New submitter jest3r writes "On Tuesday the EFF filed a brief proposing a process for the Court in the Megaupload case to hold the government accountable for the actions it took (and failed to take) when it shut down Megaupload's service and denied third parties access to their property. Many businesses used Megaupload's cloud service to store and share files not related to piracy. The government is calling for a long, drawn-out process that would require individuals or small companies to travel to courts far away and engage in multiple hearings just to get their own property back. Additionally, the government's argument that you lose all your property rights by storing your data on the cloud could apply to Amazon's S3 or Google Apps or Apple iCloud services as well (see page 4 of their filing)."
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's now on IFTTT. Check it out! Check out the new SourceForge HTML5 Internet speed test! ×
An anonymous reader writes "We can't get rid of software patents, says Richard Stallman, but we could change how they apply to creating and using software and hardware. In an editorial at Wired, he advocates for a legislative solution to the patent wars that would protect both developers and users. Quoting: 'We should legislate that developing, distributing, or running a program on generally used computing hardware does not constitute patent infringement. This approach has several advantages: —It doesn't require classifying patents or patent applications as "software" or "not software." —It provides developers and users with protection from both existing and potential future computational idea patents. —Patent lawyers can't defeat the intended effect by writing applications differently.'"
CowboyRobot writes "A pair of reports by Juniper and Bit9 confirm the suspicion that many apps are spying on users. '26 percent of Android apps in Google Play can access personal data, such as contacts and email, and 42 percent, GPS location data... 31 percent of the apps access phone calls or phone numbers, and 9 percent employ permissions that could cost the user money, such as incurring premium SMS text message charges... nearly 7 percent of free apps can access address books, 2.6 percent, can send text messages without the user knowing, 6.4 percent can make calls, and 5.5 percent have access to the device's camera.' The main issue seems to be with poor development practices. Only in a minority of cases is there malicious intent. The Juniper report and the Bit9 report are both available online."
sfcrazy writes "Apple is having trouble in Mexico right before the holiday season. The company has lost rights to the name iPhone in the country, as it was already owned by a Mexican telecom company called iFone (Google translation of Spanish original). iFone registered its trademark in 2003, four years before Apple iPhone was launched. In 2009, Apple filed a complaint with the Mexican Industrial Property Institute demanding that iFone stop using is name because it could confuse users. That claim was since denied, and iFone is looking to turn the tables."
another random user writes with news that a Virginia man, Kywan Fisher, has been ordered to pay $1,500,000 to porn-maker Flava Works for sharing ten of the company's films over BitTorrent. "The huge total was reached through penalties of $150,000 per movie, the maximum possible statutory damages under U.S. copyright law." The man did not make any defense in federal court to Flava Works' copyright infringement claims, so the judge handed down a default judgement. "In 2011 Fisher and several other defendants were sued by adult entertainment company Flava Works. The case in question differs from the so-called 'John Doe' lawsuits as the copyright holder had detailed information on the defendants who had paid accounts on the company’s movie portal. For Fisher the trouble started when instead of just viewing the films for personal entertainment, he allegedly went on to share copies on BitTorrent. These illicit copies were traced directly back to his account through a code embedded in the videos. ... The verdict will be welcomed by Flava and the many other copyright holders involved in BitTorrent lawsuits in the United States. DieTrollDie, a close follower and critic of these cases, points out that it will be widely cited in settlement letters to other defendants, but that the case itself is notably different. 'This was not the normal Copyright Troll case – there was some actual evidence beyond a public IP address. Not a smoking gun by far, but certainly enough to show a preponderance of evidence,' DTD writes.
Penurious Penguin writes "While not quite as epic or bitter as losing 600 barrels of maple syrup — in two separate heists, 80,000lbs of walnuts have been stolen in Northern California since last week. The heist was discovered after the walnuts failed to reach their destinations in Miami, FL and Dallas, TX. If you happen to see a large man (approximately 6' 2") driving a white semi-trailer and munching on $300,000 worth of walnuts, it may be the villain. Officers with highly trained squirrels have yet to be posted at interstate weigh-stations."
kgeiger writes "Voting machine designs and data formats are a free-for-all. The result is poor validation and hence opportunity for fraud. An IEEE standards group wants all election computer systems to speak the same language. From the article: 'IEEE Standards Project 1622 is working on electronic data interchange for voting systems. The plan is to create a common format, based on the Election Markup Language (EML) already recommended for use in Europe. This is a subset of the popular XML (eXtensible Markup Language) that specifies particular fields and data structures for use in voting.'"
pigrabbitbear writes "Just three weeks after Defense Secretary Leon Panetta told an audience at the Sea, Air and Space Museum that the U.S. is on the brink of a 'cyber Pearl Harbor,' the government has decided it needs to beef up the ranks of its digital defenses. It's assembling a league of extraordinary computer geeks for what will be known as the 'Cyber Reserve.'"
Peter Eckersley writes "Stanford privacy researcher Jonathan Mayer has published new research showing that websites of both the Obama and Romney presidential campaigns, which are used to communicate with and coordinate their volunteers, leak large amounts of private information to third-party online tracking firms. The Obama campaign site leaked names, usernames, zip codes and street addresses to up to ten companies. The Romney campaign site leaked names, zip codes and partial email addresses to up to thirteen firms."
theodp writes "People seem to be okay with constant corporate or government video surveillance in public. Let a lone individual point a video camera their way, however, and tempers flare. GeekWire takes a look at the antics and videos of Seattle's mysterious Surveillance Camera Man, who walks up to people and records them for no apparent reason other than to make a point: How is what he's doing different than those stationary surveillance cameras tucked away in buildings and public places?" At least with Surveillance Camera Man, you specifically know that he's watching you — not always the case. (Not even when there's no warrant, on private property in the U.S.)
Velcroman1 writes "Slashdotters have been reading for months about the upcoming ITU conference next month in Dubai, which will propose new regulations and restrictions for the Internet that critics say could censor free speech, levy tariffs on e-commerce, and even force companies to clean up their 'e-waste' and make gadgets that are better for the environment. Concerns about the closed-door event have sparked a Wikileaks-style info-leaking site, and led the State Department on Wednesday to file a series of new proposals or tranches seeking to ensure 'competition and commercial agreements — and not regulation' as the meeting's main message. Terry Kramer, the chief U.S. envoy to the conference, says the United States is against sanctions. '[Doing nothing] would not be a terrible outcome at all,' Kramer said recently."
An anonymous reader writes "Motorola feels that Apple is infringing on several FRAND patents that have to do with how every smartphone in existence connects to WiFi and cellular networks. Since Apple makes smartphones, and Google is looking to use their newly acquired Motorola as a weapon, the two companies are only a few days away from the courtroom. Apple has conceded that the Moto patents are valid by offering to pay Google/Moto $1 per device, but only going forward. Motorola wants 2.25% per device and for it to cover all Apple devices (back dated). If Motorola pursues the case and the court issues a per device rate that is higher than Apple's offer, Apple promises to pursue all possible appeals to avoid paying more than $1. Motorola could end this quickly, or watch as Apple drags this out for what could be years."
coondoggie writes "Just two weeks after it challenged the public to come up with a better technological way to stop incessant robocalling, the Federal Trade Commission pulled the plug on five mass calling companies it said were allegedly responsible for millions of illegal pre-recorded calls from 'Rachel' and others from 'Cardholder Services.' 'At the FTC, Rachel from Cardholder Services is public enemy number one,' said FTC Chairman Jon Leibowitz at the announcement of the cases."
another random user writes with this report from the BBC "A law that aims to protect children from harmful internet content by allowing the government to take sites offline has taken effect in Russia. The authorities are now able to blacklist and force offline certain websites without a trial. The law was approved by both houses of parliament and signed by President Vladimir Putin in July. If the websites themselves cannot be shut down, internet service providers (ISPs) and web hosting companies can be forced to block access to the offending material."
hypnosec writes "Kim Dotcom has let out more information about the launch of Megaupload's successor Mega, which he claims will be 'bigger, better, faster, stronger, [and] safer.' Mega is currently looking for partners willing to provide servers, support and connectivity to become 'Mega Storage Nodes.' The prime requirement, according to Dotcom, is that the servers should be located outside the U.S. and that the companies should also be based outside of the U.S. For this reason, Dotcom has decided that the new service will be launching with 'Me.ga' domain name."