×
Patents

Apple Receives Patent For Accessing Sets of Apps With Different Passcodes 156

wabrandsma writes, quoting Apple Insider "The technology, detailed in a patent awarded to Apple on Tuesday by the U.S. Patent and Trademark Office, deals with so-called 'access inputs' that determine what apps, device services, and functions can be accessed by a user. Apple's U.S. Patent No. 8,528,072 for a 'Method, apparatus and system for access mode control of a device,' describes a system that creates user access modes guarded by predetermined gesture inputs." Reading the patent, it appears Apple managed to patent allowing access to some programs without a passcode from the lock screen of a device while protecting others, so e.g. you can quickly swipe to make a phone call or control your music, but have to enter a code to read your email or access your word processor documents.
Encryption

NSA-resistant Android App 'Burns' Sensitive Messages 183

angry tapir writes "Phil Zimmermann's Silent Circle, which halted its secure mail service shortly after Lavabit, has released a messaging application for Android devices that encrypts and securely erases messages and files. The application, called Silent Text, lets users specify a time period for which the receiver can view a message before it is erased. It also keeps the keys used to encrypt and decrypt content on the user's device, which protects the company from law enforcement requests for the keys." Seems similar to pieces of the Guardian Project.
Encryption

Software Developer Says Mega Master Keys Are Retrievable 136

hypnosec writes that software developer Michael Koziarski has released a bookmarklet "which he claims has the ability to reveal Mega users' master key. Koziarski went on to claim that Mega has the ability to grab its users' keys and use them to access their files. Dubbed MegaPWN, the tool not only reveals a user's master key, but also gives away a user's RSA private key exponent. 'MEGApwn is a bookmarklet that runs in your web browser and displays your supposedly secret MEGA master key, showing that it is not actually encrypted and can be retrieved by MEGA or anyone else with access to your computer without you knowing,' reads an explanation about the bookmarklet on its official page."
China

China's Secret Scientific Megaprojects 142

An anonymous reader writes "The Diplomat reports on the 2006 National Medium to Long-term Plan (MLP) for the Development of Science and Technology, China's most ambitious national science and technology plan to date. The MLP consists of sixteen megaprojects — both civilian and military — that serve as 'S&T vanguard programs designed to transform China's science & technology capabilities in areas such as electronics, semiconductors, [and] telecommunications.' Thirteen of the megaprojects are listed in the MLP, while three are classified for national security reasons. The three classified megaprojects are likely the military components of the Shenguang Laser Project (used for thermonuclear weapons), the Beidou 2 Satellite Navigation System, and the Hypersonic Vehicle Technology Project."
Government

Prankster Calls NSA To Restore Deleted E-mail 221

First time accepted submitter manu0601 writes "Since the NSA snoops, intercepts and store our e-mails forever, why not use it as a backup service? It just lacks the API to restore files, therefore this guy [YouTube video] called the NSA to ask for a backup restoration. Guess what? It did not work." After all, why should we have to pay twice for services already performed with tax dollars?
Education

What Works In Education: Scientific Evidence Gets Ignored 440

nbauman writes "According to Gina Kolata in the New York Times, The Institute of Education Sciences in the Department of Education Sciences, U.S. Department of Education, has supported 175 randomized controlled studies, like the studies used in medicine, to find out what works and doesn't work, which are reported in the What Works Clearinghouse. Surprisingly, the choice of instructional materials — textbooks, curriculum guides, homework, quizzes — can affect achievement as much as teachers; poor materials have as much effect as a bad teacher, and good materials can offset a bad teacher's deficiencies. One popular math textbook was superior to 3 competitors. A popular computer-assisted math program had no benefit. Most educators, including principals and superintendents, don't know the data exists. 42% of school districts had never heard of the clearinghouse. Up to 90% of programs that seemed promising in small studies had no effect or made achievement scores worse. For example a program to increase 7th-grade math teachers' understanding of math increased their understanding but had no effect on student achievement. Upward Bound had no effect."
Crime

Russia Issues Travel Warning To Its Citizens About United States and Extradition 369

mendax writes "The New York Times reports that the Russian government is warning its citizens to not travel to countries that have an extradition treaty with the United States, noting that 'detentions of Russian citizens in various countries, at the request of American law enforcement, have become more frequent.' The article reports the Russian foreign ministry as saying,'Experience shows that the judicial proceedings against those who were in fact kidnapped and taken to the U.S. are of a biased character, based on shaky evidence, and clearly tilted toward conviction.'"
Patents

Patent Suit Leads To 500,000 Annoyed Software Users 180

ciaran_o_riordan writes "A rare glimpse at the human harm of a software patent lawsuit: company receives 500,000 calls complaining about video quality after a video call system was forced to change to avoid a patent. That's a lot of people having a bad day. We don't usually hear these details because the court documents get ordered sealed and the lawyers only say what the companys' communication strategists allow. However, for VirnetX v. Apple, Jeff Lease decided to go the hearings, take notes, and give them to a journalist. While most coverage is focussing on the fines involved, doubling or halving Apple's fine would have a much smaller impact on your day than the removal of a feature from some software you like. Instead of letting the software patents debate be reduced to calls for sympathy for big companies getting fined, what other evidence is out there, like this story, for harm caused directly to software users?"
Microsoft

Microsoft Seeks Patent On 'Quieting Mobile Devices' 71

theodp writes "GeekWire reports on a pending Microsoft patent that proposes to give parents a centralized dashboard on their phones for remotely monitoring and setting restrictions on other family members' mobile devices. The newly-published patent application for Automatically Quieting Mobile Devices explains how parents could use the dashboard to shut down family members' devices during certain time periods, at designated locations, during specified events, and in designated quiet zones. From the patent: 'Aspects that might be disabled include any type of interactive functions and/or features of a device (except, in some examples, initiating emergency telephone calls or emergency text messages and displaying the current time/date or information related to the quiet time may still be permitted), playing games, communicating (via phone, VOIP applications, text messaging, instant messaging, and/or email), using other applications (e.g., browsers, messaging applications, social networking applications, or consuming certain content (e.g., digital media content).' Microsoft also proposes equipping parents' phones with 'biometric detection' to thwart kids who try to circumvent 'Big Mother'."
Crime

HTC Executives Arrested Over Leaked Trade Secrets 41

An anonymous reader writes "Three HTC executives have been arrested on suspicion of leaking corporate secrets. From the article: Taipei prosecutors confirmed that HTC vice president of product design Thomas Chien, research and development director Wu Chien-Hung and senior manager of design and innovation Justin Huang were arrested on Friday. Mr Chien and Mr Chien-Hung remain in custody, while Mr Huang was released on bail, prosecutors office spokesman Mou Hsin Huang said. The executives were also accused of making false commission fee claims totaling around T$10m ($221,000). No further details about the allegations were immediately available.'"
United States

AT&T Maintains Call Database For the DEA Going Back To 1987 141

Jah-Wren Ryel writes "Forget the NSA — the DEA has been working hand-in-hand with AT&T on a database of records of every call that passes through AT&T's phone switches going back as far as 1987. The government pays AT&T for contractors who sit side-by-side with DEA agents and do phone records searches for them. From the article: 'For at least six years, law enforcement officials working on a counter narcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.'"
Advertising

Facebook To Overhaul Data Use Policy 216

dryriver writes "The new Facebook advertising policy: 'Our goal is to deliver advertising and other commercial or sponsored content that is valuable to our users and advertisers. In order to help us do that, you agree to the following: You give us permission to use your name, profile picture, content, and information in connection with commercial, sponsored, or related content (such as a brand you like) served or enhanced by us. This means, for example, that you permit a business or other entity to pay us to display your name and/or profile picture with your content or information, without any compensation to you. If you have selected a specific audience for your content or information, we will respect your choice when we use it.' — Facebook also made it clear that the company can use photo recognition software to correctly identify people on the network. It said: 'We are able to suggest that your friend tag you in a picture by scanning and comparing your friend's pictures to information we've put together from your profile pictures and the other photos in which you've been tagged.' — It [Facebook] said it was also clarifying that some of that information reveals details about the device itself such as an IP address, operating system or – surprisingly – a mobile phone number. The Register has asked Facebook to clarify this point as it's not clear from the revised policy wording if a mobile number is scooped up without an individual's knowledge or as a result of it being previously submitted by that person to access some of the company's services. Importantly, Facebookers are not required to cough up their mobile phone number upon registering with the service. At time of writing, Facebook was yet to respond with comment."
Encryption

The Legal Purgatory at the US Border: Detained, Searched, and Interrogated 555

An anonymous reader writes "America may be the land of the free, but upon arrival millions of visitors cross a legal purgatory at the U.S. border. It is an international legal phenomenon that is left much to the discretion of host countries. In some cases, this space between offers travelers far fewer rights than some of the least democratic and free countries on Earth. Limited access to legal counsel, unwarranted searches, and questionable rights to free speech to name a few. One of the more controversial — and yet still legally a contested grey area — are the rights travelers have in regards to electronics and device searches."
Censorship

Online Law Banning Discussion of Current Affairs Comes Into Force In Vietnam 140

another random user writes in with news about new internet restrictions come into effect in Vietnam. "A controversial law banning Vietnamese online users from discussing current affairs has come into effect. The decree, known as Decree 72, says blogs and social websites should not be used to share news articles, but only personal information. The law also requires foreign internet companies to keep their local servers inside Vietnam. The new law specifies that social networking sites such as Twitter and Facebook should only be used 'to provide and exchange personal information.' It also prohibits the online publication of material that "opposes" the Vietnamese government or 'harms national security.' Last month the US embassy in Hanoi said it was 'deeply concerned by the decree's provisions,' arguing that 'fundamental freedoms apply online just as they do offline.'"
Patents

Taking the Battle Against Patent Trolls To the Public 107

First time accepted submitter presspass writes "A group of technology and retail groups is beginning a national ad campaign targeting so-called patent trolls. The Internet Association, National Restaurant Association, National Retail Federation and Food Marketing Institute Patent trolls — a term known more among geeks than the general public — are about to be the target of a national ad campaign. Beginning Friday, a group of retail trade organizations is launching a radio and print campaign in 17 states. They want to raise awareness of a problem they say is draining resources from business and raising prices for consumers."
Patents

How Patent Trolls Stalled a New Transit App 85

SFGate has the story of Aaron Bannert, creator of a San Francisco transit app called Smart Ride. The app was developed to provide arrival times for the city's bus system. Smart Ride was supported by ads, and Bannert had not yet turned a profit on it when he received a legal threat from a company claiming patent infringement. "It was from a company with ties to Martin Kelly Jones, who holds a series of patents claiming ownership of technologies for tracking vehicles and providing users with electronic updates. A handful of affiliated companies, including ArrivalStar and Melvino Technologies, have threatened or sued hundreds of organizations in recent years, from small entrepreneurs like Bannert to large corporations like American Airlines. ... ArrivalStar filed more than half the patent lawsuits in South Florida federal courts last year, according to the South Florida Business Journal. ... ArrivalStar will demand as much as $200,000 for a license, according to reports in other publications." The cost to the patent troll for filing a lawsuit is around $500, but Bannert was forced to spend over $10,000 on a legal defense and delay the launch of a new version for months. He's unable to provide details on the outcome of the case. "As high as the legal expenses were for Bannert, he thinks the bigger toll from patent trolling is the indirect cost to society, the products and innovation that don't make it off the drawing board."
Encryption

Lockbox Aims To NSA-Proof the Cloud 292

Daniel_Stuckey writes "Lockbox, a tech startup founded in 2008, just received $2.5 million in seed funding for its end-to-end encryption cloud service, Client Portal. So, how does end-to-end cloud encryption work? Lockbox encrypts and compresses files before they are uploaded to the cloud. Only a person in possession of the corresponding key can unlock, or decrypt, the files. This means that the NSA, malicious hackers, business competitors, and even crazy girlfriends and boyfriends won't be be able to peer into users' most sensitive and private files."
Government

US Mounted 231 Offensive Cyber-operations In 2011, Runs Worldwide Botnet 367

An anonymous reader sends this news from the Washington Post: "U.S. intelligence services carried out 231 offensive cyber-operations in 2011, the leading edge of a clandestine campaign that embraces the Internet as a theater of spying, sabotage and war, according to top-secret documents [from Edward Snowden]. Additionally, under an extensive effort code-named GENIE, U.S. computer specialists break into foreign networks so that they can be put under surreptitious U.S. control. Budget documents say the $652 million project has placed 'covert implants,' sophisticated malware transmitted from far away, in computers, routers and firewalls on tens of thousands of machines every year, with plans to expand those numbers into the millions. ... The implants that [an NSA group called Tailored Access Operations (TAO)] creates are intended to persist through software and equipment upgrades, to copy stored data, 'harvest' communications and tunnel into other connected networks. This year TAO is working on implants that “can identify select voice conversations of interest within a target network and exfiltrate select cuts,” or excerpts, according to one budget document. In some cases, a single compromised device opens the door to hundreds or thousands of others."
Toys

U.S. Gov't Still Fighting the Man Behind Buckyballs; Guess Who's Winning? 555

usacoder writes with news of Craig Zucker, former CEO of the company behind Buckyballs, the popular neodymium magnet toys that were banned by the U.S. Consumer Product Safety Commission in July 2012. Zucker ran a brief campaign to drum up opposition to the government's ban, but it didn't turn out to be enough. Unfortunately for Zucker, the story didn't end there. Despite the magnets being labeled as not for kids, the Commission filed a motion to find him personally liable for the costs of a product recall, estimated at around $57 million. "Given the fact that Buckyballs have now long been off the market, the attempt to go after Mr. Zucker personally raises the question of retaliation for his public campaign against the commission. Mr. Zucker won't speculate about the commission's motives. 'It's very selective and very aggressive,' he says. ... Mr. Zucker says his treatment at the hands of the commission should alarm fellow entrepreneurs: 'This is the beginning. It starts with this case. If you play out what happens to me, then the next thing you'll have is personal-injury lawyers saying "you conducted the actions of the company, you were the company."'"

Slashdot Top Deals