Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Technology

San Francisco's Housing Crisis Explained 359

An anonymous reader writes "We've heard a few brief accounts recently of the housing situation in San Francisco, and how it's leading to protests, gentrification, and bad blood between long-time residents and the newer tech crowd. It's a complicated issue, and none of the reports so far have really done it justice. Now, TechCrunch has posted a ludicrously long article explaining exactly what's going on, from regulations forbidding Google to move people into Mountain View instead, to the political battle to get more housing built, to the compromises that have already been made. It's a long read, but well-researched and interesting. It concludes: 'The crisis we're seeing is the result of decades of choices, and while the tech industry is a sexy, attention-grabbing target, it cannot shoulder blame for this alone. Unless a new direction emerges, this will keep getting worse until the next economic crash, and then it will re-surface again eight years later. Or it will keep spilling over into Oakland, which is a whole other Pandora's box of gentrification issues. The high housing costs aren't healthy for the city, nor are they healthy for the industry. Both thrive on a constant flow of ideas and people.'"
Government

52 Million Photos In FBI's Face Recognition Database By Next Year 108

Advocatus Diaboli writes "The EFF has been investigating the FBI's Next-Generation Identification (NGI) scheme, an enormous database of biometric information. It's based on the agency's fingerprint database, which already has 100 million records. But according to the documents EFF dug up, the NGI database will include 52 million images of people's faces by 2015. At least 4.3 million images will have been taken outside any sort of criminal context. 'Currently, if you apply for any type of job that requires fingerprinting or a background check, your prints are sent to and stored by the FBI in its civil print database. However, the FBI has never before collected a photograph along with those prints. This is changing with NGI. Now an employer could require you to provide a 'mug shot' photo along with your fingerprints. If that's the case, then the FBI will store both your face print and your fingerprints along with your biographic data.'"
Open Source

How Does Heartbleed Alter the 'Open Source Is Safer' Discussion? 582

jammag writes: "Heartbleed has dealt a blow to the image of free and open source software. In the self-mythology of FOSS, bugs like Heartbleed aren't supposed to happen when the source code is freely available and being worked with daily. As Eric Raymond famously said, 'given enough eyeballs, all bugs are shallow.' Many users of proprietary software, tired of FOSS's continual claims of superior security, welcome the idea that Heartbleed has punctured FOSS's pretensions. But is that what has happened?"
Government

Intuit, Maker of Turbotax, Lobbies Against Simplified Tax Filings 423

McGruber (1417641) writes "Return-free filing might allow tens of millions of Americans to file their taxes for free and in minutes. Under proposals authored by several federal lawmakers, it would be voluntary, using information the government already receives from banks and employers and that taxpayers could adjust. The concept has been endorsed by Presidents Obama and Reagan and is already a reality in some parts of Europe. Sounds great, except to Intuit, maker of Turbotax: last year, Intuit spent more than $2.6 million on lobbying, some of it to lobby on four bills related to the issue, federal lobbying records show."
Security

OpenBSD Team Cleaning Up OpenSSL 304

First time accepted submitter Iarwain Ben-adar (2393286) writes "The OpenBSD has started a cleanup of their in-tree OpenSSL library. Improvements include removing "exploit mitigation countermeasures", fixing bugs, removal of questionable entropy additions, and many more. If you support the effort of these guys who are responsible for the venerable OpenSSH library, consider a donation to the OpenBSD Foundation. Maybe someday we'll see a 'portable' version of this new OpenSSL fork. Or not."

Submission + - Netflix Gets What It Pays For: Comcast Streaming Speeds Skyrocket (itworld.com)

jfruh writes: Back in Februrary, after a lengthy dispute, Netflix agreed to pay Comcast for network access after being dogged by complaints of slow speeds from Comcast subscribers. Two months later, it appears that Comcast has delivered on its promises, jumping up six places in Netflix's ISP speed rankings. The question of whether this is good news for anyone but Comcast is still open.

Submission + - Four In Five Americans Want Data-Sharing Restricted By Law (itworld.com)

jfruh writes: Some surveys from the Pew Research Center's Internet and American Life Project have found, not suprisingly, that Americans are concerned about the privacy and safety of their personal data, worrying about everything from securtiy breaches to corporate misues of it. Perhaps the most striking data point from the survey: 79% of respondents want tighter government regulations that would restrict how their personal data is shared.
Businesses

How Amazon Keeps Cutting AWS Prices: Cheapskate Culture 146

An anonymous reader writes "Amazon Web Services has cut its prices on 40-plus consecutive occasions, at times leading the charge, at other times countering similar moves by Microsoft and Google. This article at CRN includes some interesting behind-the-scenes trivia about how Amazon keeps costs down, including some interesting speculation — for example, that perhaps the reason Amazon's Glacier storage is so cheap is that maybe it might be based at least partly on tape, not disk (Amazon would not comment). The article also explains that the company will only pay for its employees to fly Economy, and that includes its senior executives. If they feel the need to upgrade to Business or First Class, they must do so from their own pocket. And instead of buying hardware from an OEM vendor, AWS sources its own components – everything from processors to disk drives to memory and network cards — and uses contract manufacturing to put together its machines."

Submission + - Snowden Used the Operating System Designed for Internet Anonymity

Hugh Pickens DOT Com writes: When Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. Now Klint Finley reports that Snowden also used The Amnesic Incognito Live System (Tails) to keep his communications out of the NSA’s prying eyes. Tails is a kind of computer-in-a-box using a version of the Linux operating system optimized for anonymity that you install on a DVD or USB drive, boot your computer from and you’re pretty close to anonymous on the internet. "Snowden, Greenwald and their collaborator, documentary film maker Laura Poitras, used it because, by design, Tails doesn’t store any data locally," writes Finley. "This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources." The developers of Tails are, appropriately, anonymous. They’re protecting their identities, in part, to help protect the code from government interference. “The NSA has been pressuring free software projects and developers in various ways,” the group says. But since we don’t know who wrote Tails, how do we now it isn’t some government plot designed to snare activists or criminals? A couple of ways, actually. One of the Snowden leaks show the NSA complaining about Tails in a Power Point Slide; if it’s bad for the NSA, it’s safe to say it’s good for privacy. And all of the Tails code is open source, so it can be inspected by anyone worried about foul play. "With Tails", say the distro developers, "we provide a tongue and a pen protected by state-of-the-art cryptography to guarantee basic human rights and allow journalists worldwide to work and communicate freely and without fear of reprisal."

Submission + - The Security Of The Most Popular Programming Languages

An anonymous reader writes: Deciding which programming language to use is often based on considerations such as what the development team is most familiar with, what will generate code the fastest, or simply what will get the job done. How secure the language might be is simply an afterthought, which is usually too late. A new WhiteHat Security report approaches application security not from the standpoint of what risks exist on sites and applications once they have been pushed into production, but rather by examining how the languages themselves perform in the field. In doing so, we hope to elevate security considerations and deepen those conversations earlier in the decision process, which will ultimately lead to more secure websites and applications.
The Media

Guardian and WaPo Receive Pulitzers For Snowden Coverage 78

Late Yesterday, the Pulitzer Prize board announced (PDF) the 2014 Pulitzer Prize winners. The public service prize was awarded to the Guardian and the Washington Post. The Washington Post was given the award for its role in revealing widespread surveillance by the NSA, "...marked by authoritative and insightful reports that helped the public understand how the disclosures fit into the larger framework of national security," and the Guardian for sparking "...a debate about the relationship between the government and the public over issues of security and privacy." Snowden released a statement praising the Pulitzer board: "Today's decision is a vindication for everyone who believes that the public has a role in government. We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognizes was work of vital public importance. This decision reminds us that what no individual conscience can change, a free press can. "
Windows

Microsoft Confirms It Is Dropping Windows 8.1 Support 575

snydeq (1272828) writes "Microsoft TechNet blog makes clear that Windows 8.1 will not be patched, and that users must get Windows 8.1 Update if they want security patches, InfoWorld's Woody Leonhard reports. 'In what is surely the most customer-antagonistic move of the new Windows regime, Steve Thomas at Microsoft posted a TechNet article on Saturday stating categorically that Microsoft will no longer issue security patches for Windows 8.1, starting in May,' Leonhard writes. 'Never mind that Windows 8.1 customers are still having multiple problems with errors when trying to install the Update. At this point, there are 300 posts on the Microsoft Answers forum thread 'Windows 8.1 Update 1 Failing to Install with errors 0x80070020, 80073712 and 800F081F.' The Answers forum is peppered with similar complaints and a wide range of errors, from 800F0092 to 80070003, for which there are no solutions from Microsoft. Never mind that Microsoft itself yanked Windows 8.1 Update from the corporate WSUS update server chute almost a week ago and still hasn't offered a replacement.'"
The Almighty Buck

IRS Can Now Seize Your Tax Refund To Pay a Relative's Debt 632

Hugh Pickens DOT Com (2995471) writes "Just in time for the April 15 IRS filing deadline comes news from the Washington Post that hundreds of thousands of taxpayers expecting refunds are instead getting letters informing them of tax debts they never knew about: often a debt incurred by their parents. The government is confiscating their checks, sometimes over debts 20—30 years old. For example, when Mary Grice was 4 (in 1960), her father died ... 'Until the kids turned 18, her mother received survivor benefits from Social Security ... Now, Social Security claims it overpaid someone in the Grice family in 1977. ... Four years after Sadie Grice died, the government is coming after her daughter. ... "It was a shock," says Grice, 58. "What incenses me is the way they went about this. They gave me no notice, they can't prove that I received any overpayment, and they use intimidation tactics, threatening to report this to the credit bureaus."' The Treasury Department has intercepted ... $75 million from debts delinquent for more than 10 years according to the department's debt management service. 'The aggressive effort to collect old debts started three years ago — the result of a single sentence tucked into the farm bill lifting the 10-year statute of limitations on old debts to Uncle Sam.'"
Encryption

First Phase of TrueCrypt Audit Turns Up No Backdoors 171

msm1267 (2804139) writes "A initial audit of the popular open source encryption software TrueCrypt turned up fewer than a dozen vulnerabilities, none of which so far point toward a backdoor surreptitiously inserted into the codebase. A report on the first phase of the audit was released today (PDF) by iSEC Partners, which was contracted by the Open Crypto Audit Project (OCAP), a grassroots effort that not only conducted a successful fundraising effort to initiate the audit, but raised important questions about the integrity of the software.

The first phase of the audit focused on the TrueCrypt bootloader and Windows kernel driver; architecture and code reviews were performed, as well as penetration tests including fuzzing interfaces, said Kenneth White, senior security engineer at Social & Scientific Systems. The second phase of the audit will look at whether the various encryption cipher suites, random number generators and critical key algorithms have been implemented correctly."

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...