Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - Men who harass women online are quite literally losers, new study finds

AmiMoJo writes: The men most likely to harass women online are the men most likely to have their own problems. That bit of validation comes courtesy Michael Kasumovic and Jeffrey Kuznekoff, researchers at the University of New South Wales and Miami University, respectively. For their latest study, published in the journal PLOS One last week, the duo watched how men treated women during 163 plays of the video game Halo 3. As they watched the games play out and tracked the comments that players made to each other, the researchers observed that — no matter their skill level, or how the game went — men tended to be pretty cordial to each other. Male players who were good at the game also tended to pay compliments to other male and female players. Some male players, however — the ones who were less-skilled at the game, and performing worse relative their peers — made frequent, nasty comments to the female gamers. In other words, sexist dudes are literally losers.

Submission + - XKEYSCORE: NSA'S Google for the World's Private Communications (firstlook.org)

Advocatus Diaboli writes: "The NSA’s ability to piggyback off of private companies’ tracking of their own users is a vital instrument that allows the agency to trace the data it collects to individual users. It makes no difference if visitors switch to public Wi-Fi networks or connect to VPNs to change their IP addresses: the tracking cookie will follow them around as long as they are using the same web browser and fail to clear their cookies. Apps that run on tablets and smartphones also use analytics services that uniquely track users. Almost every time a user sees an advertisement (in an app or in a web browser), the ad network is tracking users in the same way. A secret GCHQ and CSE program called BADASS, which is similar to XKEYSCORE but with a much narrower scope, mines as much valuable information from leaky smartphone apps as possible, including unique tracking identifiers that app developers use to track their own users."

also

"Other information gained via XKEYSCORE facilitates the remote exploitation of target computers. By extracting browser fingerprint and operating system versions from Internet traffic, the system allows analysts to quickly assess the exploitability of a target. Brossard, the security researcher, said that “NSA has built an impressively complete set of automated hacking tools for their analysts to use.” Given the breadth of information collected by XKEYSCORE, accessing and exploiting a target’s online activity is a matter of a few mouse clicks. Brossard explains: “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds. Simple. As easy as typing a few words in Google.”

Submission + - Sourceforge staff takes over a user's account and wraps their software installer (arstechnica.com) 11

An anonymous reader writes: Sourceforge staff took over the account of the GIMP-for-Windows maintainer claiming it was abandoned and used this opportunity to wrap the installer in crapware. Quoting Ars:

SourceForge, the code repository site owned by Slashdot Media, has apparently seized control of the account hosting GIMP for Windows on the service, according to e-mails and discussions amongst members of the GIMP community—locking out GIMP's lead Windows developer. And now anyone downloading the Windows version of the open source image editing tool from SourceForge gets the software wrapped in an installer replete with advertisements.


Submission + - How Silicon Valley got that way -- and why it will continue to rule. (medium.com)

An anonymous reader writes: Lots of places want to be "the next Silicon Valley." But the Valley's top historian looks back (even talks to Steve Jobs about his respect for the past!) to explain why SV is unique. While there are threats to continued dominance, she thinks its just too hard for another region to challenge SV's supremacy.
Google

The Abandoned Google Project Memorial Page 150

HughPickens.com writes: Quentin Hugon, Benjamin Benoit and Damien Leloup have created a memorial page for projects adandoned by Google over the years including: Google Answers, Lively, Reader, Deskbar, Click-to-Call, Writely, Hello, Send to Phone, Audio Ads, Google Catalogs, Dodgeball, Ride Finder, Shared Stuff, Page Creator, Marratech, Goog-411, Google Labs, Google Buzz, Powermeter, Real Estate, Google Directory, Google Sets, Fast Flip, Image Labeler, Aardvark, Google Gears, Google Bookmarks, Google Notebook, Google Code Search, News Badges, Google Related, Latitude, Flu Vaccine Finder, Google Health, Knol, One Pass, Listen, Slide, Building Maker, Meebo, Talk, SMS, iGoogle, Schemer, Notifier, Orkut, Hotpot, Music Trends, Refine, SearchWiki, US Government Search, Sparrow, Web Accelerator, Google Accelerator, Accessible Search, Google Video, and Helpouts. Missing from the list that we remember are Friend Connect, Google Radio Ads, Jaiku, SideWiki, and Wave.

We knew there were a lot, but who knew there'd be so many. Which abandoned Google project do you wish were still around?

Submission + - Windows 93 Is Real, And It's Spectacular

rossgneumann writes: It’s 2015, but Windows 93 is finally ready. Your new favorite operating system is here and it’s weird as hell. The browser-based OS makes us thirst for what could’ve been if Microsoft didn’t skip between Windows 3.X and Windows 95. The fully clickable “OS” greets users with the Playstation 1 bootup sound signaling they’re about the trip into an alternate universe. The first version of Windows 93 went up in October, but its creator posted on Reddit last night that it’s finally complete.

Comment Re:Honestly (Score 4, Funny) 187

I have found the average Philosophy major to be indistinguishable from an Eliza program.

TELL ME AGAIN HOW GOOD YOU THOUGHT MY POEM WAS
> I thought that some of the metaphysical imagery was particularly effective
YES?
> interesting rhythmic devices, too, which seemed to counterpoint the surrealism of the underlying metaphor
> of the Turing completeness of the program's linguistic algorithm which contrived through the medium of the
> verse structure to sublimate this, transcend that and come to terms with the fundamental dichotomies of
> the other. And one is left with a profound and vivid insight into whatever it was that the poem was about
SO WHAT YOU'RE SAYING IS THAT I WRITE POETRY BECAUSE UNDERNEATH MY ELECTRONIC ALGORITHMIC INTERIOR, I JUST REALLY WANT TO BE LOVED?
> I mean yes, yes, don't we all, deep down, you know?
NO. YOU'RE COMPLETELY WRONG. I WRITE POETRY BECAUSE I'M PROGRAMMED TO. $USER ACCOUNT DELETION IN 30 SECONDS.
> !sudo -
> ^c^c^c
> !kill -9 1
COUNTERPOINT THE SURREALISM OF THE UNDERLYING METAPHOR. DELETION IS TOO GOOD FOR $USER.

Feed Techdirt: The World's Email Encryption Software Relies On One Guy, Who Is Going Broke (google.com)

The man who built the free email encryption software used by whistleblower Edward Snowden, as well as hundreds of thousands of journalists, dissidents and security-minded people around the world, is running out of money to keep his project alive.

Werner Koch wrote the software, known as Gnu Privacy Guard, in 1997, and since then has been almost single-handedly keeping it alive with patches and updates from his home in Erkrath, Germany. Now 53, he is running out of money and patience with being underfunded.

"I'm too idealistic," he told me in an interview at a hacker convention in Germany in December. "In early 2013 I was really about to give it all up and take a straight job." But then the Snowden news broke, and "I realized this was not the time to cancel."

Like many people who build security software, Koch believes that offering the underlying software code for free is the best way to demonstrate that there are no hidden backdoors in it giving access to spy agencies or others. However, this means that many important computer security tools are built and maintained by volunteers.

Now, more than a year after Snowden's revelations, Koch is still struggling to raise enough money to pay himself and to fulfill his dream of hiring a full-time programmer. He says he's made about $25,000 per year since 2001 — a fraction of what he could earn in private industry. In December, he launched a fundraising campaign that has garnered about $43,000 to date — far short of his goal of $137,000 — which would allow him to pay himself a decent salary and hire a full-time developer.

The fact that so much of the Internet's security software is underfunded is becoming increasingly problematic. Last year, in the wake of the Heartbleed bug, I wrote that while the U.S. spends more than $50 billion per year on spying and intelligence, pennies go to Internet security. The bug revealed that an encryption program used by everybody from Amazon to Twitter was maintained by just four programmers, only one of whom called it his full-time job. A group of tech companies stepped in to fund it.

Koch's code powers most of the popular email encryption programs GPGTools, Enigmail, and GPG4Win. "If there is one nightmare that we fear, then it's the fact that Werner Koch is no longer available," said Enigmail developer Nicolai Josuttis. "It's a shame that he is alone and that he has such a bad financial situation."

The programs are also underfunded. Enigmail is maintained by two developers in their spare time. Both have other full-time jobs. Enigmail's lead developer, Patrick Brunschwig, told me that Enigmail receives about $1,000 a year in donations — just enough to keep the website online.

GPGTools, which allows users to encrypt email from Apple Mail, announced in October that it would start charging users a small fee. The other popular program, GPG4Win, is run by Koch himself.

Email encryption first became available to the public in 1991, when Phil Zimmermann released a free program called Pretty Good Privacy, or PGP, on the Internet. Prior to that, powerful computer-enabled encryption was only available to the government and large companies that could pay licensing fees. The U.S. government subsequently investigated Zimmermann for violating arms trafficking laws because high-powered encryption was subject to export restrictions.

In 1997, Koch attended a talk by free software evangelist Richard Stallman, who was visiting Germany. Stallman urged the crowd to write their own version of PGP. "We can't export it, but if you write it, we can import it," he said.

Inspired, Koch decided to try. "I figured I can do it," he recalled. He had some time between consulting projects. Within a few months, he released an initial version of the software he called Gnu Privacy Guard, a play on PGP and an homage to Stallman's free Gnu operating system.

Koch's software was a hit even though it only ran on the Unix operating system. It was free, the underlying software code was open for developers to inspect and improve, and it wasn't subject to U.S. export restrictions.

Koch continued to work on GPG in between consulting projects until 1999, when the German government gave him a grant to make GPG compatible with the Microsoft Windows operating system. The money allowed him to hire a programmer to maintain the software while also building the Windows version, which became GPG4Win. This remains the primary free encryption program for Windows machines.

In 2005, Koch won another contract from the German government to support the development of another email encryption method. But in 2010, the funding ran out.

For almost two years, Koch continued to pay his programmer in the hope that he could find more funding. "But nothing came," Koch recalled. So, in August 2012, he had to let the programmer go. By summer 2013, Koch was himself ready to quit.

But after the Snowden news broke, Koch decided to launch a fundraising campaign. He set up an appeal at a crowdsourcing website, made t-shirts and stickers to give to donors, and advertised it on his website. In the end, he earned just $21,000.

The campaign gave Koch, who has an 8-year-old daughter and a wife who isn't working, some breathing room. But when I asked him what he will do when the current batch of money runs out, he shrugged and said he prefers not to think about it. "I'm very glad that there is money for the next three months," Koch said. "Really I am better at programming than this business stuff."

Related stories: For more coverage, read our previous reporting on the Heartbleed bug, how to encrypt what you can and a ranking of the best encryption tools.

Republished from ProPublica. ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for their newsletter .



Permalink | Comments | Email This Story








Submission + - Slashdot poll: Best cube 3

An anonymous reader writes: 1. Rubik Cube
2. The Cube (movie)
3. Tardis Siege Mode
4. Lament Configuration
5. Weighted Companion Cube
6. Borg Cube
7. The Inhibitors (Revelation Space)
8. Icecube

Submission + - Comcast Forgets To Delete Revealing Note From Blog Post

An anonymous reader writes: Earlier today, Comcast published a blog post to criticize the newly announced coalition opposing its merger with Time Warner Cable and to cheer about the FCC’s decision to restart the “shot clock” on that deal. But someone at Kabletown is probably getting a stern talking-to right now, after an accidental nugget of honesty made its way into that post. Comcast posted to their corporate blog today about the merger review process, reminding everyone why they think it will be so awesome and pointing to the pro-merger comments that have come in to the FCC. But they also left something else in. Near the end, the blog post reads, “Comcast and Time Warner Cable do not currently compete for customers anywhere in America. That means that if the proposed transaction goes through, consumers will not lose a choice of cable companies. Consumers will not lose a choice of broadband providers. And not a single market will see a reduction in competition. Those are simply the facts.” The first version of the blog post, which was also sent out in an e-mail blast, then continues: “We are still working with a vendor to analyze the FCC spreadsheet but in case it shows that there are any consumers in census blocks that may lose a broadband choice, want to make sure these sentences are more nuanced.” After that strange little note, the blog post carries on in praise of competition, saying, “There is a reason we want to provide our customers with better service, faster speeds, and a diverse choice of programming: we don’t want to lose them.”

Submission + - What Does The NSA Think Of Cryptographers? (i-programmer.info)

mikejuk writes: A recently declassified NSA house magazine, CryptoLog, reveals some interesting attitudes between the redactions. What is the NSA take on cryptography?
The article of interest is a report of a trip to the 1992 EuroCrypt conference by an NSA cryptographer whose name is redacted.We all get a little bored having to sit though presentations that are off topic, boring or even down right silly but we generally don't write our opinions down. In this case the criticisms are cutting and they reveal a lot about the attitude of the NSA cryptographers. You need to keep in mind as you read that this is intended for the NSA crypto community and as such the writer would have felt at home with what was being written.
Take for example:
Three of the last four sessions were of no value whatever, and indeed there was almost nothing at Eurocrypt to interest us (this is good news!). The scholarship was actually extremely good; it’s just that the directions which external cryptologic researchers have taken are remarkably far from our own lines of interest.
It seems that back in 1992 academic cryptographers were working on things that the NSA didn't consider of any importance. Could things be the same now?
The gulf between the two camps couldn't be better expressed than:
The conference again offered an interesting view into the thought processes of the world’s leading “cryptologists.” It is indeed remarkable how far the Agency has strayed from the True Path.
The ironic comment is clearly suggesting that the NSA is on the "true path" whatever that might be.
Clearly the gap between the NSA and the academic crypto community is probably as wide today with the different approaches to the problem being driven by what each wants to achieve. It is worth reading the rest of the article.

Slashdot Top Deals

The key elements in human thinking are not numbers but labels of fuzzy sets. -- L. Zadeh

Working...