jfruh writes "Call it Google Analytics for physical storefronts: if you've got a phone with wi-fi, stores can detect your MAC address and track your comings and goings, determining which aisles you go to and whether you're a repeat customer. The creator of one of the most popular tracking software packages says that the addresses are hashed and not personally identifiable, but it might make you think twice about leaving your phone on when you head to the mall."
Migrate from GitHub to SourceForge quickly and easily with this tool. Check out all of SourceForge’s recent improvements.×
Velcroman1 writes "At the 2013 Consumer Electronics Show, Netflix announced Super HD, an immersive theatrical video format that looks more lifelike than any Web stream, even competing with Blu-Ray discs. But there's a costly catch. To watch the high-definition, 1080p movies when they debut later this year, you'll need a specific Internet Service Provider. Those on Cablevision or Google Fiber are in; those served by Time Warner or a host of smaller providers will be out of luck. But regardless of whether you subscribe to Netflix, you may end up paying for it, said Fred Campbell, a former FCC legal adviser who now heads The Communications Liberty & Innovation Project think tank. 'Instead of raising the price of its own service to cover the additional costs, Netflix wants to offload its additional costs onto all Internet consumers,' Campbell said. 'That's good for Netflix and bad for everyone else in the Internet economy.'"
itwbennett writes "As previously reported on Slashdot, in November of last year, the city of Munich reported savings of over €10 million from its switch to Linux. Microsoft subsequently commissioned a study (conducted by HP) that found that, in fact, 'Munich would have saved €43.7 million if it had stuck with Microsoft.' Now, Microsoft has said it won't release the study, saying that '[it] was commissioned by Microsoft to HP Consulting for internal purposes only.'"
An anonymous reader writes "Radical Islamist hackers have been harassing Egyptologist Kate Phizackerley's online journal Egyptological and her blog KV64. Phizackerley and her team finally got tired of it and shut their online work down. As blogger Roger Pearse says, 'A bunch of violent scumbags... who never have contributed in any way to the web, have successfully interfered with the scientific effort of the entire human race... Next year there will be more.' How do we route around damage like this?"
twoheadedboy writes "Kim Dotcom launched his new project Mega on Sunday, claiming it was to be 'the privacy company.' But it might not be so private after all, as security professionals have ripped it to shreds. There are numerous problems with how encryption is handled, an XSS flaw and users can't change their passwords, they say. But there are suspicions Mega is handing out encryption keys to users and touting strong security to cover its own back. After all, if Kim Dotcom and Co don't know what goes on the site, they might not be liable for copyright prosecutions, as they were for Megaupload, Mega's preprocessor." On this front, reader mask.of.sanity points out a tool in development called MegaCracker that could reveal passwords as users sign up for the site.
theodp writes "The NY Times takes a look at how MIT ensnared Aaron Swartz, but doesn't shed much light on how the incident became a Federal case with Secret Service involvement. Still, the article is interesting with its report that 'E-mails among M.I.T. officials that Tuesday in January 2011 highlight the pressures university officials felt' from JSTOR, which is generally viewed as a good guy in the incident. From the story: 'Ann J. Wolpert, the director of libraries, wrote to Ellen Finnie Duranceau, the official who was receiving JSTOR's complaints: "Has there ever been a situation similar to this when we brought in campus police? The magnitude, systematic and careful nature of the abuses could be construed as approaching criminal action. Certainly, that's how JSTOR views it."' Less than a week later, a Google search reveals, Duranceau notified the MIT community that immediate changes to JSTOR access had to be made lest the University be subjected to a JSTOR 'death sentence.' 'Because JSTOR has recently reported excessive, systematic downloading of articles at MIT,' the post warned, 'we need to add a new layer of access control. This is the only way to prevent recurrence of the abuse and therefore the only way to ensure ongoing access to this valuable resource for the MIT Community.' The post concludes, 'The incidents that prompted this change involved the use of a robot, which is prohibited by JSTOR's Terms and Conditions of Use. ...Continued access to JSTOR and other resources is dependent on the MIT Community complying with these policies.' Hope you enjoyed that freewheeling culture while it lasted, kids — now Everything is a Crime."
hypnosec writes "The Indian Government has decided it won't be using telecom equipment from international vendors, and has barred all such foreign companies from participating in the US$3.8 billion National Optical Fiber Network (NOFN) project — a project aimed at bringing high-speed Internet connectivity to the rural areas of India. The DoT has decided that it will be going ahead with 100 per cent domestic sourcing and has released a list of certified GPON suppliers. This decision comes after the research wing of the ministry, C-DoT, advised the telecom department to bar Chinese companies like ZTE and Huawei, keeping in line with a similar decision by the U.S. In an internal memo, the research body advised the department that both these Chinese companies are a security threat to the telecom world."
judgecorp writes "The European Commission has proposals for data privacy (including the 'right to be forgotten') and the U.S. government is opposing them. Now U.S. activists have arrived in Brussels to lobby against their government's opposition to the European measures. The move comes following reports of 'extreme' lobbying by U.S. authorities against the European proposals." Although the "right to be forgotten" raises some free speech issues, it doesn't seem like a bad idea in principle.
An anonymous reader writes "Reports are coming in that the social coding site GitHub has been blocked in China. While the service has seen blocks in the country before, this appears to be a much broader denial of service, affecting most, if not all users in the world's most populous country online and offline. GitHub released a statement saying: 'GitHub is still investigating, but it does appear that we’re at least being partly blocked by the Great Firewall of China. We’re looking into it, and will update with more information when we have it.'"
judgecorp writes "A UK government contract has confirmed earlier reports that British citizens will have the option to use PayPal to accredit themselves for public services such as the new Universal Credit benefit system. Using PayPal might be a public relations goof, as PayPal's parent eBay is notoriously clever at avoiding UK taxes, recently paying only £1.2 million on profit of £789 million (around 0.15 percent)."
First time accepted submitter norpy writes "The Australian branch of the pirate party has today announced that their registration as a political party has been successful. According to the announcement the party will now turn its attention to selection of candidates and development of policies for the upcoming federal election. 'Organising and validating a membership database to then submit to the AEC for the purposes of registration is a daunting task. Fortunately, we had a team of volunteers who were prepared to spend many weekends ensuring that the list we sent to the AEC was entirely valid, and I thank them for their effort,' said Brendan Molloy, Secretary of Pirate Party Australia."
elashish14 writes "A new survey commissioned by Google suggests that music listeners who utilize P2P filesharing services buy 30% more music than non-sharers. The survey also probed users' opinions on enforcement practices. Users were strongly against either throttling or disconnecting users' internet services, but the majority suggested also that search engines should block access. 52% of Americans also said that downloading infringing content should be a punishable offense."
An anonymous reader writes "On Friday, The Journal News caved under pressure of gun advocates and shut down the interactive maps which contained the names and addresses of licensed gun owners in upstate New York. The maps are still visible on the site, however they are simply static images. The Journal News published the interactive maps on December 23 which caused significant backlash. In a similar move, Gawker published the names of licensed gun owners in New York City without addresses. New York state Senator Greg Ball (Republican) called the removal of the data a 'huge win.' On Saturday, an anonymous user leaked the raw data used to build The Journal News maps."
An anonymous reader writes "An article in the NY Times makes the case that Graph Search, Facebook's recently unveiled social search utility, will be a test for users of the social networking site which will have consequences for the internet at large. The test will show whether people are willing to take the next step in sharing parts of their lives, and whether social search is the future for online interaction. '...the company engineers who created the tool — former Google employees — say that the project will not reach its full potential if Facebook data is "sparse," as they call it. But the company is confident people will share more data, be it the movies they watch, the dentists they trust or the meals that make their mouths water.' CompSci professor Oren Etzioni says it's a watershed moment for the social internet because of the scale at which Facebook operates. A decade ago, people began making the choice to share their lives online; buying into social search would be the biggest step since then. A related post by the Electronic Frontier Foundation can be summed up with this single line: 'If you walk down a crowded public street, you are probably seen by dozens of people—but it would still feel creepy for anyone to be able to look up a list of every road you've walked down.'"
theodp writes "If Aaron Swartz downloaded JSTOR documents without paying for them, it would presumably be considered a crime by the USDOJ. But if U.S. Attorney Carmen Ortiz or U.S. Attorney General Eric Holder did the same? Rather than a crime, it would be considered their entitlement, a perk of an elite education that's paid for by their alma maters. Ironically and sadly, that's the kind of inequity Aaron railed against with the Guerilla Open Access Manifesto, a document the DOJ cited as evidence (pdf) that Swartz was a menace to society. On Thursday, Ortiz insisted Swartz — who she now characterizes as 'mentally ill' — received fair and reasonable treatment from the DOJ. But that wasn't good enough for Senator John Cornyn, who on Friday asked Eric Holder to explain the DOJ prosecution of Aaron Swartz." Federal prosecutors have come under heavy criticism for their handling of the Swartz case. Legal scholar Orin Kerr provides counterpoint with two detailed, well-reasoned posts about the case. Kerr says that, as the law stands, the charges against Swartz were "pretty much legit," and that the law itself should be the target of the internet community's angst, rather than the prosecutors. "...blame the system and aim to reform the system; don’t think that this was just two or three prosecutors that were doing something unusual. It wasn’t." James Boyle, co-founder of the Center for the Study of the Public Domain, disagrees with Kerr (partly), arguing that Swartz's renown is simply drawing people together to collectively shine a light on poor legislation and poor prosecutorial practices.
dstates writes "The Department of Health and Human Services has released newly revised rules for the Health Information Privacy and Accountability Act (HIPAA) to ensure patient access to electronic copies of their electronic medical records. Several years ago, there was a great deal of excitement about personalized health information management (e.g. Microsoft HealthVault and Google Health). Unfortunately, patients found it difficult to obtain their medical records from providers in formats that could easily be imported. Personalized health records were time consuming and difficult to maintain, so these initiatives have not lived up to their expectations (e.g. Google Health has been discontinued). The new rules should address this directly and hopefully will revitalize interest in personal health information management. The new HIPAA rules also greatly strengthen patient privacy, the ability of patients to control who sees their medical information, and increases the penalties for leaking medical records information. 'Much has changed in health care since HIPAA was enacted over fifteen years ago,' said HHS Secretary Kathleen Sebelius. 'The new rule will help protect patient privacy and safeguard patients' health information in an ever expanding digital age.'"
New submitter SkinnyFatSmoothNeck writes "I'll be taking a long train ride in the coming month and I'm looking for ideas and recommendations on anti-theft devices to be used for carry-on luggage. The obvious precautions are always taken: never letting the bag out my sight, wrapping the bag strap around my leg while stowed and so on. But as this is a long ride, there will be a couple of nights involved. The first thing that came to my mind is a two-part device that triggers based on a specified proximity and is controlled from a remote (ie.: the device would be placed inside the bag and trigger a loud alarm if it strays outside of range). Perhaps a more advanced, albeit more expensive, device could also include GPS tracking. But beyond that, what other creative, ingenious or downright sensible solutions do you have to offer?"
An anonymous reader writes "Google on Friday announced yet another security improvement for Chrome 25. In addition to killing silent extension installation, the omnibox in Google's browser will send all searches over a Secure Sockets Layer (SSL) connection. Chrome already does this for users who are signed in to Google: when they search from the address bar, their queries are sent over HTTPS. As of Chrome 25, however, the same will happen for users who aren't signed in to Google."
An anonymous reader writes "The Scientific and Technical Research Council of Turkey (TÜBITAK) has put a stop to the publication and sale of all books in its archives that support the theory of evolution, daily Radikal has reported. The books have long been listed as “out of stock” on TÜBTAK's website, but their further publication is now slated to be stopped permanently. Titles by Richard Dawkins, Alan Moorehead, Stephen Jay Gould, Richard Levontin and James Watson are all included in the list of books that will no longer be available to Turkish readers. In early 2009, a huge uproar occurred when the cover story of a publication by TÜBITAK was pulled, reportedly because it focused on Darwin’s theory of evolution."
An anonymous reader writes "You don't necessarily have to a hacker to be viewed as one under federal law. ProPublica breaks down acts of 'hacktivism' to see what is considered criminal under the Computer Fraud and Abuse Act. It points out that both Aaron Swartz and Bradley Manning were charged under the CFAA. Quoting: 'A DDoS attack can be charged as a crime under the CFAA, as it “causes damage” and can violate a web site’s terms of service. The owner of the site could also file a civil suit citing the CFAA, if they can prove a temporary server overload resulted in monetary losses. ... The charges for doxing depend on how the information was accessed, and the nature of published information. Simply publishing publicly available information, such as phone numbers found in a Google search, would probably not be charged under the CFAA. But hacking into private computers, or even spreading the information from a hack, could lead to charges under the CFAA.'"