×
EU

Broadcom Offers To Scrap Exclusivity Deals To End EU Antitrust Probe (reuters.com) 20

U.S. chipmaker Broadcom has offered to scrap its exclusivity deals with TV and modem makers to end an EU antitrust investigation and stave off a possible hefty fine. Reuters reports: Broadcom, which makes chips to power smartphones, computers and networking equipment and is a major supplier to Apple, found itself in EU competition enforcers' crosshairs over its deals with six companies to buy chips exclusively or almost exclusively from it. That triggered an investigation in June last year and an order to stop such deals until the end of the probe on whether such practices were aimed at squeezing out rivals.

Broadcom has now pledged not to offer incentives to TV and modem makers to encourage them to acquire more than 50% of their chips and modems from the company for their worldwide or European production. Broadcom said its offer addressed the Commission's concerns and it expected the investigation to close before the end of the year. "In these uncertain times, we welcome the opportunity to avoid protracted litigation and to resolve the investigation without recognition of liability or the imposition of a fine," the company said in a statement. The European Commission said it would now seek feedback before deciding whether to accept the offer which would be valid for five years and without a finding of infringement by the company.

Communications

Telegram Hits 400M Monthly Active Users (techcrunch.com) 32

Instant messaging service Telegram has amassed 400 million monthly active users, it said today, up from 300 million active users the seven-year-old service disclosed to the SEC last October. From a report: The service -- founded by Pavel Durov, who also created Russian social networking site VK -- said it adds about 1.5 million users each day and is the most downloaded social media app in over 20 nations. Telegram is working on bringing a secure video call feature to its users this year in response to the growing popularity of Zoom and Houseparty, it said. The company, headquartered in Dubai, however, did not talk about the future of its Gram cryptocurrency wallet and TON Blockchain that it had revealed in 2018 but put on hold early this year. "As the gap in popularity between Telegram and its older competitors narrows, we find more and more validity in that original assumption," the firm said in a blog post.
The Internet

Internet Governance Body RIPE Opposes China's Internet Protocols Upgrade Plan (zdnet.com) 90

EU-based Internet governance body RIPE is opposing a proposal to remodel core internet protocols, a proposal backed by the Chinese government, Chinese telecoms, and Chinese networking equipment vendor Huawei. From a report: Named "New IP," this proposal consists of a revamped version of the TCP/IP standards to accommodate new technologies, a "shutoff protocol" to cut off misbehaving parts of the internet, and a new "top-to-bottom" governance model that decentralizes the internet and puts it into the hands of a few crucial node operators. The New IP proposal was submitted last year to the International Telecommunication Union (ITU) and brought to the public's attention following a Financial Times report last month. The proposal received immediate criticism from the general public and privacy advocates due to its obvious attempt to hide internet censorship features behind a technical redesign of the TCP/IP protocol stack.

The New IP proposal was described as the Chinese government's attempt to export and impose its autocratic views onto the rest of the internet and its infrastructure. Millions of eyebrows were raised when authoritarian countries like Iran, Russia, and Saudi Arabia expressed support for the proposal. In a blog post this week, RIPE NCC, the regional Internet registry for Europe, West Asia, and the former USSR, formally expressed a public opinion against China New IP proposal. "Do we need New IP? I don't think we do," said Marco Hogewoning, the current acting Manager Public Policy and Internet Governance at the RIPE NCC. "Although certain technical challenges exist with the current Internet model, I do not believe that we need a whole new architecture to address them."

Cloud

Alibaba To Invest $28 Billion In Cloud Services After Coronavirus Boosted Demand (reuters.com) 21

Chinese e-commerce giant Alibaba said it will invest $28 billion in its cloud infrastructure over three years -- "a plan that follows a boom in demand for business software as the coronavirus outbreak peaked in China," reports Reuters. From the report: The company said in a statement it will spend the funds on semiconductor and operating system development as well as building out its data centre infrastructure. While most of China's white collar employees were working from home throughout February, the country's dominant cloud player saw usage surge for its software, most notably DingTalk, a workplace chat app used by both businesses and schools. At one point, users complained of lags on the app due to the high volume of activity. The company acknowledged the issues on Weibo, the Chinese social networking site. Alibaba Cloud Intelligence president Jeff Zhang said in the statement that the COVID-19 pandemic "has posed additional stress on the overall economy across sectors" and the company hoped the investment would help businesses "speed up the recovery process."
The Internet

Vint Cerf Explains Why the Internet is Holding Up (washingtonpost.com) 19

In a video interview over Google Hangouts this week, 76-year-old Vint Cerf explained to the Washington Post why the internet's 50-year-old architecture is still holding up, "with a mix of triumph and wonder in his voice." "Resiliency and redundancy are very much a part of the Internet design," explained Cerf, whose passion for touting the wonders of computer networking prompted Google in 2005 to name him its "Chief Internet Evangelist," a title he still holds...

Cerf, along with fellow computer scientist Robert E. Kahn, was a driving force in developing key Internet protocols in the 1970s for the Pentagon's Defense Advanced Research Projects Agency, which provided early research funding but ultimately relinquished control of the network it spawned. Cerf also was among a gang of self-described "Netheads" who led an insurgency against the dominant forces in telecommunications at the time, dubbed the "Bellheads" for their loyalty to the Bell Telephone Company and its legacy technologies.

Bell, which dominated U.S. telephone service until it was broken up in the 1980s, and similar monopolies in other countries wanted to connect computers through a system much like their lucrative telephone systems, with fixed networks of connections run by central entities that could make all of the major technological decisions, control access and charge whatever the market -- or government regulators -- would allow. The vision of the Netheads was comparatively anarchic, relying on technological insights and a lot of faith in collaboration. The result was a network -- or really, a network of networks -- with no chief executive, no police, no taxman and no laws. In their place were technical protocols, arrived at through a process for developing expert consensus, that offered anyone access to the digital world from any properly configured device. Their numbers, once measured in the dozens, now rank in the tens of billions, including phones, televisions, cars, dams, drones, satellites, thermometers, garbage cans, refrigerators, watches and so much more...

Such a system carries a notable cost in terms of security and privacy, a fact the world rediscovers every time there's a major data breach, ransomware attack or controversy over the amount of information governments and private companies collect about anyone who's online -- a category that includes more than half of the world's almost 8 billion people. But the lack of a central authority is key to why the Internet works as well as it does, especially at times of unforeseen demands. Some of the early Internet architects -- Cerf among them, from his position at the Pentagon -- were determined to design a system that could continue operating through almost anything, including a nuclear attack from the Soviets...

Several [Netheads] acknowledged they celebrated just a bit when the telephone companies gradually abandoned old-fashioned circuit-switching for what was called "Voice Over IP" or VoIP. It was essentially transmitting voice calls over the Internet -- using the same technical protocols that Cerf and others had developed decades earlier.

"They're deservedly taking a bit of a moment for a high five right now," added one Comcast vice president (who "has briefed some members of the Internet's founding generation about how the company has been handling increased demands.")

And last week Vint Cerf reported good news about his own recent COVID-19 infection -- that he is no longer contagious -- and briefly summed up the experience for the Washington Post.

"I don't recommend it... It's very debilitating."
Open Source

What's New in Linux 5.6? WireGuard VPN and USB4 (msn.com) 33

Linux 5.6 "has a bit more changes than I'd like," Linus Torvalds posted on the kernel mailing list, "but they are mostly from davem's networking fixes pulls, and David feels comfy with them. And I looked over the diff, and none of it looks scary..." TechRadar reports that the new changes include support for USB4 and GeForce RTX 2000 series graphics cards with the Nouveau driver: Yes, Turing GPU support has arrived with the open source Nouveau driver, along with the proprietary firmware images, as Phoronix.com reports. However, don't get too excited, as re-clocking doesn't work yet (getting the GPU to operate at stock clocks), and other important pieces of the puzzle are missing (like no Vulkan support with Nouveau). For the unfamiliar, Nouveau is an alternative to Nvidia's proprietary drivers on Linux, and although it remains in a relatively rough state in comparison, it's still good to see things progressing for Linux gamers with one of Nvidia's latest cards in their PC.

Linux 5.6 also introduces fresh elements on the AMD front, with better reset support for Navi and Renoir graphics cards (which helps the GPU recover if it hits a problem)... Another notable move is the introduction of WireGuard support, a newcomer VPN protocol which makes a potentially nifty alternative to OpenVPN.

Linux 5.6 also supports the Amazon Echo speaker, and naturally comes with a raft of other minor improvements...

Linus's post also notes that for the next release's timing they'll "play it by ear... It's not like the merge window is more important than your health, or the health of people around you." But he says he hasn't seen signs that the pandemic could affect its development (other than the possibility of distraction by the news).

"I suspect a lot of us work from home even normally, and my daughter laughed at me and called me a 'social distancing champ' the other day..."
Medicine

Snopes Disputes 'Shakiness' of COVID-19 Origin Story Claimed By Washington Post OpEd (snopes.com) 238

Thursday an Opinion piece in the Washington Post touted what the paper's own health policy reporter has described as "a conspiracy theory that has been repeatedly debunked by experts." That conspiracy theory argues that instead of originating in the wild, the COVID-19 virus somehow escaped from a research lab.

Now the fact-checking web site Snopes has also weighed in this week, pointing out that the lab nearest the Wuhan market hadn't even published any coronavirus-related research prior to the outbreak. Instead the nearest coronavirus-researching lab was about 7 miles away, a maximum security "biosafety level 4 (BSL-4) laboratory certified to handle the world's most deadly pathogens." A February 2020 document erroneously described by several media outlets as a "scientific study" provides the supposedly science-based evidence of a virus escaping from a lab. This paper, such as it is, merely highlights the close distance between the seafood market and the labs and falsely claimed to have identified instances in which viral agents had escaped from Wuhan biological laboratories in the past... While SARS viruses have escaped from a Beijing lab on at least four occasions, no such event has been documented in Wuhan.

The purported instances of pathogens leaking from Wuhan laboratories, according to this "study," came from a Chinese news report (that we believe, based on the similarity of the research described and people involved, to be reproduced here) that profiled a Wuhan Center for Disease Control and Prevention researcher named Tian Junhua. In 2012 and 2013, he captured and sampled nearly 10,000 bats in an effort to decode the evolutionary history of the hantavirus. In two instances, this researcher properly self-quarantined either after being bitten or urinated on by a potentially infected bat, he told reporters. These events, according to the 2013 study his research produced, occurred in the field and have nothing to do with either lab's ability to contain infective agents...

In sum, this paper -- which was first posted on and later deleted from the academic social networking website ResearchGate -- adds nothing but misinformation to the debate regarding the origins of the novel coronavirus and is not a real scientific study.

In February the Washington Post had quoted Vipin Narang, an associate professor at the Massachusetts Institute of Technology, as saying that it's "highly unlikely" the general population was exposed to a virus through an accident at a lab. "We don't have any evidence for that," said Narang, a political science professor with a background in chemical engineering.

UPDATE: On Twitter Snopes' reporter has identified what he sees as major errors in the Post's recently-published op-ed.
China

How Did Covid-19 Begin? WaPo OpEd Claims Its Origin Story Is 'Shaky' (washingtonpost.com) 233

The story of how the novel coronavirus emerged in Wuhan, China, has produced a nasty propaganda battle between the United States and China. Columnist David Ignatius writes in an opinion piece for The Washington Post: The two sides have traded some of the sharpest charges made between two nations since the Soviet Union in 1985 falsely accused the CIA of manufacturing AIDS. U.S. intelligence officials don't think the pandemic was caused by deliberate wrongdoing. The outbreak that has now swept the world instead began with a simpler story, albeit one with tragic consequences: The prime suspect is "natural" transmission from bats to humans, perhaps through unsanitary markets.

But scientists don't rule out that an accident at a research laboratory in Wuhan might have spread a deadly bat virus that had been collected for scientific study. "Good science, bad safety" is how Sen. Tom Cotton (R-Ark.) put this theory in a Feb. 16 tweet. He ranked such a breach (or natural transmission) as more likely than two extreme possibilities: an accidental leak of an "engineered bioweapon" or a "deliberate release." Cotton's earlier loose talk about bioweapons set off a furor, back when he first raised it in late January and called the outbreak "worse than Chernobyl."
Important note: "U.S. intelligence officials think there's no evidence whatsoever that the coronavirus was created in a laboratory as a potential bioweapon. Solid scientific research demonstrates that the virus wasn't engineered by humans and that it originated in bats."

In February the Post also quoted Vipin Narang, an associate professor at the Massachusetts Institute of Technology, as saying that it's "highly unlikely" the general population was exposed to a virus through an accident at a lab. "We don't have any evidence for that," said Narang, a political science professor with a background in chemical engineering. That article also noted that even Senator Cotton "acknowledged there is no evidence that the disease originated at the lab."

"Instead, he suggested it's necessary to ask Chinese authorities about the possibility, fanning the embers of a conspiracy theory that has been repeatedly debunked by experts."

UPDATE (4/4/2020): While the op-ed cites a "study" (which they acknowledge was withdrawn as "not supported" by direct proof), the fact-checking site Snopes calls it instead a "document erroneously described by several media outlets as a 'scientific study'," and notes several factual errors in the document. "In sum, this paper -- which was first posted on and later deleted from the academic social networking website ResearchGate -- adds nothing but misinformation to the debate regarding the origins of the novel coronavirus and is not a real scientific study."
Twitter

Twitter Discloses Firefox Bug That Cached Private Files Sent or Received via DMs (zdnet.com) 42

Social networking giant Twitter today disclosed a bug on its platform that impacted users who accessed their platform using Firefox browsers. From a report: According to Twitter, its platform stored private files inside the Firefox browser's cache -- a folder where websites store information and files temporarily. Twitter said that once users left their platform or logged off, the files would remain in the browser cache, allowing anyone to retrieve it. The company is now warning users who share workstations or used a public computer that some of their private files may still be present in the Firefox cache. Malware present on a system could also scrape and steal this data, if ever configured to do so.
Networking

Cringely Predicts 2020 Will See 'the Death of IT' (cringely.com) 232

Long-time technology pundit Robert Cringely writes: IT — Information Technology — grew out of something we called MIS — Management Information Systems — but both meant a kid in a white shirt who brought you a new keyboard when yours broke. Well, the kid is now gone, sent home with everyone else, and that kid isn't coming back... ever. IT is near death, fading by the day. But don't blame COVID-19 because the death of IT was inevitable. This novel coronavirus just made it happen a little quicker...

Amazon has been replacing all of our keyboards for some time now, along with our mice and our failed cables, and even entire PCs. IT has been changing steadily from kids taking elevators up from the sub-basement to Amazon Prime trucks rolling-up to your mailbox. At the same time, our network providers have been working to limit their truck rolls entirely. Stop by the Comcast storefront to get your cable modem, because nobody is going to come to install it if you aren't the first person living there to have cable...

Secure Access Service Edge (SASE) extends both the network and a security model end-to-end over any network including 4G or 5G wireless. Some folks will run their applications in their end device, whether it is a PC, phone, tablet, whatever, and some will run their applications in the same cloud as SASE, in which case everything will be that much faster and more secure. That's end end-game if there is one — everything in the cloud with your device strictly for input and output, painting screens compressed with HTML5. It's the end of IT because your device will no longer contain anything so it can be simply replaced via Amazon if it is damaged or lost, with the IT kid in the white shirt becoming an Uber driver.

Since COVID-19 is trapping us in our homes it is forcing this transition to happen faster than it might have. But it was always going to happen.

Movies

To Conserve Bandwidth, Should Opting In Be Required Before Autoplaying Videos? (fatherly.com) 103

An anonymous reader writes: We keep seeing stories about how providers are slowing down their streaming speed to reduce bandwidth usage during this period when many are being asked to stay at home... But it seems that many are totally ignoring a very obvious way to reduce usage significantly, and that is by disabling autoplay on their web sites and in their apps.

To give an example, a couple of days ago I was watching a show on Hulu, and either I was more sleepy than I thought or the show was more boring than I had expected (probably some combination of both), but I drifted off to sleep. Two hours later I awoke and realize that Hulu had streamed two additional episodes that no one was watching. I searched in vain for a way to disable autoplay of the next episode, but if there is some way to do it I could not find it.

What I wonder is how many people even want autoplay? I believe Netflix finally gave their users a way to disable it, but they need to affirmatively do so via a setting somewhere. But many other platforms give their users no option to disable autoplay. That is also true of many individual apps that can be used on a Roku or similar device. If conserving bandwidth is really that important, then my contention is that autoplaying of the next episode should be something you need to opt in for, not something enabled by default that either cannot be disabled or that forces the user to search for a setting to disable.

"Firefox will disable autoplay," writes long-time Slashdot user bobs666 (adding "That's it use Firefox.") And there are ways to disable autoplay in the user settings on Netflix, YouTube, Hulu, and Amazon Prime.

But wouldn't it make more sense to disable autoplay by default -- at least for the duration of this unusual instance of peak worldwide demand?

I'd be interested in hearing from Slashdot's readers. Do you use autoplay -- or have you disabled it? And do you think streaming companies should turn it off by default?
Security

Forbes: Hack on Putin's Intelligence Agency Finds Weapon to Exploit IoT Vulnerabilities (forbes.com) 36

"Red faces in Red Square, again," writes a Forbes cybersecurity correspondent: Last July, I reported on the hacking of SyTech, an FSB contractor working on internet surveillance tech. Now, reports have emerged from Russia of another shocking security breach within the FSB ecosystem. This one has exposed "a new weapon ordered by the security service," one that can be used to execute cyber attacks on IoT devices. The goal of the so-called "Fronton Program" is to exploit IoT security vulnerabilities en masse — remember, these technologies are fundamentally less secure than other connected devices in homes and offices...

The security contractors highlight retained default "factory" passwords as the obvious weakness, one that is easy to exploit... The intent of the program is not to access the owners of those devices, but rather to herd them together into a botnet that can be used to attack much larger targets — think major U.S. and European internet platforms, or the infrastructure within entire countries, such as those bordering Russia.

But the article also notes that targetted devices for the exploits include cameras, adding that compromising such devices in foreign countries by a nation-state agency "carries other surveillance risks as well." It also points out that the FSB "is the successor to the KGB and reports directly to Russia's President Vladimir Putin," and its responsibilities include electronic intelligence gathering overseas.

"The fact that these kind of tools are being contracted out for development given the current geopolitical climate should give us all serious pause for thought."
Security

Are There Security Risks When Millions are Suddenly Working from Home? (cnn.com) 95

"The dramatic expansion of teleworking by U.S. schools, businesses and government agencies in response to the coronavirus is raising fresh questions about the capacity and security of the tools many Americans use to connect to vital workplace systems and data," reports CNN: As of last week the Air Force's virtual private networking software could only support 72,000 people at once, according to a federal contractor who was also not authorized to speak on the record, and telework briefing materials viewed by CNN. The Air Force employs over 145,000 in-house civilian workers, and over 130,000 full-time contractors.

As they increasingly log on from home, Americans are having to meld their personal technology with professional tools at unprecedented scale. For employers, the concern isn't just about capacity, but also about workers introducing new potential vulnerabilities into their routine — whether that's weak passwords on personal computers, poorly secured home WiFi routers, or a family member's device passing along a computer virus.

Long-time Slashdot reader Lauren Weinstein also worries about a world where "doctors switch to heavy use of video office visits, and in general more critical information than ever is suddenly being thrust onto the Internet..." For example, the U.S. federal government is suspending key aspects of medical privacy laws to permit use of "telemedicine" via commercial services that have never been certified to be in compliance with the strict security and privacy rules associated with HIPAA (Health Insurance Portability and Accountability Act).

The rush to provide more remote access to medical professionals is understandable, but we must also understand the risks of data breaches that once having occurred can never be reversed.

Communications

Trump Signs Law Banning Use of Federal Funds To Purchase Huawei Equipment (thehill.com) 50

President Trump on Thursday signed into law a bill banning the use of federal funds to purchase equipment from telecom companies deemed a national security threat, such as Chinese telecom group Huawei. From a report: The Secure and Trusted Communications Act, which the Senate passed in February and the House approved last year, will also require the Federal Communications Commission (FCC) to establish a $1 billion fund to help small telecom groups remove existing equipment that is deemed to be a threat. "Securing our networks from malicious foreign interference is critical to America's wireless future, especially as some communications providers rely on equipment from companies like Huawei that pose an immense threat to America's national and economic security," the bill's House sponsors, House Energy and Commerce Committee Chairman Frank Pallone Jr. (D-N.J.), ranking member Greg Walden (R-Ore.), and Reps. Doris Matsui (D-Calif.) and Brett Guthrie (R-Ky.), said in a statement.
IT

Are Virtual Conferences Better Than Real-World Conferences? (fastcompany.com) 44

Fast Company's Mark Sullivan argues that cancelling this year's tech conferences could have a silver lining -- by encouraging a movement toward virtual conferences: There are developers across the U.S. and around the world who get shut out when the conferences get sold out. Even more of them simply can't afford the admission fee (last year's WWDC was $1599) and travel expenses required to spend time in the Bay Area or Seattle. Apple uses a lottery system to pick registered developers at random, who then get the opportunity to buy a ticket for the event. "Not having a set of 5,000 people who paid to be there, and potentially millions of other people who don't get access to things exclusive to those attending, such as labs and all of the networking, but instead having everyone on the same level can be a good thing," says iOS developer Guilherme Rambo.

Even before the coronavirus came along, the major developer conferences were developing more robust online elements. Far more people stream the keynotes than watch them in person. Many conference now stream the developer sessions as well. And an increasing body of sessions from the events is archived online... With all the cancellations this year, big tech companies like Apple may get some time to really think about the value of big events in the age of live streaming. Apple, for one, might think about ways of further virtualizing WWDC.

Businesses

Cisco: Avoid Coronavirus, Stay Home, Use Webex (arstechnica.com) 58

An anonymous reader quotes a report from Ars Technica: Networking giant Cisco is getting into the coronavirus monitoring and mitigation game with its Webex remote meeting property. The company notes that in the wake of mandates issued to employees to halt travel plans and/or work from home, traffic across its Webex backbone has increased significantly. Webex meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began; traffic in other Asian countries is up by 400 percent or more, and free signup rates in impacted countries have increased 700 percent or more. In response, Cisco is offering temporarily unlimited usage (with no time restrictions) in all countries where the service is available (full list here), not just the ones worst hit by coronavirus. The company is also offering free 90-day licenses to businesses that are not currently Webex customers and offering free upgrades to customers whose current plan is insufficient to accommodate increased traffic due to the outbreak.

In the worst affected countries, telepresence and remote work software like Webex is currently the only alternative to a complete shutdown of activities. In its press release, Cisco highlights the Nesbitt Center, an organization working with disabled young adults in Hong Kong. All Hong Kong schools, including the Nesbitt Center, have been required to suspend day programs during the outbreak. Webex videoconferencing has allowed the Nesbitt Center to continue delivering educational sessions despite the lockdown.
Ars Technica also recommends Jitsi, a "free and open source software, offering video call and screen sharing capabilities." There's also Jitsi Meet for people "who just need to get something done on-the-fly with no setup at all."

Do you have a favorite remote work software?
Facebook

Facebook Has Built a Fleet of Robots To Patrol Its Data Centers (businessinsider.com) 48

There are robots on the prowl at Facebook's server farms. The social networking giant has quietly built a fleet of mobile robots to patrol its data centers, and now has a team dedicated to automating its vast network of facilities around the globe, Business Insider reported Tuesday. From the report: The high-tech initiative could boost the firm's profits and help revolutionize the data center industry -- and potentially prompt job losses around the country. As Facebook has grown, it has built out a sprawling network of data centers around the globe dedicated to hosting users' content and supporting its apps and services. Its locations now stretch from Oregon to Sweden to Singapore -- but maintaining the vast facilities requires human data center operators and engineers to manage the systems, replace malfunctioning drives, and so on.
Social Networks

LinkedIn Tests Snapchat-like Stories (inputmag.com) 19

If you thought LinkedIn had already reached peak undesirability, you were wrong: the company is now planning to add Snapchat-style Stories to its platform. From a report: Yes, the business-focused networking app that fills your inbox with recruiter and PR spam may be getting Stories. Social media users have been suffering from Stories exhaustion for years at this point. It's a feature that works great for its pioneer, Snapchat, and for Instagram... and pretty much nothing else -- I mean, have you ever watched a Facebook Story on purpose? LinkedIn Stories inevitably promise to bring well-manicured, painfully corporate video clips to your feed as a way to mix up the approach to networking. Or, as the company puts it, to "bring creativity and authenticity to the ways that members share more of their work life, so that they can build and nurture the relationships necessary to become more productive and successful."
Businesses

Facebook Sues SDK Maker OneAudience For Secretly Harvesting User Data (zdnet.com) 14

Facebook filed today a federal lawsuit in a California court against OneAudience, a New Jersey-based data analytics firm. From a report: The social networking giant claims that OneAudience paid app developers to install its Software Development Kit (SDK) in their apps, and later used the control it had over the SDK's code to harvest data on Facebook users. According to court documents obtained by ZDNet, the SDK was embedded in shopping, gaming, and utility-type apps, some of which were made available through the official Google Play Store. "After a user installed one of these apps on their device, the malicious SDK enabled OneAudience to collect information about the user from their device and their Facebook, Google, or Twitter accounts, in instances where the user logged into the app using those accounts," the complaint reads. "With respect to Facebook, OneAudience used the malicious SDK -- without authorization from Facebook -- to access and obtain a user's name, email address, locale (i.e. the country that the user logged in from), time zone, Facebook ID, and, in limited instances, gender," Facebook said. Twitter was the first to expose OneAudience's secret data harvesting practices on November 26, last year.
Businesses

Nokia To Weigh Strategic Options as Profit Pressure Mounts (bloomberg.com) 18

Nokia Oyj is exploring strategic options as fierce competition puts pressure on the Finnish network equipment maker's earnings, Bloomberg reported Thursday, citing people familiar with the matter. From the report: The company is working with advisers to consider alternatives ranging from potential asset sales to mergers, the people said, asking not to be identified because the information is private. Other options include shifting investments and making balance-sheet adjustments, one of them said. Deliberations are ongoing, and there's no certainty they will lead to any transactions, the people said. Nokia shares have lost roughly a third of their value over the past year before news of its deliberations.

Slashdot Top Deals