Forgot your password?
typodupeerror

+ - Pinch-to-zoom Apple patent rejected by USPTO->

Submitted by freddienumber13
freddienumber13 (1793526) writes "In another patent surprise, this week from the USPTO, where a claim by Apple for pinch-to-zoom has been rejected by the USPTO on the grounds that the claims were anticipated by previous patents or unpatentable. This will be welcome news for Samsung that back in April asked for a stay of the trial [http://phandroid.com/2013/04/18/samsung-apple-trial-stay-request/] however Apple have a short period of time in which they can appeal this finding."
Link to Original Source

+ - Video showing lawyers briefing clients on how to advertise jobs locals dont want->

Submitted by freddienumber13
freddienumber13 (1793526) writes "On the 20th of June, the ABC's 7.30 program ran a story on 457 VISA abuse in Australia (the Australian version of the American H1-B) — . Further into the show, they explore how companies demonstrate that such positions are necessary (advertising jobs for $50k/yr rather than the market rate of $70k-$80k/yr) with some slices of video footage showing lawyers briefing their clients on how to rort the system. Skills shortage? Unlikely. Companies looking for ways to import cheap labor at the expense of locals? Highly likely and exposed. Perhaps the most damning evidence is that of the salary of IT workers going down, not up, like everyone else's."
Link to Original Source

+ - Public CCTV order off over privacy concerns-> 1

Submitted by freddienumber13
freddienumber13 (1793526) writes "The CCTV cameras operated by the local government in the country town of Nowra, NSW (Australia) have been turned off following an order by the Administrative Decisions Tribunal. The local government is crying because it believes that it is losing an effective method in combating crime in public. Locals however are rejoicing that they are no longer being recorded whilst walking down the street."
Link to Original Source
Australia

+ - Copyright enforcement leads to artist's suicide.->

Submitted by freddienumber13
freddienumber13 (1793526) writes "The MPAA, RIAA, and every other entertainment industry body tells us how copyright enforcement is for the benefit of the artists. What they don't tell you is that nearly all musical art is based on other work, be it conscious or subconscious. The chase for money as a result of 2 bars from a folk song being used in a rock song led to the untimely and completely avoidable passing of a member of the band that recorded "Down Under". Congratulations to those that chase and enforce copyright — you ultimately brought about the passing of those whom you profess to serve through those very actions. Is it not yet time to rethink the purpose and pursuit of copyright? Or do we need to destroy the lives of more artists?"
Link to Original Source
Australia

+ - 2 year data retention for Australian ISPs->

Submitted by freddienumber13
freddienumber13 (1793526) writes "Following similar acts passed by foreign governments, the Australian government is now seeking feedback on its plans to bring into law the requirement for ISPs to retain user data for up to 2 years. They're also seeking changes to the law that would allow undercover ASIO agents and its sources to commit crimes which would include, for example, hacking into your computer."
Link to Original Source
Robotics

+ - Laser Powers Lockheed Martin's Stalker drone For 48 Hours->

Submitted by
garymortimer
garymortimer writes "Lockheed Martin (LMT) and LaserMotive, Inc., recently demonstrated the capabilities of an innovative laser power system to extend the Stalker Unmanned Aerial System (UAS) flight time to more than 48 hours. This increase in flight duration represents an improvement of 2,400 percent.

Stalker is a small, silent UAS used by Special Operations Forces since 2006 to perform intelligence, surveillance and reconnaissance missions."

Link to Original Source

+ - Copyright organization chief faces 10 years in jail for diverting funds->

Submitted by freddienumber13
freddienumber13 (1793526) writes "Just as Spain begins its implementation, it appears that the head of the copyright organisation in Spain (SGAE) has been found guilty of not passing on copyright fees. Isn't it time that we all woke up and realised that these "copyright fee collectors" do not add any value?"
Link to Original Source
Australia

+ - Australia to review Copyright Fair Use->

Submitted by freddienumber13
freddienumber13 (1793526) writes "The Australian Government has announced a review of the copyright act to look at the provisions of fair use and exceptions with a view towards considering whether or not the law has kept pace with technology and thus if further provisions are required to ensure the act remains relevant and effective."
Link to Original Source
Privacy

+ - Does HTTP "Referer" give away too much privacy? 3

Submitted by freddienumber13
freddienumber13 (1793526) writes "When browsing movie torrents on piratebay, it is common to see links to imdb and other websites run by commercial entities for information on a movie. However when you click on those links, your web browser sends along the URL of the web page that you saw the link on in the "Referer" header. Thus someone like Amazon can gauge pirate interest in a movie or other item without actually having to monitor piratebay traffic directly. For imdb, which is owned by Amazon, Amazon can get information on what movies you are interested in pirating as well as what movies you buy. Is it time that the "Referer" header was discarded completely because of how it compromises your browsing security?"
Australia

+ - Australia: ACCC seeks injunction against Apple for iPad advertising->

Submitted by freddienumber13
freddienumber13 (1793526) writes "The Australian Competition and Consumer Comission (ACCC) has filed in an injunction against Apple for misleading advertising surrounding its latest iPad. In Australia, the latest iPad does not work on the 4G networks yet the advertising for the iPad continues to tout it as an available feature. Refunds for consumers and corrected advertising are being sought."
Link to Original Source

+ - Open hardware/source digital camera?

Submitted by freddienumber13
freddienumber13 (1793526) writes "As many slashdotters will know, the firmware in digital cameras is often rather buggy. Often times it is also does not make full use of the hardware capabilities (GH2). And in almost every case, after a few short years, we're left with a small computer with a digital sensor with which we can do nothing but throw out because there's no documentation for the hardware or SDKs. This then begs the question: what if an open source digital camera could be developed? What would it take to design the board, lens, purchase a sensor, design/fabricate a case and controls, all of which is documented openly, allowing us to put whatever software we wanted in it. Would it sell? Would it reach critical mass in a developer community? Could it attract enough VC to make a viable plan? Could a plugin architecture be implemented? And most importantly, would the user interface not suck?"

Comment: Text based secure syslog already solved (Score 1) 248

by freddienumber13 (#38156584) Attached to: Secure Syslog Replacement Proposed

There are RFCs that cover the transmission of syslog messages in a secure fashion. 5424, 5425, etc.

There are tools that store syslog messages - in plain text - in a secure fashion.

syslog-ng is just one of them.

This post is "old" and nothing more than a group of people reinventing the wheel.

The *only* way to solve tampering with log data is to store it on another machine and hope hackers don't get to that.

If a hacker gains access to a system with log files on it, the best you can do is make the logging tamper-evident. This means that if the hacker modifies the data, in any way, it can be detected. This includes hash recalculation.

Making the system tamper-evident with hashes simply means that all hashes require a secret input and that the input is only ever stored on the system for the next entry. If you know the secret input for hash#0, then you can calculate the secret input for hash#n, but knowing the secret input for hash#n does not tell you what it was for hash#(n-1). Similarly, the secret input for hash#0 is not stored on the system.

"I'm not a god, I was misquoted." -- Lister, Red Dwarf

Working...