Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security

UK Court Rejects Encryption Key Disclosure Defense 708

truthsearch writes "Defendants can't deny police an encryption key because of fears the data it unlocks will incriminate them, a British appeals court has ruled. The case marked an interesting challenge to the UK's Regulation of Investigatory Powers Act (RIPA), which in part compels someone served under the act to divulge an encryption key used to scramble data on a PC's hard drive. The appeals court heard a case in which two suspects refused to give up encryption keys, arguing that disclosure was incompatible with the privilege against self incrimination. In its ruling, the appeals court said an encryption key is no different than a physical key and exists separately from a person's will."
Image

Researchers Claim To Be Able To Determine Political Leaning By How Messy You Are Screenshot-sm 592

According to a study to be published in The Journal of Political Psychology, you can tell someone's political affiliation by looking at the condition of their offices and bedrooms. Conservatives tend to be neat and liberals love a mess. Researchers found that the bedrooms and offices of liberals tend to be colorful and full of books about travel, ethnicity, feminism and music, along with music CDs covering folk, classic and modern rock, as well as art supplies, movie tickets and travel memorabilia. Their conservative contemporaries, on the other hand, tend to surround themselves with calendars, postage stamps, laundry baskets, irons and sewing materials. Their bedrooms and offices are well lit and decorated with sports paraphernalia and flags — especially American ones. Sam Gosling, an associate professor of psychology at the University of Texas at Austin, says these room cues are "behavioral residue." The findings are just the latest in a series of recent attempts to unearth politics in personality, the brain and DNA. I, for one, support a woman's right to clean.
Portables (Apple)

Top Apple Rumors, Bricks, Low Price, NVIDIA 283

Vigile writes "With the news that Apple will be releasing new MacBook products on October 14th, speculation has begun on what exactly those new products will be. Tips of a manufacturing process involving lasers and a single 'brick' of aluminum are catching on, as is the idea of a sub-$1000 netbook-type device. More interesting might be the persistent rumors of an NVIDIA chipset adoption that would drastically increase gaming ability, allow MacBooks to improve their support for OpenCL and take advantage of the new Adobe CS4 software with GPU acceleration. Will NVIDIA's ailing chipset business get a shot in the arm next week?"
Security

World Bank Under Cybersiege In "Unprecedented Crisis" 377

JagsLive sends in a Fox News report on large-scale and possibly ongoing security breaches at the World Bank. "The World Bank Group's computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year, FOX News has learned. It is still not known how much information was stolen. But sources inside the bank confirm that servers in the institution's highly-restricted treasury unit were deeply penetrated with spy software last April. Invaders also had full access to the rest of the bank's network for nearly a month in June and July. In total, at least six major intrusions — two of them using the same group of IP addresses originating from China — have been detected at the World Bank since the summer of 2007, with the most recent breach occurring just last month. In a frantic midnight e-mail to colleagues, the bank's senior technology manager referred to the situation as an 'unprecedented crisis.' In fact, it may be the worst security breach ever at a global financial institution. And it has left bank officials scrambling to try to understand the nature of the year-long cyber-assault, while also trying to keep the news from leaking to the public." Update: 10/11 01:15 GMT by T : Massive spyware infestations might be good cause to reevaluate the TCO of non-Windows systems on the desktop.
Portables (Apple)

Submission + - Apple MacBooks to get bricks, low price, NVIDIA (pcper.com)

Vigile writes: With the news that Apple will be releasing new MacBook products on October 14th, speculation has begun on what exactly those new products will be. Tips of a manufacturing process involving lasers and a single "brick" or aluminum are catching on as is the idea of a sub-$1000 netbook-type device. More interesting might be the persistent rumors of an NVIDIA chipset adoption that would drastically increase gaming ability, allow MacBooks to improve their support for OpenCL and take advantage of the new Adobe CS4 software with GPU acceleration. Will NVIDIA's ailing chipset business get a shot in the arm next week?
Privacy

20 Hours a Month Reading Privacy Policies 161

Barence sends word of research out of Carnegie Mellon University calling for changes in the way Web sites present privacy policies. The researchers, one of whom is an EFF board member, calculated how long it would take the average user to read through the privacy policies of the sites visited in a year. The answer: 200 hours, at a hypothetical cost to the US economy of $365 billion, more than half the financial bailout package. Every year. The researchers propose that, if the industry can't make privacy policies easier to read or skim, then federal intervention may be needed. This resulted in the predictable cry of outrage from online executives. Here's the study (PDF).
Security

Government Begins Securing Root Zone File 198

Death Metal notes a Wired piece on the US government beginning the process of securing the root zone file. This is in service of implementing DNSSEC, without which the DNS security hole found by Dan Kaminsky can't be definitively closed. On Thursday morning, a comment period will open on the various proposals on who should hold the keys and sign the root — ICANN, Verisign, or the US government's NTIA.
The Courts

Judge Tosses Telco Suit Over City-Owned Network 281

tsa sends along news of the city of Monticello, Minnesota, which was sued by their local telco, Bridgewater Telephone Company, because the city chose to build a fiber optics network of their own. The judge dismissed their complaint of competition by a governmental organization. Quoting: "The judge's ruling is noteworthy for two things: (1) the judge's complete dismissal of Bridgewater Telephone Company's complaint and (2) his obvious anger at the underfunding of Minnesota's state courts. Indeed, the longest footnote in the opinion is an extended jeremiad about how much work judges are under and why it took so long to decide this case."
Encryption

First Secure Quantum Crypto Network Up and Running 102

John Lam was one of many readers to send in news that on Thursday, "at a conference in Vienna, Austria, as reported by the BBC, a European Community science working group built a quantum backbone using 200-km of standard commercial optical fiber running among seven sites and successfully demonstrated the first secure quantum cryptographic key distribution network. In addition, each of the seven links used a different kind of quantum encryption, demonstrating interoperability between the technologies. To paraphrase, the project focused on the trusted repeater paradigm and developed an architecture allowing seamless integration of heterogeneous quantum-key distribution-link devices in a unified framework. Network node-modules managing all classical communication tasks provide the underlying quantum devices with authentic classical channels. The node-module architecture uses a layered model to provision network-wide, end-to-end, provably secure key distribution."
Security

US Financial Quagmire Bringing Out the Scammers 272

coondoggie contributes this snippet from NetworkWorld: "You could probably see this one coming. With all of the confusion and money involved you knew there would be cyber-vultures out there looking to cash in. Well the Federal Trade Commission today issued a warning that indeed such increased phishing activities are taking place. Specifically the FTC said it was urging user caution regarding e-mails that look as if they come from a financial institution that recently acquired a consumer's bank, savings and loan, or mortgage. In many case such emails are only looking to obtain personal information — account numbers, passwords, Social Security numbers — to run up bills or commit other crimes in a consumer's name, the FTC stated."
Software

Algorithms Can Make You Pretty 288

caffeinemessiah writes "The New York Times has an interesting story on a new algorithm by researchers from Tel Aviv University that modifies a facial picture of a person to conform to standards of attractiveness. Based on a digital library of pictures of people who have been judged 'attractive,' the algorithm finds the nearest match and modifies an input picture so it conforms to the 'attractive' person's proportions. The trick, however, is that the resultant pictures are still recognizable as the original person. Here's a quick link to a representative picture of the process. Note that this is a machine-learning approach to picture modification, not a characterization of beauty, and could just as easily be used to make a person less attractive." Note: As reader Trent Waddington points out, the underlying research was mentioned in an earlier story as well.

Comment Re:Only one more thing they need to do (Score 1) 41

Remember the MiniDisk?
The UMD is just a MiniDisk with a Mini DVD and a rounded case.
When The MiniDisk came out, it was touted by Sony as the replacement for the Cassette Tape.

The UMD format has a lot money invested in it, for better or worse, and will not go away. The only thing that will change will be the disk element. It will be a BluRay Disk in the next gen & have a third corner or some other bullshit.

Virginia High Court Wrong About IP Addresses 174

Frequent Slashdot contributor Bennett Haselton writes "The Virginia Supreme Court has ruled that the state's anti-spam law, which prohibits the sending of bulk e-mail using falsified or forged headers, violates the First Amendment because it also applies to non-commercial political or religious speech. I agree that an anti-spam law should not outlaw anonymous non-commercial speech. But the decision contains statements about IP addresses, domain names, and anonymity that are rather basically wrong, and which may enable the state to win on appeal. The two basic errors are: concluding that anonymous speech on the Internet requires forged headers or other falsified information (and therefore that a ban on forged headers is an unconstitutional ban on anonymous speech), and assuming that use of forged headers actually does conceal the IP address that the message was sent from, which it does not." Click that magical little link below to read the rest of his story.
Space

Do We Live In a Giant Cosmic Bubble? 344

Khemisty writes "Earth may be trapped in an abnormal bubble of space-time that is particularly void of matter. Scientists say this condition could account for the apparent acceleration of the universe's expansion, for which dark energy currently is the leading explanation. Until now, there has been no good way to choose between dark energy or the void explanation, but a new study outlines a potential test of the bubble scenario. If we were in an unusually sparse area of the universe, then things could look farther away than they really are and there would be no need to rely on dark energy as an explanation for certain astronomical observations. 'If we lived in a very large under-density, then the space-time itself wouldn't be accelerating,' said researcher Timothy Clifton of Oxford University in England. 'It would just be that the observations, if interpreted in the usual way, would look like they were.'"
Security

New Denial-of-Service Attack Is a Killer 341

ancientribe writes "Hacker RSnake blogs about a newly discovered and deadly denial-of-service attack that could well be the next big threat to the Internet as a whole. It goes after a broadband Internet connection and KOs machines on the other end such that they stay offline even after the attack is over. It spans various systems, too: the pair of Swedish researchers who found it have already contacted firewall, operating system, and Web-enabled device vendors whose products are vulnerable to this attack." Listen to the interview (MP3) — English starts a few minutes in — and you might find yourself convinced that we have a problem. The researchers claim that they have been able to take down every system with a TCP/IP stack that they have attempted; and they know of no fix or workaround.

Slashdot Top Deals

On the eighth day, God created FORTRAN.

Working...