The Internet

How a Tax Inspector Used Google Search To Locate the Founder of SilkRoad (bbc.com) 95

An anonymous reader shares a report: You could buy any drug imaginable, wherever you were in the world, on the Silk Road website. Hidden on the dark web, it made millions of dollars every week. The US government had been trying to shut it down for more than two years when tax agent Gary Alford was brought in to try to trace the money which passed through the site. In his spare time, Gary started searching Google to try to find the mysterious mastermind behind the site: Dread Pirate Roberts. And he was successful. Gary spent hours trawling the internet for the first ever mention of Silk Road. He says he came across a posting on Bitcoin forum. In the post, Roberts had shared his Gmail account. That escalated the investigation. Gary spoke with BBC describing the rest.
Google

Supreme Court Asked To Nullify the Google Trademark (arstechnica.com) 196

Is the term "google" too generic and therefore unworthy of its trademark protection? That's the question before the US Supreme Court. From a report: What's before the Supreme Court is a trademark lawsuit that Google already defeated in a lower court. The lawsuit claims that Google should no longer be trademarked because the word "google" is synonymous to the public with the term "search the Internet." "There is no single word other than google that conveys the action of searching the Internet using any search engine," according to the petition to the Supreme Court. It's perhaps one of the most consequential trademark case before the justices since they ruled in June that offensive trademarks must be allowed. The Google trademark dispute dates to 2012 when a man named Chris Gillespie registered 763 domain names that combined "google" with other words and phrase, including "googledonaldtrump.com."
Businesses

Trademarks Shows Amazon Has Sights On Meal-Kits, 'Single Cow Burgers' and Other Fast Food Options (techcrunch.com) 75

The latest business Amazon may expand into is the business of meal-kits. According to TechCrunch, Amazon recently filed a trademark (serial number 87517760) for "We do the prep. You be the chef," which relates to a meal-kit service similar to the kind offered by Blue Apron and others. From the report: Amazon describes the service simply: "Prepared food kits composed of meat, poultry, fish, seafood, fruit and/or and vegetables and also including sauces or seasonings, ready for cooking and assembly as a meal; Frozen, prepared, and packaged meals consisting of meat, poultry, fish, seafood, fruit and/or vegetables; fruit salads and vegetable salads; soups and preparations for making soups." It turns out that, in fact, company in the last seven months had registered at least two other trademarks for slightly shorter versions of the same meal kit concept. Respectively, serial numbers 87418923 and 87256976 for "We prep. You cook" and "No-line meal kits," also relate to food-kit services along with marketing related to them. Amazon also has been quietly developing its own lines of pre-made food aimed at people searching for more quality ingredients. The company has, for example, around 10 trademarks filed related to the phrase "single cow burger."
Education

Students Are Better Off Without a Laptop In the Classroom (scientificamerican.com) 247

Cindi May writes via Scientific American about new research that "suggests that laptops do not enhance classroom learning, and in fact students would be better off leaving their laptops in the dorm during class." From the report: Although computer use during class may create the illusion of enhanced engagement with course content, it more often reflects engagement with social media, YouTube videos, instant messaging, and other nonacademic content. This self-inflicted distraction comes at a cost, as students are spending up to one-third of valuable (and costly) class time zoned out, and the longer they are online the more their grades tend to suffer. To understand how students are using computers during class and the impact it has on learning, Susan Ravizza and colleagues took the unique approach of asking students to voluntarily login to a proxy server at the start of each class, with the understanding that their internet use (including the sites they visited) would be tracked. Participants were required to login for at least half of the 15 class periods, though they were not required to use the internet in any way once they logged in to the server. Researchers were able to track the internet use and academic performance of 84 students across the semester.

participants spent almost 40 minutes out of every 100-minute class period using the internet for nonacademic purposes, including social media, checking email, shopping, reading the news, chatting, watching videos, and playing games. This nonacademic use was negatively associated with final exam scores, such that students with higher use tended to score lower on the exam. Social media sites were the most-frequently visited sites during class, and importantly these sites, along with online video sites, proved to be the most disruptive with respect to academic outcomes. In contrast with their heavy nonacademic internet use, students spent less than 5 minutes on average using the internet for class-related purposes (e.g., accessing the syllabus, reviewing course-related slides or supplemental materials, searching for content related to the lecture). Given the relatively small amount of time students spent on academic internet use, it is not surprising that academic internet use was unrelated to course performance. Thus students who brought their laptops to class to view online course-related materials did not actually spend much time doing so, and furthermore showed no benefit of having access to those materials in class.

Security

How Hollywood Got Hacked: Studio at Center of Netflix Leak Breaks Silence (variety.com) 79

Earlier this year, hackers obtained and leaked the episodes of TV show Orange Is the New Black. In a candid interview, Larson Studios' chief engineer David Dondorf explained how the audio post-production business allowed the hacker group to gain access to the Netflix original content. Dandorf says the company hired private data security experts to find how it was breached. The investigation found that the hacker group had been searching the internet for PCs running older versions of Windows and stumbled across an old computer at Larson Studios still running Windows 7. From the report: Larson's employees just didn't know all that much about it. Having a computer running an ancient version of Windows on the network was clearly a terrible lack of oversight, as was not properly separating internal servers from the internet. "A lot of what went on was ignorance," admitted Rick Larson. "We are a small company. Did we even know what the content security departments were at our clients? Absolutely not. I couldn't have told you who to call. I can now." It's a fascinating story about how the hacker group first made contact and tried to threaten Larson Studios' president and his wife, and how they responded. Worth a read.
Opera

Opera Slows Its Development On The iOS Platform (betanews.com) 61

Reader BrianFagioli writes: After searching for Opera in the Apple App Store, I noticed something odd -- none of the company's iOS browsers (Opera Mini and Opera Coast) had been updated in 2017. Since we are almost halfway through the year, I decided to ask Opera what was up. Shockingly, the company told me that it no longer has a team working on iOS. An Opera employee by the name of 'Rosi' sent me a tweet this morning, making the revelation. While the desktop version of the browser is still in development, the company has chosen to abandon its efforts on iOS. To show just how bad it is, the Opera Mini browser hasn't been updated in almost a year. Opera Coast was updated in December of 2016, however -- almost six months ago.
Update: Opera has clarified that while they're not currently working on iOS, they still plan to support it.
Open Source

Ask Slashdot: What's The Best Place To Suggest New Open Source Software? 225

dryriver writes: Somebody I know has been searching up and down the internet for an open source software that can apply GPU pixel shaders (HLSL/GLSL/Cg/SweetFX) to a video and save the result out to a video file. He came up with nothing, so I said "Why not petition the open source community to create such a tool?" His reply was "Where exactly does one go to ask for a new open source software?"

So that is my question: Where on the internet can one best go to request that a new open source software tool that does not exist yet be developed? Or do open source tools only come into existence when someone -- a coder -- starts to build a software, opens the source, and invites other coders to join the fray?

This is a good place to discuss the general logistics of new open source projects -- so leave your best answers in the comments. What's the best place to suggest new open source software?
Businesses

Medium Cuts Staff By One-Third, Shuts Down New York and DC Offices (arstechnica.com) 177

An anonymous reader quotes a report from Ars Technica: Medium, the San Francisco-based online publishing platform founded in 2012, has laid off 50 employees, or roughly one-third of its staff. The company will also close offices in New York and Washington, DC. Ev Williams, Medium's CEO, wrote in a lengthy post on Wednesday that the company would be changing its business model despite ending 2016 as "our best year yet." He blamed the entire concept of "ad-driven media on the Internet" as the root of the company's shortcomings. As Williams, who is also a co-founder of Twitter, wrote: "It simply doesn't serve people. In fact, it's not designed to. The vast majority of articles, videos, and other "content" we all consume on a daily basis is paid for -- directly or indirectly -- by corporations who are funding it in order to advance their goals. And it is measured, amplified, and rewarded based on its ability to do that. Period. As a result, we getwell, what we get. And it's getting worse."
Social Networks

Using Multiple Social Networks May Lead To Depression and Anxiety, Says Study (dailydot.com) 119

An anonymous reader quotes a report from Daily Dot: The more social media you use, the higher the likelihood that you'll be anxious or depressed. At least according to the University of Pittsburgh Center for Research on Media, Technology and Health. In a study published online this month with more than 1,700 millennial adults, it found people who report using seven to 11 social media platforms had more than three times the risk of depression or anxiety than millennials who use zero to two platforms. The participants were asked about the most popular social media platforms in 2014, the year the study was conducted, which included Facebook, YouTube, Twitter, Google Plus, Instagram, Snapchat, Reddit, Tumblr, Pinterest, Vine, and LinkedIn. Those who used more than seven platforms showed higher levels of depressive symptoms, even when researchers controlled for factors like race, gender, relationship status, household income, education, and total time spent on social media. Brian A. Primack, lead author of the study, notes that the correlation is not certain. He told PsyPost: "It may be that people who suffer from symptoms of depression or anxiety, or both, tend to subsequently use a broader range of social media outlets. For example, they may be searching out multiple avenues for a setting that feels comfortable and accepting. However, it could also be that trying to maintain a presence on multiple platforms may actually lead to depression and anxiety. More research will be needed to tease that apart."
Privacy

Watchdog Group Claims Smart Toys Are Spying On Kids (mashable.com) 70

The Center for Digital Democracy has filed a complaint with the Federal Trade Commission warning of security and privacy holes associated with a pair of smart toys designed for children. Mashable reports: "This complaint concerns toys that spy," reads the complaint, which claims the Genesis Toys' My Friend Cayla and i-QUE Intelligent Robot can record and collect private conversations and offer no limitations on the collection and use of personal information. Both toys use voice recognition, internet connectivity and Bluetooth to engage with children in conversational manner and answer questions. The CDD claims they do all of this in wildly insecure and invasive ways. Both My Friend Cayla and i-QUE use Nuance Communications' voice-recognition platform to listen and respond to queries. On the Genesis Toy site, the manufacturer notes that while "most of Cayla's conversational features can be accessed offline," searching for information may require an internet connection. The promotional video for Cayla encourages children to "ask Cayla almost anything." The dolls work in concert with mobile apps. Some questions can be asked directly, but the toys maintain a constant Bluetooth connection to the dolls so they can also react to actions in the app and even appear to identify objects the child taps on on screen. While some of the questions children ask the dolls are apparently recorded and sent to Nuance's servers for parsing, it's unclear how much of the information is personal in nature. The Genesis Privacy Policy promises to anonymize information. The CDD also claims, however, that My Friend Cayla and i-Que employ Bluetooth in the least secure way possible. Instead of requiring a PIN code to complete pairing between the toy and a smartphone or iPad, "Cayla and i-Que do not employ... authentication mechanisms to establish a Bluetooth connection between the doll and a smartphone or tablet. The dolls do not implement any other security measure to prevent unauthorized Bluetooth pairing." Without a pairing notification on the toy or any authentication strategy, anyone with a Bluetooth device could connect to the toys' open Bluetooth networks, according to the complaint.
AI

Stephen Hawking: Automation and AI Is Going To Decimate Middle Class Jobs (businessinsider.com) 468

An anonymous reader quotes a report from Business Insider: In a column in The Guardian, the world-famous physicist wrote that "the automation of factories has already decimated jobs in traditional manufacturing, and the rise of artificial intelligence is likely to extend this job destruction deep into the middle classes, with only the most caring, creative or supervisory roles remaining." He adds his voice to a growing chorus of experts concerned about the effects that technology will have on workforce in the coming years and decades. The fear is that while artificial intelligence will bring radical increases in efficiency in industry, for ordinary people this will translate into unemployment and uncertainty, as their human jobs are replaced by machines. Automation will, "in turn will accelerate the already widening economic inequality around the world," Hawking wrote. "The internet and the platforms that it makes possible allow very small groups of individuals to make enormous profits while employing very few people. This is inevitable, it is progress, but it is also socially destructive." He frames this economic anxiety as a reason for the rise in right-wing, populist politics in the West: "We are living in a world of widening, not diminishing, financial inequality, in which many people can see not just their standard of living, but their ability to earn a living at all, disappearing. It is no wonder then that they are searching for a new deal, which Trump and Brexit might have appeared to represent." Combined with other issues -- overpopulation, climate change, disease -- we are, Hawking warns ominously, at "the most dangerous moment in the development of humanity." Humanity must come together if we are to overcome these challenges, he says.
Government

Yahoo Scan By US Fell Under Foreign Spy Law Expiring Next Year (reuters.com) 50

An anonymous reader quotes a report from Reuters: A Yahoo operation in 2015 to scan the incoming email of its customers for specific information requested by the U.S. government was authorized under a foreign intelligence law, parts of which will expire next year, two U.S. government officials familiar with the matter said. The collection in question was specifically authorized by a warrant issued by the secret Foreign Intelligence Surveillance Court, said the two government sources, who requested anonymity to speak freely. Yahoo's request came under the Foreign Intelligence Surveillance Act, the sources said. The two sources said the request was issued under a provision of the law known as Section 702, which will expire on Dec. 31, 2017, unless lawmakers act to renew it. The FISA Court warrant related specifically to Yahoo, but it is possible similar such orders have been issued to other telecom and internet companies, the sources said. Section 702 of the FISA governs a program exposed by former National Security Agency contractor Edward Snowden known as Prism, which gathers messaging data from Alphabet Inc's Google, Facebook Inc, Microsoft Corp, Apple Inc and other major tech companies that involves a foreign target under surveillance. Another type of spying the authority allowed under Section 702 is known as "upstream," and allows the NSA to copy web traffic flowing along the internet backbone located inside the United States and search for certain terms associated with a target. "The NSA has said that it only targets individuals under Section 702 by searching for email addresses and similar identifiers," Senator Ron Wyden (OR-D) said in a statement to Reuters on Monday. "If that has changed, the executive branch has an obligation to notify the public."
Government

Yahoo Secretly Scanned Customer Emails For US Intelligence (reuters.com) 194

An anonymous reader shares with us an exclusive report from Reuters: Yahoo Inc last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter. The company complied with a classified U.S. government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said two former employees and a third person apprised of the events. Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to a spy agency's demand by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time. It is not known what information intelligence officials were looking for, only that they wanted Yahoo to search for a set of characters. That could mean a phrase in an email or an attachment, said the sources, who did not want to be identified. Reuters was unable to determine what data Yahoo may have handed over, if any, and if intelligence officials had approached other email providers besides Yahoo with this kind of request. The two former employees say that the decision Yahoo CEO Marissa Mayer made to obey the directive resulted in the June 2015 departure of CISO Alex Stamos, who left to work for Facebook. The company said in response to Reuters questions about the demand, "Yahoo is a law abiding company, and complies with the laws of the United States."
Software

The UK's Largest Sperm Bank Is Now An App (technologyreview.com) 65

Sperm bank? There's an app for that. The largest sperm bank in the United Kingdom -- the London Sperm Bank -- has released an official app that aims to "modernize the process of hooking prospective parents up with the biological material they need to make it happen," according to MIT Technology Review: The app is essentially just a mobile version of the filtered search function the London Sperm Bank offers on its website. But in doing something as simple as bringing its desktop services to mobile devices, the bank is making a play to further normalize reproductive technologies. The London Sperm Bank boasts that users will receive push notifications as soon as new donors are available, which could help speed things up for hopeful parents looking for a match. The road to conception can take years for people using reproductive technologies, so expediting any part of the process would be a welcome time-saver. But the bank has over 10,000 vials of sperm, so searching, even using filters, could still be a lengthy process. To combat this, the app also offers a wish list function that lets more focused users predetermine what they're looking for in a donor, and receive a notification when their criteria are met. The way the service works on mobile has been compared to Tinder, but there's actually no swiping involved. Its wish list function means it's more akin to apps like Anthology, which job seekers use to find their next career move. The report notes that, while there are other mobile sperm bank apps out there, the London Sperm Bank is the only one with several medical associations and the U.K. government's Human Fertilization and Embryology Authority on board. Also, the app is free to download, but the cost of ordering sperm is about $1,200 per order, which is the same as if you order through the London Sperm Bank catalogue.
Privacy

GhostMail Closes in September, Leaves Users Searching For Secure Email Alternatives (zdnet.com) 158

On September 1, "GhostMail will no longer provide secure email services unless you are an enterprise client," reports ZDNet. "According to the company, it is 'simply not worth the risk.'" GhostMail provided a free and anonymous "military encrypted" e-mail service based in Switzerland, and collected "as little metadata" as possible. But this week on its home page, GhostMail told its users "Since we started our project, the world has changed for the worse and we do not want to take the risk of supplying our extremely secure service to the wrong people... In general, we believe strongly in the right to privacy, but we have taken a strategic decision to only supply our platform and services to the enterprise segment."

GhostMail is referring their users to other free services like Protonmail as an alternative, but an anonymous Slashdot reader asks: What options does an average person have for non-NSA-spied-on email? I am sure there are still some Ghostmail competitors out there but I'm wondering if it's better to coax friends and family to use encryption within their given client (Gmail, Yahoo, Outlook, whatever...) And are there any options for hosting a "private" email service: inviting friends and family to use it and have it kind of hosted locally. Ghostmail-in-a-box or some such?
The Almighty Buck

How The Internet Helps Sex Workers Keep Customers Honest (qz.com) 147

HughPickens.com writes: Mid-range prostitution is a relatively new market, enabled by technology. Before the internet, it was hard for escorts to find customers: They had to either walk the streets searching for customers, rely on word-of-mouth, or work with agencies. The internet changed all that as Allison Schrager writes at Quartz that if you work at Goldman Sachs in NYC and you want to tie up a woman and then have sex with her, you'll first have to talk to Rita. Rita will "insist on calling your office, speaking to the switchboard operator, and being patched through to your desk. Then she will want to check out your profile on the company website and LinkedIn. She'll demand you send her message from your work email, and require a scan of either your passport or driver's license." Though some escorts rely on sex work-specific sites that maintain "bad date" lists of potentially dangerous clients, others make use of more mainstream sources to gather information about and verify the identities of potential johns. Rita is addressing a problem that every business, both legal and illegal, has. Before the internet, more commerce occurred locally -- customers knew their merchants or service providers and went back to them repeatedly. As technology has expanded our transactional networks, it must also offer new ways of building trust and reputation. "The lesson here is that, while you'd think all the technological options for finding customers would make Rita's job as a madam obsolete, it has actually made her services more critical," says Schrager. "One step ahead of the mainstream economy, Rita's thriving business shows that some jobs won't disappear. They just need to be recast in a way that capitalizes on what made them valuable in the first place."
Google

Google To Offer Better Medical Advice When You Search Your Symptoms (cnbc.com) 104

An anonymous reader writes from a report via CNBC: Google said Monday that it will be improving its catalog of searched Googled health symptoms by adding information on related health conditions that have been vetted by the Mayo Clinic and Harvard Medical School. For example, if you type "headache on one side," Google will offer up a list of associated conditions like "migraine," "common cold" or "tension headache." When it comes to general searches like "headache," the company will also give an overview description along with information on self-treatment options or symptoms that warrant a doctor's visit. In Google's official blog post, the company said roughly 1 percent of the searches on Google, which equates to millions of searches, are related to symptoms users are researching. However, search results can be confusing, and result in "unnecessary anxiety and stress," Google said. It plans to use its Knowledge Graph feature, which contains high-quality medical information collected from doctors, to enhance search results.
Security

Slack To Disable Thousands of Logins Leaked on GitHub (detectify.com) 27

An anonymous reader writes: Thursday one technology site reported that thousands of developers building bots for the team-collaboration tool Slack were exposing their login credentials in public GitHub repositories and tickets. "The irony is that a lot of these bots are mostly fun 'weekend projects', reported Detectify. "We saw examples of fit bots, reminding you to stretch throughout the day, quote bots, quoting both Jurassic Park...and Don Quixote...."

Slack responded that they're now actively searching for publicly-posted login credentials, "and when we find any, we revoke the tokens and notify both the users who created them, as well as the owners of affected teams." Detectify notes the lapse in security had occurred at a wide variety of sites, including "Forbes 500 companies, payment providers, multiple internet service providers and health care providers... University classes at some of the world's best-known schools. Newspapers sharing their bots as part of stories. The list goes on and on..."

Movies

Report: Comcast In Talks To Buy DreamWorks For $3 Billion (usatoday.com) 49

An anonymous reader quotes a report from USA Today: Comcast is in talks to buy DreamWorks Animation in a multi-billion-dollar deal, The Wall Street Journal and Bloomberg are reporting. The cost of the deal would be more than $3 billion, according to both news organizations, citing unnamed sources. Jeffrey Katzenberg, CEO of DreamWorks Animation, has been searching for a buyer for the company, which has a current market value of $2.3 billion. DreamWorks is based in Glendale, Calif., and was founded in 1994 by Katzenberg, filmmaker Steven Spielberg and movie and music executive David Geffen. The animation unit was spun off in 2004. Philadelphia-based Comcast has two primary businesses, Comcast Cable and NBCUniversal. Comcast also owns Universal Parks and Resorts. Comcast already owns an animation studio, Illumination Entertainment, known for its work on the Despicable Me and Minions movies.
Crime

Child Porn Is Being Hidden on Legal Commercial Websites (theguardian.com) 92

People who visit porn websites or search for adult pornography on the Web are facing the risk of being arrested for accessing child abuse images. The Internet Watch Foundation is warning that vicious minds are increasingly hiding criminal content on legal commercial websites, according to a report on The Guardian. The IWF found 743 websites in 2015, compared with 353 in 2013, in which child sexual abuse content was hosted on legal porn websites, and could be accessed if a special link was requested. From the report: "It has really started to become an accepted practice for the commercial side of the paedophilic community because this obfuscation technique is more effective at keeping its content live for longer," said Fred Langford, chief executive of the UK charity. Last year, the IWF found that 21% of the webpages containing illegal images and videos were commercial and those seeking to profit from the abuse were increasingly disguising it behind legal content, usually adult pornography. Langford said the trend raised the risk that people searching for adult pornography could unwittingly access child abuse images on disguised websites.

Slashdot Top Deals