writes "Facebook has recognised it's a gender-diverse world — at least in the US.
In addition to Male or Female, Facebook now lets US users choose among some 50 additional options such as "transgender," "cisgender," "gender fluid," "intersex" and "neither."
Users also now have the ability to choose the pronoun they would like to be referred to publicly: he/his, she/her, or the gender-neutral they/their.
"When you come to Facebook to connect with the people, causes, and organizations you care about, we want you to feel comfortable being your true, authentic self," Facebook said in a post on its Diversity page.
"An important part of this is the expression of gender, especially when it extends beyond the definitions of just 'male' or 'female,' " the post continued. "So today, we're proud to offer a new custom gender option to help you better express your own identity on Facebook.""Link to Original Source
writes "From the Guardian:
Snapchat users’ phone numbers may be exposed to hackers due to an unresolved security vulnerability, according to a new report released by a group of Australian hackers.
Snapchat is a social media program that allows users to send pictures to each other that disappear within 10 seconds. Users can create profiles with detailed personal information and add friends that can view the photos a user shares.
But Gibson Security, a group of anonymous hackers from Australia, has published a new report with detailed coding that they say shows how a vulnerability can be exploited to reveal phone numbers of users, as well as their privacy settings."Link to Original Source
writes "Despite a 2011 law requiring retailers to provide a refund option for faulty goods, and free repairs to items reasonably expected to still function properly (this part of the law is intentionally ambiguous), Apple steadfastly stuck to its AppleCare program, denying warranty repairs to units more than one year old (without the purchase of an extension) and only offering replacement or credit for DOA items.
Apple has promised to compensate all Australian customers who were charged for repairs during the last two years, and make the terms of the law clear on the Australian Apple website. How this will affect company warranty policy is unclear — under the law, consumers could be entitled to repairs for the life of the product (barring damage, of course). What is the acceptable 'life' of an iPad? A MacBook?"Link to Original Source
writes "To commemorate 50 years of the Tardis, today the BBC is airing a 75 minute special finally revealing the secrets of the Time War.
What did you think off the special? And what's your fondest memory of Who? And what about that Capaldi guy?
"Link to Original Source
writes "An Adelaide teacher is facing sentencing over child pornography charges brought about after he impersonated a 13-year old girl in an on-line chat forum. The Australian Broadcasting Corporation reports: 'Grant Geoffrey Martin, 45, pleaded guilty to two charges of producing child pornography, one of them aggravated.
The District Court was told that between June last year and February this year, Martin pretended to be a teenage girl on an online child sex slave chat site and produced written pornographic material about children.'
"He told police he didn't know his actions constituted criminal activity. Clearly he understands the offending is serious but having said that it is not as serious as if he was possessing images of child victims," his lawyer said."Link to Original Source
writes "Silicon Valley technology conference organisers TechCrunch have been forced to apologise after two Australian men pitched a smartphone app called "Titstare" in front of a nine-year-old girl.
The Sydney duo's presentation had the mainly male audience laughing, but angered Twitter users and reignited a debate about sexism in the technology sector.
The two entrepreneurs — Jethro Batts, 28, and David Boulton, 24 — pitched their "tongue in cheek" idea at TechCrunch Disrupt in San Francisco on Sunday after winning expenses for the trip to the US in a similar competition, AngelHack Sydney.
In their pitch, Boulton explained to an audience of hundreds (plus thousands online) that it would allow users to "take photos of yourself, looking at tits".
"It's science my good friend, science," Boulton said.
TechCrunch also apologised for another pitch for a product called Circle Shake, in which a man simulated masturbation.
Additional article: http://www.theatlanticwire.com/technology/2013/09/titstare-tech-worlds-latest-brogrammer-joke-techcrunch-disrupt/69171/"Link to Original Source
writes "From the ABC (Australia): "Rolf Harris has been charged with nine counts of indecent assault and four counts of making indecent images of a child.
The charges come as a part of the British investigation prompted by the child sexual abuse allegations against late BBC TV star Jimmy Savile.
Six of the indecent assault charges relate to the alleged assault of a girl aged between 15 and 16 in the years 1980 and 1981, while the other three relate to the alleged assault of a 14-year-old girl in 1986.
The four alleged offences of making indecent images of a child occurred between March and July 2012.
Alison Saunders from the Crown Prosecution Service (CPS) says evidence from the Metropolitan Police has been carefully considered.""Link to Original Source
writes "More than 40,000 people in the United Kingdom have signed a petition calling on Twitter to improve its procedures that allow users to report abuse.
Freelance journalist Caroline Criado-Perez started the petition after she was subjected to a barrage of online abuse over her role in a campaign to have women featured on British banknotes.
"Since the campaign won, the tenor of the tweets and the messages changed, and they became very, very violent and abusive," she said.
"They included rape threats and violent anatomical detailing of what various men wanted to do to me."
Ms Criado-Perez reported the matter to police and through Twitter's internal reporting system.
But Ms Criado-Perez says the answer she received from Twitter was not satisfactory.
"The response from Twitter being that, 'Oh well, look, there's this form that you can fill out', that's a really time-consuming process," she said.
"And if you're someone who's receiving about 50 rape threats an hour, it's just not practical to expect you to go and fill in this form for every single tweet.
"[Twitter] are on the side of the abusers, not the victims, and they really, really need to get on the side of the victims.""Link to Original Source
writes "Fairfax Media is reporting today that Australian telecommunications giant Telstra agreed more than a decade ago to store huge volumes of electronic communications it carried between Asia and America for potential surveillance by United States intelligence agencies.
Under the previously secret agreement, the telco was required to route all communications involving a US point of contact through a secure storage facility on US soil that was staffed exclusively by US citizens carrying a top-level security clearance.
The US Department of Justice and Federal Bureau of Investigation also demanded that Telstra "provide technical or other assistance to facilitate ... electronic surveillance".
The revelations come as the British and US governments reel from the leaking of sensitive intelligence material that has detailed a vast electronic spying apparatus being used against foreign nationals and their own citizens."Link to Original Source
writes "Melbourne restauranteur Paul Mathis has developed a one-character replacement for the word 'The' – effectively an upper-case "T" and a lower-case "h" bunched together so they share the upright stem – and an app that puts it in everyone's hand by allowing users to download an entirely new keyboard complete not just with his "Th" symbol, but also a row of keys containing the 10 or 15 (depending on the version) most frequently typed words in English.
Mathis has already copped criticism on Twitter (one correspondent called him "a crazy arsehole") from people who claim he is attempting to trademark a symbol that is part of the Serbian Cyrillic alphabet (pronounced "tshe", the letter represents the "ch" sound found in the word "chew")."Link to Original Source
writes "From the Guardian: The plan to spirit the surveillance whistleblower Edward Snowden to sanctuary in Latin America appeared to be unravelling on Friday, amid tension between Ecuador's government and Julian Assange, the founder of WikiLeaks.
President Rafael Correa halted an effort to help Snowden leave Russia amid concern Assange was usurping the role of the Ecuadoran government, according to leaked diplomatic correspondence published on Friday.
Amid signs Quito was cooling with Snowden and irritated with Assange, Correa declared invalid a temporary travel document which could have helped extract Snowden from his reported location in Moscow.
Correa declared that the safe conduct pass issued by Ecuador's London consul – in collaboration with Assange – was unauthorised, after other Ecuadorean diplomats privately said the WikiLeaks founder could be perceived as "running the show"."Link to Original Source
writes "Stephen Conroy, Australia's infamous communications minster who wanted to bring in a nation-wide Internet filter and mandatory data-retention laws, and who bragged that he could force Australian communications companies to 'wear red underpants on their heads' has resigned, a casualty of a shakeup of Australia's ruling Labor party caused by the overthrow of the current Prime Minister by the previous Prime Minister, in a leadership grudge-match."Link to Original Source
writes "Firstly, Julian Assange is not the second coming — not even in his own circles. His ‘hacker’ background is by no means unique, and was almost a common experience amongst ‘geeks’ who grew up during the late 80s and early 90s. Being investigated for, or even charged with, hacking / phreaking / fraud offences was as common amongst his peers as trailer trash being arrested for shoplifting, or simple assault. (Heck, if you were trailer trash with a modem you might have been charged with all of them!)
The information required to exploit various devices, systems and networks was freely available, if you knew where to look (or what number to dial), and the mechanics of doing so were often trivial. Let’s just get that out of the way, and accept that for the purposes of this review, Assange was, prior to Wikileaks, nothing extraordinary — just a geek with a little bit of dangerous knowledge.
However, having the hutzpah to publish classified information when ‘everyone knows’ what would happen to you for doing so is really what differentiated Assange from the rest of the crowd — no one can or should dispute that. It’s surprising he hasn’t already had an ‘accident’, and he should be applauded for his evident vigilance in keeping himself alive. But, there are other documentaries that do that. What this particular documentary seemingly wants to explore is not whether what Assange did was exceptional (we already agree that it was), but whether how he elected to bring his ‘secrets’ to the world was done in the most appropriate, compassionate way.
‘We Steak Secrets’ recognises that, to some, this is important — even if many of Assange’s supporters think that it isn’t.
Bradley Manning is a tragic individual. Those who find themselves questioning their gender identity (often before pursuing gender reassignment) do not typically make the best choices. (This is why to proceed on such a path one usually needs to see a psychiatrist.) It is an incredibly confusing, frightening and yet euphoric time and I don’t generally advise people in such circumstances to make any decisions that could change their lives in any real degree while they mull over their future, since they’re not likely to be their best choices in retrospect.
Being transgendered may not itself be a ‘mental illness’, but the anxiety, depression and mania associated with coming to terms with being so certainly is, and one can’t be considered of ‘sound mind’ in such a state — this is an important point to make, and one the documentary attempts to impart through Manning’s IRC chats with the sad little man who would eventually turn him in.
Obviously, deciding to copy a large amount of classified data and deliver it to Wikileaks would qualify as a ‘poor decision’, especially when you’re in the US military, and have practically zero likelihood of defending your actions to your superiors. This is what the documentary suggests, and to do so is not slander — it merely tries to explain to the layperson why such a bright young man would choose to martyr himself in such a dramatic way when very few others (if anyone) would ever consider embarking on such an ambitious but dangerous course of action.
The documentary assumes that a completely rational individual in a similar scenario would never jeopardise his personal security in such a rash fashion irrespective of a perceived collective humanitarian benefit — which is not an unfair assumption to make — and asks what made Manning different; what could lead him to behave so contrary to that norm.
In doing so, ‘We Steal Secrets’ makes a decent hypothesis.
Moving on from Manning to Assange, the documentary then raises the question, “If Assange was aware of Manning’s personal difficulties, was he irresponsible in choosing to receive the classified information, and go ahead with publishing it, knowing what would result?” This is an ethical conundrum that is open for debate, but open for debate it most certainly is — regardless of whether Assange’s supporters like it or not.
Although Assange evidently concluded that releasing the information was of greater value to humanity than preserving the remainder of Bradley Manning’s productive life, others may not have felt similar. But go ahead Assange did, at full steam.
He made his choice, fair enough — but could Assange have redacted details that weren’t all that important to the context of the information, such as the names of informants? Could he have released statistics, or related overall ‘stories’ told by the data, rather than the data itself, to mitigate some of the consequence to Manning? Would Manning’s looming punishment have been reduced had the information been handled differently?
We can only speculate — but we are entitled to, make no mistake.
It’s not ‘unfair’ for the documentary to ask these questions, either. It’s also not ‘unfair’ to continue on and examine Assange’s exploitation of his subsequent ‘rock-star’ status — after all, it speaks to his motivations, and casts a shadow on his supposed altruism. However, although to me the documentary tells the unfortunate tale of a fame-seeker who took advantage of someone in the grip of reconciling a very difficult truth in order to further his own agenda, others could interpret it differently.
I’m not sure how, but I’m sure they could. Can you?"Link to Original Source
writes "From the Australian Broadcasting Corporation:
Japan's peak whaling body has launched a new campaign to promote whale meat as a nutritious food that enhances physical strength and reduces fatigue.
With about 5,000 tonnes of whale meat sitting unwanted in freezers around Japan, the country's Institute for Cetacean Research has decided to launch a new campaign to promote the by-product of its so-called scientific whaling program.
Once popular in school lunches, younger generations of Japanese rarely, if ever, eat whale.
But the institute hopes to revive flagging interest by advertising whale meat as a great source of balenine — a substance believed to enhance energy and physical health."Link to Original Source
writes "I recently attended a 'hackathon' that was really just another pitching contest, and out of frustration am tempted to organise an event myself that is better suited to developers and far less entrepreneur-centric than some of the latest offerings.
What I'd like to know from the /. community is, what would you like to see in a hackathon? What are some good hackathons you've attended that weren't just thinly-veiled pitch-development workshops? I have an idea around assigning attendees to quasi-random teams based on their skillsets, then giving them 48 hours to complete a serious coding / engineering challenge (probably in the not-for-profit space) — but maybe you've got some better ideas?"