Government

Entertainment Industry's Dystopia of the Future 394

renek writes "If you think the RIAA/MPAA's tactics have been outlandish, laughable, and disconcerting in the past, you haven't seen anything yet. From government-mandated spyware that deletes infringing content to border searches of media players, this reads like an Orwellian nightmare. Given the US government's willingness to bend over for Big Media it wouldn't be terribly surprising to see how far this goes and how under the radar it stays."
Censorship

Chinese Reactions To Google Leaving China 249

I Don't Believe in Imaginary Property writes "Most people have already heard western media reactions to Google leaving China proper and redirecting search traffic to its Hong Kong branch, but ChinaSMACK has translated comments from average Chinese internet users so that non-Chinese can understand how the Chinese public feels. While many of them are supportive of the government on some level, they were able to obtain many comments by those critical of the government before they could be 'harmonized' (deleted) and translated those as well. The deleted comments often complain about the wumao (50 cent party), government employees who are paid 50 cents RMB per post supporting the government, and worry that the Chinese Internet will become a Chinese LAN."
Google

Dueling Summary Judgment Motions In Viacom v. YouTube 89

I Don't Believe in Imaginary Property writes "Eric Goldman, an Associate Professor of Law at Santa Clara University School of Law, has an excellent analysis of the dueling summary judgment motions in Viacom v. YouTube. Basically, both sides have been trotting out the most damning things they can find and asking the judge to rule against the other party. Viacom is mad that Chad Hurley, one of YouTube's co-founders, lost his email archive and couldn't remember some old emails. Worse, YouTube founder Karim once uploaded infringing content. But then Google points out that only a very small percentage of the users are engaged in infringing activity (some 0.016% of all YouTube accounts have been deleted for infringement), one of the clips Viacom is suing over is only one second long (what about fair use?), and most of YouTube's content is non-infringing, including the campaign videos which all major US presidential candidates posted to YouTube." (More below.)
Crime

Federal Agents Quietly Using Social Media 171

SpuriousLogic passes along this excerpt from the ChiTrib: "The Feds are on Facebook. And MySpace, LinkedIn, and Twitter, too. US law enforcement agents are following the rest of the Internet world into popular social-networking services, going undercover with false online profiles to communicate with suspects and gather private information, according to an internal Justice Department document that offers a tantalizing glimpse of issues related to privacy and crime-fighting. ... The document... makes clear that US agents are already logging on surreptitiously to exchange messages with suspects, identify a target's friends or relatives and browse private information such as postings, personal photographs, and video clips. Among other purposes: Investigators can check suspects' alibis by comparing stories told to police with tweets sent at the same time about their whereabouts. Online photos from a suspicious spending spree... can link suspects or their friends to robberies or burglaries." The FoIA lawsuit was filed by the EFF, which has posted two documents obtained from the action, from the DoJ and Internal Revenue (more will be coming later). The rights group praises the IRS for spelling out limitations and prohibitions on deceptive use of social media by its agents — unlike the DoJ. The US Marshalls and the BATFE could not find any documents related to the FoIA request, so presumably they have no guidelines or prohibitions in this area.
Caldera

SCO Asked O'Gara To Smear Groklaw 96

I Don't Believe in Imaginary Property writes "PJ of Groklaw has found some really interesting documents coming out of the never-ending SCO trial. Specifically, in SCO v. Novell, SCO doesn't want the jury to find out about the email Blake Stowell (then a PR guy for SCO) sent to Maureen O'Gara that asked her to 'send a jab PJ's way.' For those who don't remember that far back in the SCO saga, the 'jab' was when O'Gara wrote an inaccurate, rambling and irrelevant 'exposé' on PJ which got O'Gara fired for violating journalistic ethics after angry readers complained to the publisher — an act which caused Ms. O'Gara to tell SCO, 'I want war pay.' For those wondering how they can keep going after that final judgment against SCO over a year ago, it's hard to do the saga justice without glossing over everything, but the short version is that SCO ran to bankruptcy after they were mostly dead, but before becoming completely dead. That automatically stopped all the cases against SCO due to standard bankruptcy court rules, then SCO effectively re-litigated a bunch of issues via bankruptcy court rules. Currently, they're accusing Novell of 'slander of title' over copyrights that two different courts have ruled SCO does not own, and we're waiting to see if a jury will reach the same conclusion. They're also trying to use the company's lawsuits as assets and to sell them to various SCO insiders so that the legal wranglings can continue even if nothing is left of SCO. From the very start, SCO has always been the type to fight dirty."
Iphone

Apple's iPhone Developer License Agreement Revealed 483

nigham writes "The EFF is publicly disclosing a version of Apple's iPhone developer program license agreement. The highlights: you can't disclose the agreement itself (the EFF managed to get it via the Freedom of Information Act thanks to NASA's recent app), Apple reserves the right to kill your app at any time with no reason, and Apple's liability in any circumstance is limited to 50 bucks. There's also this gem: 'You will not, through use of the Apple Software, services or otherwise create any Application or other program that would disable, hack, or otherwise interfere with the Security Solution, or any security, digital signing, digital rights management, verification or authentication mechanisms implemented in or by the iPhone operating system software, iPod Touch operating system software, this Apple Software, any services or other Apple software or technology, or enable others to do so.' The entire agreement (PDF) is up at the EFF's site."
Advertising

Power To the Pop-Ups 204

Slashdot frequent contributor Bennett Haselton writes a piece advocating for Pop-Ups and even more obtrusive advertising. But not for the reasons you might think. He says "Annoying pop-up ads have been a great friend to Internet freedom, by enabling the operation of proxy sites that would be too expensive to operate otherwise. With the rising costs of making new proxy sites to stay ahead of the 'censorware' companies, even more intrusive ads could be an even bigger friend to Internet freedom. Got any ideas for how those more intrusive ads could work?" Clicky clicky below to read his point.
Communications

USPTO To Review Controversial VoIP Patent 35

alphadogg writes "The US Patent and Trademark Office has agreed to review a controversial patent issued in 2001 that is claimed to cover much of the technology underlying VoIP. The patent, held by a small company called C2 Communications Technologies, is one of 10 that the Electronic Frontier Foundation has been trying to strike down for several years through its Patent Busting Project. On Friday, the patent office granted the EFF's request for a re-examination. The digital civil-liberties organization argued that another applicant had submitted basically some of the same technology to the patent office before C2 did. Patent No. 6,243,373, 'Method and apparatus for implementing a computer network/Internet telephone system,' is credited to David L. Turock as inventor and is owned by C2, previously called Acceris Communications Technologies."
Education

UCLA Profs Banned From Posting Course Videos 134

I Don't Believe in Imaginary Property writes "As of Winter Quarter 2010, UCLA professors will no longer be able to post videos on their course websites. Although they've long relied upon fair use protections for educational use, the Association for Information Media and Equipment has made claims that they're copyright infringers, even though the videos are only available on campus and the students are allowed to watch the videos in the Instructional Media Lab. Even though they believe their use of the materials to be fair, the UCLA has decided to back down rather than face litigation. Many professors have commented that this will hurt students, because they now have to watch all videos at the IML, which isn't open on weekends, forcing students to try to fit assigned videos between classes."
Microsoft

Craig Mundie Wants "Internet Driver's Licenses" 427

I Don't Believe in Imaginary Property writes "Craig Mundie, Microsoft's Chief Research and Strategy Officer, called for the creation of an 'Internet Driver's License' at the World Economic Forum in Davos, saying, 'If you want to drive a car you have to have a license to say that you are capable of driving a car, the car has to pass a test to say it is fit to drive and you have to have insurance.' Of course, there are quite a few problems with this. For starters, internet use cannot yet cause death or dismemberment like car accidents can; and this would get rid of most of the good of internet anonymity while retaining all of the bad parts, especially in terms of expanding the market for stolen identities. Even though telephone networks have long been used by scammers and spammers/telemarketers, we've never needed a 'Telephone Driver's License.'"
Privacy

De-Anonymizing Social Network Users 88

An anonymous reader writes "The H has an article about some researchers who found a new way to de-anonymize people. Compared to the EFF's Panopticlick, the goal of this experiment is not to identify a user's browser uniquely, but to identify individual users. The test essentially exploits the fact that many social network users are identifiable by their membership of various groups. According to the researchers, it's very unlikelly that two people on any social network will belong to exactly the same groups. A 'group fingerprint' can thus allow websites to identify previously anonymous visitors. They describe the setup and all details and the results look very interesting. They also have a live demo for the social network Xing that was able to de-anonymize me."
Encryption

Parallel Algorithm Leads To Crypto Breakthrough 186

Hugh Pickens writes "Dr. Dobbs reports that a cracking algorithm using brute force methods can analyze the entire DES 56-bit keyspace with a throughput of over 280 billion keys per second, the highest-known benchmark speeds for 56-bit DES decryption and can accomplish a key recovery that would take years to perform on a PC, even with GPU acceleration, in less than three days using a single, hardware-accelerated server with a cluster of 176 FPGAs. The massively parallel algorithm iteratively decrypts fixed-size blocks of data to find keys that decrypt into ASCII numbers. Candidate keys that are found in this way can then be more thoroughly tested to determine which candidate key is correct." Update by timothy, 2010-01-29 19:05 GMT: Reader Stefan Baumgart writes to point out prior brute-force methods using reprogrammable chips, including Copacobana (PDF), have achieved even shorter cracking times for DES-56. See also this 2005 book review of Brute Force, about the EFF's distributed DES-breaking effort that succeeded in 1997 in cracking a DES-encrypted message.
Government

FCC's Net Neutrality Plan Blocks BitTorrent 303

master_p writes "The FCC's formally issued draft net neutrality regulations have a huge copyright loophole in them; a loophole that would theoretically permit Comcast to block BitTorrent just like it did in 2007 — simply by claiming that it was 'reasonable network management' intended to 'prevent the unlawful transfer of content.' The new proposed net neutrality regulations would allow the same practices that net neutrality was first invoked to prevent, even if these ISP practices end up inflicting collateral damage on perfectly lawful content and activities."
Privacy

Tracking Browsers Without Cookies Or IP Addresses? 265

Peter Eckersley writes "The EFF has launched a research project called Panopticlick, to determine whether seemingly innocuous browser configuration information (like User Agent strings, plugin versions and fonts) may create unique fingerprints that allow web users to be tracked, even if they limit or delete cookies. Preliminary results indicate that the User Agent string alone has 10.5 bits of entropy, which means that for a typical Internet user, only one in about 1,500 (2 ^ 10.5) others will share their User Agent string. If you visit Panopticlick, you can get a reading of how rare or unique your browser configuration is, as well as helping EFF to collect better data about this problem and how best to defend against it." I remember laughing years ago when I would see users who had modified their user agent string with some sort of defiant pro-privacy message, without realizing that their action made them uniquely identifiable out of hundreds of thousands of others.

Universal, Pay Those EFFing Lawyers 335

Slashdot frequent contributor Bennett Haselton writes "The EFF is seeking over $400,000 in attorney's fees from Universal Music Group after Universal sent a DMCA takedown notice to YouTube, demanding the removal of a video posted by user Stephanie Lenz. Lenz had posted a video of her toddler dancing to a 30-second clip of the Prince song "Let's Go Crazy"; after Universal sent the takedown notice, the EFF sent YouTube a counter-notice on behalf of Lenz arguing that the video was fair use, and YouTube restored it. Now the EFF is asking the judge to award them attorney's fees for their work." Use your magical clicking device below to read many more words.
Image

Facebook Master Password Was "Chuck Norris" Screenshot-sm 319

I Don't Believe in Imaginary Property writes "A Facebook employee has given a tell-all interview with some very interesting things about Facebook's internals. Especially interesting are all the things relating to Facebook privacy. Basically, you don't have any. Nearly everything you've ever done on the site is recorded into a database. While they fire employees for snooping, more than a few have done it. There's an internal system to let them log into anyone's profile, though they have to be able to defend their reason for doing so. And they used to have a master password that could log into any Facebook profile: 'Chuck Norris.' Bruce Schneier might be jealous of that one."
Government

RIAA Wants Limits On Net Neutrality So ISPs Can Police File Sharing 173

Presto Vivace writes "Reporting for Computer World, Grant Gross writes that the RIAA is asking the FCC not to make the net neutrality rules so strict that they 'would limit broadband providers' [flexibility] to "address" illegal online file sharing.' It seems the RIAA is unclear on the concept of the Fourth Amendment. 'The FCC should not only avoid rules prohibiting ISPs from blocking illegal file trading, but it should actively encourage ISPs to do so, the RIAA said. ... Other groups called on the FCC to stay out of the copyright enforcement business. If ISPs are required to check for copyright infringement, they could interfere with legal online activities, said six digital rights and business groups, including Public Knowledge, the Consumer Electronics Association and the Electronic Frontier Foundation.'"
Books

DRM and the Destruction of the Book 419

Hugh Pickens writes "EFF reports that Cory Doctorow spoke to a crowd of about a hundred librarians, educators, publishers, authors, and students at the National Reading Summit on How to Destroy the Book and said that 'anyone who claims that readers can’t and won’t and shouldn’t own their books are bent on the destruction of the book, the destruction of publishing, and the destruction of authorship itself.' Doctorow says that for centuries, copyright has acknowledged that sacred connection between readers and their books and that when you own a book 'it’s yours to give away, yours to keep, yours to license or to borrow, to inherit or to be included in your safe for your children' and that 'the most important part of the experience of a book is knowing that it can be owned.'"
Encryption

Quantum Encryption Implementation Broken 133

I Don't Believe in Imaginary Property writes "Professor Johannes Skaar's Quantum Hacking group at NTNU have found a new way to break quantum encryption. Even though quantum encryption is theoretically perfect, real hardware isn't, and they exploit these flaws. Their technique relies on a particular way of blinding the single photon detectors so that they're able to perform an intercept-resend attack and get a copy of the secret key without giving away the fact that someone is listening. This attack is not merely theoretical, either. They have built an eavesdropping device and successfully attacked their own quantum encryption hardware. More details can be found in their conference presentation."
Communications

Verizon Defends Doubling of Early Termination Fee 319

I Don't Believe in Imaginary Property writes "Verizon is defending its decision to double its Early Termination Fee from $175 to $350 after being called to account by the FCC. They claim it's because the higher fees allow them to offer more expensive phones with a lower up-front cost (PDF), and they also say that because they pro-rate the fee depending on how much of your contract is left, they still lose money. Apparently doing something about the Verizon customer service horror stories isn't as good a way to retain customers as telling them that they have to pay several hundred dollars to leave."

Slashdot Top Deals