grumpyman writes "A coalition of 49 ex-NASA employees, including seven Apollo astronauts, have accused the U.S. space agency of sullying its reputation by taking the 'extreme position' of concluding that carbon dioxide is a major cause of climate change. Is the claim in this letter opinion or fact?"
Agree -- and I totally meant to mention that as well. In fact, Opera Mini is a more on-point example than the Blackberry infrastructure, as with Opera Mini (at least some builds thereof) you similarly had no choice in keeping another server out of your web-browsing experience.
It's worth taking note that this is not a completely novel idea. The Blackberry web browser when running the Blackberry Internet Service has also used server-side resources of RIM's infrastructure to slice and dice and optimize web services. The same is true of email attachments -- the RIM infrastructure intercepts and re-optimizes. Especially apparent in viewing PDF attachments to email. In the Blackberry Enterprise Server infrastructure, this functionality actually moves to ones own BES server instance, with end-to-end encryption between the BES server and the handheld. This fact, at least, provides a corporation with the ability to not have the security exposure of having RIM decipher the pages and content. Perhaps the objection is that for Kindle fire we don't have an independently implementable server-side browsing optimization node?
Trevelyan writes "In his Blackhat talk on the past and future of SSL (YouTube video) Moxie Marlinspike explains the problems of SSL today, and the history of how it came to be so. He then goes on to not only propose a solution, but he's implemented it as well: Convergence. It will let you turn off all those untrustable CAs in you browser and still safely use HTTPS. It even works with self-signed certificates. You still need to trust someone, but not forever like CAs. The system has 'Notaries,' which you can ask anonymously for their view on a certificate's authenticity. You can pool Notaries for a consensus, and add/remove them at any time."
decora writes "The EFF reports on an internet censorship case in South Korea. The blog of Professor K.S. Park was recently brought up for consideration by the Korean Communication Standards Commission, which presides over South Korea's online censorship scheme, blocking about 10,000 URLs per month. The unusual thing about this case is that Park himself is a member of the commission; he was appointed to it by the opposition party as a well known free-speech advocate. The other members of the committee allowed him to make changes to his blog for now, but have vowed to 'take action' against it in the future."
eldavojohn writes "With the Pirate Bay trial, it's been easy to overlook similar struggles in other nations. A Dutch Usenet community named FTD is going on the offensive and suing BREIN (Bescherming Rechten Entertainment Industrie Nederland). You may remember BREIN (along with the IFPI & BPI) as the people who raided and cut out the heart of eDonkey. This is turning into a pretty familiar scenario; the FTD group makes software that allows its 450k members to easily find copyrighted content for free on Usenet. The shocking part is that FTD isn't waiting for BREIN to sue them. FTD is refusing to take down their file location reports, and is actually suing BREIN. Why the preemptive attack? FTD wants the courts to show that the act of downloading is not illegal in the Netherlands. (Both articles have the five points in English that FTD wants the courts to settle.) OSNews has a few more details on the story."
An anonymous reader asks "Is there a solution for online storage of encrypted data providing encrypted search and similar functions over the encrypted data? Is there an API/software/solution or even some online storage company providing this? I don't like Google understanding all my unencrypted data, but I like that Google can search them when they are unencrypted. So I would like to have both: the online storage provider does not understand my data, but he can still help me with searching in them, and doing other useful stuff. I mean: I send to the remote server encrypted data and later an encrypted query (the server cannot decipher them), and the server sends me back a chunk of my encrypted data stored there — the result of my encrypted query. Or I ask for the directory structure of my encrypted data (somehow stored in my data too — like in a tar archive), and the server sends it back, without knowing that this encrypted chunk is the directory structure. I googled for this and found some papers, however no software and no online service providing this yet." Can anyone point to an available implementation?
NewYorkCountryLawyer writes "Leading copyright law scholar Prof. Pamela Samuelson, of the University of California law school, and research fellow Tara Wheatland, have published a 'working paper' which directly refutes the position taken by the US Department of Justice in RIAA cases on the constitutionality of the RIAA's statutory damages theories. The Department of Justice had argued in its briefs that the Court should follow a 1919 United States Supreme Court case which upheld the constitutionality of a statutory damages award that was 116 times the actual damages sustained, under a statute which gave consumers a right of action against railway companies. The Free Software Foundation filed an amicus curiae brief supporting the view that the more modern, State Farm/Gore test applied by the United States Supreme Court to punitive damages awards is applicable. The new paper is consistent with the FSF brief and contradicts the DOJ briefs, arguing that the Gore test should be applied. A full copy of the paper is available for viewing online (PDF)."
pinguin-geek writes "Researchers at the McCormick School of Engineering and Applied Science at Northwestern University have identified a new 'guilt-by-association' threat to privacy in peer-to-peer (P2P) systems that would enable an eavesdropper to accurately classify groups of users with similar download behavior. While many have pointed out that the data exchanged over these connections can reveal personal information about users, the researchers shows that only the patterns of connections — not the data itself — is sufficient to create a powerful threat to user privacy. To thwart this threat, they have released SwarmScreen, a publicly available, open source software that restores privacy by masking a user's real download activity in such a manner as to disrupt classification."
An anonymous reader writes "BoingBoing Gadgets has updated their story from yesterday on DRM contained in the new iPod Shuffle. (We also discussed this rumor last week.) It's a false alarm. There is a chip in the headphone controls but it is just an encoder chip. There is no DRM and no reason to believe that third party headphones wouldn't work with the new Shuffle. (Apple would still prefer you to license the encoder under the Made for iPod program, but with no DRM, there is no DMCA risk to a manufacturer reverse engineering it.) The money quote: 'For the record, we do not believe that the new iPod headphones with in-line remote use DRM that affects audio playback in any way.'"
failcomm writes "I've been talking with my son's (middle-school) computer lab teacher about a 'time capsule' project. The school has a number of 'retirement age' PCs (5-6 years old — Dells, HPs, a couple of Compaqs), and we've been kicking around the idea of trying to preserve a working system and some media (CDs and/or DVDs), and locking them away to be preserved for some period of time (say 50 years); to be opened by students of the future. The goal would be to have instructions on how to unpack the system, plug it into the wall (we'll assume everyone is still using 110v US outlets), and get the system to boot. Also provide instructions on how to load the media and see it in action; whether it is photos or video or games or even student programs — whatever. So first, is this idea crazy? Second, how would we go about packing/preserving various components? Lastly, any suggestions on how to store it long term? (Remember, this is a school project, so we can't exactly just 'freeze it in carbonite'; practical advice would be appreciated.)"
I love that word pernicious... I've started naming all my servers after nasty p-words. pernicious, persnickety, pugnacious...
kev009 writes to recommend his editorial overview of the past, present and future of Linux file systems: ext2, ext3, ReiserFS, XFS, JFS, Reiser4, ext4, Btrfs, and Tux3. "In hindsight it seems somewhat tragic that JFS or even XFS didn't gain the traction that ext3 did to pull us through the 'classic' era, but ext3 has proven very reliable and has received consistent care and feeding to keep it performing decently. ... With ext4 coming out in kernel 2.6.28, we should have a nice holdover until Btrfs or Tux3 begin to stabilize. The Btrfs developers have been working on a development sprint and it is likely that the code will be merged into Linus's kernel within the next cycle or two."
CountryGeek passed us a link to a story in the Birmingham News, saying that schools in the Alabama city will be the first US students to make use of the XO laptop. The piece touches on a bit of the project's history, and seems to indicate the Birmingham school district is ready to make a serious commitment to these devices. "Langford has asked the City Council to approve $7 million for the laptops and a scholarship program that would give Birmingham students with a C average or above a scholarship to college or tech school of their choice. The City Council has not yet approved the funding. The rugged, waterproof computers will be distributed to students on April 15, Langford said, and children will be allowed to take them home. If a computer is lost, the school system can disable it, rendering it useless, Langford said. Students will turn in their computers at the end of their eighth-grade year."