Facebook

Facebook Bug Prevented Users From Deleting Their Accounts (venturebeat.com) 49

Emil Protalinski, reporting for VentureBeat: Until just a few days ago, some Facebook users could not delete their accounts -- the option to do so simply didn't work. After VentureBeat reached out to Facebook regarding the issue, an engineer was able to squash the bug.

Two weeks ago, I got an email from a VentureBeat reader who couldn't delete his Facebook account. He claimed there were others also having issues -- no matter what they tried, they simply could not delete Facebook. I didn't believe him at first. [...] I did my due diligence. The least I could do was help him delete his account. Upon request, the reader was gracious enough to let me log into his Facebook account so I could see for myself. No matter what I tried, and regardless of which browser I used, the Facebook help page for deleting your account would not load when logged into his account.
The reporter contacted a Facebook spokesperson, who after looking into the matter concluded that a bug prevented some people with "a large number of posts" from deleting their accounts. Facebook says it has resolved the issue.
DRM

'It's Always DRM's Fault' (publicknowledge.org) 172

A social media post from Anders G da Silva, who accused Apple of deleting movies he had purchased from iTunes, went viral earlier this month. There is more to that story, of course. In a statement to CNET, Apple explained that da Silva had purchased movies while living in Australia, with his iTunes region set to "Australia." Then he moved to Canada, and found that the movies were no longer available for download -- due, no doubt, to licensing restrictions, including restrictions on Apple itself. While his local copies of the movies were not deleted, they were deleted from his cloud library. Apple said the company had shared a workaround with da Silva to make it easier for him to download his movies again. Public Knowledge posted a story Tuesday to weigh in on the subject, especially since today is International Day Against DRM. From the post: To that rare breed of person who carefully reads terms of service and keeps multiple, meticulous backups of important files, da Silva should have expected that his ability to access movies he thought he'd purchased might be cut off because he'd moved from one Commonwealth country to another. Just keep playing your original file! But DRM makes this an unreasonable demand. First, files with DRM are subject to break at any time. DRM systems are frequently updated, and often rely on phoning home to some server to verify that they can still be played. Some technological or business change may have turned the most carefully backed-up and preserved digital file into just a blob of unreadable encrypted bits.

Second, even if they are still playable, files with DRM are not very portable, and they might not fit in with modern workflows. To stay with the Apple and iTunes example, the old-fashioned way to watch a movie purchased from the iTunes Store would be to download it in the iTunes desktop app, and then watch it there, sync it to a portable device, or keep iTunes running as a "server" in your home where it can be streamed to devices such as the Apple TV. But this is just not how things are done anymore. To watch an iTunes movie on an Apple TV, you stream or download it from Apple's servers. To watch an iTunes movie on an iPhone, same thing. (And because this is the closed-off ecosystem of DRM'd iTunes movies, if you want to watch your movie on a Roku or an Android phone, you're just out of luck.)

[...] My takeaway is that, if a seller of DRM'd digital media uses words like "purchase" and "buy," they have at a minimum an obligation to continue to provide additional downloads of that media, in perpetuity. Fine print aside, without that, people simply aren't getting what they think they're getting for their money, and words like "rent" and "borrow" are more appropriate. Of course, there is good reason to think that even then people are not likely to fully understand that "buying" something in the digital world is not the same as buying something in the physical world, and more ambitious measures may be required to ensure that people can still own personal property in the digital marketplace. See the excellent work of Aaron Perzanowski and Jason Schultz on this point. But the bare minimum of "owning" a movie would seem to be the continued ability to actually watch it.

Android

Chinese Phone Maker Xiaomi Deletes a Public MIUI vs Android One Twitter Poll After Voting Didn't Go Its Way (betanews.com) 61

Chinese smartphone maker Xiaomi, which sells handsets at razor thin margins, is increasingly dominating in its home market and emerging places such as India and Indonesia. To make money, the company relies on a range of homegrown software features in its Android-based MIUI operating system. In a surprising move earlier this week, the company asked its Twitter followers to choose between MIUI and Android One (which runs pure Android OS). Things didn't go as it had planned. From a report: Presumably the company was rather hoping that Twitter users would vote for its own MIUI which it could then rub in Google's face -- but the poll actually went against Xiaomi. Rather than leave the results of the vote up for anyone to see, the company decided to simply delete it and pretend it never happened. Take a look at the Xiaomi account on Twitter, and you'll see no hint that any such poll has ever taken place. But over on Reddit, there's a thread which was started by someone posting a link to the poll. In the comments, one Redditor noticed after a period of voting that: "So far it's 53-47 for android one."
Slashdot.org

20 Years of Stuff That Matters 726

Today we're marking Slashdot's 20th birthday. 20 years is a long time on the internet. Many websites have come and gone over that time, and many that stuck around haven't had any interest in preserving their older content. Fortunately, as Slashdot approaches its 163,000th story, we've managed to keep track of almost all our old postings - all but the first 2^10, or so. In addition to that, we've held onto user comments, the lifeblood of the site, from 1999 onward. As we celebrate Slashdot's 20th anniversary this month, we thought we'd take a moment to highlight a few of the notable or interesting stories and discussions that have happened here in the past decade and a half. This is part of our 20-year anniversary celebration, and we've set up a page to coordinate user meet-ups. We'll be continuing to run some special pieces throughout the month, so keep an eye out for those.

Read on for a trip down memory lane.

Update: Slashdot founder CmdrTaco has taken to Medium with some of his own Slashdot nostalgia.
Programming

Douglas Crockford Envisions A Post-JavaScript World (infoworld.com) 300

JavaScript developer (and JSON proponent) Douglas Crockford recently described "a theoretical post-JavaScript World," according to InfoWorld. Crockford "believes the web development staple needs a successor that can fix multiple programming nuances." An anonymous reader summarizes their report: Despite its status as the world's most popular language, Crockford told an audience at the Oracle Code conference, "It would be sad if JavaScript turns out to be the last language." He complained that JavaScript has two different ways of declaring variables -- let and var -- as well as two different "bottom variables" with no value -- both null and undefined. "There's an argument among language designers, should we have bottom values at all? But there's nobody who thinks you should have two of them."

According to InfoWorld, Crockford "also presented a scenario with JavaScript being turned into a purely functional programming language by getting rid of 'impurities' like date, the delete operation, math.random and object.assign. Afterward, he stressed replacing JavaScript rather than adding functional capabilities to it... The next language also should be better able to deal with multiple cores. Most languages have followed the sequential model of Fortran, executing one operation after another, he said. 'That's not how the world works anymore. We now have lots of cores available to us, which all want to be running at the same time.'"

In other news, Crockford also proposed ending the "spaces vs. tabs" debate by simply eliminating tabs altogether.
Democrats

Hillary Clinton Used BleachBit To Wipe Emails (neowin.net) 569

An anonymous reader quotes a report from Neowin: The open-source disk cleaning application, BleachBit, got quite a decent ad pitch from the world of politics after it was revealed lawyers of the presidential hopeful, Hillary Clinton, used the software to wipe her email servers. Clinton is currently in hot water, being accused of using private servers for storing sensitive emails. "[South Carolina Representative, Trey Gowdy, spoke to Fox News about Hillary Clinton's lawyers using BleachBit to wipe the private servers. He said:] 'She and her lawyers had those emails deleted. And they didn't just push the delete button; they had them deleted where even God can't read them. They were using something called BleachBit. You don't use BleachBit for yoga emails or bridesmaids emails. When you're using BleachBit, it is something you really do not want the world to see.'" Two of the main features that are listed on the BleachBit website include "Shred files to hide their contents and prevent data recovery," and "Overwrite free disk space to hide previously deleted files." These two features would make it pretty difficult for anyone trying to recover the deleted emails. Slashdot reader ahziem adds: The IT team for presidential candidate Hillary Clinton used the open source cleaning software BleachBit to wipe systems "so even God couldn't read them," according to South Carolina Rep. Trey Gowdy on Fox News. His comments on the "drastic cyber-measure" were in response to the question of whether emails on her private Microsoft Exchange Server were simply about "yoga and wedding plans." Perhaps Clinton's team used an open-source application because, unlike proprietary applications, it can be audited, like for backdoors. In response to the Edward Snowden leaks in 2013, privacy expert Bruce Schneier advised in an article in which he stated he also uses BleachBit, "Closed-source software is easier for the NSA to backdoor than open-source software." Ironically, Schneier was writing to a non-governmental audience. Have any Slashdotters had any experience with BleachBit? Specifically, have you used it for erasing "yoga emails" or "bridesmaids emails?"
Microsoft

Windows 10 Anniversary Update Borks Dual-Boot Partitions (omgubuntu.co.uk) 281

Windows 10 Anniversary Update may affect and even delete other partitions on the same disk, OMGUbuntu is reporting, citing several complaints by users. "Broken boot loaders on an update are one thing but losing data, even entire partitions?" asks the author. Microsoft-centric news blog WindowsReport is corroborating on the report, adding that in some cases, the new OS was not able to detect some partitions. It says (edited): Many users are reporting that some of their partitions disappeared after installing the Anniversary Update. Usually, it's the smallest partition that disappears, although we couldn't say for sure whether the partition is deleted or if Windows simply doesn't detect it. Some users are saying that the partition is not allocated, while others can detect it once they install third-party partition management applications.We have reached out to Microsoft for clarification, and will update the post when we hear back from them.
Encryption

Windows Malware Poses As Ransomware, Just Deletes Victims' Files (slashgear.com) 118

An anonymous reader writes: Ranscam, a ransom malware reported by Cisco's Talos Security Intelligence group, claims to have encrypted victims' files and hold them for ransom, but in actuality it has already deleted those files and is simply trying to trick its victims into paying to recover files that are no longer there anymore. SlashGear reports: "Most ransomware follow a similar tactic once they get control of a computer or mobile device. They encrypt certain files, personal documents are a favorite, and then display a message instructing the user to pay, usually with bitcoins, to receive the decryption key to save their files. Ranscam, however, is completely without honor, as much honor as you can find among thieves and scam artists. It claims to have encrypted the users' files and then makes the usual demand. However, it adds an additional threat. For each time the user clicks on the 'payment sent' button but no payment was received, it threatens it will delete a file. That, however, is a total farce. In truth, files have already been deleted, so whether the victim pays or not is moot. The perpetrators don't have any way to recover those deleted files anyway. Also, the threats it flashes users are simply static images fetched from a remote server. Users might just as well be clicking on a two-slide presentation. The good news is that reported Ranscam infections are small, according to Cisco's Talos Security Intelligence group."
Bug

Hacker Finds Bug to Edit or Delete Any Medium Post (vice.com) 39

Joseph Cox, reporting for Motherboard: Medium has become the go-to home for extended blog posts from researchers, CEOs, and even the President of the United States. Now, one hacker has found a way to edit or delete any post on the publishing platform. "I tried to think of different possibilities or testing cases on how can I delete a story of any user. And fortunately, I found a severe bug," Philippines-based freelance penetration test and bug bounty hunter Allan Jay Dumanhug told Motherboard in an email. The trick, Dumanhug explained in a blog post published at the end of last month, centres around Medium's "Publications" feature. Users can create their own publications -- perhaps a page dedicated to infosec news, for example -- and then request to add other users' posts to it. Each post on Medium is given its own unique, 12-character identifier code. The person who authored the post has to approve that request, otherwise their story doesn't go anywhere. But Dumanhug found that while adding his own story to his own publication, he could intercept the HTTP request and simply change the identifier to that of another post.
Communications

Reddit Deletes Surveillance 'Warrant Canary' In Transparency Report (reuters.com) 178

Arthur Dent '99 writes: Today, Reddit deleted wording in its transparency report that would normally indicate that they had not received any "national security letters" or "other classified requests for user information." Such "national security letters" contain penalties for telling others about the request, as the government wishes to keep the request secret. However, because Reddit had placed pre-existing wording in their transparency report in the event of such a letter, they were able to simply delete the existing wording to passively inform others that a request had been received, without actually saying anything at all. This usage of pre-existing wording is known as a "warrant canary" to indicate danger, such as real canaries were used in the past to indicate the presence of deadly gases in coal mines.
Businesses

Comcast Forgets To Delete Revealing Note From Blog Post 114

An anonymous reader notes that Comcast inadvertently posted a bit too much in a blog post today. Earlier today, Comcast published a blog post to criticize the newly announced coalition opposing its merger with Time Warner Cable and to cheer about the FCC's decision to restart the "shot clock" on that deal. But someone at Kabletown is probably getting a stern talking-to right now, after an accidental nugget of honesty made its way into that post. Comcast posted to their corporate blog today about the merger review process, reminding everyone why they think it will be so awesome and pointing to the pro-merger comments that have come in to the FCC. But they also left something else in. Near the end, the blog post reads, "Comcast and Time Warner Cable do not currently compete for customers anywhere in America. That means that if the proposed transaction goes through, consumers will not lose a choice of cable companies. Consumers will not lose a choice of broadband providers. And not a single market will see a reduction in competition. Those are simply the facts." The first version of the blog post, which was also sent out in an e-mail blast, then continues: "We are still working with a vendor to analyze the FCC spreadsheet but in case it shows that there are any consumers in census blocks that may lose a broadband choice, want to make sure these sentences are more nuanced." After that strange little note, the blog post carries on in praise of competition, saying, "There is a reason we want to provide our customers with better service, faster speeds, and a diverse choice of programming: we don't want to lose them."
Books

Book Review: The New Digital Age 68

Nerval's Lobster writes "Eric Schmidt and Jared Cohen begin their new nonfiction book, The New Digital Age, with a rather bold pronouncement: 'The Internet is the largest experiment involving anarchy in history.' Subsequent chapters deal with how that experiment will alter life in decades to come, as more and more people around the world connect to the Internet via cheap mobile phones and other devices." Keep reading to see what Nerval's Lobster has to say about the book.
The Internet

Schneier: The Internet Is a Surveillance State 333

An anonymous reader writes "Bruce Schneier has written a blunt article in CNN about the state of privacy on the internet. Quoting: 'The Internet is a surveillance state. Whether we admit it to ourselves or not, and whether we like it or not, we're being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads. One reporter used a tool called Collusion to track who was tracking him; 105 companies tracked his Internet use during one 36-hour period. ... This is ubiquitous surveillance: All of us being watched, all the time, and that data being stored forever. This is what a surveillance state looks like, and it's efficient beyond the wildest dreams of George Orwell. Sure, we can take measures to prevent this. We can limit what we search on Google from our iPhones, and instead use computer web browsers that allow us to delete cookies. We can use an alias on Facebook. We can turn our cell phones off and spend cash. But increasingly, none of it matters. There are simply too many ways to be tracked."
GNU is Not Unix

Richard Stallman Answers Your Questions 527

A while ago you had the chance to ask founder of the GNU Project, and free software advocate, Richard Stallman, about GNU/Linux, free software, and anything else. You can read his answers to a wide range of questions below. As usual, RMS didn't pull any punches.
Books

Amazon: Authors Can't Review Books 248

In an effort to step up its fight against astroturfers, Amazon has barred authors from reviewing books. It's not simply that authors can't review their own books — they can't review any book in a similar genre to something they've published. "This means that thriller writers are prevented from commenting on works by other authors who write similar books. Critics suggest this system is flawed because many authors are impartial and are experts on novels." British author Joanne Harris had a simpler solution in mind: "To be honest I would just rather Amazon delete all their reviews as it... has caused so much trouble. It is a pity. Originally it was a good idea but it is has become such an issue now. The star rating has become how people view if a book is a success and it has become inherently corrupt." How would you improve the online review system?
Slashdot.org

Linus Torvalds Answers Your Questions 326

Monday you had a chance to ask Linus Torvalds any question you wanted. We sent him a dozen of the highest rated and below you'll see what he has to say about computers, programming, books, and copyrights. He also talks about what he would have done differently with Linux if he had to do it all over again. Hint: it rhymes with nothing.
Slashdot.org

15 Years of Stuff That Matters 145

15 years is a long time on the internet. Many websites have come and gone over that time, and many that stuck around haven't had any interest in preserving their older content. Fortunately, as Slashdot approaches its 2^17th story, we've managed to keep track of almost all our old postings — all but the first 2^10, or so. In addition to that, we've held onto user comments, the lifeblood of the site, from 1999 onward. As we celebrate Slashdot's 15th anniversary this month, we thought we'd take a moment to highlight a few of the notable or interesting stories and discussions that have happened here in the past decade and a half. Read on for a trip down memory lane.
Social Networks

Bring On the Decentralized Social Networking 238

Frequent contributor Bennett Haselton writes: "The distributed-social-networking Diaspora Project recently announced that their software will be released as open source. I don't know if Diaspora specifically will be the Next Big Thing in social networking, but I hope that social networking moves to a decentralized model within the next few years, where anyone can set up and run a hub to administer profiles for themselves and their friends or clients, and where profiles can interact with each other in a distributed fashion instead of on a centralized system like Facebook." Read on for Bennett's thoughts on how that model could work.
Data Storage

Dumpster Drive: File-Sharing For Your Digital Trash Screenshot-sm 79

An anonymous reader writes "Dumpster Drive is a file-sharing application that recycles digital files. Using dumpster diving as a model for recirculating unwanted objects, Dumpster Drive allows others to dig through files that you delete on your computer in a passive file-sharing network. Instead of simply erasing data from your computer, the software allows users to extend the lifecycle of their unwanted files and pass them on to others." Not sure how useful this is, but I think it's a neat idea.
Social Networks

Crowdsourcing the Censors: A Contest 111

Frequent contributor Bennett Haselton is back with an article about how sites with huge amounts of user-generated content struggle to deal with abuse complaints, and could benefit from a crowd-sourced policing system similar to Slashdot's meta-moderation. He writes "In The Net Delusion, Evgeny Morozov cites examples of online mobs that filed phony abuse complaints in order to shut down pro-democracy Facebook groups and YouTube videos criticizing the Saudi royal family. I've got an idea for an algorithm that would help solve the problem, and I'm offering $100 (or a donation to a charity of your choice) for the best suggested improvement, or alternative, or criticism of the idea proposed in this article." Hit the link below to read the rest of his thoughts.

Slashdot Top Deals