Feed aggregator

Snowden Questions WikiLeaks' Methods of Releasing Leaks

Slashdot - 48 min 8 sec ago
An anonymous reader quotes a report from PCWorld: Former U.S. National Security Agency contractor, Edward Snowden, has censured WikiLeaks' release of information without proper curation. On Thursday, Snowden, who has embarrassed the U.S. government with revelations of widespread NSA surveillance, said that WikiLeaks was mistaken in not at least modestly curating the information it releases. "Democratizing information has never been more vital, and @Wikileaks has helped. But their hostility to even modest curation is a mistake," Snowden said in a tweet. WikiLeaks shot back at Snowden that "opportunism won't earn you a pardon from Clinton [and] curation is not censorship of ruling party cash flows." The whistleblowing site appeared to defend itself earlier on Thursday while referring to its "accuracy policy." In a Twitter message it said that it does "not tamper with the evidentiary value of important historical archives." WikiLeaks released nearly 20,000 previously unseen DNC emails last week, which suggest that committee officials had favored Clinton over her rival Senator Bernie Sanders. The most recent leak consists of 29 voicemails from DNC officials.

Read more of this story at Slashdot.

Categories: Technology

Clinton Campaign Breached By Hackers

Slashdot - 1 hour 11 min ago
An anonymous reader writes: Hillary Clinton's campaign network was breached by hackers targeting several large Democratic organizations, Reuters reports. Clinton's campaign spokesperson Nick Merrill confirmed the hack in a statement. 'An analytics data program maintained by the DNC, and used by our campaign and a number of other entities, was accessed as part of the DNC hack. Our campaign computer system has been under review by outside security experts. To date, they have found no evidence that our internal systems have been compromised,' he said. The hack follows on the heels of breaches at the Democratic National Committee and at the Democratic Congressional Campaign Committee earlier this year. More than 19,000 emails from DNC officials were published on WikiLeaks just prior to the Democratic National Convention, casting a shadow over the proceedings. Some security experts and U.S. officials have attributed the breaches to Russian operatives, although the origin of the email leak is less certain.

Read more of this story at Slashdot.

Categories: Technology

Court Ruling Shows The Internet Does Have Borders After All

Slashdot - 1 hour 43 min ago
itwbennett writes: Microsoft's recent victory in court, when it was ruled that the physical location of the company's servers in Ireland were out of reach of the U.S. government, was described on Slashdot as being "perceived as a major victory for privacy." But J. Trevor Hughes, president and CEO of the International Association of Privacy Professionals (IAPP) has a different view of the implications of the ruling that speaks to John Perry Barlow's vision of an independent cyberspace: "By recognizing the jurisdictional boundaries of Ireland, it is possible that the Second Circuit Court created an incentive for other jurisdictions to require data to be held within their national boundaries. We have seen similar laws emerge in Russia -- they fall under a policy trend towards 'data localization' that has many cloud service and global organizations deeply concerned. Which leads to a tough question: what happens if every country tries to assert jurisdictional control over the web? Might we end up with a fractured web, a 'splinternet,' of lessening utility?"

Read more of this story at Slashdot.

Categories: Technology

SwiftKey Bug Leaked Email Addresses, Phone Numbers To Strangers

Slashdot - 2 hours 28 min ago
An anonymous reader writes: After many users reported receiving predictions meant for other users, such as email addresses and phone numbers, SwiftKey has suspended part of its service. The service responsible for the bug was SwiftKey's cloud sync service. The Verge reports that one user, an English speaker, was getting someone else's German suggestions, while someone received NSFW porn search suggestions. The Telegraph also reports, "One SwiftKey user, who works in the legal profession and ask to remain anonymous, found out their details had been compromised when a stranger emailed them to say that a brand new phone had suggested their email address when logging into an account online. 'A few days ago, I received an email from a complete stranger asking if I had recently purchased and returned a particular model of mobile phone, adding that not one but two of my email addresses (one personal and one work address) were saved on the phone she had just bought as brand-new,' said the user." SwiftKey released an official statement today about the issue but said that it "did not pose a security issue."

Read more of this story at Slashdot.

Categories: Technology

Instagram Will Soon Allow Users To Filter Comments

Slashdot - 3 hours 8 min ago
Instagram has had enough of questionable, offensive comments. The company announced Friday that it will soon give users the ability to make the choice about what's acceptable and what's not, reports BBC. From an article: The first will let people hide certain words, phrases or emoji icons from their feed. The second will go further in allowing users to block comments entirely, on a post by post basis. Verified accounts will be able use these new tools first before they are rolled out to everyone, Newsbeat has learned. Accounts which get lots of comments will get access in the next couple of weeks.

Read more of this story at Slashdot.

Categories: Technology

Amazon CEO Jeff Bezos Becomes World's Third Richest Person

Slashdot - 3 hours 48 min ago
An anonymous reader quotes a report from BBC: Strong earnings from Amazon and a boost to the company's stock have made its founder, Jeff Bezos, the world's third richest person, according to Forbes. Mr Bezos owns 18% of Amazon's shares, which rose 2% in trading on Thursday. Forbes estimated his fortune to be $65.3 billion (49.5 billion British Pound). Amazon's revenue beat analysts' expectations, climbing 31% from last year to $30.4 billion in the second quarter. Profit for the e-commerce giant was $857 million, compared with $92 million in 2015. According to Forbes estimates, Mr Bezos's fortune is only surpassed by Microsoft founder Bill Gates, worth $78 billion (59 billion British Pound), and the $73.1 billion (55 billion British Pound) fortune of Zara founder Amancio Ortega. Amazon had developed a reputation for announcing little or no profit each quarter, but appeared to hit a turning point last year and has seen improving earnings since. Amazon shares have spiked 50% since February. BBC's report includes some bullet points about Bezos. He was born in Albuquerque, New Mexico, in 1964. He studied at Princeton University and worked on Wall Street. In 1994, he launched Amazon as an online book retailer. A lifelong Star Trek fan, Bezos launched Blue Origin spaceflight and aerospace firm in 2000, and more than a decade later, he purchased The Washington Post newspaper in 2013.

Read more of this story at Slashdot.

Categories: Technology

US Military Using $600K 'Drone Buggies' To Patrol Camps In Africa

Slashdot - 4 hours 28 min ago
An anonymous reader quotes a report from CNBC: The U.S. military is using an unmanned robotic vehicle to patrol around its camps in the Horn of Africa. The remote controlled vehicle is the result of a 30-year plan after military chiefs approved the concept of a robotic security system in 1985. Now the Mobile Detection Assessment and Response System, known as MDARS, are carrying out patrols in the east African country of Djibouti, under the control of the Combined Joint Task Force-Horn of Africa. The area is known as home to a number of hostile militant groups including the al-Qaeda-affiliated al-Shabaab. An operator sits in a remote location away from the vehicle watching the terrain via a camera link which is fixed to the chassis. U.S. military software engineer Joshua Kordanai said in a video presentation that the vehicle drives itself, freeing the remote operator to monitor video. "The vehicle has an intruder detection payload, consisting of radar, a night vision camera, a PTZ [pan-tilt-zoom] camera and two-way audio, so the system will be able to detect motion," he added. One report prices the cost of an earlier version of the military 'drone buggy' at $600,000 each.

Read more of this story at Slashdot.

Categories: Technology

How to use GeoIP with Nginx on Ubuntu 16.04

LinuxToday - 4 hours 48 min ago

HowToForge: This tutorial explains how to use the GeoIP module with nginx on Ubuntu 16.04 to find out where your visitors come from.

Categories: Technology

Judge Rules Political Robocalls Are Protected By First Amendment

Slashdot - 5 hours 8 min ago
Trailrunner7 quotes a report from On the Wire: A federal judge has ruled that robocalls made on behalf of political candidates are protected by the First Amendment and cannot be outlawed. The decision came in a case in Arkansas, where political robocalls had been illegal for more than 30 years. On Wednesday, U.S. District Court Judge Leon Holmes ruled that banning political robocalls amounts to an infringement of free speech protections and also constitutes prior restraint of speech. Political campaigns have been using robocalls for decades, and some states have sought to ban them, arguing that they are intrusive and violate recipients' privacy. In the Arkansas case, the state attorney general put forward both of these arguments, and also argued that the calls can tie up phone lines, making them unusable in an emergency. Holmes said in his decision that there was no evidence that political robocalls prevent emergency communications, and also said that the Arkansas statute should have banned all robocalls, not just commercial and political ones. "The statute at issue here imposes a content-based restriction on speech; it is not one of the rare cases that survives strict scrutiny. The state has failed to prove that the statute at issue advances a compelling state interest and is narrowly tailored to serve that interest," Holmes wrote.

Read more of this story at Slashdot.

Categories: Technology

Telco central offices could be in for open source makeover

LinuxToday - 5 hours 48 min ago

The CORD Summit, hosted by the Open Networking Lab (On.Lab) and The Linux Foundation, promotes the use of technologies such as Network Functions Virtualization (NFV), software-defined networking (SDN) and the cloud

Categories: Technology

Amazon Reaches New High Of 268,900 Employees -- Skyrocketing 47% In Just One Year

Slashdot - 5 hours 48 min ago
Amazon remains one of the biggest attractors of talent worldwide. During its quarterly earnings, the company said it hired 23,700 employees in the second quarter -- making the total employee headcount at the company 268,900. GeekWire reports: Amazon's headcount has grown by a staggering amount over the last few years. Its employment numbers increased close to 10 percent in the last three months and 47 percent over a year ago, when its employee count stood at a paltry-by-comparison 183,100 people. That's an increase of 85,800 employees in one year -- more than the entire city of Bellingham, Wash.Related: The New York Times report on work challenges at Amazon.

Read more of this story at Slashdot.

Categories: Technology

Australia Has Moved 1.5 Metres, So It's Updating Its Location For Self-Driving Cars

Slashdot - 6 hours 26 min ago
An anonymous reader shares a CNET report: Australia is changing from "down under" to "down under and across a bit". The country is shifting its longitude and latitude to fix a discrepancy with global satellite navigation systems. Government body Geoscience Australia is updating the Geocentric Datum of Australia, the country's national coordinate system, to bring it in line with international data. The reason Australia is slightly out of whack with global systems is that the country moves about 7 centimetres (2.75 inches) per year due to the shifting of tectonic plates. Since 1994, when the data was last recorded, that's added up to a misalignment of about a metre and a half. While that might not seem like much, various new technology requires location data to be pinpoint accurate. Self-driving cars, for example, must have infinitesimally precise location data to avoid accidents. Drones used for package delivery and driverless farming vehicles also require spot-on information.ABC has more details.

Read more of this story at Slashdot.

Categories: Technology

Ring : A free, open source and secure alternative to Skype messenger

LinuxToday - 6 hours 48 min ago

Ring, formerly known as SELphone, is a free, open source, and secure alternative to Skype messenger.

Categories: Technology

Slashdot Asks: Free Upgrade To Windows 10 Ends Today: What's Your Thought On This?

Slashdot - 7 hours 7 min ago
Exactly one year ago, Microsoft released Windows 10 to the general public. The latest version of company's desktop operating system brought with it Cortana, and Windows Hello among other features. While users have lauded Windows 10 for performance improvements, the Redmond-based company's aggressive upgrade tactics have spoiled the experience for many. Whether it was installing Windows 10 on computers without users' consent, or eating up tons of bandwidth for users who couldn't afford it, or whether it was deceptive dialog boxes, Microsoft definitely deserves a lot of blame -- and rightfully, a bunch of lawsuits. But many of these things, hopefully, will end today -- July 29, 2016 (or to be exact, Saturday morning 5:59am EDT / 2:59am PDT) Today is officially the last day when eligible Windows 7 and Windows 8 computers could be upgraded to Windows 10 for free of charge. After this, an upgrade to Windows 10 will set you back by at least $119. We asked you a couple of weeks ago whether or not would you recommend someone to update their computer to Windows 10, and the vast majority of you insisted against it. What's your thought on this now? Those who opt out of updating to Windows 10 will also miss the Anniversary Update -- and its features -- which Microsoft plans to release on August 2 for free of charge.

Read more of this story at Slashdot.

Categories: Technology

WhatsApp Isn't Fully Deleting Its 'Deleted' Chats

Slashdot - 7 hours 48 min ago
Facebook-owned messaging app WhatsApp retains and stores chat logs even after those messages have been deleted, according to iOS researcher Jonathan Zdziarski. The Verge reports: Examining disk images taken from the most recent version of the app, Zdziarski found that the software retains and stores a forensic trace of the chat logs even after the chats have been deleted, creating a potential treasure trove of information for anyone with physical access to the device. The same data could also be recoverable through any remote backup systems in place. In most cases, the data is marked as deleted by the app itself -- but because it has not been overwritten, it is still recoverable through forensic tools. Zdziarski attributed the problem to the SQLite library used in coding the app, which does not overwrite by default. WhatsApp was applauded by many privacy advocates for switching to default end-to-end encryption through the Signal protocol, a process that completed this April. But that system only protects data in transit, preventing carriers and other intermediaries from spying on conversations as they travel across the network.

Read more of this story at Slashdot.

Categories: Technology

AMD Extends Polaris GPU Line-up With Mainstream Radeon RX 470 and Radeon RX 460

Slashdot - 8 hours 28 min ago
Some more graphics cards news via our long time reader MojoKid: AMD is officially announcing its newest mainstream members of the Polaris graphics family today, known as the Radeon RX 470 and Radeon RX 460. AMD is touting the RX 470 as a perfect companion for 1080p resolution gaming, offering 60+ FPS performance (with anti-aliasing enabled) in popular game titles. The RX 460, on the other hand, is based on Polaris 11 architecture, which has a more budget-minded performance profile. If all you're looking for is an efficient, yet capable eSports gaming card, then AMD claims the RX 460 still has you covered. Peak compute performance for the RX 470 drops in at 4.9 TFLOPs (compared to 5.8 TFLOPs for the Radeon RX 480). The RX 460 has less than half the stream processors and less than half the compute units of the RX 470 and as a result, the peak compute performance stands at 2.2 TFLOPs. Pricing for the Radeon RX 470 and Radeon RX 460 is set at $149 and $99 MSRP, respectively.

Read more of this story at Slashdot.

Categories: Technology

Ask Slashdot: Best Browser Extensions -- 2016 Edition

Slashdot - 9 hours 7 min ago
Reader LichtSpektren writes: Almost eleven years ago, Slashdot featured an Ask titled "Favorite Firefox Extensions?". I thought it might be worthwhile to ask the question again (Editor's note: we couldn't agree more!), but expand the query to all web browsers now that there's more choices available. Right now my main browser is Firefox, which I use with uBlock Origin, Disconnect, HTTPS Everywhere, Privacy Badger, NoScript, Self-Destructing Cookies, Decentraleyes, Privacy Settings, and Clean Links. (N.B. the first four of these are also available in Chromium-based browsers.) I use Chrome as a secondary browser, with the first four of the aforementioned extensions, plus also Clear Cache and occasionally Flashcontrol. This one has nothing to do with security or privacy, but Reedy on Chromium is a really nice tool for speed reading. What do you use?Let's get this going.

Read more of this story at Slashdot.

Categories: Technology

British Spy Agency GCHQ Used URL Shortener To Honeypot Arab Spring Activists

Slashdot - 9 hours 47 min ago
The British spy agency GCHQ used a custom URL shortener and Twitter sockpuppets to influence and infiltrate activists during the Iran revolution of 2009 and the Arab Spring of 2011, reports Motherboard, citing leaked documents by Edward Snowden. From the article: The GCHQ's special unit, known as the Joint Threat Research Intelligence Group or JTRIG, was first revealed in 2014, when leaked top secret documents showed it tried to infiltrate and manipulate -- using "dirty trick" tactics such as honeypots -- online communities including those of Anonymous hacktivists, among others. The group's tactics against hacktivists have been previously reported, but its influence campaign in the Middle East has never been reported before. I was able to uncover it because I was myself targeted in the past, and was aware of a key detail, a URL shortening service, that was actually redacted in Snowden documents published in 2014. A now-defunct free URL shortening service -- lurl.me -- was set up by GCHQ that enabled social media signals intelligence. Lurl.me was used on Twitter and other social media platforms for the dissemination of pro-revolution messages in the Middle East.

Read more of this story at Slashdot.

Categories: Technology

Ubuntu Touch OTA-13 Update to Rename the Libertine Scope to "Desktop Apps"

LinuxToday - 9 hours 48 min ago

Yes, that's right, we're talking about the OTA-13 update, which should arrive this fall with numerous new features

Categories: Technology
Syndicate content