Forgot your password?
typodupeerror

Comment: Re:I spent 3 hours trying to upgrade service... (Score 1) 218

by onproton (#47709749) Attached to: Comcast Training Materials Leaked
All the major telecoms have been trying to push landline services on their consumers - every single time I get new service or transfer they tell me I "have" to get a phone line because it's cheaper. In what world does that make sense?

Verizon stopped offering dry-line DSL about 2 years ago and forces all their customers to also pay for phone service - not because of technical implications, mind you, solely because they want it to look like people are using it, and they can do whatever the hell they want because no one is competing with them.

+ - Research Unveils Improved Method To Let Computers Know You Are Human

Submitted by Anonymous Coward
An anonymous reader writes "CAPTCHA services that require users to recognize and type in static distorted characters may be a method of the past, according to studies published by researchers at the University of Alabama at Birmingham. Researchers focused on a broad form of gamelike CAPTCHAs, called dynamic cognitive game, or DCG, CAPTCHAs, which challenge the user to perform a gamelike cognitive task interacting with a series of dynamic images. For example, in a “ship parking” DCG challenge, the user is required to identify the boat from a set of moving objects and drag-and-drop it to the available “dock” location. The puzzle is easy for the human user to solve, but may be difficult for a computer program to figure out. Also, its gamelike nature may make the process more engaging for the user compared to conventional text-based CAPTCHAs."

+ - Vehicle-To-Vehicle Networks Could Save Over 1,000 Lives a Year->

Submitted by itwbennett
itwbennett (1594911) writes "On Monday, the National Highway Traffic Safety Administration (NHTSA) published a research report on vehicle-to-vehicle (V2V) technology and is seeking input from the public and industry. In the report, it estimated the safety benefits of just two possible applications of V2V, called Left Turn Assist and Intersection Movement Assist. Together, they could prevent as many as 592,000 crashes and save 1,083 lives per year, the agency said."
Link to Original Source

+ - Rightscorp's new plan: Pay our copyright fees, or we take your browser->

Submitted by mpicpp
mpicpp (3454017) writes "Online copyright cop charging $20 per song explains 2014 strategy to investors.

Internet copyright enforcer Rightscorp has told investors some revelatory details about its strategy in its second-quarter earnings call, as reported by TorrentFreak.

Rightscorp was founded to be a kind of RIAA-lite, getting online pirates to pay record companies and other rights-holders without the need to resort to high-stakes litigation. Instead, it creates e-mail notices demanding $20 per song from users it deems "repeat infringers" and insists that ISPs forward those notices.

The company is growing fast, but is still way, way in the red. Last year it earned $324,000 in revenue, while spending more than $2.1 million to run its operations. This year it's earning more revenue: $440,414 in the first six months of the year. However, operating costs during the same period have already hit $1.8 million.

Rightscorp's two marquee clients are BMG and Warner Music. Together, those two clients account for around one-third of Rightscorp's income.

The company is now working with more than 140 Internet service providers, although they provide differing levels of cooperation. Rightscorp's pitch to these ISPs is that since it has ironclad evidence of which users are "repeat infringers," they're obligated under copyright law to forward the notices; otherwise the ISPs become liable to a high-stakes copyright suit."

Link to Original Source

+ - Microsoft's Windows 8 App Store is Full of Scamware and It Doesn't Seem to Care

Submitted by Deathspawner
Deathspawner (1037894) writes "Windows 8 brought a lot to the table, with one of its most major features being its app store. However, it's not a feature that Microsoft seems too intent on keeping clean. As it is today, the store is completely littered with misleading apps and outright scamware. The unfortunate thing is that to find any of it, all you have to do is simply open the store and peruse the main sections. Not so surprisingly, no Microsoft software seems to be affected by this, but many open-source apps can be found at the store from unofficial sources that have a cost, or will lead the user to download a third-party installer. It's only a matter of time before malware sneaks its way in, if it's not there already."

+ - Broadband Subscribers Eclipsing Cable TV Subscribers->

Submitted by Anonymous Coward
An anonymous reader writes "High-speed internet has become an everyday tool for most people, and cord-cutters have dramatically slowed the growth of cable TV, so this had to happen eventually: broadband internet subscribers now outnumber cable TV subscribers among the top cable providers in the U.S. According to a new report, these providers account for 49,915,000 broadband subscribers, edging out the number of cable subscribers by about 5,000. As Re/code's Peter Kafka notes, this means that for better or worse, the cable guys are now the internet guys. Kafka says their future is "selling you access to data pipes, and pay TV will be one of the things you use those pipes for.""
Link to Original Source

+ - Knocking down the Great Firewall of China->

Submitted by Nocturrne
Nocturrne (912399) writes "The FOSS project Lantern (https://getlantern.org/) is having great success in unblocking the internet for many users in oppressive regimes, like China and Iran. Much like Tor and bitorrent, Lantern is using peer-to-peer networking to overcome firewalls, but with the additional security of a trusted network of friends. The network of peers is growing, but we need more friends in uncensored countries to join us."
Link to Original Source

+ - NSA/GCHQ: The HACIENDA Program for Internet Colonization->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "Since the early days of TCP, port scanning has been used by computer saboteurs to locate vulnerable systems. In a new set of top secret documents seen by Heise, it is revealed that in 2009, the British spy agency GCHQ made port scans a "standard tool" to be applied against entire nations. Twenty-seven countries are listed as targets of the HACIENDA program in the presentation, which comes with a promotional offer: readers desiring to do reconnaissance against another country need simply send an e-mail."
Link to Original Source

Comment: Re:Flash vulnerability? (Score 5, Informative) 166

by onproton (#47682205) Attached to: Watch a Cat Video, Get Hacked: the Death of Clear-Text
From the article: "A step-by-step breakdown of how such an attack might occur is as follows: 1. A target is selected and their name is entered into the Network Injection GUI. 2. The target’s traffic stream is located based on their ISP’s RADIUS records. 3. As per the rule on the network injector (as shown in Figure 14), the appliance waits for the target to visit YouTube. 4. When this traffic is identified, it is redirected to the network injection appliance. 5. The legitimate video is blocked and malicious flash (SWF) is injected into the clear-text portion of the traffic. (Represented by the kitty skull and cross bones.) 6. The target is presented with a dialogue to upgrade their flash installation. If this upgrade is accepted the malicious SWF enables the installation of a ‘scout agent’ which provides target validation. 7. If the target is assessed as correct (i.e., the desired person), and safe for install (not a malware analysis honeypot), then the full agent is deployed. 8. Surveillance of the target commences."

+ - Project Aims to Build a Fully Open SoC and Dev Board->

Submitted by DeviceGuru
DeviceGuru (1136715) writes "A non-profit company is developing an open source 64-bit system-on-chip that will enable fully open hardware, 'from the CPU core to the development board.' The 'lowRISC' SoC is the brainchild of a team of hardware and software hackers from the University of Cambridge, with the stated goal of implementing a 'fully open computing eco-system, including the instruction set architecture (ISA), processor silicon, and development boards.' The lowRISC's design is based on a new 64-bit RISC-V ISA, developed at UC Berkeley. The RISC-V core design has now advanced enough for the lowRISC project to begin designing an SoC around it. Prototype silicon of a 'RISC-V Rocket' core itself has already been benchmarked at UC Berkeley, with results results (on GitHub) suggesting that in comparison to a 32-bit ARM Cortex-A5 core, the RISC-V core is faster, smaller, and uses less power. And on top of that it's open source. Oh, and there's a nifty JavaScript-based RISC-V simulator that runs in your browser."
Link to Original Source

+ - Watch a Cat Video, Get Hacked: The Death of Clear-Text

Submitted by onproton
onproton (3434437) writes "Citizen Lab released new research today on a targeted exploitation technique used by state actors involving "network injection appliances" installed at ISPs. These devices can target and intercept unencrypted YouTube traffic and replace it with malicious code that gives the operator control over the system or installs a surveillance backdoor. One of the researchers writes, "many otherwise well-informed people think they have to do something wrong, or stupid, or insecure to get hacked—like clicking on the wrong attachments, or browsing malicious websites...many of these commonly held beliefs are not necessarily true." This technique is largely designed for targeted attacks, so it's likely most of us will be safe for now — but just one more reminder to use https."

Comment: Re:Totalitarianism all the way (Score 1) 253

by onproton (#47680583) Attached to: The Benefits of Inequality
No one is arguing that all the complexities and nuances of government can be described in a 100 word slashdot comment. However, I still fail to see how a government can be classified as "democratic" if (as seen above) "average citizens’ preferences continue to have essentially zero estimated impact upon policy change." So, if by "the people have the power to change things" you mean "the wealthy people have the power to change things," then we agree, but this form of government has a different name.

The universe is like a safe to which there is a combination -- but the combination is locked up in the safe. -- Peter DeVries

Working...