Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Google

Gmail Messages Can Now Self-Destruct 204

New submitter Amarjeet Singh writes: Dmail is a Chrome extension developed by the people behind Delicious, the social bookmarking app/extension. This extension allows you to set a self-destruct timer on your emails. You can use Dmail to send emails from Gmail as usual, but you will now have a button which can set an self destruct timer of an hour, a day or a week. Dmail claims it will also unlock a feature that won't allow forwarding, meaning only the person you sent your message to will be able to see it.
ch

Swiss Researchers Describe a Faster, More Secure Tor 61

An anonymous reader writes: Researchers from the Swiss Federal Institute of Technology and University College London published a paper this week describing a faster and more secure version of Tor called HORNET. On one hand, the new onion routing network can purportedly achieve speeds of up to 93 gigabits per second and "be scaled to support large numbers of users with minimal overhead". On the other hand, researchers cannot claim to be immune to "confirmation attacks" known to be implemented on Tor, but they point out that, given how HORNET works, perpetrators of such attacks would have to control significantly more ISPs across multiple geopolitical boundaries and probably sacrifice the secrecy of their operations in order to successfully deploy such attacks on HORNET.
Privacy

Researchers: Mobile Users Will Trade Data For Fun and Profit 21

itwbennett writes: Even as mobile users become more security and privacy conscious, researchers and other mobile data collectors still to collect user data in order to build products and services. The question: How to get users to give up that data? Researchers at the New Jersey Institute of Technology tested two incentives: gamification and micropayments. The test involved building a campus Wi-Fi coverage map using user data collected from student participants who either played a first-person shooter game or who were paid to complete certain tasks (e.g., taking photos). The game turned out to be a quick and efficient way to build the Wi-Fi coverage map. But data from the micropayments group was found to be "sometimes unreliable, and individuals were trying to trick the system into thinking they had accomplished tasks."
Privacy

Red Star Linux Adds Secret Watermarks To Files 100

An anonymous reader writes: ERNW security analyst Florian Grunow says that North Korea's Red Star Linux operating system is tracking users by tagging content with unique hidden tags. He particularizes that files including Word documents and JPEG images connected to but not necessarily executed in Red Star will have a tag introduced into its code that includes a number based on hardware serial numbers. Red Star's development team seems to have created some quite interesting custom additions to Linux kernel and userspace, based on which Grunow has written a technical analysis.
Image

'Pluto Truthers' Are Pretty Sure That the NASA New Horizons Mission Was Faked Screenshot-sm 321

MarkWhittington writes: Forget about Apollo moon landing hoax theories. That is so 20th Century. Gizmodo reported that the "Pluto Truthers" have followed the astonishing images being sent back by NASA's New Horizons probe and have come to the conclusion that they are faked. After all, if the space agency could fake the entire moon landing, it would be child's play to fake a robotic probe to the edge of the Solar System.
Businesses

Neil Young Says His Music Is Too Good For Streaming Services 574

An anonymous reader writes: After years of complaining about modern music formats Neil Young today announced that he's pulling his music from all streaming services. He made the announcement on his official Facebook page saying: "Streaming has ended for me. I hope this is ok for my fans. It's not because of the money, although my share (like all the other artists) was dramatically reduced by bad deals made without my consent. It's about sound quality. I don't need my music to be devalued by the worst quality in the history of broadcasting or any other form of distribution. I don't feel right allowing this to be sold to my fans. It's bad for my music. For me, It's about making and distributing music people can really hear and feel. I stand for that. When the quality is back, I'll give it another look. Never say never."

Comment Re:For an alternative (Score 2) 581

What you raise, is an often raised response to discussions about free-speech and censorship.

What is often left out of these discussions, however, is the pervasive nature of corporate control over speech in the 'real' world (as well as the virtual). Corporations (and rich individuals) own newspapers (which trumpet *their* voice) TV stations (which do the same). The space for the mass dissemination of people's voices is small, and relegated to small groups, public meetings and protests (often barely tolerated by our democratic representatives).

When it comes to the mass dissemination of individuals voices, the internet is similarly coralled. Get a blog, people scream, on your own website! And there, the footfall is often small in scope. On sites where many people come together, those sites are owned by corporations and businesses, often merely looking for a proft..

The stark fact is, there are no public spaces on the internet. It's all owned by someone.

Privacy

Anonymizing Wi-Fi Device Project Unexpectedly Halted 138

An anonymous reader notes that a project to develop an anonymizing Wi-Fi device has been canceled under mysterious circumstances. The device, called Proxyham, was unveiled a couple weeks ago by Rhino Security Labs. They said it would use low-frequency radio channels to connect a computer to public Wi-Fi hotspots up to 2.5 miles away, thus obscuring a user's actual location. But a few days ago the company announced it would be halting development and canceling a talk about it at Def Con, which would have been followed with a release of schematics and source code. They apologized, but appear to be unable to say anything further.

"In fact, all [the speaker] can say is that the talk is canceled, the ProxyHam source code and documentation will never be made public, and the ProxyHam units developed for Las Vegas have been destroyed. The banner at the top of the Rhino Security website promoting ProxyHam has gone away too. It's almost as if someone were trying to pretend the tool never existed." The CSO article speculates that a government agency killed the project and issued a gag order about it. A post at Hackaday calls this idea absurd and discusses the hardware needed to build a Proxyham. They say using it would be "a violation of the Computer Fraud & Abuse Act, and using encryption over radio violates FCC regulations. That’s illegal, it will get you a few federal charges — but so will blowing up a mailbox with some firecrackers." They add, "What you’re seeing is just the annual network security circus and it’s nothing but a show."
Google

Google Accidentally Reveals Data On 'Right To Be Forgotten' Requests 51

Colin Castro points out an article from The Guardian, who noticed that Google's recent transparency report contained more data than intended. When perusing the source code, they found data about who was making requests for Google to take down links under the "right to be forgotten" law. The data they found covers 75% of all requests made so far. Less than 5% of nearly 220,000 individual requests made to Google to selectively remove links to online information concern criminals, politicians and high-profile public figures, the Guardian has learned, with more than 95% of requests coming from everyday members of the public. ... Of 218,320 requests to remove links between 29 May 2014 and 23 March 2015, 101,461 (46%) have been successfully delisted on individual name searches. Of these, 99,569 involve "private or personal information." Only 1,892 requests – less than 1% of the overall total – were successful for the four remaining issue types identified within Google’s source code: "serious crime" (728 requests), "public figure" (454), "political" (534) or "child protection" (176) – presumably because they concern victims, incidental witnesses, spent convictions, or the private lives of public persons.
Democrats

Hillary Clinton Takes Aim At 'Gig Economy' 432

SonicSpike writes with an excerpt from Marketwatch that says at least one major candidate in the 2016 electoral fight has made the "sharing economy" epitomized by Uber and Airbnb a campaign issue. In a major campaign speech in New York City, the former secretary of state didn't mention the ride-sharing service by name. But it was pretty clear what sort of companies she was talking about when she got to how some Americans earn money. "Many Americans are making extra money renting out a spare room, designing websites, selling products they design themselves at home, or even driving their own car," she said at the New School. But that sort of work comes with its own problems, she said. "This 'on demand' or so-called 'gig economy' ... is raising hard questions about workplace protections and what a good job will look like in the future," Clinton added.

Slashdot Top Deals

Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.

Working...