Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Privacy

Facebook's "Evil Interfaces" 244

An anonymous reader writes "Tim Jones over at the EFF's Deep Links Blog just posted an interesting article on the widespread use of deceptive interface techniques on the Web. He began by polling his Twitter and Facebook audience for an appropriate term for this condition and received responses like 'Bait-and-Click' and 'Zuckerpunched.' Ultimately, he chose 'Evil Interfaces' from Greg Conti's HOPE talk on malicious interface design and follow-up interview with media-savvy puppet Weena. Tim then goes on to dissect Facebook (with pictures). So, what evil interfaces have you encountered on (or off) the Web?"
Patents

Red Hat Prevails Against Patent Troll Acacia 89

walterbyrd writes with news that Red Hat and Novell have won a patent case brought by a subsidiary of Acacia Research Corporation. The company had "accused Red Hat and Novell of infringing three patents that cover a computer-based graphical user interface that spans multiple workplaces, and lets users access icons remotely, according to court documents. A jury in Marshall, Texas, yesterday sided with Red Hat and Novell's defense that the patents were invalid." Red Hat's Michael Cunningham said, "The jury knocked out three invalid patents that were masquerading as a new and important inventions, when they were not. We appreciate the jury's wisdom and remain committed to providing value to our customers, including through our Open Source Assurance program. We also remain stalwart in resisting bogus shakedown tactics."
Privacy

Court Allows Unmasking of P2P Downloaders 244

bricko writes "A federal appeals court says copyright-infringing downloaders can now be outed. If you use or have used P2P, this may interest you. From Wired: 'The RIAA detected what it claimed to be infringing activity on an IP address the university linked to the student. The unidentified student moved to quash a federal judge’s order that the university forward the student’s identity to the RIAA. The student asserted a First Amendment right of privacy on the Internet, in addition to a fair-use right to the six music tracks in question. The appeals court ruled in the RIAA’s favor (PDF) after balancing a constitutional right to remain anonymous against a copyright owner’s right to disclosure of the identity of a possible “trespasser of its intellectual property interest."'"
Handhelds

The PalmPilots That Never Were 56

harrymcc writes "Among the things that HP is getting in its $1.2 billion takeover of Palm are hundreds of patents for mobile technologies. Many are reflected in Palm's iconic products. But they also include odd keyboard designs, peculiar ideas like a stylus tip that converts into a joystick, and pre-Treo hybrids of phone and PDA that just didn't work. I rounded up some fascinating examples." It's worth clicking through the obnoxious slide-show format to see them.
Australia

Australian Gov't Claims Internet Filter Legislation Still In Play 98

Dracophile writes "Contrary to yesterday's article about The Australian's report that the Australian government had put on the back burner plans to introduce Internet filter legislation before the next election, The Sydney Morning Herald reports that the government rejected claims that it had abandoned such plans, and that 'a spokeswoman for Communications Minister Stephen Conroy said the government remained committed to the policy.' Unless the Australian Labor Party abandons the plan altogether, will the timing make any difference to voters?"
The Courts

Writer Peter Watts Sentenced; No Jail Time 299

shadowbearer writes "SF writer Peter Watts, a Canadian citizen, whose story we have read about before in these pages, was sentenced three days ago in a Port Huron, MI court. There's not a lot of detail in the story, and although he is still being treated like a terrorist (cannot enter or pass through the US, DNA samples) he was not ordered to do any time in jail, was freed, and has returned home to his family. The judge in the case was, I believe, as sympathetic as the legal system would allow him to be."
Privacy

Why Tor Users Should Be Cautious About P2P Privacy 122

An anonymous reader writes "I went across your post a few days ago saying that a machine connected to the Internet was all one needed to spy on most BitTorrent users of the Internet. I followed the link to find out that those researchers from INRIA claimed their attacks also worked for BitTorrent users on Tor. I didn't believe it at first, but then today I found this link on the Tor Project. It seems their attacks don't only link your real IP to your BitTorrent files on Tor but also to the web pages that you're browsing! Tell me it's a joke." No joke, but according to Jacob Appelbaum (a Tor developer), the security flaw is more nuanced — and the fault of software outside of Tor. Read on for his explanation of how the privacy benefits of Tor can be easily lost.
Patents

Steve Jobs Hints At Theora Lawsuit 686

netcrawler writes "Steve Jobs' open letter on Flash has prompted someone at the Free Software Foundation Europe to ask him about his support of proprietary format H.264 over Theora. Jobs' pithy answer (email with headers) suggests Theora might infringe on existing patents and that 'a patent pool is being assembled to go after Theora and other "open source" codecs now.' Does he know something we don't?" Update: 05/01 00:38 GMT by T : Monty Montgomery of Xiph (the group behind Theora, as well as Ogg Vorbis, and more) provides a pointed, skeptical response to the implicit legal threat, below.
Communications

Palin Email Snoop Found Guilty On 2 Charges 291

netbuzz writes "A federal jury in Knoxville today has convicted David Kernell, 22, of two charges — misdemeanor computer fraud and felony obstruction of justice — in connection with the 2008 episode where he accessed the personal Yahoo email account of Republican vice presidential candidate Sarah Palin and then initiated a worldwide rummaging of its contents. The obstruction charge carries a maximum prison term of 20 years."
Movies

Avatar Blu-Ray DRM Issues 376

geekd writes "Once again, DRM only hurts legit content purchasers: 'An unusual glitch has angered some Avatar Blu-ray owners. For these unlucky people, since the disc won't play on their Blu-ray players, their new Avatar DVD serves no real purpose other than to sit idly on the coffee table. ... It appears the main culprit concerning playback issues with Avatar is, ironically, the disc's DRM (digital rights management). ... Even with updated firmware, a lot of Blu-ray players weren't prepared for these security measures. Despite the security problems, bootleggers are having a field day. Pirated copies of Avatar, according to Los Angeles Times, were available as early as January.'" Reader Murpster adds that this problem isn't specific to the Blu-ray version: "Got a regular Avatar DVD and it won't play on either of my DVD players. It will play on one computer DVD drive, if I want to watch it on a 12-inch screen."
Piracy

US Says 4.3 Billion People Live With Bad IP Laws 229

bowser100 writes "The US government has released its annual Special 301 report (PDF) in which it purports to identify those countries with inadequate intellectual property laws. Michael Geist digs into the report, noting the list is so large that it is rendered meaningless. According to the report, approximately 4.3 billion people live in countries without effective intellectual property protection. Since the report does not include any African countries outside of North Africa, the US is effectively saying that only a small percentage of the world meets its standard for IP protection."
Government

What Happened To Obama's Open Source Adviser? 296

gov_coder writes "Back in January of 2009, various news articles announced that former Sun CEO Scott McNealy was to become the Obama administration's Open Source Technology adviser. Currently, however, a search for Scott on the whitehouse.gov website yields zero results. Searching a bit more, I found that Scott is currently working on CurriWiki, a kind of Wikipedia for school curriculum. So my question is, what happened? Did some lobbyist block the appointment? Did Scott decide his other activities were more important? Scott, if you are out there — please tell us what happened. There are many people working in government IT, such as myself, who were really excited about the possibilities of an expanded role for open source software in government, and are now wondering what went wrong."
Encryption

Recourse For Draconian Encryption Requirements? 555

CryoStasis writes in with this question, which likely resulted from the new Massachusetts data security law. "I work for a major hospital in the Northeast. Recently the hospital has taken it upon itself to increase its general level of computer security. As a result they now require full-disk encryption on any computer connected to their network on site. Although I think this stance is perhaps a little over-exuberant, most of these computers are machines that have been purchased with hospital funding. In the department that I work in, however, many of the employees (myself included) bring their own personal machines to work every day. For obvious reasons we're rather reluctant to allow the hospital's IT staff to attempt installation of the encryption software. Those who have allowed the installation have had major problems afterwards, on both Macs and Windows machines — ranging from severe/total data loss to frequent crashes to general slowness — which the hospital does very little to remedy. To make matters worse, the hospital is now demanding that any machine that is used to check email (via email clients or webmail directly) be encrypted, including desktop-style machines at home, which must be brought in to the IT department, as they refuse to distribute the encryption software to the employees for install. By monitoring email access they have begun harassing employees who check email from off campus, stating that their email/login access will be disabled unless they bring in their computers. I have no intention of letting these people install anything on my machine, particularly software of which their IT staff clearly doesn't have a solid grasp. Have other Slashdot readers come across this kind of a problem? Do I have any recourse, legal or otherwise, to stop them from requiring me to install software on my personal machines?"
Australia

Australian Government Delays Internet Filter Legislation 255

An anonymous reader writes "It seems the Australian federal government is being forced to delay the introduction of its proposed and much-hated, much-maligned Internet filter. It will not be introduced in the next two sittings of parliament, which realistically delays it until after the next election. News on withdrawing the filter, which was a promise from the previous election, has disappointed lobbying groups such as the Australian Christian Lobby."
Security

India, China Try Import Regulations As Security Tools 108

An anonymous reader writes "The Register reports that the Chinese government is forcing vendors to cough up the source code to their encryption alogrithms before they can sell their equipment to the Chinese government. The EU doesn't seem to like it, but if I were in their position I'd want the same thing." China's biggest neighbor goes further; another anonymous reader writes "Telco equipment from China could have spyware that gives access to telcom networks in India. The Indian government has officially told mobile operators not to import any equipment manufactured by Chinese vendors, including Huawei and ZTE. The ban order follows concerns raised by the Home Ministry that telecom equipment from some countries could have spyware or malware that gives intelligence agencies across the border access to telecom networks in India. The biggest gainers from the move could be Ericsson, Nokia, and Siemens, which have been losing market share to aggressive Chinese equipment-makers in India."

Slashdot Top Deals

Anything free is worth what you pay for it.

Working...