Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Microsoft

Microsoft Says Goodbye To WebTV/MSN TV 92

An anonymous reader writes "Microsoft has just notified both subscribers of MSN TV that the service would be ending at the end of September (FAQ for subscribers here). The service, which delivered Internet access to a TV screen via a set top box, was the evolution of WebTV Networks launched by Steve Perlman and others during the initial Web boom in the mid '90s. Microsoft bought the company for $503 million in 1997, when Bill Gates was still CEO."
Privacy

Keeping Your Data Private From the NSA (And Everyone Else) 622

Nerval's Lobster writes "If those newspaper reports are accurate, the NSA's surveillance programs are enormous and sophisticated, and rely on the latest in analytics software. In the face of that, is there any way to keep your communications truly private? Or should you resign yourself to saying or typing, 'Hi, NSA!' every time you make a phone call or send an email? Fortunately there are ways to gain a measure of security: HTTPS, Tor, SCP, SFTP, and the vendors who build software on top of those protocols. But those host-proof solutions offer security in exchange for some measure of inconvenience. If you lose your access credentials, you're likely toast: few highly secure services include a 'Forgot Your Password?' link, which can be easily engineered to reset a password and username without the account owner's knowledge. And while 'big' providers like Google provide some degree of encryption, they may give up user data in response to a court order. Also, all the privacy software in the world also can't prevent the NSA (or other entities) from capturing metadata and other information. What do you think is the best way to keep your data locked down? Or do you think it's all a lost cause?"
Government

Intelligence Director Claims NSA Surveillance Reports Inaccurate 262

Nerval's Lobster writes "James R. Clapper, the nation's Director of National Intelligence, claimed that recent reports about the NSA monitoring Americans' Internet and phone communications are inaccurate. 'The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act,' he wrote in a June 6 statement. 'They contain numerous inaccuracies.' While the statement didn't detail the supposed inaccuracies, it explained why the monitoring described in those articles would, at least in theory, violate the law. 'Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States,' it read. 'It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.' Those newspaper articles describe an NSA project codenamed Prism, which allegedly taps into the internal databases of nine major technology companies: Microsoft, Google, Yahoo, Facebook, PalTalk, YouTube, Skype, AOL, and Apple. Both publications drew their information from an internal PowerPoint presentation used to train intelligence operatives. Speaking to Slashdot, Google, Microsoft and Facebook all again denied knowledge of Prism; the Google spokesperson suggested he didn't 'have any insight' into why Google would have appeared in the NSA's alleged PowerPoint presentation. But many, many questions remain."
Microsoft

Microsoft Confirms Xbox One's Phone Home Requirement, Game Resale Rules 581

Following the confusion surrounding Microsoft's announcement of the Xbox One, the company has now clarified many of the hot-button issues in a set of posts on their official site. First, they confirmed that the console will need to phone home in order to continue playing games. On your primary console, you'd need to connect to the internet and check in once every 24 hours. They also announced that you'll be able to access and play any of your games by logging in on somebody else's console, but the internet connection will be required every hour to keep playing that way. Other media don't require the connection. Microsoft also explained how game licensing will work. On the upside, anyone using your console will be able to play your games, and you can share your games with up to 10 members of your family for free. The downside is the news about used games; Microsoft says they've "designed Xbox One so game publishers can enable you to trade in your games at participating retailers." The key word there is can, which implies that you can't without the publisher's express permission. Finally, the company made a set of statements about how Kinect's audio and video sensors will collect and share your data. "When Xbox One is on and you're simply having a conversation in your living room, your conversation is not being recorded or uploaded." They also say data gathered during normal use won't leave the console without your explicit permission.
Privacy

US Mining Data Directly From 9 Silicon Valley Companies 404

Rick Zeman writes "Hot on the heels of Verizon's massive data dump to NSA comes news of 'PRISM' where The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person's movements and contacts over time. This program, established in 2007, includes major companies such as Apple, Microsoft, Yahoo, Google, Facebook...and more."
Communications

Labor Dept. Wanted $1M For E-mail Addresses of Political Appointees 154

Virtucon writes with this snippet from an Associated Press story as carried by TwinCities.com: "'The AP asked for the addresses following last year's disclosures that the former administrator of the Environmental Protection Agency had used separate email accounts at work. The practice is separate from officials who use personal, non-government email accounts for work, which generally is discouraged—but often happens anyway—due to laws requiring that most federal records be preserved. The scope of using the secret accounts across government remains a mystery: Most U.S. agencies have failed to turn over lists of political appointees' email addresses, which the AP sought under the Freedom of Information Act more than three months ago. The Labor Department initially asked the AP to pay more than $1 million for its email addresses.' The reason for the $1 million dollar request was to do research including going to backup tapes. Some of the information has been turned over to AP but it still seems that the government just can't get their hands on e-mail addresses for their own people."
Bug

PayPal Reviewing Qualifying Age For Vulnerability Rewards 95

itwbennett writes "In follow-up to 17-year old Robert Kugler's claim that PayPal denied him a bug bounty because he was under 18, the company now says that it is 'investigating whether it can lower the qualifying age for vulnerability rewards for those who responsibly report security problems.' The company also said that the vulnerability had already been reported by another researcher — although they didn't mention that in the email to Kugler telling him he wouldn't be receiving payment."
The Media

Apple Leaves Journalists Jonesing 277

Hodejo1 writes "Apple traditionally has big product announcements in the early spring, so around February both the mainstream press and the tech blogs began to circulate their favorite rumors (the iWatch, iTV). They also announced the date of the next Apple event, which this year was in March — except it didn't happen. 'Reliable sources' then confirmed it would be in April, then May and then — nothing. In withdrawal and with a notoriously secretive Apple offering no relief the tech journalists started to get cranky. The end result is a rash of petulant stories that insist Apple is desperate for new products, in trouble (with $150 billion dollars in the bank, I should be in such trouble) and in decline. The only ones desperate seem to be editors addicted to traffic-generating Apple announcements. Good news is on the horizon, though, as the Apple Worldwide Developer Conference starts June 10th." This was in evidence last night, as Apple CEO Tim Cook spoke to the press at the All Things D conference. Cook's statements were mostly the sort of vague, grandiose talk that gets fed to investors on an earnings call, but it's generating article after article because, hey, it's Tim Cook.
United States

Chinese Hackers Steal Top US Weapons Designs 395

n1ywb writes "Chinese hackers have gained access to the designs of many of the nation's most sensitive advanced weapons systems, according to a report prepared for the Defense Department and government and defense industry officials,The Washington Post reported Tuesday. The compromised weapons designs include, among others, the advanced Patriot missile system, the Navy's Aegis ballistic missile defense systems, the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the F-35 Joint Strike Fighter." Also (with some more details and news-report round-up) at SlashBI.
Privacy

PETA Wants To Sue Anonymous HuffPo Commenters 590

MarkWhittington writes, quoting himself: "PETA is incensed over an article in the Huffington Post that details that organization's unsettling practice of euthanizing animals in a Virginia facility that many have assumed is a no kill shelter. According to the New York Post, PETA wants to sue some of the people who have left comments on the article. The problem is that, following the practice of many on the Internet, many of the comments are under assumed names or are anonymous. PETA is attempting to discover the true identities of their critics so that it can sue them for defamation."
Businesses

N. Carolina May Ban Tesla Sales To Prevent "Unfair Competition" 555

nametaken writes with this excerpt from Slate: "From the state that brought you the nation's first ban on climate science comes another legislative gem: a bill that would prohibit automakers from selling their cars in the state. The proposal, which the Raleigh News & Observer reports was unanimously approved by the state's Senate Commerce Committee on Thursday, would apply to all car manufacturers, but the intended target is clear. It's aimed at Tesla, the only U.S. automaker whose business model relies on selling cars directly to consumers, rather than through a network of third-party dealerships. ... [The article adds] it's easy to understand why some car dealers might feel a little threatened: Tesla's Model S outsold the Mercedes S-Class, BMW 7 Series, and Audi A8 last quarter without any help from them. If its business model were to catch on, consumers might find that they don't need the middle-men as much as they thought." State laws imposing restrictions on manufacturers in favor of dealers aren't new, though; For more on ways that franchise operations have "used state regulations to protect their profits" long before Tesla was in the picture, check out this 2009 interview with Duke University's Michael Munger.
Government

US DOJ Say They Don't Need Warrants For E-Mail, Chats 457

gannebraemorr writes "The U.S. Department of Justice and the FBI believe they don't need a search warrant to review Americans' e-mails, Facebook chats, Twitter direct messages, and other private files, internal documents reveal. Government documents obtained by the American Civil Liberties Union and provided to CNET show a split over electronic privacy rights within the Obama administration, with Justice Department prosecutors and investigators privately insisting they're not legally required to obtain search warrants for e-mail."
Robotics

Robot Snake Could Aid Search and Rescue Operations 66

mikejuk writes "The Carnegie Mellon University Biorobotics Lab demonstrates how the snakelike robots can aid search and rescue operations in collapsed buildings. The video appeared more or less at the same time as the current real disaster in Dhaka, Bangladesh where an 8-storey building collapsed, trapping some three thousand people. Bangladesh rescue teams, helped by members of the community, have so far worked with small tools and their bare hands to bring out survivors. Having a snake robot that could provide pictures from within the building would lead to speedier and more effective rescue operations."
Advertising

Startup Founder Plays Tech Press Like a Fiddle 135

theodp writes "Steinar Skipsnes came up with a unique way to get more women into tech. Make them up. Posing as 'Sarah Hanson,' a 19-year-old woman who claimed to have auctioned off 10% of her future income in return for $125,000 to fund her Senior Living Map startup, Skipsnes pitched the story via email to generate press coverage. It worked — VentureBeat, HuffPo, Yahoo!, AOL, GeekWire, and others took the bait. But after doubts were aired about the story, Skipsnes fessed up to concocting the too-good-to-be-true hoax about the female teen entrepreneur to appeal to the interests of the tech press. 'I started to think "what if I took the elements of what the press loves and created a story?"' Skipsnes explained. "So I did.'"

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...