From the Guardian: 'Snowden's escape from Hong Kong infuriated US politicians, while China focused on condemning Washington over his latest disclosures, which suggested the NSA had hacked into Chinese mobile phone companies ... Moscow was also drawn into the controversy after it emerged that Snowden's passport had been revoked before he left Hong Kong and he did not have a visa for Russia. But Russia appeared indifferent to the uproar, with one official saying Snowden was safe from the authorities as long as he remained in the transit lounge at the city's Sheremetyevo airport. Dmitry Peskov, spokesman for the Russian president, Vladimir Putin, said: "I know nothing."' From ABC: Snowden registered for the flight to Havana that leaves Moscow on Monday..."
United States

Obama's Climate Plans Face Long Fight 229

An anonymous reader writes "He hasn't even given his Tuesday speech yet but Obama's plans to tackle climate change are already raising objections in Washington. From the article: 'When President Barack Obama lays out plans to tackle climate change in a speech Tuesday, including the first effort to curb greenhouse-gas emissions from existing power plants, he will unleash a years-long battle that has little assurance of being resolved during his time in office. The president has called climate change a "legacy issue," and his speech may head off a backlash from environmentalists should his administration approve the proposed Keystone XL oil pipeline from Canada. But the address is unlikely to blunt criticism of Mr. Obama's approach from the left or the right.'"
Bitcoin

California Sends a Cease and Desist Order To the Bitcoin Foundation 396

An anonymous reader writes in with bad news for the Bitcoin Foundation. "California's Department of Financial Institutions has issued a cease and desist letter to the Bitcoin Foundation for "allegedly engaging in the business of money transmission without a license or proper authorization," according to Forbes. The news comes after Bitcoin held its "Future of Payments" conference in San Jose last month. If found in violation, penalties range from $1,000 to $2,500 per violation per day plus criminal prosecution (which could lead to more fines and possibly imprisonment). Under federal law, it's also a felony "to engage in the business of money transmission without the appropriate state license or failure to register with the US Treasury Department," according to Forbes. Penalties under that law could be up to five years in prison and a $250,000 fine."
Google

FTC Reviews Google's Purchase of Navigation App Waze 95

An anonymous reader writes "Google's acquisition of Waze has piqued the interest of the FTC and is now facing an antitrust review. "Google confirmed that it has been contacted by lawyers from the Federal Trade Commission over the company's '$1.1 billion acquisition of the mobile navigation company Waze, which closed in mid-June. A Google spokeswoman declined to comment on details of the antitrust review by the FTC. Representatives of the agency didn't immediately respond to a request for comment.'"
Government

Tennessee Official: Water Complaints Could be "Act of Terrorism" 407

An anonymous reader writes "A Tennessee Department of Environment and Conservation deputy director is threatening citizens with being listed as terrorists for giving official complaints. Sherwin Smith, deputy director of TDEC’s Division of Water Resources said: 'But you need to make sure that when you make water quality complaints you have a basis, because federally, if there's no water quality issues, that can be considered under Homeland Security an act of terrorism.' 'In terms of the comments made by a member of the Water Resources Division at the meeting, we are just receiving the information and looking into this on our end,' spokeswoman Meg Lockhart said. 'The department would like to fully assess what was said in the meeting. I am told that the meeting was far longer than the audio clip provided by SOCM and that Mr. Smith actually clarified his remarks. But again, we are looking into it.'"
Privacy

The Return of Surveillance Camera Man 188

theodp writes "Remember Surveillance Camera Man, the anonymous guy who walked up to random people around Seattle and creeped them out by taking video of them without explanation? GeekWire reports that he's back with a new video compilation of his adventures in pushing people's privacy buttons, the latest installment in an apparent ongoing commentary on the pervasiveness of public surveillance, which has taken on a whole new twist with increased fretting over the recording capabilities of Google Glass and heightened concern over privacy in general, thanks to the NSA data surveillance controversy."
Privacy

Edward Snowden Leaves Hong Kong 536

hazeii writes "Ed Snowden, the U.S. whistleblower responsible for exposing the degree to which the U.S. watches its own citizens (as well as the rest of the world) is reported as having left Hong Kong for Moscow. According to the South China Morning Post, he is on a commercial flight to Russia but intriguingly it seems this is not his final destination. It's not clear whether this move is in response to the U.S. request to extradite him."
China

US Hacked Chinese University Network 330

An anonymous reader writes "Hong Kong's South China Morning Post reports that Tsinghua University, widely regarded as the mainland's top education and research institute, was the target of extensive hacking by U.S. spies this year, according to information leaked by Edward Snowden. The information also showed that the attacks on Tsinghua University were intensive and concerted efforts. In one single day of January, at least 63 computers and servers in Tsinghua University have been hacked by the NSA. The university is home to one of the mainland's six major backbone networks, the China Education and Research Network from where internet data from millions of Chinese citizens could be mined. Universities in Hong Kong and the mainland were revealed as targets of NSA's cyber-snooping activities last week when Snowden claimed the Chinese University of Hong Kong had been hacked." The U.S. government is reportedly hacking into Chinese mobile phone companies as well for access to text messages. In related news, the U.S. has asked Hong Kong to extradite Snowden, and the petition to pardon him has met that 100,000 signature threshold required for an official response from the administration.
Privacy

Introducing the NSA-Proof Crypto-Font 259

Daniel_Stuckey writes "At a moment when governments and corporations alike are hellbent on snooping through your personal digital messages, it'd sure be nice if there was a font their dragnets couldn't decipher. So Sang Mun built one. Sang, a recent graduate from the Rhode Island Schoold of Design, has unleashed ZXX — a 'disruptive typeface' that he says is much more difficult to the NSA and friends to decrypt. He's made it free to download on his website, too. 'The project started with a genuine question: How can we conceal our fundamental thoughts from artificial intelligences and those who deploy them?' he writes. 'I decided to create a typeface that would be unreadable by text scanning software (whether used by a government agency or a lone hacker) — misdirecting information or sometimes not giving any at all. It can be applied to huge amounts of data, or to personal correspondence.' He named it after the Library of Congress's labeling code ZXX, which archivists employ when they find a book that contains 'no linguistic content.'"
Mozilla

Firefox Advances Do-Not-Track Technology 148

CowboyRobot writes "Despite strong advertising industry opposition, Mozilla is advancing plans to have the Firefox browser block, by default, many types of tracking used by numerous websites, and especially advertisers. 'We're trying to change the dynamic so that trackers behave better,' Brendan Eich, CTO of Firefox developer Mozilla, told The Washington Post. According to NetMarketShare, 21% of the world's computers run Firefox. Eich said the blocking technology, which is still being refined, will go live in the next few months. The blocking technology is based on that used by Apple's Safari browser, which blocks all third-party cookies. Advertisers use these types of cookies to track users across multiple websites. Mozilla's cookie-blocking efforts follow a Do Not Track capability being adopted by all major browsers. But the DNT effort stalled in November 2012, after advertisers stopped participating in the program, following Microsoft making DNT active by default in Internet Explorer 10. Advertisers wanted the feature to be not active by default."
United Kingdom

GCHQ Tapping UK Fiber-Optic Cables 157

An anonymous reader writes "According to The Guardian, the UK government is tapping fiber-optic cables that carry global communications and gathering vast amounts of data. The British Government Communications Headquarters (GCHQ) has been sharing the data with its American counterpart, the NSA. 'The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate. ... The documents reveal that by last year GCHQ was handling 600m "telephone events" each day, had tapped more than 200 fibre-optic cables and was able to process data from at least 46 of them at a time.'"
Facebook

Facebook Bug Exposed 6 Million Users 75

jamaicaplain sends this quote from the NY Times: "Facebook has inadvertently exposed six million users' phone numbers and e-mail addresses to unauthorized viewers over the last year, the company said late Friday. Facebook blamed the data leaks, which began in 2012, on a technical flaw in its huge archive of contact information collected from its 1.1 billion users worldwide. As a result of the problem, Facebook users who downloaded contact data for their list of friends obtained additional information that they were not supposed to have. Facebook's security team was alerted to the problem last week and fixed it within 24 hours. But Facebook did not publicly acknowledge the flaw until Friday afternoon, when it published a message on its blog explaining the situation."
Advertising

Data Miners Liken Obama Voters To Caesars Gamblers 166

theodp writes "As Steve Wozniak publicly laments how government used new technologies he introduced in unintended ways to monitor people, the NY Times reports how the digital masterminds behind the Obama Presidential campaign are cashing in by bringing the secret, technologically advanced formulas used for reaching voters to commercial advertisers. 'The plan is to bring the same Big Data expertise that guided the most expensive presidential campaign in history to companies and nonprofits,' explains Civis Analytics, which is backed by Google Chairman and Obama advisor Eric Schmidt. Also boasting senior members of Obama's campaign team is Analytics Media Group (A.M.G.), which pitched that 'keeping gamblers loyal to Caesars was not all that different from keeping onetime Obama voters from straying to Mitt Romney.' The extent to which the Obama campaign used the newest tech tools to look into people's lives was largely shrouded, the Times reports, but included data mining efforts that triggered Facebook's internal safeguard alarms. ... 'We asked to see [voter's Facebook] photos but really we were looking for who were tagged in photos with you, which was a really great way to dredge up old college friends — and ex-girlfriends.' The Times also explains how the Obama campaign was able to out-optimize the Romney campaign on TV buys by obtaining set-top box TV show viewing information from cable companies for voters on the Obama campaign's 'persuadable voters' list. "

Slashdot Top Deals