Forgot your password?
typodupeerror

+ - Who's on WhatsApp?

Submitted by theodp
theodp (442580) writes "In announcing its $16B acquisition of WhatsApp, Facebook confessed it had very little data on WhatsApp's estimated 450 million users. Asked about the user data, Facebook CFO David Ebersman said, "WhatsApp has good penetration across all demographics but you are not asked your age when you sign up." Wall Street analysts concerned by Ebersman's answer won't be comforted by GeekWire reporter Taylor Soper's (non-scientific) poll of UW students, which suggested that WhatsApp may not exactly be BMOC (Big Messenger on Campus). "I don’t use it at all," replied one UW junior. "I've heard of it but I have so many other things I do online that it would just be another time-consuming thing. I use Facebook or texting to talk to people." WhatsApp did fare better in a survey of Soper's Facebook network, where responders said they used WhatsApp mostly for communicating internationally and in groups. So, are you or someone you know using WhatsApp, and what's the motivation for doing so?"

+ - Ask Slashdot: Opinion of slashdot beta? 9

Submitted by Anonymous Coward
An anonymous reader writes "What are your thoughts about slashdot beta? Post your complaints here so that I don't have to see them elsewhere. Additionally, if the beta is so bad that you don't want to stay, what other news website do you recommend?"

+ - Slashdot creates beta site users express theirs dislike-> 4

Submitted by who_stole_my_kidneys
who_stole_my_kidneys (1956012) writes "Slashdot started redirecting users in February to its newly revamped webpage and received a huge backlash from users. The majority of comments dislike the new site while some do offer solutions to make it better. The question is will Slashdot force the unwanted change on its users that clearly do not want change?"
Link to Original Source

+ - Once Slashdot beta has been foisted upon me, what site should I use instead? 2

Submitted by somenickname
somenickname (1270442) writes "As a long time Slashdot reader, I'm wondering what website to transition to once the beta goes live. The new beta interface seems very well suited to tablets/phones but, it ignores the fact that the user base is, as one would expect, nerds sitting in front of very large LCD monitors and wasting their employers time. It's entirely possible that the browser ID information gathered by the site has indicated that they get far more hits on mobile devices where the new interface is reasonable but, I feel that no one has analyzed the browser ID (and screen resolution) against comments modded +5. I think you will find that most +5 comments are coming from devices (real fucking computers) that the new interface does not support well. Without an interface that invites the kind of users that post +5 comments, Slashdot is just a ho-hum news aggregation site that allows comments. So, my question is, once the beta is the default, where should Slashdot users go to?"

+ - Lawsuit: Oracle Called $50K "Good Money For An Indian"->

Submitted by jfruh
jfruh (300774) writes "A former Oracle sales manager is suing the database company for what he called racially discriminatory salary-setting practices. Ian Spandow wanted to transfer a high-performing salesman from Oracle's India office to California. When he requested a salary of $60,000 a year or more for the employee, equivalent to what his white American counterparts received, he was told instead to offer $50,000, which was "good money for an Indian." When Spandow protested, he was himself summarily fired."
Link to Original Source

+ - NSA Spied Upon: 60 Countries, Unicef, EU Competition Commissioner & Israeli

Submitted by mrspoonsi
mrspoonsi (2955715) writes "BBC Reports: More details of people and institutions targeted by UK and US surveillance have been published by The Guardian, The New York Times and Der Spiegel. The papers say that the list of around 1,000 targets includes a European Union commissioner, humanitarian organisations and an Israeli PM. They suggest over 60 countries were targets of the NSA and Britain's GCHQ. GCHQ monitored the communications of foreign leaders — including African heads of state and sometimes their family members — and directors of United Nations and other relief programmes. The paper reports that the emails of Israeli officials were monitored, including one listed as "Israeli prime minister". The PM at the time, 2009, was Ehud Olmert. The Dutch Liberal MEP Sophia in 't Veld described the latest claims as "shocking". "The UK spying on its fellow EU member states in order to get an economic advantage is simply unacceptable""

+ - A Plan to Fix Daylight Savings Time by Creating Two National Time Zones

Submitted by Hugh Pickens DOT Com
Hugh Pickens DOT Com (2995471) writes "Allison Schrager writes in the Atlantic that losing another hour of evening daylight isn't just annoying. It's an economically harmful policy with minimal energy savings. "The actual energy savings are minimal, if they exist at all. Frequent and uncoordinated time changes cause confusion, undermining economic efficiency. There’s evidence that regularly changing sleep cycles, associated with daylight saving, lowers productivity and increases heart attacks." So here's Schrager's proposal. This year, Americans on Eastern Standard Time should set their clocks back one hour (like normal), Americans on Central and Rocky Mountain time do nothing, and Americans on Pacific time should set their clocks forward one hour. This will result in just two time zones for the continental United States and the east and west coasts will only be one hour apart. "America already functions on fewer than four time zones," says Schrager. "I spent the last three years commuting between New York and Austin, living on both Eastern and Central time. I found that in Austin, everyone did things at the same times they do them in New York, despite the difference in time zone. People got to work at 8 am instead of 9 am, restaurants were packed at 6 pm instead of 7 pm, and even the TV schedule was an hour earlier. " Research based on time use surveys found American’s schedules are already determined more by television than daylight suggesting, in effect, that Americans already live on two time zones. Schrager says that this strategy has already been proven to work in other parts of the world. China has been on one time zone since 1949, despite naturally spanning five time zones and in 1983, Alaska, which naturally spans four time zones, moved most of the state to a single time zone. "It sounds radical, but it really isn’t. The purpose of uniform time measures is coordination. How we measure time has always evolved with the needs of commerce.," concludes Schrager. "Time is already arbitrary, why not make it work in our favor?""

+ - How I compiled TrueCrypt for Windows and matched the official binaries-> 1

Submitted by xavier2dc
xavier2dc (3408341) writes "TrueCrypt is a popular software enabling data protection by means of encryption for all categories of users. It is getting even more attention lately following the revelations of the NSA as the authors remain anonymous and no thorough security audit have yet been conducted to prove it is not backdoored in any way. This has led several concerns raised in different places, such as this blog post (http://www.privacylover.com/encryption/analysis-is-there-a-backdoor-in-truecrypt-is-truecrypt-a-cia-honeypot/), this one (http://brianpuccio.net/excerpts/is_truecrypt_really_safe_to_use), this security analysis (https://www.privacy-cd.org/downloads/truecrypt_7.0a-analysis-en.pdf) also related on that blog post (http://blog.cryptographyengineering.com/2013/10/lets-audit-truecrypt.html) from which the IsTrueCryptAuditedYet? (http://istruecryptauditedyet.com/) was born.

One of the recurring questions is: What if the binaries provided on the website were different than the source code and they included hidden features? To address this issue, I built the software from the official sources in a careful way and was able to match the officials binaries. According to my findings, all three recent major versions (v7.1a, v7.0a, v6.3a) exactly match the sources."

Link to Original Source

+ - Huawei Using NSA Scandal to Turn Tables on Accusations of Spying-> 2

Submitted by Nerval's Lobster
Nerval's Lobster (2598977) writes "Huawei Technologies, the Chinese telecom giant banned from selling to U.S. government agencies due to its alleged ties to Chinese intelligence services, is trying to turn the tables on its accusers by offering itself as a safe haven for customers concerned that the NSA has compromised their own IT vendors. “We have never been asked to provide access to our technology, or provide any data or information on any citizen or organization to any Government, or their agencies,” Huawei Deputy Chairman Ken Hu said in the introduction to a 52-page white paper on cybersecurity published Oct. 18. Huawei was banned from selling to U.S. government entities and faced barriers to civilian sales following a 2012 report from the U.S. House of Representatives that concluded Huawei’s management had not been forthcoming enough to convince committee members to disregard charges it had given Chinese intelligence services backdoors into its secure systems and allowed Chinese intelligence agents to pose as Huawei employees. But the company promises to create test centers where governments and customers can test its products and inspect its services as part of an “open, transparent and sincere” approach to questions about its alleged ties, according to a statement in the white paper from Huawei CEO Ren Zhengfei. Can Huawei actually gain more customers by playing off the Snowden scandal?"
Link to Original Source

+ - Security Researchers Want to Fully Audit Truecrypt

Submitted by Hugh Pickens DOT Com
Hugh Pickens DOT Com (2995471) writes "TrueCrypt has been one of the trusty tools in a security-minded user’s toolkit for nearly a decade — but there's one problem: no one knows who created the software and no one has ever conducted a full security audit on it. Now Cyrus Farivar reports in Ars Technica that a fundraiser reached more than $16,000 in a public call to perform a full security audit on TrueCrypt. "Lots of people use it to store very sensitive information," writes Matthew Green, a well-known cryptography professor at Johns Hopkins University. "That includes corporate secrets and private personal information. Bruce Schneier is even using it to store information on his personal air-gapped super-laptop, after he reviews leaked NSA documents. We should be sweating bullets about the security of a piece of software like this." According to Green, Truecrypt "does some damned funny things that should make any (correctly) paranoid person think twice." The Ubuntu Privacy Group says the behavior of the Windows version [of Truecrypt 7.0] is problematic. "As it can't be ruled out that the published Windows executable of Truecrypt 6.0a is compiled from a different source code than the code published in "TrueCrypt_7.0a_Source.zip" we however can't preclude that the binary Windows package uses the header bytes after the key for a back door." Green is one of people leading the charge to setup the audit, and he helped create the website istruecryptauditedyet.com. “We're now in a place where we have nearly, but not quite enough to get a serious audit done.""

+ - LinkedIn Agrees to Block Stalkers-> 2

Submitted by sholto
sholto (1149025) writes "When Buzzfeed wrote about LinkedIn's stalker problem in June, LinkedIn claimed it had enough privacy tools "to effectively minimize unwanted connections". But a petition by a 24-year-old Ohio woman sexually assaulted by her boss and harassed through the network appears to have won the day for privacy advocates.
“Users on Facebook, Twitter, Pinterest and other sites can easily block other users. LinkedIn appears to be an outlier among other top social media sites,” said petitioner Anna R."

Link to Original Source

panic: kernel trap (ignored)

Working...