×
Electronic Frontier Foundation

Trove of NSA Documents and FISC Opinions Declassified Thanks to EFF Lawsuit 110

An anonymous reader writes "Thanks to an EFF lawsuit, the office of the Director of National Intelligence is releasing declassified redacted versions of various documents relating to the NSA's domestic surveillance activities. The documents are being released on the anniversary of the 9/11 attacks." The EFF is hosting the documents, which are searchable. A few initial findings were posted yesterday evening; they include (thanks to another anonymous reader) the NSA illegally using phone data for three years, and evidence that Clapper knowingly mislead the public about metadata collection.
Education

Google Joins Open edX 29

lpress writes "Google and MIT have both built open source MOOC platforms and offered innovative MOOCs. They have just announced the establishment of mooc.org, a non-profit organization that will provide a platform to develop, host, and research online courses. The devil is, no doubt, in the details, but this combination of MIT's educational expertise and reputation, Google's vast infrastructure, and the lofty goals of both organizations might turn out to be revolutionary." From Google's research weblog: "Google and edX have a shared mission to broaden access to education, and by working together, we can advance towards our goals much faster. In addition, Google, with its breadth of applicable infrastructure and research capabilities, will continue to make contributions to the online education space, the findings of which will be shared directly to the online education community and the Open edX platform." Course Builder will continue to be maintained for the time being, but eventually Google will "provide an upgrade path to Open edX and MOOC.org from Course Builder."
Science

Study Suggests Weather and Not Hunting Killed Off Wooly Mammoths 150

Big Hairy Ian writes, quoting the BBC: "A DNA analysis shows that the number of creatures began to decrease much earlier than previously thought as the world's climate changed. It also shows that there was a distinct population of mammoth in Europe that died out around 30,000 years ago. ... Dr Dalen worked with researchers in London to analyse DNA samples from 300 specimens from woolly mammoths collected by themselves and other groups in earlier studies ... [The researchers] speculate that it was so cold that the grass on which they fed became scarce. The decline was spurred on as the Ice Age ended, possibly because the grassland on which the creatures thrived was replaced by forests in the south and tundra in the north."
BSD

FreeBSD Removes GCC From Default Base System 333

An anonymous reader writes "With the LLVM/Clang migration, FreeBSD developers have now disabled building GCC and the GNU C++ standard library (libstdc++) as part of the FreeBSD base system. GCC and libstdc++ have been superseded by LLVM's Clang and libc++, respectively, on primary architectures for FreeBSD 10.0." You can still flip a few switches to get GCC, but the system compiler will still be clang. Update: 09/11 14:50 GMT by U L : Reader Noryungi noted that the What's Cooking for FreeBSD 10 page is also worth a look, adding "I have to say, this is shaping up to be a very interesting release. Bhyve [the BSD hypervisor], in particular, sounds very promising."
Google

Court Declares Google Must Face Wiretap Charges For Wi-Fi Snooping 214

New submitter Maser_24 writes with news about continued action against Google for snooping on unsecured Wi-Fi networks when collecting data for Street View. From the article: "A federal appeals court this week ruled that Google could be held liable for civil damages for the company's 2011 scandal involving the company's collection of Wi-Fi data from unsecured hotspots using their Street View vehicles. To come to that conclusion, the court followed a rather unique logic path; according to the court, unsecured Wi-Fi hotspots are not 'radio communications' that are 'readily accessible' to the general public and therefore Google violated the Wiretap Act." This despite being cleared of wrongdoing by the FCC.
Java

Java 8 Developer Preview Released 189

An anonymous reader writes "Oracle has released the first developer preview of Java 8 for the full range of platforms (Windows, Max OS X, Linux, Solaris). Java 8 is a major update to both language and platform with Lambda expressions, method references, default methods, a new Date and Time API, Compact Profiles, the Nashorn JavaScript Engine, and the removal of the Permanent Generation from the HotSpot virtual machine. 'This milestone is intended for broad testing by developers,' Java Platform Chief Architect Mark Reinhold wrote on his blog. 'We've run all tests on all Oracle-supported platforms and haven't found any glaring issues. We've also fixed many of the bugs discovered since we reached the Feature Complete milestone back in June.' Let the bug hunt commence!" This is the second part of the JDK "Plan B" where JDK 7 was pushed out without cool new features like lambda expressions to prevent stalling language development for too long.
Encryption

Are the NIST Standard Elliptic Curves Back-doored? 366

IamTheRealMike writes "In the wake of Bruce Schneier's statements that he no longer trusts the constants selected for elliptic curve cryptography, people have started trying to reproduce the process that led to those constants being selected ... and found it cannot be done. As background, the most basic standard elliptic curves used for digital signatures and other cryptography are called the SEC random curves (SEC is 'Standards for Efficient Cryptography'), a good example being secp256r1. The random numbers in these curve parameters were supposed to be selected via a "verifiably random" process (output of SHA1 on some seed), which is a reasonable way to obtain a nothing up my sleeve number if the input to the hash function is trustworthy, like a small counter or the digits of PI. Unfortunately it turns out the actual inputs used were opaque 256 bit numbers, chosen ad-hoc with no justifications provided. Worse, the curve parameters for SEC were generated by head of elliptic curve research at the NSA — opening the possibility that they were found via a brute force search for a publicly unknown class of weak curves. Although no attack against the selected values are currently known, it's common practice to never use unexplainable magic numbers in cryptography standards, especially when those numbers are being chosen by intelligence agencies. Now that the world received strong confirmation that the much more obscure and less widely used standard Dual_EC_DRBG was in fact an NSA undercover operation, NIST re-opened the confirmed-bad standards for public comment. Unless NIST/the NSA can explain why the random curve seed values are trustworthy, it might be time to re-evaluate all NIST based elliptic curve crypto in general."
NASA

Space Food From Space Farms 168

Modern Farmer magazine has an article about NASA's efforts into growing food in space, a slow, difficult process that's nonetheless necessary if humanity is to have any significant presence away from Earth's surface. Quoting: "This December, NASA plans to launch a set of Kevlar pillow-packs, filled with a material akin to kitty litter, functioning as planters for six romaine lettuce plants. The burgundy-hued lettuce (NASA favors the 'Outredgeous' strain) will be grown under bright-pink LED lights, ready to harvest after just 28 days. NASA has a long history of testing plant growth in space, but the goals have been largely academic. Experiments have included figuring out the effects of zero-gravity on plant growth, testing quick-grow sprouts on shuttle missions and assessing the viability of different kinds of artificial light. But [the Vegetable Production System] is NASA's first attempt to grow produce that could actually sustain space travelers. Naturally, the dream is to create a regenerative growth system, so food could be continually grown on the space station — or, potentially, on moon colonies or Mars. ... Plant size is a vital calculation in determining what to grow on the space station, where every square foot is carefully allotted. Harvest time is also of extreme importance; the program wants to maximize growth cycles within each crew’s (on average) six-month stay."
Movies

The Tech Behind Man of Steel's Metropolis 74

angry tapir writes "Much of the urban vistas of Man of Steel, Cars 2 and the horrible remake of Total Recall were not modelled by hand. Instead they relied on a product called CityEngine, which is more typically associated with local government bodies' urban planning and urban design. The software procedurally generates cities using scripts written in a Python-like language. The next version of CityEngine, coming out next month, will incorporate an SDK so third-party developers can use parameter-defined procedural generation of urban environments in their own applications. CityEngine's product manager talks about the upcoming version, how it's being used at the moment, and plans to incorporate augmented reality in it."
Sony

PS Vita TV's Killer App: Remote Play 134

jfruh writes "When Sony announced the PS Vita TV yesterday, most observers saw it as competition for the Apple TV and Roku, or maybe the Ouya. But gaming writer Peter Smith views it differently; he thinks that remote play, including the ability to stream games from the upcoming PlayStation 4 console, will be the Vita TV's killer-app. In that sense, it isn't so much a low-cost replacement for casual gamers as an add-on to the high-end PS4. '[W]hen you're in the middle of a game and someone wants to watch TV, you can just grab a Vita and keep on playing. (This is similar to the popular "tablet play" feature of Nintendo's Wii U, without the Wii U's limitation of having to stay in close proximity to the base console.) ... For any Playstation 4 household with more than one TV I think the PS Vita TV will become a 'must-have' accessory; it's almost like getting a second PS4 for $100.'"
Open Source

How To Turn Your Pile of Code Into an Open Source Project 176

Esther Schindler writes "You've written some code, you think it would be useful to the world, and you'd like to give back to the open source world. But how do you do it? Andy Lester provides a checksheet for developers for how to release an open source project and get it noticed. For instance: Before you release the project to the wild, write some documentation, create a mailing list, create an issue tracker, and so on. 'Users require releases of your software. It’s a disservice to your users to point at the Git repo and say “Just pull from the master branch and install it.” Users don’t want to have to use version control just to get a release of the code. Create a proper tarball (.tar.gz) that is easily downloadable by anyone. Announce each release. Your announcements should not assume that the reader is familiar with your project.' You think he's missing anything?"
Google

Google's Encryption Plan To Stifle NSA's Dragnet Will Raise the Stakes 216

CWmike writes "Google's strategy for making surveillance of user Internet activity more difficult for U.S. and foreign governments — started last year, but accelerated in June following the NSA leaks — is as much about economics as data encryption, experts say. Eric Grosse, vice president for security engineering at Google, told The Washington Post: 'It's an arms race.' The crux of the issue with Google making the NSA dragnet harder (knowing if the government wants in, it will get in) is that the NSA evaluates the tactic it uses by weighing the cost with the value of the information obtained. However, the agency does evaluate the tactic it uses by weighing the cost with the value of the information obtained. 'The NSA has turned the fabric of the Internet into a vast surveillance platform, but they are not magical,' Bruce Schneier, a renowned security technologist and cryptographer, wrote in The Guardian. 'They're limited by the same economic realities as the rest of us, and our best defense is to make surveillance of us as expensive as possible.' The NSA's capabilities for cracking encryption are not known outside the agency. However, the most secure part of an encryption system remains the 'mathematics of cryptography,' Schneier said. The greater weaknesses, and the ones mostly likely to be exploited by governments in general, are the systems at the start and end of the data flow. 'I worry a lot more about poorly designed cryptographic products, software bugs, bad passwords, companies that collaborate with the NSA to leak all or part of the keys, and insecure computers and networks.' Is this about citizen's rights, or a business decision (some might say an existential issue) for Google? Does it matter, and will it make a difference?"
Displays

Bomb Defuse Simulator 2013: a Head-Tracking Tech Demo 35

New submitter Johnny G. Mills writes "During a gamejam (an event to quickly develop and build an interesting game), two members of Sassybot Studio used a projector, Microsoft Kinect, and two moving boxes to create a simulator for defusing a bomb. They used me as a test subject, and thought Slashdot would enjoy this convergence of tech and gaming. 'The wires generated in Bomb Defuse Simulator 2013 are created procedurally to provide the player with a random challenge each time the game is played. ... The controls in the game are split up into physical input and Xbox controller input. With physical input the player moves around the bomb to see what is happening. This is literally done by walking around the real environment ... In our case we projected onto cardboard boxes to prove the concept. In theory this concept can be applied to larger and more unconventional objects. Doing so will challenge the game designer with utilizing the real space in order to create a game in virtual space.'"
Intel

Intel's Haswell Chips Pushing Windows RT Into Oblivion 321

SmartAboutThings sends this excerpt from Technology Personalized: "Intel has started shipping the fourth generation Haswell chips for tablets, which brings power-efficient processors and hence much better battery life to Windows tablets. According to IDG, Intel has now started shipping new low-power, fourth-generation Core i3 processors, including one that draws as little as 4.5 watts of power in specific usage scenarios. These new Haswell processors could go into fanless tablets and laptop-tablet hybrids, bringing longer battery life to the devices. This is a great news for Windows lovers, who have had to sacrifice performance for battery life (and vice versa) until now. Now, with almost 50% better battery life as promised by Intel for Windows tablets, the OEMs have no real need to come out with Windows RT based tablets and hybrids anymore."
Earth

Evidence of 100,000-Year-Old Life Found In Antarctic Subglacial Lake 63

Researchers taking advantage of retreating ice shelves in Antarctica have discovered evidence of life that's been sealed away for nearly 100,000 years. Lake Hodgson on the Antarctic Peninsula, once covered by over 400 meters of ice, is now obscured only by a thin layer three to four meters thick. Scientists carefully drilled through the ice and took samples (abstract) from the layers of mud at the bottom (as much as 93 meters below the lake's surface). "The top few centimetres of the core contained current and recent organisms which inhabit the lake but once the core reached 3.2 m deep the microbes found most likely date back nearly 100,000 years. ... Some of the life discovered was in the form of Fossil DNA showing that many different types of bacteria live there, including a range of extremophiles which are species adapted to the most extreme environments. These use a variety of chemical methods to sustain life both with and without oxygen. One DNA sequence was related to the most ancient organisms known on Earth and parts of the DNA in twenty three percent has not been previously described."

Slashdot Top Deals