×
Caldera

SCO Asked O'Gara To Smear Groklaw 96

I Don't Believe in Imaginary Property writes "PJ of Groklaw has found some really interesting documents coming out of the never-ending SCO trial. Specifically, in SCO v. Novell, SCO doesn't want the jury to find out about the email Blake Stowell (then a PR guy for SCO) sent to Maureen O'Gara that asked her to 'send a jab PJ's way.' For those who don't remember that far back in the SCO saga, the 'jab' was when O'Gara wrote an inaccurate, rambling and irrelevant 'exposé' on PJ which got O'Gara fired for violating journalistic ethics after angry readers complained to the publisher — an act which caused Ms. O'Gara to tell SCO, 'I want war pay.' For those wondering how they can keep going after that final judgment against SCO over a year ago, it's hard to do the saga justice without glossing over everything, but the short version is that SCO ran to bankruptcy after they were mostly dead, but before becoming completely dead. That automatically stopped all the cases against SCO due to standard bankruptcy court rules, then SCO effectively re-litigated a bunch of issues via bankruptcy court rules. Currently, they're accusing Novell of 'slander of title' over copyrights that two different courts have ruled SCO does not own, and we're waiting to see if a jury will reach the same conclusion. They're also trying to use the company's lawsuits as assets and to sell them to various SCO insiders so that the legal wranglings can continue even if nothing is left of SCO. From the very start, SCO has always been the type to fight dirty."
Iphone

Apple's iPhone Developer License Agreement Revealed 483

nigham writes "The EFF is publicly disclosing a version of Apple's iPhone developer program license agreement. The highlights: you can't disclose the agreement itself (the EFF managed to get it via the Freedom of Information Act thanks to NASA's recent app), Apple reserves the right to kill your app at any time with no reason, and Apple's liability in any circumstance is limited to 50 bucks. There's also this gem: 'You will not, through use of the Apple Software, services or otherwise create any Application or other program that would disable, hack, or otherwise interfere with the Security Solution, or any security, digital signing, digital rights management, verification or authentication mechanisms implemented in or by the iPhone operating system software, iPod Touch operating system software, this Apple Software, any services or other Apple software or technology, or enable others to do so.' The entire agreement (PDF) is up at the EFF's site."
Advertising

Power To the Pop-Ups 204

Slashdot frequent contributor Bennett Haselton writes a piece advocating for Pop-Ups and even more obtrusive advertising. But not for the reasons you might think. He says "Annoying pop-up ads have been a great friend to Internet freedom, by enabling the operation of proxy sites that would be too expensive to operate otherwise. With the rising costs of making new proxy sites to stay ahead of the 'censorware' companies, even more intrusive ads could be an even bigger friend to Internet freedom. Got any ideas for how those more intrusive ads could work?" Clicky clicky below to read his point.
Communications

USPTO To Review Controversial VoIP Patent 35

alphadogg writes "The US Patent and Trademark Office has agreed to review a controversial patent issued in 2001 that is claimed to cover much of the technology underlying VoIP. The patent, held by a small company called C2 Communications Technologies, is one of 10 that the Electronic Frontier Foundation has been trying to strike down for several years through its Patent Busting Project. On Friday, the patent office granted the EFF's request for a re-examination. The digital civil-liberties organization argued that another applicant had submitted basically some of the same technology to the patent office before C2 did. Patent No. 6,243,373, 'Method and apparatus for implementing a computer network/Internet telephone system,' is credited to David L. Turock as inventor and is owned by C2, previously called Acceris Communications Technologies."
Education

UCLA Profs Banned From Posting Course Videos 134

I Don't Believe in Imaginary Property writes "As of Winter Quarter 2010, UCLA professors will no longer be able to post videos on their course websites. Although they've long relied upon fair use protections for educational use, the Association for Information Media and Equipment has made claims that they're copyright infringers, even though the videos are only available on campus and the students are allowed to watch the videos in the Instructional Media Lab. Even though they believe their use of the materials to be fair, the UCLA has decided to back down rather than face litigation. Many professors have commented that this will hurt students, because they now have to watch all videos at the IML, which isn't open on weekends, forcing students to try to fit assigned videos between classes."
Microsoft

Craig Mundie Wants "Internet Driver's Licenses" 427

I Don't Believe in Imaginary Property writes "Craig Mundie, Microsoft's Chief Research and Strategy Officer, called for the creation of an 'Internet Driver's License' at the World Economic Forum in Davos, saying, 'If you want to drive a car you have to have a license to say that you are capable of driving a car, the car has to pass a test to say it is fit to drive and you have to have insurance.' Of course, there are quite a few problems with this. For starters, internet use cannot yet cause death or dismemberment like car accidents can; and this would get rid of most of the good of internet anonymity while retaining all of the bad parts, especially in terms of expanding the market for stolen identities. Even though telephone networks have long been used by scammers and spammers/telemarketers, we've never needed a 'Telephone Driver's License.'"
Privacy

De-Anonymizing Social Network Users 88

An anonymous reader writes "The H has an article about some researchers who found a new way to de-anonymize people. Compared to the EFF's Panopticlick, the goal of this experiment is not to identify a user's browser uniquely, but to identify individual users. The test essentially exploits the fact that many social network users are identifiable by their membership of various groups. According to the researchers, it's very unlikelly that two people on any social network will belong to exactly the same groups. A 'group fingerprint' can thus allow websites to identify previously anonymous visitors. They describe the setup and all details and the results look very interesting. They also have a live demo for the social network Xing that was able to de-anonymize me."
Encryption

Parallel Algorithm Leads To Crypto Breakthrough 186

Hugh Pickens writes "Dr. Dobbs reports that a cracking algorithm using brute force methods can analyze the entire DES 56-bit keyspace with a throughput of over 280 billion keys per second, the highest-known benchmark speeds for 56-bit DES decryption and can accomplish a key recovery that would take years to perform on a PC, even with GPU acceleration, in less than three days using a single, hardware-accelerated server with a cluster of 176 FPGAs. The massively parallel algorithm iteratively decrypts fixed-size blocks of data to find keys that decrypt into ASCII numbers. Candidate keys that are found in this way can then be more thoroughly tested to determine which candidate key is correct." Update by timothy, 2010-01-29 19:05 GMT: Reader Stefan Baumgart writes to point out prior brute-force methods using reprogrammable chips, including Copacobana (PDF), have achieved even shorter cracking times for DES-56. See also this 2005 book review of Brute Force, about the EFF's distributed DES-breaking effort that succeeded in 1997 in cracking a DES-encrypted message.
Government

FCC's Net Neutrality Plan Blocks BitTorrent 303

master_p writes "The FCC's formally issued draft net neutrality regulations have a huge copyright loophole in them; a loophole that would theoretically permit Comcast to block BitTorrent just like it did in 2007 — simply by claiming that it was 'reasonable network management' intended to 'prevent the unlawful transfer of content.' The new proposed net neutrality regulations would allow the same practices that net neutrality was first invoked to prevent, even if these ISP practices end up inflicting collateral damage on perfectly lawful content and activities."
Privacy

Tracking Browsers Without Cookies Or IP Addresses? 265

Peter Eckersley writes "The EFF has launched a research project called Panopticlick, to determine whether seemingly innocuous browser configuration information (like User Agent strings, plugin versions and fonts) may create unique fingerprints that allow web users to be tracked, even if they limit or delete cookies. Preliminary results indicate that the User Agent string alone has 10.5 bits of entropy, which means that for a typical Internet user, only one in about 1,500 (2 ^ 10.5) others will share their User Agent string. If you visit Panopticlick, you can get a reading of how rare or unique your browser configuration is, as well as helping EFF to collect better data about this problem and how best to defend against it." I remember laughing years ago when I would see users who had modified their user agent string with some sort of defiant pro-privacy message, without realizing that their action made them uniquely identifiable out of hundreds of thousands of others.

Universal, Pay Those EFFing Lawyers 335

Slashdot frequent contributor Bennett Haselton writes "The EFF is seeking over $400,000 in attorney's fees from Universal Music Group after Universal sent a DMCA takedown notice to YouTube, demanding the removal of a video posted by user Stephanie Lenz. Lenz had posted a video of her toddler dancing to a 30-second clip of the Prince song "Let's Go Crazy"; after Universal sent the takedown notice, the EFF sent YouTube a counter-notice on behalf of Lenz arguing that the video was fair use, and YouTube restored it. Now the EFF is asking the judge to award them attorney's fees for their work." Use your magical clicking device below to read many more words.
Image

Facebook Master Password Was "Chuck Norris" Screenshot-sm 319

I Don't Believe in Imaginary Property writes "A Facebook employee has given a tell-all interview with some very interesting things about Facebook's internals. Especially interesting are all the things relating to Facebook privacy. Basically, you don't have any. Nearly everything you've ever done on the site is recorded into a database. While they fire employees for snooping, more than a few have done it. There's an internal system to let them log into anyone's profile, though they have to be able to defend their reason for doing so. And they used to have a master password that could log into any Facebook profile: 'Chuck Norris.' Bruce Schneier might be jealous of that one."
Government

RIAA Wants Limits On Net Neutrality So ISPs Can Police File Sharing 173

Presto Vivace writes "Reporting for Computer World, Grant Gross writes that the RIAA is asking the FCC not to make the net neutrality rules so strict that they 'would limit broadband providers' [flexibility] to "address" illegal online file sharing.' It seems the RIAA is unclear on the concept of the Fourth Amendment. 'The FCC should not only avoid rules prohibiting ISPs from blocking illegal file trading, but it should actively encourage ISPs to do so, the RIAA said. ... Other groups called on the FCC to stay out of the copyright enforcement business. If ISPs are required to check for copyright infringement, they could interfere with legal online activities, said six digital rights and business groups, including Public Knowledge, the Consumer Electronics Association and the Electronic Frontier Foundation.'"
Books

DRM and the Destruction of the Book 419

Hugh Pickens writes "EFF reports that Cory Doctorow spoke to a crowd of about a hundred librarians, educators, publishers, authors, and students at the National Reading Summit on How to Destroy the Book and said that 'anyone who claims that readers can’t and won’t and shouldn’t own their books are bent on the destruction of the book, the destruction of publishing, and the destruction of authorship itself.' Doctorow says that for centuries, copyright has acknowledged that sacred connection between readers and their books and that when you own a book 'it’s yours to give away, yours to keep, yours to license or to borrow, to inherit or to be included in your safe for your children' and that 'the most important part of the experience of a book is knowing that it can be owned.'"
Encryption

Quantum Encryption Implementation Broken 133

I Don't Believe in Imaginary Property writes "Professor Johannes Skaar's Quantum Hacking group at NTNU have found a new way to break quantum encryption. Even though quantum encryption is theoretically perfect, real hardware isn't, and they exploit these flaws. Their technique relies on a particular way of blinding the single photon detectors so that they're able to perform an intercept-resend attack and get a copy of the secret key without giving away the fact that someone is listening. This attack is not merely theoretical, either. They have built an eavesdropping device and successfully attacked their own quantum encryption hardware. More details can be found in their conference presentation."
Communications

Verizon Defends Doubling of Early Termination Fee 319

I Don't Believe in Imaginary Property writes "Verizon is defending its decision to double its Early Termination Fee from $175 to $350 after being called to account by the FCC. They claim it's because the higher fees allow them to offer more expensive phones with a lower up-front cost (PDF), and they also say that because they pro-rate the fee depending on how much of your contract is left, they still lose money. Apparently doing something about the Verizon customer service horror stories isn't as good a way to retain customers as telling them that they have to pay several hundred dollars to leave."
Television

"Loud Commercial" Legislation Proposed In US Congress 636

Hackajar writes "Have you ever caught yourself running for the volume control when a TV commercial comes on? Congresswoman Anna Eshoo (D-CA) has, and is submitting legislation that would require TV commercials in the US to stay at volume levels similar to the programming they are associated with. From the article: 'Right now, the government doesn't have much say in the volume of TV ads. It's been getting complaints ever since televisions began proliferating in the 1950s. But the FCC concluded in 1984 there was no fair way to write regulations controlling the "apparent loudness" of commercials.'"
Bug

Office 2003 Bug Locks Owners Out 247

I Don't Believe in Imaginary Property writes "A Microsoft Office 2003 bug is locking people out of their own files, specifically those protected with Microsoft's Rights Management Service. Microsoft has a TechNet bulletin on the issue with a fix. It looks like they screwed up and let a certificate expire. There's no information on when the replacement certificate will expire, though, or what will happen when it does."
The Internet

Israeli ISPs Caught Interfering With P2P Traffic 139

Fuzzzy writes "For a long time, people have suspected that Israeli ISPs are blocking or delaying P2P traffic. However, no hard evidence was provided, and the ISPs denied any interference. Today Ynetnews published a report on comprehensive research that for the first time proves those suspicions. Using Glasnost and Switzerland, an Internet attorney / blogger found evidence of deep packet inspection and deliberate delays. From the article: 'Since 2007 Ynet has received complaints according to which Israeli ISPs block P2P traffic. Those were brought to the media and were dismissed by the ISPs. Our findings were that there is direct and deliberate interference in P2P traffic by at least two out of the three major ISPs and that this interference exists by both P2P caching and P2P blocking.'"
Censorship

Ambassador Claims ACTA Secrecy Necessary 407

I Don't Believe in Imaginary Property writes "According to Ambassador Ron Kirk, the head of US Trade Representatives, the secrecy around the ACTA copyright treaty is necessary because without that secrecy, people would be 'walking away from the table.' If you don't remember, that treaty is the one where leaks indicate that it may contain all sorts of provisions for online copyright enforcement, like a global DMCA with takedown and anti-circumvention restrictions, three-strikes laws to terminate offending internet connections, and copyright cops. FOIA requests for the treaty text have been rebuffed over alleged 'national security' concerns. One can only hope that what he has said is true and that sites like Wikileaks will help tear down the veil of secrecy behind which they're negotiating our future."

Slashdot Top Deals