XBox (Games)

Xbox One Launch Woes Were Preventable, Next Console Likely Digital Download Only 230

MojoKid writes: Microsoft's Xbox One launch didn't go off exactly as planned in late 2013. Before the console's release, the company was dogged over DRM restrictions with the console and concerns over its high price tag compared to its counterpart, the Sony PlayStation 4. Microsoft would attribute the higher price tag to the included Kinect camera — a peripheral that many gamers didn't particularly care for. Former Xbox Chief Robbie Bach offered his two cents recently on the Xbox One — a console that launched years after he announced he retired from the company in 2010. Bach noted, regarding the Xbox One's rocky launch, "...gosh, I think some of that was predictable and preventable." As for the future of physical game media, Bach doesn't think that the future will be so bright when it comes to DRM and always-connected requirements in the next generation of gaming consoles. He said that the next Xbox would "probably not" have physical media to speak of, with consoles adopting digital-only distribution.
Security

New Snowden Leaks Show NSA Attacked Anti-Virus Software 98

New submitter Patricbranson writes: The NSA, along with its British counterpart Government Communications Headquarters (GCHQ), spent years reverse-engineering popular computer security software in order to spy on email and other electronic communications, according to the classified documents published by the online news site The Intercept. With various countries' spy agencies trying to make sure computers aren't secure (from their own intrusions, at least), it's no wonder that Kaspersky doesn't want to talk about who hacked them.
Google

Google To Propose QUIC As IETF Standard 84

As reported by TechCrunch, "Google says it plans to propose HTTP2-over-QUIC to the IETF as a new Internet standard in the future," having disclosed a few days ago that about half of the traffic from Chrome browsers is using QUIC already. From the article: The name "QUIC" stands for Quick UDP Internet Connection. UDP's (and QUIC's) counterpart in the protocol world is basically TCP (which in combination with the Internet Protocol (IP) makes up the core communication language of the Internet). UDP is significantly more lightweight than TCP, but in return, it features far fewer error correction services than TCP. ... That's why UDP is great for gaming services. For these services, you want low overhead to reduce latency and if the server didn't receive your latest mouse movement, there's no need to spend a second or two to fix that because the action has already moved on. You wouldn't want to use it to request a website, though, because you couldn't guarantee that all the data would make it. With QUIC, Google aims to combine some of the best features of UDP and TCP with modern security tools.
Cellphones

How NSA Spies Stole the Keys To the Encryption Castle 192

Advocatus Diaboli writes with this excerpt from The Intercept's explanation of just how it is the NSA weaseled its way into one important part of our communications: AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world's cellular communications, including both voice and data.
Encryption

NSA Agents Leak Tor Bugs To Developers 116

An anonymous reader writes: We've known for a while that NSA specifically targets Tor, because they want to disrupt one of the last remaining communication methods they aren't able to tap or demand access to. However, not everybody at the NSA is on board with this strategy. Tor developer Andrew Lewman says even as flaws in Tor are rooted out by the NSA and British counterpart GCHQ, other agents from the two organizations leak those flaws directly to the developers, so they can be fixed quickly. He said, "You have to think about the type of people who would be able to do this and have the expertise and time to read Tor source code from scratch for hours, for weeks, for months, and find and elucidate these super-subtle bugs or other things that they probably don't get to see in most commercial software." Lewman estimates the Tor Project receives these reports on a monthly basis. He also spoke about how a growing amount of users will affect Tor. He suggests a massive company like Google or Facebook will eventually have to take up the task of making Tor scale up to millions of users.
Government

More On the "Cuban Twitter" Scam 90

We mentioned a few days ago the USAID-funded SMS social network that was connecting Cubans against the wishes of the Cuban government. Now Glen Greenwald's The Intercept has more on this kind of back-channel government intervention via what he characterizes as "the Internet propaganda bucket." Advocatus Diaboli (1627651) writes with an excerpt: "These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to "discrediting" the agency's enemies with false information spread online.

The documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual "SIGDEV" gathering of the "Five Eyes" surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda."
Privacy

EFF Reports GHCQ and NSA Keeping Tabs On Wikileaks Visitors and Reporters 82

sandbagger writes in with a story about U.S. and British government interest and involvement with journalists visiting the Wikileaks website. "The Intercept recently published an article and supporting documents indicating that the NSA and its British counterpart GCHQ surveilled and even sought to have other countries prosecute the investigative journalism website WikiLeaks. GCHQ also surveilled the millions of people who merely read the WikiLeaks website. The article clarifies the lengths that these two spy organizations go to track their targets and confirms, once again, that they do not confine themselves to spying on to those accused of terrorism. One document contains a summary of an internal discussion in which officials from two NSA offices discuss whether to categorize WikiLeaks as a "malicious foreign actor" for surveillance targeting purposes. This would be an important categorization because agents have significantly more authority to engage in surveillance of malicious foreign actors."
Canada

Canadian Spy Agency Snooped Travelers With Airport Wi-Fi 159

Walking The Walk writes: "It seems the NSA isn't the only agency doing illegal domestic spying. According to a Snowden document obtained by the CBC, Communications Security Establishment Canada (CSEC) has apparently been tracking domestic travelers, starting from when they first use free Wi-Fi at an airport, and continuing for days after they left the terminal. From the article: 'The document indicates the passenger tracking operation was a trial run of a powerful new software program CSEC was developing with help from its U.S. counterpart, the National Security Agency. In the document, CSEC called the new technologies "game-changing," and said they could be used for tracking "any target that makes occasional forays into other cities/regions."' The CBC notes early in the article that the spy agency 'is supposed to be collecting primarily foreign intelligence by intercepting overseas phone and internet traffic, and is prohibited by law from targeting Canadians or anyone in Canada without a judicial warrant.' Predictably, CSEC's chief is quoted saying that they aren't allowed to spy on Canadians, so therefore they don't. As observed by experts consulted for the story, that claim is equivalent to saying that they collect the data but we're to trust that they don't look at it."
Communications

Feinstein and Rogers: No Clemency For Snowden 504

Ars Technica reports, probably to no one's surprise, that U.S. elected officials are unlikely to start seeing Edward Snowden as a righteous whistleblower rather than a traitor to the U.S. government. From the article:"[Sunday], the chairwoman of the Senate Intelligence Committee, Dianne Feinstein (D-CA), and her House counterpart, Mike Rogers (R-MI), both emphasized there would be no mercy coming from Washington. 'He was trusted; he stripped our system; he had an opportunity—if what he was, was a whistle-blower—to pick up the phone and call the House Intelligence Committee, the Senate Intelligence Committee, and say I have some information,' Feinstein told CBS' Face The Nation. 'But that didn’t happen. He’s done this enormous disservice to our country, and I think the answer is no clemency.'"
Security

UK Cryptographers Call For UK and US To Out Weakened Products 105

Trailrunner7 writes "A group of cryptographers in the UK has published a letter that calls on authorities in that country and the United States to conduct an investigation to determine which security products, protocols and standards have been deliberately weakened by the countries' intelligence services. The letter, signed by a number of researchers from the University of Bristol and other universities, said that the NSA and British GCHQ 'have been acting against the interests of the public that they are meant to serve.' The appeal comes a couple of weeks after leaked documents from the NSA and its UK counterpart, Government Communications Headquarters, showed that the two agencies have been collaborating on projects that give them the ability to subvert encryption protocols and also have been working with unnamed security vendors to insert backdoors into hardware and software products."
Government

NSA Shares Intel On Americans With Israel 328

An anonymous reader writes "The U.K.'s Guardian newspaper is reporting that the NSA shares the raw intel collected on Americans with Israel. From the article: 'Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the U.S. government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis. ... The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing. The five-page memorandum, termed an agreement between the U.S. and Israeli intelligence agencies "pertaining to the protection of U.S. persons," repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights. But this is undermined by the disclosure that Israel is allowed to receive "raw Sigint" – signal intelligence. The memorandum says: "Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content."'
Government

Half of Tor Sites Compromised, Including TORMail 583

First time accepted submitter elysiuan writes "The founder of Freedom Hosting has been arrested in Ireland and is awaiting extradition to USA. In a crackdown the FBI claims to be about hunting down pedophiles, half of the onion sites in the TOR network have been compromised, including the e-mail counterpart of TOR deep web, TORmail. The FBI has also embedded a 0-day Javascript attack against Firefox 17 on Freedom Hosting's server. It appears to install a tracking cookie and a payload that phones home to the FBI when the victim resumes non-TOR browsing. Interesting implications for The Silk Road and the value of Bitcoin stemming from this. The attack relies on two extremely unsafe practices when using TOR: Enabled Javascript, and using the same browser for TOR and non-TOR browsing. Any users accessing a Freedom Hosting hosted site since 8/2 with javascript enabled are potentially compromised."
Software

Next-Gen Video Encoding: x265 Tackles HEVC/H.265 104

An anonymous reader writes "Late last night, MulticoreWare released an early alpha build of the x265 library. x265 is intended to be the open source counterpart to the recently released HEVC/H.265 standard which was approved back in January, much in the same way that x264 is used for H.264 today. Tom's Hardware put x265 through a series of CPU benchmarks and then compared x265 to x264. While x265 is more taxing in terms of CPU utilization, it affords higher quality at any given bit rate, or the same quality at a lower bit rate than x264." (Reader Dputiger writes points out a comparison at ExtremeTech, too.)
Businesses

Maneuvering Continues For Control of Dell 57

An anonymous reader writes "Just as Carl Icahn's months-long, high-profile bid for control of Dell seemed to have run its course, came the announcement that Dell's board had postponed a shareholder's vote on the bid from Michael Dell and investment firm Silver Lake Partners, to take private the company that Dell had started in a University of Texas dorm room twenty nine years ago. The postponement indicated that Dell was not confident that their $24.4 billion ($13.65 per share) deal had the necessary votes. Icahn and his main ally, Southeastern Asset Management, claim that the proposed deal undervalues the company and its upside potential; Icahn's latest proposal is to keep the company public, but to offer $14 per share plus upside warrants, for every share tendered by stockholders. The latest wrinkle is apparent tension within the Dell/Silver Lake team; Silver Lake reportedly feels entitled to the $450 million buyout fee specified in the deal's language, if any alternative bid from Icahn succeeds within a year; Dell and the board feel that Silver Lake would only be entitled to expenses in that case, perhaps amounting to a few tens of millions USD. The Bloomberg story also reports that Michael Dell has at times been unable to reach his Silver Lake counterpart (a longtime friend) on the phone to discuss possibly sweetening the bid."
United Kingdom

GCHQ Tapping UK Fiber-Optic Cables 157

An anonymous reader writes "According to The Guardian, the UK government is tapping fiber-optic cables that carry global communications and gathering vast amounts of data. The British Government Communications Headquarters (GCHQ) has been sharing the data with its American counterpart, the NSA. 'The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate. ... The documents reveal that by last year GCHQ was handling 600m "telephone events" each day, had tapped more than 200 fibre-optic cables and was able to process data from at least 46 of them at a time.'"
Businesses

NY and SF Mayors Announce Joint Tech Summits 27

First time accepted submitter Clarklteveno writes "New York Mayor Michael Bloomberg and his San Francisco counterpart, Ed Lee, said at a news conference Friday that they are sponsoring a pair of technology summits over the next year. The mayors said the 'digital cities' summits — one in New York in September and another in San Francisco early next year — will seek to find ways to use technology to solve problems the cities face. The mayors made the announcement after touring the office of San Francisco-based mobile payment company Square with co-founder Jack Dorsey, who also helped found Twitter. Bloomberg pointed to power outages and dangerous winds and flooding from Hurricane Sandy as examples of issues the summits would seek to address."
Businesses

Duracell's Powermat Ties the Knot With PowerKiss 61

Lucas123 writes "Powermat Technologies has announced an agreement to merge with its European counterpart, PowerKiss, in a deal that will make what once was two disparate wireless power specifications come together under one. Among airports, coffee shops, malls and arenas, Powermat, owned by Duracell, claims it has more than 1,500 charging spots in the U.S. In Europe, PowerKiss said it has 1,000 charging spots in airports, hotels and cafes; it also recently announced wireless charging at some McDonald's restaurants. Powermat and PowerKiss are attempting to prevail against the competing Wireless Power Consortium (WPC), which supports the widely adopted Qi (pronounced "chee") standard used in Nokia, Samsung, and LG products. Like the Qi standard, the PMA's Power 2.0 specification is based on magnetic induction wireless power technology."
Crime

TJX Hacker Gives Keynote At 'Offensive' Security Conference 35

An anonymous reader writes "Two hundred hackers from around the world gathered at a Miami Beach hotel Thursday and Friday for the Infiltrate Security conference, which focuses on systems hacking from the 'offensive' perspective (with slides). In a keynote address, Stephen Watt, who served two years in prison for writing the software used by his friend Alberto Gonzalez to steal millions of credit card numbers from TJX, Hannaford and other retailers, acknowledges he was a 'black hat' but denies that he was directly involved in TJX or any other specific job. Watt says his TCP sniffer logged critical data from a specified range of ports, which was then encrypted and uploaded to a remote server. Brad 'RenderMan' Haines gave a presentation on vulnerabilities of the Air Traffic Control system, including the FAA's 'NextGen' system which apparently carries forward the same weakness of unencrypted, unauthenticated location data passed between airplanes and control towers. Regarding the recent potential exploits publicized by Spanish researcher Hugo Teso, Haines says he pointed out similar to the FAA and its Canadian counterpart a year ago, but received only perfunctory response."
Technology

Festo's Drone Dragonfly Takes To the Air 45

yyzmcleod writes "Building on the work of last year's bionic creation, the Smart Bird, Festo announced that it will literally launch its latest creation, the BionicOpter, at Hannover Messe in April. With a wingspan of 63 cm and weighing in at 175 grams, the robotic dragonfly mimics all forms of flight as its natural counterpart, including hover, glide and maneuvering in all directions. This is made possible, the company says, by the BionicOpter's ability to move each of its four wings independently, as well as control their amplitude, frequency and angle of attack. Including its actuated head and body, the robot exhibits 13 degrees of freedom, which allows it to rapidly accelerate, decelerate, turn and fly backwards."
Network

Five Internet Founders Share First £1 Million Engineering 'Nobel' Prize 55

judgecorp writes "The first Queen Elizabeth Prize for Engineering, worth £1 million, has been shared by five founders of the Internet and the World Wide Web. In addition to Sir Tim Berners Lee and Vint Cerf, the other recipients are Cerf's colleague Bob Kahn, creator of the Mosaic browser Marc Andreessen, and a much less well known Frenchman, Louis Pouzin, aged 82. Working at Bell Labs, Pouzin invented the datagram protocols on which Cerf and Kahn based the TCP/IP protocols. The judges originally planned the prize for a maximum of three winners, but that had to change, thanks to the collaborative nature of the Internet. All the recipients praised their colleagues and pointed out that engineering is always a team effort: 'Fortunately we are still alive,' joked Pouzin. 'It is forty years since we did the things for which we are being honoured.' Awarded in the U.K., the prize is an international effort to create an engineering counterpart to the Nobels. The judges considered entries from 65 countries."

Slashdot Top Deals