Titus Andronicus writes "fuse-exfat, a GPLv3 implementation of the exFAT file system for Linux, FreeBSD, and OS X, has reached 1.0 status, according to an announcement from Andrew Nayenko, the primary developer. exFAT is a file system designed for sneaker-netting terabyte-scale files and groups of files on flash drives and memory cards between and among Windows, OS X, and consumer electronics devices. It was introduced by Microsoft in late 2006. Will fuse-exfat cut into Microsoft's juicy exFAT licensing revenue? Will Microsoft litigate fuse-exfat's developers and users into patent oblivion? Will there be a DKMS dynamic kernel module version of the software, similar to the ZFS on Linux project? All that remains to be seen. ReadWrite, The H, and Phoronix cover the story."
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×
An anonymous reader writes "Yesterday in a post at the White House website, the U.S. government announced that June 1-2 would be the National Day of Civic Hacking. 'Civic Hacking Day is an opportunity for software developers, technologists, and entrepreneurs to unleash their can-do American spirit by collaboratively harnessing publicly-released data and code to create innovative solutions for problems that affect Americans.' It will be a joint project with Random Hacks of Kindness, Code for America. Activities are being planned in many cities across the country, and you can also sign up to host your own event. It's nice to see the government use the word 'hacking' in a positive way, since most uses of the term these days involve malicious activity."
judgecorp writes "The latest Google Transparency Report, which tallies the number of times personal data is requested from Google, shows that governments are becoming more inquisitive than ever. Requests for user data have gone up by 70 percent since Google started these reports in 2009 — but the report shows Google is getting better at saying no: in 2009 it complied — fully or partially — with 76 percent of requests, and that figure is now down to 66 percent." This report is the first to feature requests broken down by the legal process used.
Curseyoukhan writes with a skeptical perspective on the U.S. Cyberwar posturing. From the article: "The first shot was probably the release of Stuxnet sometime during or before 2009. Even though no one has officially claimed responsibility everyone knows who was behind it. Stuxnet hit with a bang and did a whole lot of damage to Iran's uranium-enrichment capabilities. We followed up Stuxnet with Flame — the Ebola virus of spyware. What did the Iranians fire back with? A series of massive, on-going and ineffective DDoS attacks on American banks. This is a disproportionate response but not in the way military experts usually mean that phrase. It's the equivalent of someone stealing your car and you throwing an ever-increasing number of eggs at his house in response. It's fascinating that Iran continues to do nothing more despite the fact that U.S. critical infrastructure currently has the defensive posture of a dog waiting for a belly rub. Keep that in mind the next time you hear that a 'cyber Pearl Harbor' is imminent."
theodp writes "There's a funny thing about the estimated $1.7 trillion that American companies say they have indefinitely invested overseas,' reports the WSJ's Kate Linebaugh (reg. or the old Google trick). 'A lot of it is actually sitting right here at home.' And if tech companies like Google and Microsoft want to keep more than three-quarters of the cash owned by their foreign subsidiaries at U.S. banks, held in U.S. dollars or parked in U.S. government and corporate securities, Linebaugh explains, this money is still overseas in the eyes of the IRS and isn't taxed as long as it doesn't flow back to the U.S. parent company. Helping corporations avoid the need to tap their foreign-held cash are low interest rates at home, which have allowed U.S. companies to borrow cheaply. Oracle, for instance, raised $5 billion last year, paying an interest rate roughly two-thirds of a percentage point above the low post-crash Treasury yield, about 2.5% at the time (by contrast, grad students and parents pay 6.8%-7.9% for Federal student loans). Were the funds it manages to keep in the hands of its foreign subsidiaries brought home and subjected to U.S. income tax, Oracle estimated it could owe Uncle Sam about $6.3 billion."
An anonymous reader writes with more news about the no-poach agreements that seemed to plague tech companies. From the article: "Steve Jobs threatened patent litigation if Palm wouldn't agree to stop hiring Apple employees, says former Palm CEO Edward Colligan in a statement dated August 7th, 2012. The allegation is backed up by a trove of recently-released evidence that shows just how deeply Silicon Valley's no-hire agreements pervaded in the mid-2000s. Apple, Google, Intel, and others are the focus of a civil lawsuit into the 'gentleman's agreements,' in which affected employees are fighting for class action status and damages from resulting lost wages, potentially reaching into the hundreds of millions of dollars."
TrueSatan writes "Andrew Auernheimer doesn't appear suicidal, no thanks to U.S. prosecutors, yet he has been under attack for his act of altering an API URL that revealed a set of user data and posting details of same. 'In June of 2010 there was an AT&T webserver on the open Internet. There was an API on this server, a URL with a number at the end. If you incremented this number, you saw the next iPad 3G user email address. I thought it was egregiously negligent for AT&T to be publishing a complete target list of iPad 3G owners, and I took a sample of the API output to a journalist at Gawker.' Auernheimer has been under investigation from that point onward, with restrictions on his freedom and ability to earn a living that are grossly disproportionate to any perceived crime. This is just as much a case of legislative overreach and the unfettered power of prosecutors as was Swartz's case."
An anonymous reader writes "As first-person shooters have evolved, they've transitioned from using Nazis as the bad guys to more modern organizations, such as the Taliban. Two recent games, Call of Duty: Black Ops II and Medal of Honor: Warfighter, have both shown the country of Pakistan in a very negative light, and now shopkeepers in the country are beginning to boycott the games. 'Saleem Memon, president of the All Pakistan CD, DVD, Audio Casette Traders and Manufacturers Association, said he had written to members ordering them not to stock the controversial games after receiving dozens of complaints. ... The latest installment of the Medal of Honor series opens with American Navy Seals coming ashore in Karachi docks on a mission to destroy a black market arms shipment. But when their detonation sets off a second, bigger explosion they realize they have stumbled on a much bigger terrorist plot, sparking a global manhunt. A chaotic car chase through the city follows amid warnings that the ISI — Pakistan's intelligence agency — is on the way. Mr. Memon added there was a danger children would be brainwashed into thinking foreign agents were at war inside Karachi, possibly leading them into the arms of militants. "These games show a misleading idea of what is happening in the city. You don't get the CIA all the way through Grand Theft Auto," he said.'"
An anonymous reader writes "Australian surgeon Guy Hingston is suing Google in the U.S. for 'auto-complete' defamation. Typing in his name brings up 'Guy Hingston bankrupt' in the auto-complete. The association seems to have come about because Hingston purchased an aviation group CoastJet which went bankrupt two-and-a-half years later. Hingston himself was also bankrupted. Hingston claims this association has cost him customers and is suing Google for $75k, plus court costs. Google has often found itself the target of litigation over auto-complete searches. Are auto-complete results even useful? Should Google be policing the auto-complete suggestions?"
jfruh writes "Call it Google Analytics for physical storefronts: if you've got a phone with wi-fi, stores can detect your MAC address and track your comings and goings, determining which aisles you go to and whether you're a repeat customer. The creator of one of the most popular tracking software packages says that the addresses are hashed and not personally identifiable, but it might make you think twice about leaving your phone on when you head to the mall."
Velcroman1 writes "At the 2013 Consumer Electronics Show, Netflix announced Super HD, an immersive theatrical video format that looks more lifelike than any Web stream, even competing with Blu-Ray discs. But there's a costly catch. To watch the high-definition, 1080p movies when they debut later this year, you'll need a specific Internet Service Provider. Those on Cablevision or Google Fiber are in; those served by Time Warner or a host of smaller providers will be out of luck. But regardless of whether you subscribe to Netflix, you may end up paying for it, said Fred Campbell, a former FCC legal adviser who now heads The Communications Liberty & Innovation Project think tank. 'Instead of raising the price of its own service to cover the additional costs, Netflix wants to offload its additional costs onto all Internet consumers,' Campbell said. 'That's good for Netflix and bad for everyone else in the Internet economy.'"
itwbennett writes "As previously reported on Slashdot, in November of last year, the city of Munich reported savings of over €10 million from its switch to Linux. Microsoft subsequently commissioned a study (conducted by HP) that found that, in fact, 'Munich would have saved €43.7 million if it had stuck with Microsoft.' Now, Microsoft has said it won't release the study, saying that '[it] was commissioned by Microsoft to HP Consulting for internal purposes only.'"
An anonymous reader writes "Radical Islamist hackers have been harassing Egyptologist Kate Phizackerley's online journal Egyptological and her blog KV64. Phizackerley and her team finally got tired of it and shut their online work down. As blogger Roger Pearse says, 'A bunch of violent scumbags... who never have contributed in any way to the web, have successfully interfered with the scientific effort of the entire human race... Next year there will be more.' How do we route around damage like this?"
twoheadedboy writes "Kim Dotcom launched his new project Mega on Sunday, claiming it was to be 'the privacy company.' But it might not be so private after all, as security professionals have ripped it to shreds. There are numerous problems with how encryption is handled, an XSS flaw and users can't change their passwords, they say. But there are suspicions Mega is handing out encryption keys to users and touting strong security to cover its own back. After all, if Kim Dotcom and Co don't know what goes on the site, they might not be liable for copyright prosecutions, as they were for Megaupload, Mega's preprocessor." On this front, reader mask.of.sanity points out a tool in development called MegaCracker that could reveal passwords as users sign up for the site.
theodp writes "The NY Times takes a look at how MIT ensnared Aaron Swartz, but doesn't shed much light on how the incident became a Federal case with Secret Service involvement. Still, the article is interesting with its report that 'E-mails among M.I.T. officials that Tuesday in January 2011 highlight the pressures university officials felt' from JSTOR, which is generally viewed as a good guy in the incident. From the story: 'Ann J. Wolpert, the director of libraries, wrote to Ellen Finnie Duranceau, the official who was receiving JSTOR's complaints: "Has there ever been a situation similar to this when we brought in campus police? The magnitude, systematic and careful nature of the abuses could be construed as approaching criminal action. Certainly, that's how JSTOR views it."' Less than a week later, a Google search reveals, Duranceau notified the MIT community that immediate changes to JSTOR access had to be made lest the University be subjected to a JSTOR 'death sentence.' 'Because JSTOR has recently reported excessive, systematic downloading of articles at MIT,' the post warned, 'we need to add a new layer of access control. This is the only way to prevent recurrence of the abuse and therefore the only way to ensure ongoing access to this valuable resource for the MIT Community.' The post concludes, 'The incidents that prompted this change involved the use of a robot, which is prohibited by JSTOR's Terms and Conditions of Use. ...Continued access to JSTOR and other resources is dependent on the MIT Community complying with these policies.' Hope you enjoyed that freewheeling culture while it lasted, kids — now Everything is a Crime."