×
Piracy

Most Torrent Downloaders Are Monitored, Study Finds 309

derekmead writes "A new study from Birmingham University in the U.K. found that people will likely be monitored within hours of downloading popular torrents by at least one of ten or more major monitoring firms. The team, led by security researcher Tom Chothia, ran software that acted like a BitTorrent client for three years and recorded all of the connections made to it. At SecureComm conference in Padua, Italy this week, the team announced that they found huge monitoring operations tracking downloaders that have been up and running for at least the entirety of their research. According to the team's presentation (PDF), monitors were only regularly detected in Top 100 torrents, while monitoring of more obscure material was more spotty. What's really mysterious is who all of the firms are. Chothia's crew found around 10 different monitoring entities, of which a few were identifiable as security companies, copyright firms, or other torrent researchers. But six entities could not be identified because they were masked through third party hosting. Now, despite firms focusing mostly on just the top few searches out there at any given time, that's still a massive amount of user data to collect and store. Why? Well, if a reverse class-action lawsuit were feasible, those treasure troves of stored data would be extremely valuable."
Piracy

Cambodia To Extradite Gottfrid Svartholm 126

judgecorp writes "The Cambodian authorities have said they will extradite Gottfrid Svartholm who is wanted in Sweden for his part in founding file sharing site The Pirate Bay. As there is no extradition treaty between Sweden and Cambodia, Svartholm is being extradited under immigration law, so it is not yet clear whether he will actually be sent to Sweden."
Australia

Business Tier For Australia's NBN Brings Big Possibilities For VoIP 70

An anonymous reader writes "Despite the cost blowing out to $37 billion and ongoing political debate, Australia's rollout of fibre optic cable to 93% of the country's homes, schools and businesses hit another milestone today. To encourage the use of VOIP, Australian small businesses lucky enough to get the fibre cable will have access to high-priority class 1 traffic speeds for multi-line telephony. As this article about the NBN explains, TC-1 speeds up to 5Mbps will be available, which the network builder says will support up to 50 simultaneous lines (separate to general Internet traffic, which is currently delivered at up to 100MBps). While the network is years away from reaching many Australians, this might nevertheless one day be seen as a watershed moment in the move from analogue telephone services to VOIP."
Crime

Anonymous Leaks 1M Apple Device UDIDs 282

Orome1 writes "A file containing a million and one record sets containing Apple Unique Device Identifiers (UDIDs) and some other general information about the devices has been made available online by Anonymous hackers following an alleged breach of an FBI computer. 'During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java,' the hackers claim." Update: 09/04 13:44 GMT by T : A piece at SlashCloud points out that if the leak is genuine, this raises some sticky questions about privacy and security; in particular: "[H]ow did the agency obtain said information, and to what purpose? Why did all that personal data reside on the laptop of one special agent?"
Crime

Firefox, Opera Allow Phishing By Data URI Claims New Paper 151

hypnosec writes "A student at the University of Oslo, Norway has claimed that Phishing attacks can be carried out through the use of URI and users of Firefox and Opera are vulnerable to such attacks. Malicious web pages can be stored into data URIs (Uniform Resource Identifiers) whereby an entire webpage's code can be stuffed into a string, which if clicked on will instruct the browser to unpack the payload and present it to the user in form of a page. This is where the whole thing gets a bit dangerous. In his paper, Phishing by data URI [PDF], Henning Klevjer has claimed that through his method he was able to successfully load the pages on Firefox and Opera. The method however failed on Google Chrome and Internet Explorer."
Google

Google Extends Patent Search To Prior Art 81

mikejuk writes "As well as buying up patents to defend itself against the coming Apple attack on Android, Google is also readying its own technology. It has extended its Patent Search facility to include European patents and has added a Prior Art facility. The new Prior Art facility seems to be valuable both to inventors and to the legal profession. In order to be granted a patent the inventor has to establish that it is a novel idea — and in the current litigious environment companies and their lawyers might want to show that patents should not have been granted."
Encryption

Calculating the Cost of Full Disk Encryption 242

CowboyRobot writes "Is full disk encryption (FDE) worth it? A recent study conducted by the Ponemon Institute shows that the expected benefits of FDE exceed cost by a factor ranging from 4 to 20, based on a reduction in the probability that data will be compromised as the result of the loss or theft of a digital device. 'After doing all of the math, Ponemon found that the cost of FDE on laptop and desktop computers in the U.S. per year was $235, while the cost savings from reduced data breach exposure was $4,650.'"
Crime

How Apple's Story Is Like Breaking Bad 288

theodp writes "Over at CNN, Omar L. Gallaga explains how Apple's story is like Breaking Bad, the TV drama whose protagonist — high school chemistry teacher Walter White — decides to use his science skills to cook methamphetamine to provide for his family after being diagnosed with terminal cancer. Walter takes shocking, out-of-character risks but reinvents himself as a brilliant, feared meth chemist who grows more ambitious, ruthless and cocky with each victory. 'Like Steve Jobs,' writes Gallaga, 'Walter White's cancer awakens a panic in him to hurry up and leave a legacy through his work.' Gallaga continues: 'Like Walter White, it [Apple] has mixed the proper elements at just the right amounts to create highly pure, addictive products. The products have been made within secretive working conditions. The skill employed to design and manufacture them tends to make what competitors put out seem like cheaper, cloudier, less effective imitations.'"
Open Source

Are App.net's Crowdfunders Being Taken For a Ride? 95

snydeq writes "At least 10,000 people believe in App.net's vision of a messaging platform for Web apps — but it's unclear whether those people will be peers or sharecroppers, writes Simon Phipps. 'Last week App.net reached the milestone of 10,000 users who signed up for a new — mostly yet to be written — social network that looks like an early reimplementation of Twitter. Signing up people to claim user names on an (not vaporware) alpha Web service may not seem surprising or novel, but this time there's a difference: Everyone who signed up for App.net paid $50 for the privilege,' Phipps writes. 'App.net has used the crowdfunding approach, but it's not the same kind of project. While superficially similar — there's an offer of immediate use of its Twitter-clone service and reservation of the user ID of your choice — it's much more speculative. It's crowdsourcing the seed capital for a new venture, crowdsourcing the design, crowdsourcing the testing, and crowdsourcing most of the software that interacts with the venture, all without actually giving anyone but the founder a true stake in the outcome.'"
Google

Google Patents Software To Identify Real-World Objects In Videos 150

hypnosec writes "Google has been recently granted a patent that could not only improve online search, but also will possibly give the search engine giant an awful lot of information about the world. Google wants to scan and analyze the content within videos (YouTube videos, most probably) and look for objects in the real world, identify them, and make a catalogue out of those objects. The patent describes Google's technology of scanning a video, picking out landmarks, objects and context; and subsequent tagging and categorization." Adds reader MojoKid: "The privacy implications of such an automated system are enormous. Facebook's own automatic facial recognition software was highly controversial when it debuted, and what Google has now patented puts Facebook to shame. The larger question, unaddressed in this patent, is whether we want our individual personal data to be tagged, filed, and logged without permission or choice."
Patents

Apple Adds Samsung Galaxy SIII To Its Ban List 553

After its big win against Samsung, Apple named 8 Samsung products it wanted an injunction to ban from sale in the U.S. Apple wasn't content with that, though; USA Today reports on the state of the expanded list: "The new list of 21 products includes Samsung's flagship smartphone Galaxy S III as well as the Galaxy Note, another popular Android phone. If the court finds those devices are infringing Apple's patents and irreparably harming the U.S. company, it could temporarily halt sales in the U.S. market even before the trial begins."
Patents

Appeals Court: You Can Infringe a Patent Even If You Didn't Do All the Steps 126

reebmmm writes "In a much anticipated patent law case, an en banc panel of the Federal Circuit overturned existing law and came out in favor a new rule for indirect infringement: you can still be liable for infringing even if no single person does all the infringement. This case consolidated two different cases involving internet patents. In McKesson v. Epic, a lower court found that Epic did not infringe a patent about a patient portal because one of the steps was performed by the patient accessing the portal. In Akamai v. Limelight, the lower court found that Limelight did not infringe because its customers, not the company itself, tagged content. This is likely headed for the Supreme Court."
Android

Download With Caution: Romney, Obama Campaign Apps Have Privacy Flaws 106

puddingebola writes "Apps released by both the Obama and Romney campaigns have been found to have 'privacy issues.' From the article: 'Experts at GFI Software looked at the Android versions of both apps, discovering both to be surprisingly invasive. Obama for America and Mitt's VP request permissions, access to services and data and capabilities beyond their core mandate.'"
Piracy

Gottfrid Svartholm Warg Arrested In Cambodia 138

An anonymous reader writes "The Pirate Bay co-founder Gottfrid Svartholm Warg, alias "anakata," was arrested two days ago (Original, Swedish) in Pnohm Pehn, Cambodia and may soon be facing extradition to Sweden (alternate sources: Aftonbladet (Swedish), IDG (Swedish)). He was sentenced to one year in prison for his involvement in The Pirate Bay in 2009 and failed to appear at the prison to serve his sentence. On a related note, the domain freeanakata.se seems to have been registered today although it currently isn't resolving."
Android

Russia's New Secure Android Tablet Keeps Data From Google 127

wiredmikey writes "It seems Russia's defense ministry doesn't trust Google's tablet computers: a new Android device presented to a top Russian government official boasts encryption and works with software and a global positioning system made in Russia, the AFP reports. The OS has all the functional capabilities of an Android operating system but none of its hidden features that send users' private data to Google, addressing concerns that data stored by Google could slip into the hands of the US government and expose some of their most secret and sensitive communications. Two versions of the tablet will supposedly be made — one for consumers and one for defense needs."
Canada

Police Probing Theft of Millions of Pounds of Maple Syrup From Strategic Reserve 399

An anonymous reader writes with this bit from the Globe and Mail: "Quebec police are on the hunt for a sticky-fingered thief after millions of dollars of maple syrup vanished from a Quebec warehouse. The theft was discovered during a routine inventory check last week at the St-Louis-de-Blandford warehouse, where the syrup is being held temporarily. The Federation of Quebec Maple Syrup Producers, which is responsible for the global strategic maple syrup reserve, initially kept the news quiet, hoping it would help police solve the crime quickly."
Crime

The Case Against DNA 166

Hugh Pickens writes "Thanks to fast-paced television crime shows such as CSI, we have come to regard DNA evidence as incontestable. But BBC reports that David Butler has every right to be cynical about the use of DNA evidence by the police. Butler spent eight months in prison, on remand, facing murder charges after his DNA was allegedly found on the victim. 'I think in the current climate [DNA] has made police lazy,' says Butler. 'It doesn't matter how many times someone like me writes to them, imploring they look at the evidence... they put every hope they had in the DNA result.' The police had accused Butler of murdering a woman, Anne Marie Foy, in 2005 — his DNA sample was on record after he had willingly given it to them as part of an investigation into a burglary at his mother's home some years earlier. But Butler has a rare skin condition, which means he sheds flakes of skin, leaving behind much larger traces of DNA than the average person. Butler worked as a taxi driver, and so it was possible for his DNA to be transferred from his taxi via money or another person, onto the murder victim. The case eventually went to trial and Butler was acquitted after CCTV evidence allegedly placing Butler in the area where the murder took place was disproved. Professor Allan Jamieson, head of the Glasgow-based Forensic Institute, has become a familiar thorn in the side of prosecutors seeking to rely on DNA evidence and has appeared as an expert witness for the defense in several important DNA-centered trials, most notably that of Sean Hoey, who was cleared of carrying out the 1998 Omagh bombing, which killed 29 people. Jamieson's main concern about the growing use of DNA in court cases is that a number of important factors — human error, contamination, simple accident — can suggest guilt where there is none. 'Does anyone realize how easy it is to leave a couple of cells of your DNA somewhere?' says Jamieson. 'You could shake my hand and I could put that hand down hundreds of miles away and leave your cells behind. In many cases, the question is not "Is it my DNA?", but 'How did it get there?"'"
Twitter

Twitter Jokes: Free Speech On Trial 172

An anonymous reader writes "On 6 January 2010, Paul Chambers typed a flippant tweet that would turn his life upside-down for the next two and a half years. As the courts repeatedly showed a lack of common sense and an ignorance of technology, for a long time it looked as though the right to free speech in the UK was under very real threat. Now that it's over, we can step back and take a detailed look at how such an insane case even came to trial. This article delves deep into the the Twitter Joke Trial: how it happened, what it means, and the epic struggle to balance civility and civil liberties."
Government

FinSpy Commercial Spyware Abused By Governments 87

plover writes "The NY Times has a story about FinSpy, a commercial spyware package sold 'only for law enforcement purposes,' being used by governments to spy on dissidents, journalists, and others. Two U.S. computer experts, Morgan Marquis-Boire from Google, and Bill Marczak, a PhD student in Computer Science, have been tracking it down around the world. 'The software proved to be the stuff of a spy film: it can grab images of computer screens, record Skype chats, turn on cameras and microphones and log keystrokes. The two men said they discovered mobile versions of the spyware customized for all major mobile phones. But what made the software especially sophisticated was how well it avoided detection. Its creators specifically engineered it to elude antivirus software made by Kaspersky Lab, Symantec, F-Secure and others.'"
Japan

Samsung Beats Apple In Tokyo, Itching To Sue Over LTE Patents 221

AmiMoJo writes "A court in Tokyo has ruled that Samsung Electronics did not infringe on a patent relating to transferring media content between devices. Tokyo District Judge Tamotsu Shoji dismissed the case filed by Apple in August, finding that Samsung was not in violation of Apple patents related to synchronizing music and video data between devices and servers." This particular battle is just one front in a patent war that spans ten countries and dozens of cases. Samsung also confirmed it was ready and willing to sue Apple if an LTE iPhone ever hits the market. Meanwhile, Apple was granted a number of new patents on Tuesday, including one for changing settings on a wireless device depending on its location (#8,254,902). For example, sound and light from the device could be disabled when entering a movie theater, or communications with other devices could be disabled in a science laboratory.

Slashdot Top Deals