Harry (Lei) Zhang, together with the CTO of HyperHQ, Xu Wang, will present “CRI: The Second Boom of Container Runtimes” at KubeCon + CloudNativeCon EU 2018, May 2-4 in Copenhagen, Denmark. The presentation will clarify about more about CRI, container runtimes, KataContainers and where they are going. Please join them if you are interested in learning more.
Gloo, a single binary file written in Go, can be deployed as a Kubernetes pod, in a Docker container, and now also on Cloud Foundry. The setup also requires a copy of Envoy, though the installation process can be greatly simplified through additional software developed by the company, TheTool. The user then writes configuration objects to capture the workflow logic.
I'm announcing the release of the 4.9.95 kernel.
All users of the 4.9 kernel series must upgrade.
The updated 4.9.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.9.y and can be browsed at the normal kernel.org git web browser: http://git.kernel.org/?p=linux/kernel/git/stable/linux-st...
After a very busy cycle due to the Meltdown and Spectre security vulnerabilities, which were publicly disclosed earlier this year and later discovered to put billions of devices using modern processors at risk of attacks, the Linux 4.15 kernel series was released at the of January heavily redesign against two critical hardware bugs.
Now, nearly three months and only eighteen maintenance updates later, the Linux 4.15 kernel series reached end of life and it will no longer receive support. As such, all those using a kernel from the Linux 4.15 branch on their GNU/Linux distributions are urged to upgrade to the latest Linux 4.16 kernel series as soon as possible.
The Linux kernel community recently announced bpfilter, which will replace the long-standing in-kernel implementation of iptables with high-performance network filtering powered by Linux BPF, all while guaranteeing a non-disruptive transition for Linux users.
Alibaba Cloud announced it is deploying Cloud Foundry on its infrastructure alongside joining the Cloud Foundry Foundation as a gold member.
The Cloud Foundry Foundation continues to garner strong support from the developer community. But the ongoing surge in interest around the use of Kubernetes to exploit containers for cloud deployments has placed a focus on how the Cloud Foundry Foundation will evolve.
The topic of Kubernetes integration with Cloud Foundry was part of several sessions and keynote addresses at this week’s Cloud Foundry Summit. While the organization has tangentially begun to integrate the container orchestrator into its work, it remains cautious on a stronger embrace.
Enterprises that have deployed Cloud Foundry platform as a service found it catalyzed new thinking about the application delivery process and other organizational practices.
Containers are eating the software world — and Kubernetes is the king of containers. So if you are working on any major software project, especially in the enterprise, you will run into it sooner or later. Cloud Foundry, which hosted its semi-annual developer conference in Boston this week, is an interesting example for this.
Hyperledger is an open-source project and hub for developers to work on blockchain technologies.
The Hyperledger infrastructure is being developed in order to support cross-industry uses of distributed ledger technologies, most commonly associated with the exchange of cryptocurrency.
[...]
Over the past year, Hyperledger has formalized how blockchain projects can move from development to their first 1.0 release. This process now includes a number of security requirements, including meeting the demands of the Core Infrastructure Initiative (CII), which sets "best practice" requirements for open-source project security.
In addition, up to three members of a project must be nominated to the Hyperledger security team to help triage and resolve vulnerabilities.
The Bridgewater, New Jersey-based company iconectiv this week joined the Linux Foundation Networking Fund. iconectiv is perhaps most well-known as a Local Number Portability Administrator (LNPA). In this role the company handles the administrative work to enable people to port their phone numbers between different service providers. It operates as the LNPA for the majority of countries in the world. It was named as the LNPA for the United States in 2016, taking over the role from Neustar.
AMD's Alex Deucher has sent in a small set of fixes for the AMDGPU Direct Rendering Manager driver in the Linux 4.17 kernel.
The three patches are for fixing a dark screen issue with AMDGPU DC, a fix for clock/voltage dependency tracking for WattMan, and an updated SMU interface for the yet-to-be-announced Vega 12 GPU.
While the relevant bits for supporting Intel GPU mediated pass-through to virtual machines with KVM are now upstream in the Linux kernel as well as in QEMU 2.12, Intel developers have just announced their quarterly release of "KVMGT" for those wanting the officially blessed configuration for running Intel virtual GPU support with KVM virtual machines.
Following RadeonSI adding "Vega M" support for the new Radeon graphics appearing embedded on select Intel Kabylake processor packages, the RADV developers have similarly staged their Vega M support in this open-source Vulkan driver.
Earlier this month we covered "The Forge" picking up initial Linux support and now they have rounded out their full-featured Linux support with Vulkan rendering.
It was just last year that open-source RadeonSI/RADV developers were trying to get the Radeon RX 580 "Polaris" GPU to be competitive with the GeForce GTX 1060 as it is under Windows given each GPU's capabilities. We've seen the RX 580 and GTX 1060 dancing under Linux the past few months and yesterday's 20-way GPU comparison with Rise of the Tomb Raider was quite significant -- perhaps most surprising being how well the RX 580 performed. Heck, just one or two years ago it was an accomplishment seeing any official Radeon driver support at-launch for new Linux game releases. So here are some extensive tests looking closer at the GTX 1060 vs. RX 580 battle in this latest Vulkan-powered Linux game port.
Version 4.0 of the FFmpeg multimedia toolkit is out. There is a long list of new filters, formats, and more; see the announcement for details.
FFmpeg 4.0 is now available as the latest major release for this widely-used open-source multimedia encode/decoder library.
FFmpeg 4.0 introduces NVIDIA NVDEC GPU-based decoding for H264 / MJPEG / HEVC / MPEG-1/2/4, VC1, VP8, and VP9 formats. This release also adds an Intel QSV accelerated overlay filter, an OpenCL overlay filter, VA-API MJPEG and VP8 decoding support, new VA-API filters, and many other accelerated code path improvements.
The open-source and cross-platform FFmpeg multimedia framework has been updated to version 4.0, a major release that introduces numerous new features and improvements.
Coming six months after the 3.x series, FFMpeg 4.0 introduces bitstream filters for editing metadata in H.264, MPEG-2, and HEVC streams, an experimental MagicYUV encoder, Nvidia NVDEC-accelerated H.264, MPEG-1/2/4, HEVC, VC1, VP8/9, and MJPE hwaccel decoding, and Intel QSV-accelerated MJPEG encoding.
Helium Rain [Steam, Official Site], the gorgeous space sim from Deimos Games is really quite good so it's a shame they've seen such low overall sales. In total, they've had around 14,000€ (~$17,000) in sales which is not a lot for a game at all.
The good news, is that out of the two thousand copies they say they've sold, a huge 14% of them have come from Linux. It's worth noting, that number has actually gone up since we last spoke to them, where they gave us a figure of 11% sales on Linux.
Wild Terra Online [Steam], the MMO from Juvty Worlds has a small but dedicated following, now is your chance to see if it's for you.
To say that blockchain technology is big news is an understatement. It is the technology to be involved with right now if you’re interested in a disruptive technology. As a refresher, it is the underlying technology behind cryptocurrencies like Bitcoin and Ethereum. It is also behind an emerging trend in gaming called blockchain gaming, or crypto gaming.
Blockchain is simply a transaction that is recorded and added to a previous transaction, forming a chain of data. Each transaction added to the chain can account for many different things. For example, with Bitcoin, the transaction that makes up blockchain data here is the movement/discovery of units of the cryptocurrency.
Following yesterday's 20-way graphics card comparison for Rise of the Tomb Raider that debuted yesterday on Linux and is exclusively powered by Vulkan, my next benchmarking objective was trying out the official AMD Vulkan driver, AMDVLK, to see how it would work given the successes of RADV on launch-day for this latest Feral Interactive game port.
For The King, a strategic RPG with tabletop and roguelike elements has recently left Early Access, it seems they also published the Linux version too.
We've reached out to the developer for a review key, so hopefully we can give it some proper thoughts in good time. At least early indications are that it's quite good, going by what users think of it.
Hollow Knight: Lifeblood has just released aiming to make the already amazing action adventure game even better. I must say,
Puppy Games latest game Basingstoke, which mixes in stealth and action is going to release April 27th with full Linux support.
I spoke to Alex Koshelkov, Founder & CEO Crytivo last night. They confirmed to me that the Steam Early Access release will indeed have a Linux version, which will not use their current updater (which requires a mono-complete install to work) since it will update via Steam directly which is going to be much nicer. The actual game is built from Unity, so it should be fine.
Graveyard Keeper [Official Site], from Lazy Bear Games and tinyBuild finally has some proper gameplay to show off and it's equal parts weird, grim and quite interesting.
Arch Linux is finally transitioning to glibc 2.27, which may make for a faster system.
Glibc 2.27 was released at the start of February. This updated GNU C Library shipped with many performance optimizations particularly for Intel/x86_64 but also some ARM tuning and more. Glibc 2.27 also has memory protection keys support and other feature additions, but the performance potential has been most interesting to us.
Quite a few snapshots have been released this week and the last one for OpenSuSE Tumbleweed, bringing some of the latest GNU/Linux technologies and Open Source software. Among these, we can mention the recently released Linux 4.16 kernel series as the operating system is now powered by Linux kernel 4.16.2.
"The 4.16.2 Linux Kernel made ip_tunnel, ipv6, ip6_gre, ip6_tunnel and vti6 better to validate user provided tunnel names. Due to a build system failure, not all 4.16.2 binaries were built correctly; this will be resolved in the 20180417 snapshot, which will be released shortly," said Douglas DeMaio in a recent report.
The project was disclosed by Red Hat in a blog post in February as part of what the Hatters describe themselves as a “radically open brand project.” The Linux and cloud services firm ran a survey seeking “input. It closed Feb. 25.
As corporate logos go, Red Hat's fedora-sporting "Shadowman" is about as iconic as they come, but he could be living on borrowed time.
The software company, based in downtown Raleigh, is in the midst of an "open brand project" and in October is due to roll out an all-new logo. The color red, and a hat, are likely to figure in it somehow presuming in-house designers follow the advice they're getting from customers and employees.
But Shadowman's survival is far from assured, as the company has already said its research suggests he's "seen as more secretive than open, and more villainous than heroic."
Do you remember Crunchbang Linux? Crunchbang (often referred to as #!) was a fan-favorite, Debian-based distribution that focused on using a bare minimum of resources. This was accomplished by discarding the standard desktop environment and using a modified version of the Openbox Window Manager. For some, Crunchbang was a lightweight Linux dream come true. It was lightning fast, easy to use, and hearkened back to the Linux of old.
We’re now just seven short days away from the stable Ubuntu 18.04 LTS release — which means it’s almost upgrade decision time!
As a Long Term Support release (LTS) Ubuntu 18.04 ‘Bionic Beaver’ gets security fixes, bugs patches and a handful of select app updates for five years.
The team manages all web projects across Canonical. From www.ubuntu.com to the Juju GUI we help to bring beauty and consistency to all the web projects.
We'll have an awesome weekend of conferences (with 4 parallel talks), podcasts, stands, social events... Most of them are in English, but there will be in Spanish & Asturian too.
Kodi originated as Xbox Media Center, or XBMC. However, it evolved into what’s now Kodi. The utilitarian open-source media center plays pretty much any audio and video file you throw at it.
Plus, Kodi add-ons serve as apps similar to what’s found on streaming devices like Roku. For instance, the Plex for Kodi add-on provides access to your Plex media server library, while the Funimation Now add-on lets you stream Funimation from Kodi. Furthermore, the robust Kodi media center provides plenty of options to access networked media files.
As a Kodi-based Linux distro, Kodibuntu is a fusion of Kodi and Lubuntu, a lightweight Ubuntu derivative. Yet Kodibuntu differs from the likes of OpenELEC, LibreELEC, and OSMC in that it’s a full on Linux distro with a desktop environment. While the main focus is media center use, you benefit from the ability to access and edit system files.
Thus, it’s more comprehensive than most Kodi OSes. If you’ve used Ubuntu, then Kodibuntu should present a familiar experience. Learn more about Kodi with our complete A-Z of Kodi guide!
Advantech has launched two rugged, Linux-ready embedded DIN-rail computers with Intel Bay Trail SoCs and iDoor expansion: an “UNO-1372G-E” with 3x GbE ports and a smaller UNO-1372G-J with only 2x GbE, but with more serial and USB ports.
People have been running Ubuntu and other GNU/Linux distributions on Chromebooks for almost as long as Chromebooks have been available. While some folks have replaced Chrome OS altogether or created dual boot systems, the simplest method is to use Crouton, which allows you to install a Linux distribution in a chroot environment, allowing you to run Ubuntu or another OS alongside Chrome OS and switch between the two environments without rebooting.
In this post, I’d like to offer a possibility. A theory that I want to believe, one that is not yet backed by the evidence. If you should take other Fuchsia Friday posts with a grain of salt, take this post with the whole salt shaker.
The help desk market is crowded and dominated by player like Zendesk, Salesforce and Spiceworks, but there are some solid open source alternatives for smaller businesses with the time and patience.
A good piece of help desk software should allow any business to log, track and respond to customer support queries across a range of platforms.
Open source solutions may not be as feature rich or fully formed out of the box, and they won't look as good as Zendesk or Salesforce, but they give great customisation options and are much more cost effective than closed source solutions.
California-based blockchain startup Propy, is bringing the commercial use of blockchain technology to the US. After facilitating the first US Blockchain-based real estate deed in Vermont, Propy announced a new open source Developer Program.
The idea behind Propy: it allows anyone to buy or sell real estate, anywhere, online. Propy provides an efficient crypto and fiat payment and an immutable record on the blockchain, ensuring that title deeds and property rights will be there forever.
Titus powers critical aspects of the Netflix business, from video streaming, recommendations and machine learning, big data, content encoding, studio technology, internal engineering tools, and other Netflix workloads. Titus offers a convenient model for managing compute resources, allows developers to maintain just their application artifacts, and provides a consistent developer experience from a developer’s laptop to production by leveraging Netflix container-focused engineering tools.
On Thursday Netflix announced it's made its home grown container management system, Titus, open source.
What kinds of companies should consider open source SDN, and what are the associated challenges in using such open source deployments? Lumina Networks has unrivalled expertise in working with customers and partners to deliver implementations, and explains its processes and outlines the benefits of using open source SDN.
Adjusting to climate change will require a lot of good ideas. The need to develop more sustainable forms of industry in the decades ahead demands vision and ingenuity. Elon Musk, chief executive of Tesla and SpaceX, believes he has found a way for companies to share their breakthroughs and speed up innovation.
Fond of a bold gesture, the carmaker and space privateer announced back in 2014 that Tesla would make its patents on electric vehicle technology freely available, dropping the threat of lawsuits over its intellectual property (IP). Mr Musk argued the removal of pesky legal barriers would help “accelerate the advent of sustainable transport”. The stunning move has already had an impact. Toyota has followed Tesla by sharing more than 5,600 patents related to hydrogen fuel cell cars, making them available royalty free. Ford has also decided to allow competitors to use its own electric vehicle-related patents, provided they are willing to pay for licences.
Could Telsa’s audacious strategy signal a more open approach to patents among leading innovators? And if more major companies should decide to adopt a carefree attitude to IP, what are the risks involved?
Open source technologies are solving many of our most pressing problems, in part because the open source model of cooperation, collaboration, and almost endless iteration creates an environment where problems are more readily solved. As the adage goes, "given enough eyeballs, all bugs are shallow."
However, self-driving vehicle technology is one rapidly growing area that hasn't been greatly influenced by open source. Most of today's autonomous vehicles, including those from Volkswagen, BMW, Volvo, Uber, and Google, ride on proprietary technology, as companies seek to be the first to deliver a successful solution. That changed recently with the launch of Baidu's Apollo.
Luxoft’s automotive division has launched PELUX 1.0, an open source platform available to developers. This has been developed from its PELUX software suite as used by carmakers and tier 1 suppliers to build converged infotainment, autonomous driving, communication, HMI and car body control systems.
Mozilla's open source project, Common Voice, is well on its way to becoming the world’s largest repository of human voice data to be used for machine learning. Common Voice recently made its way into Black Duck's annual Open Source Rookies of the Year list.
What’s special about Common Voice is in the details. Every language is spoken differently—with a wide variation of speech patterns, accents, and intonations—throughout the world. A smart speech recognition engine—that has applications over many Internet of Things (IoT) devices and digital accessibility—can recognize speech samples from a diverse group of people only when it learns from a large number of samples. A speech database of recorded speech from people across geographies helps make this ambitious machine learning possible.
From rich text to video to podcasts, the Internet era offers an array of new ways for creators to build worlds. Here at Mozilla, we are particularly excited about virtual reality. Imagine moving beyond watching or listening to a story; imagine also feeling that story. Imagine being inside it with your entire mind and body. Now imagine sharing and entering that experience with something as simple as a web URL. That’s the potential before us.
This week we’re heads down focusing on adding features in the three broad areas of Browsers, Social and the Content Ecosystem.
At this time last year, I had just moved on from Release Engineering to start managing the Sheriffs and the Developer Workflow teams. Shortly after the release of Firefox Quantum, I also inherited the Taskcluster team. The next few months were *ridiculously* busy as I tried to juggle the management responsibilities of three largely disparate groups.
Over the past few weeks we've hit a few major milestones in our project to migrate all of Firefox's CI and release automation to taskcluster.
Firefox 60 and higher are now 100% on taskcluster!
In other words, the value of the open source database market to customers/users is measured in the tens of billions, or even hundreds of billions, of dollars. One other way of thinking about this? That's tens or hundreds of billions of dollars that proprietary vendors will never capture.
For nearly 30 years, PostgreSQL (a.k.a., Postgres) has arguably been the most common SQL open source database that you have never heard of. Call it the Zelig of databases, its technology either sat behind or acted as the starting point behind an array of nearly a dozen commercial database offerings from EnterpriseDB to Redshift, Greenplum, Netezza, CockroachDB and a host of others. And PostgreSQL has distinguished lineage as one of the brainchilds of Turing Award winner and database legend Dr. Michael Stonebraker, who started the PostgreSQL project based on the lessons learned from his previous database venture, Ingres.
In order to compete and get products to market rapidly, enterprises today leverage cloud-ready and cloud-enabled technologies. Platforms as a Service (or PaaS) provide out-of-the-box capabilities which enable application developers to focus on their business logic and users instead of infrastructure and interoperability. This key ability separates successful projects from those which drown themselves in tangential work which never stops.
In this blog post, we’ll cover MongoDB’s general PaaS and cloud enablement strategy as well as touch upon some new features of Red Hat’s OpenShift which enable you to run production-ready MongoDB clusters. We’re also excited to announce the developer preview of MongoDB Enterprise Server running on OpenShift. This preview allows you to test out how your applications will interact with MongoDB running on OpenShift.
Work on the next big release of the widely-used open-source and cross-platform office suite for GNU/Linux, macOS, and Microsoft Windows operating systems, LibreOffice 6.1, has already begun this week with a focus on revamping the online experience and improving the Writer and Calc components.
A first bug hunting session was scheduled for the end of next week, on April 27, 2018, when developers will hack on the first alpha milestone of LibreOffice 6.1, which should be available to download for all supported platforms a few days before the event. During the bug hunting session, devs will try to fix as many bugs as possible.
Apple has open-sourced FoundationDB, a distributed ACID-compliant NoSQL datastore, three years after acquiring the company that developed the technology.
At the time, developers who used the database voiced resentment that Apple had taken a useful tool off the market and left companies using the software without support.
For Apple, that's water under the bridge. In a post to the FoundationDB project's newborn blog, the fruit-themed computer maker said, "We believe FoundationDB can become the foundation of the next generation of distributed databases."
To make that happen, Apple is counting on community contributions and support.
It's a busy month for the BSDs with DragonFlyBSD 5.2 having come along with OpenBSD 6.3 and right before that was TrueOS 18.03. Now there's finally the release candidate of the long-awaited NetBSD 8.0 update.
NetBSD 7.0 arrived back in October 2015 while the NetBSD 8.0 release should not be too much further out. Arguably most interesting with NetBSD 8.0 is its finally bring initial USB 3.0 support though the change-log currently just describes it as "some USB 3 support."
If a penny was donated for every pf or OpenSSH installed with a mainstream operating system or phone in the last year we would be at our goal.
OMB is increasingly pushing agencies to adopt open source solutions, and in 2016 launched a pilot project requiring at least 20 percent of custom developed code to be released as open source – partly to strengthen and help maintain it by tapping a community of developers. OMB memo M-16-21 further asks agencies to make any code they develop available throughout the federal government in order to encourage its reuse.
“Open source solutions give agencies access to a broad community of developers and the latest advancements in technology, which can help alleviate the issues of stagnated or out-dated systems while increasing flexibility as agency missions evolve over time,” says Henry Sowell, chief information security officer at Hortonworks Federal. “Enterprise open source also allows government agencies to reduce the risk of vendor lock-in and the vulnerabilities of un-supported software,” he adds.
Recently I really got interested to learn Go, and to be honest I found it to be a beautiful language. I personally feel that it has that performance boost factor from a static language background and easy prototype and get things done philosophy from dynamic language background.
The real inspiration to learn Go was these amazing number of tools written and the ease with which these tools perform although they seem to be quite heavy. One of the good examples is Docker. So I thought I would write some utility for fun, I have been using fortune, this is a Linux utility which gives random quotes from a database. I thought let me write something similar but let me do something with jokes, keeping this mind I was actually searching for what can I do and I landed up on jokes about Chuck Norris or as we say it facts about him. I landed up on chucknorris.io they have an API which can return different jokes about Chuck, and there it was my opportunity to put something up and I chose Go for it.
Migrations are both essential and frustratingly frequent as your codebase ages and your business grows: most tools and processes only support about one order of magnitude of growth before becoming ineffective, so rapid growth makes them a way of life. This isn't because they're bad processes or poor tools, quite the opposite: the fact that something stops working at significantly increased scale is a sign that it was designed appropriately to the previous constraints rather than being over designed.
Why is this so hard? I just want low-level access to write a simple graphical interface in a somewhat obscure language.
A study released this month sheds new light on the Indian Patent Office’s (IPO’s) application of Section 3(d) of the country’s Patents Act – a controversial section intended to circumscribe the issue of ‘secondary’ rights for pharmaceuticals products. It finds not only that Section 3(d) objections by the patent office have increased markedly over time, but that the provision has been widely invoked against ‘primary’ patent applications to protect new drugs.
It is impossible, really, not to connect two recent pieces of news: Residents of Flint, Michigan, have been told that the state that poisoned their drinking water will no longer provide them free bottled water. They’ll be going back to paying some of the highest prices in the country, some $200 a month, for water that may still be making them sick. The Washington Post reports at least 12,000 homes in Flint still waiting for replacement of lead pipes.
At the same time, Michigan approved a permit letting the Nestlé Corporation pump more fresh water out of a well in the Great Lakes Basin to bottle and sell at a profit, more than half a million gallons a day, the right to which will cost Nestlé…wait for it…around $200 a year. And that won’t increase, although the amount of water they are taking will—by 60 percent.
This is, in fact, how water rights work in this country, but if it feels wrong to you, you are far from alone. What can be and what is being done? Joining us now to discuss this critical story is Peggy Case. She’s president of Michigan Citizens for Water Conservation. She joins us now by phone from near Traverse City. Welcome to CounterSpin, Peggy Case.
IBM Security unveiled an open-source toolkit at RSA 2018 that will allow the cyber community to test their AI-based security defenses against a strong and complex opponent in order to help build resilience and dependability into their systems.
Elytron is a new security framework that ships with WildFly version 10 and Red Hat JBoss Enterprise Application Platform (EAP) 7.1. This project is a complete replacement of PicketBox and JAAS. Elytron is a single security framework that will be usable for securing management access to the server and for securing applications deployed in WildFly. You can still use the legacy security framework, which is PicketBox, but it is a deprecated module; hence, there is no guarantee that PicketBox will be included in future releases of WildFly. In this article, we will explore the components of Elytron and how to configure them in Wildfly.
Twitter has banned advertising from Russian security vendor Kaspersky Lab since January, the head of the firm, Eugene Kaspersky, has disclosed.
A mobile application built by a third party for the RSA security conference in San Francisco this week was found to have a few security issues of its own—including hard-coded security keys and passwords that allowed a researcher to extract the conference's attendee list. The conference organizers acknowledged the vulnerability on Twitter, but they say that only the first and last names of 114 attendees were exposed.
In a yet-to-be peer-reviewed study published on Freedom To Tinker, a site hosted by Princeton's Center for Information Technology Policy, three researchers document how third-party tracking scripts have the capability to scoop up information from Facebook's login API without users knowing. The tracking scripts documented by Steven Englehardt, Gunes Acar, and Arvind Narayanan represent a small slice of the invisible tracking ecosystem that follows users around the web largely without their knowledge.
If you login to websites through Facebook, we've got some bad news: hidden trackers can suck up more of your data than you'd intended to give away, potentially opening it up to abuse.
He impersonated his victims and tricked call centres at communications firms Comcast and Verizon into divulging confidential information.
A teenage hacker who rose to fame for hacking into the online accounts of former CIA director John Brennan, former director of intelligence James Clapper, and other high-profile US government employees, got sentenced to two years of prison on Friday.
For a few months in late 2015 and early 2016, Kane Gamble, who went by the alias Cracka at the time, was the alleged 15-year-old leader of a hacking group calling themselves Crackas With Attitude or CWA. The group targeted and broke into Brennan’s AOL email account, Clapper’s internet provider account, and others, including a White House official.

An 18-year-old Briton has pleaded guilty at his trial to ten offences under the computer misuse act. As reported by Telegraph, the then 15-year-old Kane #Gamble received access to secret information about US reconnaissance operations in Afghanistan and Iran while to trying to hack computers of former #CIA head John Brennan and several other high-ranking US officials. The computer-savvy teen, who founded in 2015 his own online hacking team, Crackas With Attitude (CWA), is currently on conditional bail and will be sentenced by Mr Justice Haddon-Cave at the Old Bailey. Pretending at one point to be no less than the acting head on CIA, Gamble is accused of gaining unauthorised access to details of intelligence operations planned in Afghanistan and Iran.
In their book Manufacturing Consent Edward Herman and Noam Chomsky distinguished between two kinds of victims: the worthy victims and the unworthy victims. The “worthy victims” are the victims (real and alleged) of leaders on the U.S. enemies list, such as Bashar al-Assad. The “unworthy victims” are those of the U.S. and its client states, such as Israel and Saudi Arabia.
The United States military is, at any given moment, visiting lethal violence on human beings—with families, and hopes and dreams—in a range of countries around the world.
In The Atlantic (4/14/18), Thanassis Cambanis described the war crime as “undoubtedly a good thing,” and called for “sustained attention and investment, of diplomatic, economic and military resources”—though the latter rubbed up against his assessment in the same paragraph that “a major regional war will only make things worse.” Moreover, he described “the most realistic possibility” for the US and its partners in Syria as “an incomplete and possibly destabilizing policy of confrontation [and] containment. But a reckoning can’t be deferred forever.”
This “reckoning” was his somewhat oblique way of referring to a war pitting the US and its allies against the Syrian government and its allies, the very “wider regional war” he just warned against. In Cambanis’ view, “confrontations” between nuclear-armed America and nuclear-armed Russia are “inevitable,” which implies that there is no sense in trying to avoid such potentially apocalyptic scenarios.
A Washington Post editorial (4/14/18) said that “Mr. Trump was right to order the strikes.” The paper was glad that Defense Secretary Jim Mattis and President Donald Trump “properly left open the possibility of further action.” The Post’s rationale for continuing to attack Syria was that “the challenge to vital US interests in Syria is far from over,” and that Trump was therefore wrong “to call Friday’s operation a ‘Mission Accomplished.’” These “interests” include ensuring that Iran does not “obtain the land corridor it seeks across Syria.” (Cambanis, similarly, described as “justified” US efforts to “contain Syria and its allies.”)
The Trump administration also announced Thursday a new policy aimed at expanding the sale of armed drones, particularly the large armed drones such as the Predator and the Reaper. Trump’s trade adviser Peter Navarro said the policy change will allow U.S. weapons companies to increase their direct sales of armed drones to so-called authorized allies and partners. This comes as a new report from the Security Assistance Monitor revealed that Trump approved an unprecedented $82 billion in arms sales during his first year in office.
The author and former military analyst tells The Nation that it’s still US policy to launch a first-strike nuclear attack.
In practice this will mean taking our intelligence, surveillance and reconnaissance capability to the next level, hoovering up information from beneath the waves, from space, from across the increasingly important electro-magnetic spectrum finding out what our enemies are doing in high-definition and providing artificial intelligence – enabling analysis that can stay ahead in a fast-moving world
It will mean accelerating the development of our innovative 77 Brigade – those reservists and regulars who give us the ability to win the information war – so we create and counter the narratives so central to modern conflict
When the lawyer Jennifer Robinson first met Julian Assange, the most famous prisoner in the world not actually to be in prison, he was, she says, just “a guy with a backpack”. By that summer of 2010, the WikiLeaks founder had tossed some grenades into the public domain – a leaked report on toxic-waste dumping; Guantanamo Bay torture manuals – but Cablegate, the explosive release of 250,000 classified US diplomatic cables, still lay a little ahead. Nevertheless, the human rights lawyer Geoffrey Robertson smelt trouble, and called Robinson, with whom he’d worked in her capacity as a lawyer at a central London practice, and asked her to be prepared. The three of them, Assange, Robinson and he, were, after all, Australians.
WikiLeaks Shop, the merchandise arm of international anonymous publishing non profit WikiLeaks, reported on Twitter Friday, April 20, that their account with crypto wallet and exchange Coinbase has been blocked.
WikiLeaks is calling for a global blockade of one of the world’s largest exchanges for crypto-trading, Coinbase, after the company banned the WikiLeaks Shop from its platform “without explanation.”
The whistleblowing organization claims the cryptocurrency payments processor is responding to a “concealed influence,” and is urging members of the digital currency community to boycott it.
JULIAN ASSANGE HAS BEEN barred from communicating with the outside world for more than three weeks. On March 27, the Government of Ecuador blocked Assange’s internet access and barred him from receiving visitors other than his lawyers. Assange has been in the Ecuadorian embassy in London since 2012, when Ecuador granted him asylum due to fears that his extradition to Sweden as part of a sexual assault investigation would result in his being sent to the U.S. for prosecution for his work with WikiLeaks. In January of this year, Assange formally became a citizen of Ecuador.
As a result of Ecuador’s recent actions, Assange – long a prolific commentator on political debates around the world – has been silenced for more than three weeks, by a country which originally granted him political asylum and of which he is now a citizen. While Ecuador was willing to defy western dictates to hand over Assange under the presidency of Rafael Correa – who was fiercely protective of Ecuadorian sovereignty even if it meant disobeying western powers – his successor, Lenín Moreno, has proven himself far more subservient, and that mentality – along with Moreno’s increasingly bitter feud with Correa – are major factors in the Ecuadorian government’s newly hostile treatment of Assange.
New reports provide an unprecedented look at contaminants leaking from coal ash ponds and landfills. But the chasm between information and environmental protection may deepen thanks to a proposed Trump administration rollback.
Qualcomm Inc. will cut 1,500 jobs in California, the majority at the chipmaker’s San Diego headquarters, according to documents filed with the state.
Some 1,231 positions will be eliminated in San Diego with terminations starting about June 19, the company said in a WARN, or Worker Adjustment and Retraining Notification, notice. Companies are required to make such a state filing when they reduce their workforce by 50 or more employees within a 30-day period. At the same time, about 269 workers will lose their jobs at the company’s Santa Clara and San Jose locations.
A looming trade war between the United States and China has put Qualcomm, one of America’s largest technology companies, squarely in the middle of the battlefield.
A major supplier in both China and the United States, the San Diego-based chip maker has long managed to play the trading relationship between the world’s two largest economies to its advantage. But an escalating trade battle over which country will dominate the technologies of the future is now threatening Qualcomm’s business and its growth.
Last month, we reported that over the past five years, IBM has targeted its older U.S. employees for layoffs. The numbers are staggering: Since 2013, we estimated IBM eliminated more than 20,000 American employees ages 40 and over. We’ve collected the stories of over 1,400 former IBM employees and learned about their experiences during these job cuts. So exactly how does one of the country’s largest tech giants quietly push out this many older workers? Don’t we have laws to protect people at the end of their careers?
Watch the video above to find out about how IBM — a longtime leader in employment practices — went from dream employer in the 1980s to what it has become in recent years.
Wall Street giant Wells Fargo is expected to be hit with a $1 billion fine imposed by federal regulators accusing the bank of forcing people to buy auto insurance policies they didn’t need, for improperly charging mortgage holders and for other financial crimes. Despite being hit by a series of high-profile scandals and fines in recent years, Wells Fargo continues to reap billions of dollars a year in profits—reporting $5.9 billion in earnings in the first three months of this year alone.
In 2016, KrebsOnSecurity exposed a network of phony Web sites and fake online reviews that funneled those seeking help for drug and alcohol addiction toward rehab centers that were secretly affiliated with the Church of Scientology. Not long after the story ran, that network of bogus reviews disappeared from the Web. Over the past few months, however, the same prolific purveyor of these phantom sites and reviews appears to be back at it again, enlisting the help of Internet users and paying people $25-$35 for each fake listing.
In February, President Donald Trump took to Twitter once again to attack his attorney general, Jeff Sessions. He decried as “DISGRACEFUL” Sessions’s referral to the Justice Department’s inspector general of a Republican accusation that department lawyers had acted improperly in seeking a Foreign Intelligence Surveillance Act (FISA) warrant in October 2016 to eavesdrop on Carter Page, a Trump campaign aide. Trump insisted that Sessions should have investigated the charges himself. This was only the latest in a long line of public recriminations Trump has unleashed against his attorney general, in what New York Times reporters Peter Baker and Katie Benner aptly described as “an almost Shakespearean rift.”
When Stormy Daniels spoke to “60 Minutes” last month, the porn actress described a threat she received years ago after speaking to a journalist about her alleged affair with Donald Trump. A stranger approached her in a parking lot in Las Vegas. Daniels was there with her baby daughter. “Leave Trump alone,” Daniels recalled the man warning her. “That’s a beautiful little girl. It’d be a shame if something happened to her mom.”
Daniels did not report the threat to the police. On Wednesday, Donald Trump tweeted that Daniels’ account of events was “a total con job” about a “non-existent man.”
As it happens, other people in disputes with Trump have also found themselves the targets of threats — and sometimes they’ve reported it to authorities.
I teach internet law, and focus substantial time on computer privacy and cyber security law. The core anti-hacking statute is the Computer Fraud and Abuse Act (18 U.S.C. 1030(a)). Although I’m somewhat surprised by the new DNC v. Russia lawsuit, it is not surprising that the CFAA serves as a primary basis for the lawsuit.
The official account for WikiLeaks tweeted that they were looking to file a countersuit against the Democratic party, which sued the organization Friday along with the Trump campaign and the Russian government for alleged collusion.
On Friday, the Democratic National Committee filed a lawsuit in the U.S. District Court for the Southern District of New York against the Russian government, the Trump campaign and associated persons, and WikiLeaks, alleging an illegal conspiracy to influence the outcome of the election.
The Democratic National Committee has accused the Russian Federation, the Trump campaign, WikiLeaks, Guccifer 2.0, and others of engineering a conspiracy to leak damaging hacked data.
The Democratic National Committee has sued Russia, WikiLeaks, the Trump campaign, and a number of other individuals and organizations that the political party believes were affiliated with the now-infamous 2016 hack, whose perpetrators managed to spirit away internal research about then-candidate Donald Trump, as well as private e-mail and messages.
The complaint, filed in federal district court in Manhattan, alleges that top Trump campaign officials conspired with the Russian government and its military spy agency to hurt Democratic presidential nominee Hillary Clinton and help Trump by hacking [sic] the computer networks of the Democratic Party and disseminating stolen material found there.
Some of the most important stories in contemporary journalism have come from media outlets obtaining and publishing materials that were taken without authorization or even in violation of the law. Both the New York Times and Washington Post published thousands of pages from the top secret Pentagon Papers after Daniel Ellsberg took them without authorization from the Pentagon – and they won the right to publish them in the U.S. Supreme Court.
The Guardian and the Washington Post won the 2014 Pulitzer Prize for Public Service for publishing and reporting on huge numbers of top secret documents taken by Edward Snowden from the NSA. The Guardian, the New York Times, and numerous papers from around the world broke multiple stories by publishing classified classified documents downloaded by Chelsea Manning without authorization and sent to WikiLeaks. In 2016, more than 100 newspapers from around the world published and reported on millions of private financial documents known as the “Panama Papers,” which were taken without authorization from one of the world’s biggest offshore law firms and revealed the personal finances of people around the world.
This morning I saw a lot of excitement and happiness from folks who greatly dislike President Trump over the fact that the Democratic National Committee had filed a giant lawsuit against Russia, the GRU, Guccifier 2, Wikileaks, Julian Assange, the Trump campaign, Donald Trump Jr., Jared Kushner, Paul Manafort, Roger Stone and a few other names you might recognize if you've followed the whole Trump / Russia soap opera over the past year and a half. My first reaction was that this was unlikely to be the kind of thing we'd cover on Techdirt, because it seemed like a typical political thing. But, then I looked at the actual complaint and it's basically a laundry list of the laws that we regularly talk about (especially about how they're abused in litigation). Seriously, look at the complaint. There's a CFAA claim, an SCA claim, a DMCA claim, a "Trade Secrets Act" claim... and everyone's favorite: a RICO claim.
[...]
The crux of the complaint is that these groups / individuals worked together in a conspiracy to leak DNC emails and documents. And, there's little doubt at this point that the Russians were behind the hack and leak of the documents, and that Wikileaks published them. Similarly there's little doubt that the Trump campaign was happy about these things, and that a few Trump-connected people had some contacts with some Russians. Does that add up to a conspiracy? My gut reaction is to always rely on Ken "Popehat" White's IT'S NOT RICO, DAMMIT line, but I'll leave that analysis to folks who are more familiar with RICO.
[...]
Holy shit. This is the DNC trying to use DMCA 1201 as a mini-CFAA. They're not supposed to do that. 1201 is the anti-circumvention part of the DMCA and is supposed to be about stopping people from hacking around DRM to free copyright-covered material. Of course, 1201 has been used in all sorts of other ways -- like trying to stop the sale of printer cartridges and garage door openers -- but this seems like a real stretch. Russia hacking into the DNC had literally nothing to do with copyright or DRM. Squeezing a copyright claim in here is just silly and could set an awful precedent about using 1201 as an alternate CFAA (we'll get to the CFAA claims in a moment). If this holds, nearly any computer break-in to copy content would also lead to DMCA claims. That's just silly.
Onto the CFAA part. As we've noted over the years, the Computer Fraud and Abuse Act is quite frequently abused. Written in response to the movie War Games to target "hacking," the law has been used for basically any "this person did something we dislike on a computer" type issues. It's been dubbed "the law that sticks" because in absence of any other claims that one always sticks because of how broad it is.
Waters said he also concluded that The Syria Campaign — the PR firm behind the White Helmets — was not simply the humanitarian voice it purported to be, but a corporate outfit that represented much more prosaic interests. During a Barcelona concert on April 13, Roger Waters denounced the Syrian White Helmets as “a fake organization that exists only to create propaganda for jihadists and terrorists.” Warning that the groups’ unverified claims about chemical weapons attacks across insurgent-held territory were aimed at triggering Western military intervention, Waters cautioned his audience, “If we were to listen to the propaganda of the White Helmets and others, we would encourage our governments to start dropping bombs on people in Syria. This would be a mistake of monumental proportions for us as human beings.”
In fact, Waters had first hand experience with the powerful pro-war PR operation behind the White Helmets. Back in October 2016, a public relations firm representing the White Helmets called The Syria Campaign attempted to recruit Waters by inviting him to a lavish dinner organized by a Saudi-British billionaire, Hani Farsi. The rock legend and renowned activist was told that by signing on to the organization’s mission, he could help “elevate the voices of Syria’s peaceful heroes”
Project Six — the nonprofit watchdog group led by Faisal Khan, the former inspector general of Chicago’s City Council — announced Friday that it’s shutting down.
The organization launched only two years ago and promised to be an independent and nonpartisan government reform organization.
But even as Khan hired staff and released reports alleging misconduct by politicians, he declined to disclose his funding sources.
Asides from the general hostility to third-parties wanting to build on the Twitter platform, they've also done a really poor job of managing bad actors. Of the the tools they do offer, they save the best for people with "verified" status: ostensibly a system for preventing fakes, now consider by some a status symbol. Twitter have done nothing to counter this, in fact they've actively encouraged it, by withdrawing it in at least one case from a notorious troll as an ad-hoc form of punishment. For the rest of us, the tools are woefully inadequate. If you find yourself on the receiving end of even a small pocket of bad attention, twitter becomes effectively unusable for hours or days on end. Finally troll-in-chief (and now President of the US) is inexplicably still permitted on Twitter despite repeatedly and egregiously violating their terms of service, demonstrating that there's different rules for some folks than the rest of us.
A federal judge on Friday signaled possible shortcomings in a request by Donald Trump’s personal lawyer to delay adult-film actress Stormy Daniels’ lawsuit over her alleged affair with the U.S. president, but stopped short of putting it on hold.
Daniels, whose real name is Stephanie Clifford, sued last month to end a non-disclosure agreement related to a $130,000 payment she received from the lawyer, Michael Cohen, before the 2016 U.S. presidential election, to keep quiet about her alleged relationship with Trump a decade earlier.
Posing as ‘John Barron,’ he claimed he owned most of his father’s real estate empire.
Prestigious US thinker and activist Noam Chomsky is just one of over a hundred academics in the fields of law, human rights, politics, sociology and history, from 19 different countries, who on Friday called for the “immediate release” of Catalan pro-independence leaders being held in prison. In a letter sent to Scotland’s 'The National' newspaper, the academics also call on the European Union to act at once “to stop this repression, which represents an indelible and permanent stain on European democracy.”
Apart from the Massachusetts Institute of Technology professor Chomsky, who is well known for his political activism, the letter is signed by other top academics from the universities of Liverpool, Columbia, Glasgow, St Andrews, Helsinki and Manchester, among others. In the letter, the scholars say that there is “no doubt that we are living the darkest days of Spanish democracy since 1978,” and they are critical of the “escalation in the use of criminal charges and arrests continued to be used by Spain against its political opponents.”
It’s not just about payoffs to a porn star and a Playboy bunny.
Television shows are writing the 25th Amendment into their ripped-from-the-headlines storylines. Pundits debate the possibilities of the removal and succession of the president if he is incapacitated. Even former FBI Director James Comey has weighed in on whether Donald Trump is “medically unfit to be president.” (He doesn’t think so.) In the unlikely -- but politically fascinating -- event that a Cabinet were to use the power to oust a sitting president, what would come next?
It is partnering with BOOM, an independent digital journalism initiative certified through the International Fact-Checking Network, for the project. Like India, similar initiatives in France, Italy, the Netherlands, Germany, Mexico, Indonesia, the Philippines and the US are underway.
More than 50 journalists, including editors and columnists, media persons and media freedom organisation representatives in Pakistan and abroad have signed a petition against curbs on media in the country in recent days.
Just as places like Russia are getting more aggressive with companies like Google and Amazon in seeking to stop online communications they can't monitor, Google made a move that really fucked over a ton of people who rely on anti-censorship tools. For years, various anti-censorship tools from Tor to GreatFire to Signal have made use of "domain fronting." That's a process by which services could get around censorship by effectively appearing to send traffic via large companies' sites, such as Google's.
Texas attorney Mark Bennett -- instrumental in getting an unconstitutional "peeping tom" law tossed in 2014 -- has scored another win for the First Amendment by getting an unconstitutional revenge porn law tossed. It's not that anyone (except revenge porn purveyors) wants to see revenge porn go unchecked. It's that there's plenty of laws on the books already to address the problem and those written to target revenge porn tend to do collateral damage to the Constitution.
For the past number of years, Google’s App Engine has inadvertently permitted developers to evade internet censors. The loophole came in the form of a practice known as ‘domain fronting’, which let services use the Google network to escape state-level online obstacles.
Google has thrown a spanner into the works of developers who have been using domain-fronting in the Google App Engine to avoid Internet censorship by using Google's network.
The update in Google's network architecture was first spotted by developers of privacy-minded web browser Tor. It removes an approach that services like encrypted messaging platform Signal, anti-Chinese censorship tool GreatFire.org, and VPN services offered by Psiphon depended upon.
If you spend any time at all in Techdirt's comments, you should be familiar with That Anonymous Coward. He's a prolific and regular commenter (with strong opinions). He also spends a lot of time on Twitter. Well, at least until a week or so ago when Twitter suspended his account. It's no secret that Twitter has been getting a lot of pressure from people to be more proactive in shutting down and cutting off certain accounts. There are even a bunch of people who claim that Twitter should suspend the President's account -- though we think that would be a really bad idea.
As we've pointed out in the past, people who demand that sites shut down and suspend accounts often don't realize how difficult it is to do this at scale and not fuck up over and over again. Indeed, we have plenty of stories about sites having trouble figuring out what content is really problematic. Indeed, frequently these stories show that the targets of trolls and abusers are the ones who end up suspended.
You can read TAC's open letter to Jack Dorsey, which also includes an account of what happened. In short, over a year ago, TAC responded to something Ken "Popehat" White had tweeted, and referred to himself -- a gay man -- as "a faggot." Obviously, many people consider this word offensive. But it's quite obvious from how it was used here that this was a situation of someone using the word to refer to himself and to reclaim the slur.
Just a few weeks ago we wrote about how a group of sex workers, in response to the passing of FOSTA/SESTA, had set up their own social network, called Switter, which was a Mastodon instance. As we noted in our post, doing so was unlikely to solve any of the problems of FOSTA/SESTA, because it's perhaps even more likely that Switter itself would become a target of FOSTA/SESTA (remember, with FOSTA, the targeting goes beyond "sex trafficking" to all prostitution).
And, indeed, it appears I was not the only one to think so. The organization that created Switter, Assembly Four, put up a note saying that Cloudflare had shut down Switter claiming the site was in violation of its terms of service.
Switter went offline at around 5 AM, April 18 UTC+10 due to Cloudflare removing and blocking the switter.at zone. We received an email from their Legal Department that reads:
Cloudflare has terminated its services to the anime torrent site NYAA.si. According to Cloudflare, the pirate site tried to interfere with and thwart the operation of the company's abuse reporting systems. The site's operator, however, says he's not aware of any wrongdoing.
A social networking website for sex workers has been temporarily shut down in response to a new United States law meant to combat online sex trafficking, reigniting concerns raised by the tech sector that the legislation will stifle speech on the internet.
Switter, pitched as “a Twitter-like platform for Sex Workers,” was founded in late March by a group of sex workers in Australia, where prostitution is legal countrywide and even regulated in some states.
In its single month of operation, Switter amassed nearly 48,000 users across the world. “It's notable, because it's created by sex workers, for sex workers, and the people who created it work out of countries where sex work is not criminalized,” Liara Roux, an adult film producer and activist who used the site, tells ConsumerAffairs in a prepared statement.
Donald Trump's long time lawyer, Michael Cohen has been in a bit of hot water of late. As you no doubt heard, the FBI raided Cohen's office and home seeking a bunch of information, some of which related to the $130,000 he paid to adult performer Stormy Daniels. Already there have been a few court appearances in which Cohen (and Donald Trump) have sought to suppress some of what's been seized, but that doesn't seem to be going too well. At the same time, Cohen is still fighting Daniels in court, which also doesn't seem to be going too well.
Given all of that, it's not too surprising that Cohen has decided to dismiss his ridiculous lawsuit against Buzzfeed for publishing the Christopher Steele dossier. As we pointed out, that lawsuit was going nowhere, because it sought to hold Buzzfeed liable for content created by someone else (oh, and that leaves out that much of what Cohen claimed was defamatory may actually have been true.
Embattled attorney Michael Cohen has dropped a pair of much-touted libel suits against BuzzFeed and the private investigation firm Fusion GPS over publication of the so-called dossier detailing alleged ties between President Donald Trump and Russia.
Cohen abandoned the suits late Wednesday as he continues to fight to recover documents and electronic files seized from his home, office and hotel room last week by federal authorities as part of what appears to be a broad criminal investigation into his conduct.
One of the main reasons FOSTA/SESTA is now law is because of Facebook's vocal support for the bill. Sheryl Sandberg repeatedly spoke out in favor of the bill, misrepresenting what the bill actually did. In our own post-mortem on what happened with FOSTA/SESTA we noted that a big part of the problem was that many people inside Facebook (incredibly) did not appear to understand how CDA 230 works, and thus misunderstood how FOSTA/SESTA would create all sorts of problems. Last month, we noted that there was some evidence to suggest that Facebook itself was violating the law it supported.
However, a new article from Buzzfeed presents even more evidence of just how much liability Facebook may have put on itself in supporting the law. The article is fairly incredible, talking about how Facebook has allowed a group on its site that helps landlords seek out gay sex in exchange for housing -- and the report is chilling in how far it goes. In some cases, it certainly appears to reach the level of sex trafficking, where those desperate for housing basically become sex slaves to their landlords.
The government of Commander Daniel Ortega responded to the protests over reforms to the Nicaraguan Institute of Social Security (INSS) with repression and aggressions against university students and journalists from national and international media.
The government also ordered the censorship of independent television channels on the cable television signal.
The motive of the protests is the decree to increase contributions of employees and employers to Social Security, impose a 5% tax on those already retired and lower future pensions, among other measures.
Australian academic James Leibold was looking forward to having his work published in a special edition of The China Quarterly. His study of the impact of the Belt and Road Initiative on ethnic minorities in China had taken him two long years, but he was confident his paper – which argued state surveillance in Xinjiang was at odds with the aims of Beijing’s trade initiative – was finally ready for public consumption.
But then Leibold found two fellow academics from European universities had suddenly had second thoughts about publishing their work alongside his. A discussion ensued and collectively they decided about a month ago not to submit any of their papers. Leibold’s piece would have to wait. “We had a long conversation. They were concerned they wouldn’t be granted visas to China. It was self-censorship,” said Leibold of La Trobe University. “It’s regrettable this happened.”
[...]
For instance, no one from the Chinese government had warned Leibold or his colleagues against publishing their papers. But a combination of factors, including knowledge of other scholars who had been denied Chinese visas and a previous order from Beijing that the Quarterly block articles on sensitive subjects such as the Tiananmen crackdown, helped to convince Leibold’s colleagues it was better to keep their heads down.
And their experience is far from unique. Leibold said some researchers in Chinese universities had withdrawn from joint projects with foreign institutions after being warned by authorities that their projects were being monitored. He said some Western academics had become “spooked” during trips to the country when they were stopped by Chinese security agents and asked about their studies. In one case, he said, an academic was told to give the agents a copy of his doctoral dissertation.
Mark Zuckerberg, Facebook’s founder and CEO, thinks people want targeted advertising. The “overwhelming feedback,” he said multiple times during his congressional testimony, was that people want to see “good and relevant” ads. Why then are so many Facebook users, including leaders of state in the U.S. Senate and House, so fed up and creeped out by the uncannily on-the-nose ads? Targeted advertising on Facebook has gotten to the point that it’s so “good,” it’s bad—for users, who feel surveilled by the platform, and for Facebook, who is rapidly losing its users’ trust. But there’s a solution, which Facebook must prioritize: stop collecting data from users without their knowledge or explicit, affirmative consent.
It should never be the user’s responsibility to have to guess what’s happening behind the curtain.
Right now, most users don’t have a clear understanding of all the types of data that Facebook collects or how it’s analyzed and used for targeting (or for anything else). While the company has heaps of information about its users to comb through, if you as a user want to know why you’re being targeted for an ad, for example, you’re mostly out of luck. Sure, there's a “why was I shown this” option on an individual ad", but each generally reveals only bland categories like “Over 18 and living in California”—and to get an even semi-accurate picture of all the ways you can be targeted, you’d have to click through various sections, one at a time, on your “Ad Preferences” page.
A decision by the Minnesota Supreme Court on Wednesday will help the public learn more about how law enforcement use of privacy invasive biometric technology.
The decision in Webster v. Hennepin County is mostly good news for the requester in the case, who sought the public records as part of a 2015 EFF and MuckRock campaign to track mobile biometric technology use by law enforcement across the country. EFF filed a brief in support of Tony Webster, arguing that the public needed to know more about how officials use these technologies.
Across the country, law enforcement agencies have been adopting technologies that allow cops to identify subjects by matching their distinguishing physical characteristics to giant repositories of biometric data. This could include images of faces, fingerprints, irises, or even tattoos. In many cases, police use mobile devices in the field to scan and identify people during stops. However, police may also use this technology when a subject isn’t present, such as grabbing images from social media, CCTV, or even lifting biological traces from seats or drinking glasses.
Webster’s request to Hennepin County officials sought a variety of records, and included a request for the agencies to search officials’ email messages for keywords related to biometric technology, such as “face recognition” and “iris scan.”
The decision sets the stage for a showdown between tech firms and the government on NSA surveillance.
Amidst all of the coverage of Mark Zuckerberg’s congressional testimony last week, you may have missed another consequential headline for Facebook — and for everyone who uses the internet.
An Irish court ruled that U.S. surveillance programs result in the “mass indiscriminate” processing of Europeans’ private data, and it expressed serious concerns about the lack of legal remedies for this surveillance. If the European Union’s highest court agrees, it may limit the ability of companies to easily move data from the EU into the U.S. In other words, NSA spying could have a major impact on the profits of Facebook and other Silicon Valley giants.
One of the central issues in the case, known as the Schrems litigation, is whether the breathtaking scope of NSA surveillance violates users’ rights. That’s because under European law, companies face restrictions on transferring data to countries with weaker privacy rules. To address those restrictions, in the 1990s, the EU and the United States negotiated an agreement known as “Safe Harbor,” which allowed companies doing business in the EU to transfer data to the U.S. based on the principle that the U.S. ensures an “adequate” level of protection for that information.
[...]
However, as I explained in expert testimony for Schrems, those claims are completely divorced from reality.
When people’s data is transferred from Europe, it is vulnerable to warrantless mass surveillance by the NSA and other agencies under two broad spying authorities: Section 702 of the Foreign Intelligence Surveillance Act and Executive Order 12,333. The U.S. can target law-abiding Europeans under programs such as PRISM, which pulls information from American tech firms, and Upstream, which grabs communications directly from the internet’s physical infrastructure as they’re in transit. And in practice there are few, if any, effective remedies because the U.S. government almost never officially notifies the millions of people it subjects to this spying. Without notice, it is extremely difficult to challenge this surveillance in court.
In light of these facts, the Irish court rejected several of Facebook’s arguments. It ruled that the U.S. government engages in mass surveillance and found that people subject to U.S. surveillance do not receive notice. In addition, it concluded that concerns about the lack of remedies are “well-founded.”
Alexander Nix has refused to testify before the U.K. Parliament's media committee, even though the committee's chairman has said there was no legal reason for Nix to not appear before it.
Coalitions representing more than 670 companies and 240,000 members from the entertainment sector has written to Congress urging a strong response to the Facebook privacy fiasco. The groups, which include all the major Hollywood studios and key players from the music industry, are calling for Silicon Valley as a whole to be held accountable for whatever appears on their platforms.
"There is no such thing as VPN that doesn't keep logs. If they can limit your connections or track bandwidth usage, they keep logs."
Facebook does not appear to have changed its attitude to user privacy in any way despite all its recent troubles, with the company having decided to avoid providing the protections afforded by the EU General Data Protection Regulation to nearly 70% of its registered users worldwide.
That’s one of many questions raised by the huge amounts of data collected and maintained by the Chicago Police Department.
As I wrote in a column this week, nearly 129,000 people are identified as gang members in what’s commonly known as the department’s “gang database.” The gang data is marred by inconsistencies and mistakes — 13 people in it are listed as 118 years old, for instance, and two others are supposedly 132. The errors can lead to lives being upended by incarceration and deportation.
“It’s really affecting people in a lot of different ways, and in ways we don’t even know because we don’t know how this information is shared,” said Vanessa del Valle, a clinical assistant law professor at Northwestern University law school’s MacArthur Justice Center.
Jacksonville Sheriff Mike Williams in recent months has repeatedly defended his department’s enforcement of pedestrian violations. Claims of a racial disparity have been overstated, he has argued. There is no policy targeting people of color, he has insisted. He’s made his case before the City Council. Most recently, Williams had a report supporting his claims hand-delivered to a local NAACP official.
When making his case, Williams has relied on what he has said is a true accounting of pedestrian ticket data for recent years. That data, he claims, shows that 45 percent of tickets went to blacks. That figure, while greater than the city’s black population, is substantially less than the number reported by the Times-Union and ProPublica in a series of articles late last year. The Times-Union and ProPublica reported that 55 percent of the tickets over the prior five years had been issued to blacks.
In Israel, the organizers for the Genesis Prize, known as Israel’s Nobel Prize, have been forced to cancel the upcoming award ceremony, after the winner of this year’s prize, American-Israeli actress Natalie Portman, said she is refusing to travel to Israel to participate because of her distress over recent events. Portman has won an Academy Award, a Golden Globe Award and a Screen Actors Guild Award, and has starred in the new “Star Wars” trilogy, as well as the movies “Black Swan,” “Closer” and “V for Vendetta.” The Genesis Prize comes with a $2 million award. Portman’s decision not to participate in the ceremony comes as the Israeli military is in the midst of a brutal and deadly crackdown against Palestinian protesters in Gaza. Israeli snipers have killed dozens of unarmed Palestinian protesters so far.
Dividing up online services into those that have paid for TSA Precheck-like priority access and those that haven't wouldn't necessarily be appealing to consumers. While TSA Precheck lets travelers zoom through security, everyone else is stuck in a long, slow-moving line and met with frequent obstacles. Comparing paid prioritization to TSA Precheck lends credence to the pro-net neutrality argument that allowing paid fast lanes would necessarily push all other online services into "slow lanes."
Where are the female inventors? Despite the recent fashion for children’s books designed to redress the representation of historical female inventors, according to the Intellectual Property Office, women make up just 7 per cent of UK patent holders.
Though registrable intellectual property (IP) rights are typically held in the name of a company rather than an individual, explains Tania Clark, partner and trademark attorney at IP firm Withers & Rogers, “inventors are required to be named when filing a patent application and, in these instances, the majority are men”.
For many relatively young firms here in the greater Shenzhen area – China’s Silicon Valley – the IP department is at a relatively embryonic stage. As they invest more resources in intellectual property, they face important questions about how to build up an in-house function. Shirley Chen, the director of intellectual property for Lenovo, advised companies in this situation that there are not necessarily wrong answers when it comes to organisation: “I consider myself quite lucky to have experienced working in an IP team that’s within legal as well as one that’s an R&D unit”.
Artificial intelligence (AI) will challenge assumptions of patent ownership and bring about a unique set of issues, according to Mike Schuster, assistant professor at the Oklahoma State University. In a recent interview, Schuster said that these issues must be addressed by the US Government soon so that when the time comes, sufficient information and research will be available to make an informed decision.
AI is already here, and Schuster explained that it has already independently invented jet engines, parts of bullet trains, communication systems and new pharmaceuticals.
An upcoming paper from Schuster specifically discusses this problem and the variety of types of AI capable of invention.
Distributed ledger technology, commonly called a Blockchain, has recently become a highly popular term in many different industries for its cost-saving and operational risk reducing potential. In this interview with Intellectual Property Watch, Dominik Thor, the founder of IPCHAIN Database, a startup that focuses on IP protection through the use of Blockchain, explains about the ways this new technology can revolutionise the IP sector.
Advocate general advises CJEU that Nestlé did not produce sufficient evidence to show that Kit Kat’s three-dimensional shape had acquired distinctive character, in an opinion observers say makes tough task of attaining shape marks even harder
After taking a hiatus from issuing bogus DMCA takedowns against this site, self-proclaimed poet "Shaun Shane" is back at it. The harassment of anyone who dares to publish a certain poem of Shane's -- the one about tongues made of glass -- is a (possibly) Texas-based cottage industry. The harassment continues to this day, but not much of it is directed at Google. Most of Shane's "work" is done over at Twitter, where tweets are greeted with takedown requests.