Chrome

Former Firefox VP on What It's Like To Be Both a Partner of Google and a Competitor via Google Chrome (twitter.com) 68

Sidewalk Labs, the urban innovation arm of Google's parent company Alphabet, plans to build a $1 billion high-tech neighborhood in Toronto. The problem? It is facing an opposition from residents who have called for its demise. As the backlash gains momentum, it could force Sidewalk Labs to abandon or alter its vision. On paper, Sidewalk Labs' idea arguably has some merits: It wishes to "set new standards" for how cities are designed and built. But some are apprehensive of Google's plans, because the company has a knack for assuming more control over things and killing local competition.

Johnathan Nightingale, a former VP of Firefox, has seen such behavior first hand. He draws some parallels: I spent 8 years at Mozilla working on Firefox and for almost all of that time Google was our biggest partner. Our revenue share deal on search drove 90% of Mozilla's income. When I started at Mozilla in 2007, there was no Google Chrome and most folks we spoke with inside were Firefox fans. They were building an empire on the web, we were building the web itself. I think our friends inside Google genuinely believed that. At the individual level, their engineers cared about most of the same things we did. Their product and design folks made many decisions very similarly and we learned from watching each other.

But Google as a whole is very different than individual Googlers. Google Chrome ads started appearing next to Firefox search terms. Gmail and Google Docs started to experience selective performance issues and bugs on Firefox. Demo sites would falsely block Firefox as "incompatible." All of this is stuff you're allowed to do to compete, of course. But we were still a search partner, so we'd say "hey what gives?" And every time, they'd say, "oops. That was accidental. We'll fix it in the next push in 2 weeks." Over and over. Oops. Another accident. We'll fix it soon. We want the same things. We're on the same team. There were dozens of oopses. Hundreds maybe? I'm all for "don't attribute to malice what can be explained by incompetence" but I don't believe Google is that incompetent.

This is not a thread about blaming Google for Firefox troubles though. We at Mozilla wear that ourselves, me more than anyone for my time as Firefox VP. But I see the same play happening here in my city and I don't like it. And for me it means two things: The question is not whether individual Sidewalk Labs people have pure motives. I know some of them, just like I know plenty on the Chrome team. They're great people. But focus on the behavior of the organism as a whole. At the macro level, Google/Alphabet is very intentional. When Google wants to get a thing done, it is very effective. Mistakes happen, but when you see a sustained pattern of "oops" and delays from this organization -- you're being outfoxed. Get there faster than I did.

Television

Dragons, Nuclear Weapons, and Game of Thrones (thebulletin.org) 86

Slashdot reader Dan Drollette shared this article from the Bulletin of Atomic Scientists where a specialist in nuclear security analyzes Game of Thones, citing dragons "as living, fire-breathing metaphors for nuclear weapons." Despite the fantasy setting, the story teaches a great deal about the inherent dangers that come with managing these game-changing agents, their propensity for accidents, the relative benefits they grant their masters, and the strain these weapons impose upon those wielding them. "Dragons are the nuclear deterrent, and only [Daenerys Targaryen, one of the series' heroines] has them, which in some ways makes her the most powerful person in the world," George R. R. Martin said in 2011. "But is that sufficient? These are the kind of issues I'm trying to explore.

"The United States right now has the ability to destroy the world with our nuclear arsenal, but that doesn't mean we can achieve specific geopolitical goals. Power is more subtle than that. You can have the power to destroy, but it doesn't give you the power to reform, or improve, or build."

It makes for a bleak outlook. Or, as a character repeatedly warns in the first episode: "Winter is coming."

Television

China's 'Game of Thrones' Fans Try Torrents, VPNs For Uncensored Episodes (scmp.com) 47

"Winter is coming for fans of the hit television series Game of Thrones, with the final season set to hit screens around the world after a near two-year hiatus," reports the South China Morning Post. There were 96 million views for a discussion about the show on China's Twitter-like platform Weibo.

"But those watching inside China are also bracing for the chill of censorship." In recent years, Chinese authorities have ramped up the pressure on the television and film industries to clean up content they deem vulgar or politically incorrect. This has led to some serious censorship of foreign productions. Recent examples include the removal of scenes of smashed heads and bare flesh from the American superhero film Logan, and the apparent manipulation of a scene in Oscar-winner The Shape of Water so that a naked woman is made to appear to be wearing clothes...

In a bid to get around the censorship, many Chinese Game of Thrones fans have turned to virtual private networks and torrent download websites to access unexpurgated versions of their favourite episodes.

Tencent Video holds the exclusive distribution rights for the show in China, leaving one Weibo user to post "I'm begging Father Tencent not to censor too much, thank you."

Another added "This censored version is not interesting. I would pay money to watch the uncut version."
Politics

Are Silicon Valley Workers Abandoning Libertarianism For Socialism? (salon.com) 611

Salon writes that Silicon Valley tech workers are "defying their overlords," arguing that recent unionization attempts by Kickstarter employees may be only the beginning: The workers' Kickstarter campaign is not the first attempt, though, or even the first time rumblings of unionization, have circulated among programmers. In 2018, software engineers at the startup Lanetix announced their intent to unionize -- and were promptly fired by management (It is illegal to fire employees for trying to unionize). The National Labor Relations Board intervened, and ultimately forced Lanetix to pay the 15 fired engineers a total of $775,000. The show of worker power at Lanetix may have paved the way for Kickstarter's workers. Similarly, workers across the video game industry -- generally among the most overworked, underpaid workers within the tech industry -- have been making steps towards unionization. Game Workers Unite, profiled by Salon last year, is building a grassroots movement to organize the ranks of video game makers.

Together, this suggests that a small but visible movement for white-collar software engineers unionizing has been gaining steam in the Valley over the past few years -- suggesting that the people who make up the tech industry, once a bastion of libertarianism, are starting to understand the often subtle ways that their employers exploit them... For decades, libertarianism was part and parcel to the tech industry. Despite a grueling work culture and a high-profile collusion scandal among major tech corporations to suppress software engineers' wages, tech workers were more likely to see themselves as future founders than an exploited underclass -- a point of view encouraged by employers through high wages and generous, often absurd office perks. Recent developments suggest such endearing tactics are no longer working.

Security

Internet Explorer Exploit Steals Data From Windows Users-- Even If They Never Use Internet Explorer (mashable.com) 80

Security researcher John Page has revealed a new zero-day exploit that allows remote attackers to exfiltrate Local files using Internet Explorer. "The craziest part: Windows users don't ever even have to open the now-obsolete web browser for malicious actors to use the exploit," reports Mashable. "It just needs to exist on their computer..." [H]ackers are taking advantage of a vulnerability using .MHT files, which is the file format used by Internet Explorer for its web archives. Current web browsers do not use the .MHT format, so when a PC user attempts to access this file Windows opens IE by default. To initiate the exploit, a user simply needs to open an attachment received by email, messenger, or other file transfer service...

Most worrisome, according to Page, is that Microsoft told him that it would just "consider" a fix in a future update. The security researcher says he contacted Microsoft in March before now going public with the issue. As ZDNet points out, while Internet Explorer usage makes up less than 10 percent of the web browser market, it doesn't particularly matter in this case as the exploit just requires a user to have the browser on their PC.

Moon

Privately-Funded Moon Mission Will Try Again. 'Lunar Library' May Be On The Moon (space.com) 37

NASA administrator Jim Bridenstine has congratulated the team which sent the first privately-funded mission into lunar orbit -- even though it crashed into the surface of the moon. Its final photo was taken Thursday just 7.5 kilometers above the surface of the moon.

But Space.com reports that's not the end of the story: On Saturday Morris Kahn, the billionaire businessman, pilanthropist and SpaceIL president, confirmed that the SpaceIL team is meeting this weekend to begin planning the Beresheet 2.0 mission. "In light of all the support I've got from all over the world, and the wonderful messages of support and encouragement and excitement, I've decided that we're going to actually build a new halalit -- a new spacecraft," Kahn said in a video statement posted on Twitter by SpaceIL. "We're going to put it on the moon, and we're going to complete the mission."

The team behind Beresheet knew all along that the mission's design included risks. In order to keep the spacecraft small enough to piggyback with another spacecraft on a Falcon 9 rocket, the engineering team had to design the craft without any backup systems. Nevertheless, before its ultimate failure, the spacecraft withstood multiple glitches while in Earth orbit and during the early stages of landing.... NASA knows as well as anyone just how difficult spaceflight can be. The moon's surface is littered with dozens of expired spacecraft, and although many ended their missions smoothly, several made unplanned crash landings, including NASA's own Surveyor 2 and 4 missions during the 1960s.

Somewhere in the spacecraft's wreckage are 25 data disks backing up crucial human knowledge that were meant to last one billion years. The group behind the disk notes that "airplane black boxes survive stronger impacts, and our disc is less breakable... It was probably thrown a few kilometers away -- a 30 million page frisbee on the moon."

They're now assembling a team of crash experts, engineers, "and even a treasure hunter or two... to figure out what might remain, and then track it down." Their preliminary response from several experts: their Lunar Library "is definitely on the Moon, and it is also likely to be intact...."

"We have either installed the first library on the moon, or we installed the first archaeological ruins of early human attempts to build a library on the moon..."
Medicine

Fake Mouse On Twitter Mocks Overgeneralized Scientific Research (twitter.com) 91

DevNull127 writes: Research scientist James Heathers is a postdoctoral research associate working on bio-signals and meta-science research at Northeastern University, with a PhD from the University of Sydney. He's also pretending to be a mouse on Twitter. And every tweet consists of the exact same two words...

Heathers retweets articles about scientific studies — usually articles with glossy photos and enticing headlines like "Exercise during pregnancy protects children from obesity, study finds." His tweets add the two crucial missing words. "In mice."

In this case a doctoral student at Washington State University measured a specific protein's level in the offspring of mice that performed 60 minutes of moderate-intensity exercise every morning during pregnancy — and in regular mice. On the basis of that he recommended "that women — whether or not they are obese or have diabetes — exercise regularly during pregnancy because it benefits their children's metabolic health."

The name of the Twitter feed: JustSaysInMice.

Other mouse-based studies turning up on the Twitter feed:
  • How Fatty Diets Stop the Brain From Saying 'No' To Food
  • Reused Cooking Oil Ups Risk of Metastases In Breast Cancer Patients
  • Keto Diet Not Effective, Causes Blood Sugar Problems In Women
  • Growth Hormone Acts To Foil Weight Loss: Study

When you read those headlines, just remember to add those two words...

"In mice."


Facebook

Sunday-Morning Outage Strikes Facebook, Instagram, and WhatsApp (gizmodo.com) 64

"We were all free of Facebook's iron grip on the internet for a few hours," writes Gizmodo.

An anonymous reader quotes their report. Facebook and its subsidiaries Instagram and WhatsApp experienced widespread outages on Sunday for the second time in the past month (and the third time this year), with issues reported starting at around 6:30 a.m. ET and extending until around 9:00 a.m. ET. Per Bloomberg, Facebook and Instagram domains ceased to be accessible by users during that time period, while Messenger and WhatsApp were also non-functional... Users worldwide appeared to be impacted, with Bloomberg noting that Twitter users everywhere from the U.S. to Israel and Thailand were complaining about the outage.
Businesses

Scammers Are Buying Thousands Of Fake 5-Star Amazon Reviews -- on Facebook (thehustle.co) 156

Why are there so many five-star reviews for an iPhone charger on Amazon with a voltage irregularity that can cause permanent damage? "It's sad to imagine how many shoppers spotted this $13.99 charger pack on Amazon's first-page results and fell for the thousands of positive reviews and the algorithmically-generated endorsement from a platform that people trust more than religion," reports The Hustle.

A spot-check confirmed that "10 of the 22 first-page results on Amazon for 'iPhone charger' were products with thousands of 5-star reviews, all unverified and posted within a few days of each other," and they've now investigated "the underbelly of Amazon's fake-review economy" and "how such a product, peddled by a ragtag troupe of e-commerce scammers, managed to game one of the world's premier technology companies." The fake Amazon review economy is a thriving market, ripe with underground forums, "How To Game The Rankings!" tutorials, and websites with names like (now-defunct) "amazonverifiedreviews.com." But the favored hunting grounds for sellers on the prowl is Amazon's fellow tech behemoth, Facebook. In a recent two-week period, I identified more than 150 private Facebook groups where sellers openly exchange free products (and, in many cases, commissions) for 5-star reviews, sans disclosures. A sampling of 20 groups I analyzed collectively have more than 200,000 members. These groups seem to be in the midst of an online Gold Rush: Most are less than a year old, and in the past 30 days have attracted more than 50,000 new users... One stay-at-home mom from Kentucky told me she makes $200-300 per month leaving positive reviews for things like sleep masks, light bulbs, and AV cables...

Fake reviews have been an issue for Amazon since its inception, but the problem appears to have intensified in 2015, when Amazon.com began to court Chinese sellers. The decision has led to a flood of new products -- a 33% increase, by some accounts -- sold by hundreds of thousands of new sellers. Rooted in manufacturing hubs like Guangzhou and Shenzhen, they use Amazon's fulfillment program, FBA, to send large shipments of electronic goods directly to Amazon warehouses in the US. This rapid influx has spawned thousands of indistinguishable goods (chargers, cables, batteries, etc.). And it has prompted sellers to game the system. "It's a lot harder to sell on Amazon than it was 2 or 3 years ago," says Fahim Naim, an ex-Amazon manager who now runs an e-commerce consulting firm. "So a lot of sellers are trying to find shortcuts." Steve Lee, a Los Angeles-based vendor, is among them: "You have to play the game to sell now," he says. "And that game is cheating and breaking the law...."

The article points out that this is illegal. "Endorsements are required to be truthful," Mary Engel, Associate Director of the Federal Trade Commission's Division of Advertising Practices, tells the site. "If a reviewer has received something of value in exchange for their opinion, they need to clearly disclose that in the review." But instead, the review-watching site "ReviewMeta" analyzed 203 million Amazon reviews and found 11.3% (22.8 million) were untrustworthy -- while another site estimates the fake-review percentage is 30%. (Amazon's own estimate? "Less than 1%") ReviewMeta also spotted more than 2 million "unverified" reviews just in March of 2019 -- 99.6% of which were five-star. "They're almost all for these off-brand, cheap electronic products: Phone chargers, headphones, cables. Generic things that are super cheap to manufacture, have good margins, and get a ton of searches."

Though Amazon has sued over 1,000 fake-review sites to date, "Their way of handling it is reactive, not proactive," says the founder of ReviewMeta. "Amazon is a $900B company with thousands of brilliant engineers. I majored in construction management. It seems like they should be able to figure this one out."
Space

'BlackHoles@Home' Will Use Your PC For DIY Gravitational Wave Analysis (phys.org) 50

West Virginia University assistant professor Zachariah Etienne is launching "a global volunteer computing effort" analyzing gravitational waves from colliding black holes, reports Phys.org: "As our gravitational wave detectors become more sensitive, we're going to need to greatly expand our efforts to understand all of the information encoded in gravitational waves from colliding binary black holes," Etienne said. "We are turning to the general public to help with these efforts, which involve generating unprecedented numbers of self-consistent simulations of these extremely energetic collisions. This will truly be an inclusive effort, and we especially hope to inspire the next generation of scientists in this growing field of gravitational wave astrophysics."

His team -- and the scientific community in general -- needs computing capacity to run the simulations required to cover all possibilities related to the properties and other information contained in gravitational waves. "Each desktop computer will be able to perform a single simulation of colliding black holes," said Etienne. By seeking public involvement through use of vast numbers of personal desktop computers, Etienne and others hope to dramatically increase the throughput of the theoretical gravitational wave predictions needed to extract information from observations of the collisions.

Etienne and his team are building a website with downloadable software based on the same Berkeley Open Infrastructure for Network Computing, or BOINC, system used for the SETI@Home project and other scientific applications. The free middleware system is designed to help harness the processing power of thousands of personal computers across the globe. The West Virginia team has named their project BlackHoles@Home and expects to have it up and running later this year.

They have already established a website where the public can begin learning more about the effort.

Wireless Networking

Fifty 'Connected Cows' Already Have 5G (reuters.com) 85

A herd of dairy cows in the U.K. "are enjoying the benefits of 5G connectivity before you," reports Reuters: For the cows, among the 5G-connected gadgets they are wearing is a collar that controls a robotic milking system. When the cow feels ready to be milked it will approach machine gates that will automatically open. The device recognizes the individual to precisely latch on to its teats for milking, while the cow munches on a food reward. At the government-funded Agricultural Engineering Precision Innovation Centre (Agri-EPI Centre) in Shepton Mallet, in southwest England, around 50 of the 180-strong herd is fitted with the 5G smart collars and health-monitoring ear tags.
But -- why?! The Verge explains: According to Reuters, Cisco is testing infrastructure for the eventual global rollout of 5G that could be used by various industries that are not traditionally in the tech bubble but are still dependent on increasingly sophisticated hardware and software. That includes farming. In this case, Cisco is trying out 5G in three rural locations...

It makes a whole lot of sense when you think about it: farms are large and spread-out spaces, and cows are often shuffled between grazing grounds and areas of the farm where they can be more easily milked and checked on. With the 5G collars, Cisco says farmers can keep tabs on the animals at all times of the day without having to physically trek out to observe the cows up close... The future is wonderful and weird, and farmers have access to it before you and I because without them, we all starve.

"We can connect every cow, we can connect every animal on this farm," Cisco's Nick Chrissos told Reuters, in what may be the strangest boast a Cisco executive has ever uttered in public. "That's what 5G can do for farming -- really unleash the power that we have within this farm, everywhere around the UK and everywhere around the world."

Google

Overtime Complaints? China's JD.com Boss Criticizes 'Slackers' (reuters.com) 180

An anonymous reader quotes Reuters: Richard Liu, the founder of Chinese e-commerce giant JD.com Inc, has weighed in on an ongoing debate about the Chinese tech industry's grueling overtime work culture, lamenting that years of growth had increased the number of "slackers" in his firm who are not his "brothers...." Liu, who started the company that would become JD.com in 1998, in the note spoke about how in the firm's earliest days he would set his alarm clock to wake him up every two hours to ensure he could offer his customers 24-hour service -- a step he said was crucial to JD's success...

The '996' work schedule, which refers to a 9 a.m. to 9 p.m. workday, six days a week, has in particular become the target of online debate and protests on some coding platforms, where workers have swapped examples of excessive overtime demands at some firms. Liu said JD did not force its staff to work the "996" or even a "995" overtime schedule. "But every person must have the desire to push oneself to the limit!" he said.

JD disputed reports that the company would be cutting up to 8% of its workforce, but did say "We're getting back to those roots as we seek, develop and reward staff who share the same hunger and values... JD.com is a competitive workplace that rewards initiative and hard work, which is consistent with our entrepreneurial roots."

JD's investors include Walmart and Google.
Crime

Amazon Helps Cops Set Up Package Theft Sting Operations (vice.com) 135

An anonymous reader quotes Motherboard: In response to Amazon packages being stolen from people's doorsteps, police departments around the country have set up sting operations that use fake packages bugged with GPS trackers to find and arrest people who steal packages. Internal emails and documents obtained by Motherboard via a public records request show how Amazon and one police department partnered to set up one of these operations.

The documents obtained by Motherboard -- which include an operations plan and internal emails between Amazon and the Hayward, California Police Department -- show that Amazon's "national package theft team" made several calls to the Hayward Police Department and sent the department packages, tape, and stickers that allowed the department to set up a "porch pirate" operation in November and December of 2018... Several other cities around the country -- including Aurora, Colorado; Albuquerque, New Mexico; Jersey City, New Jersey; and Hayward, California -- have also conducted porch pirate sting operations aided by Amazon. Jersey City, New Jersey -- like Hayward, California -- put GPS-tracking devices inside the dummy packages. Aurora and Albuquerque, meanwhile, used doorbell cameras from Ring -- which is owned by Amazon -- to capture video footage and surveil for theft.

Stats

We're All Being Judged By a Secret 'Trustworthiness' Score (wsj.com) 135

schwit1 writes: Nearly everything we buy, how we buy, and where we're buying from is secretly fed into AI-powered verification services that help companies guard against credit-card and other forms of fraud, according to the Wall Street Journal.

More than 16,000 signals are analyzed by a service called Sift, which generates a "Sift score" ranging from 1 to 100. The score is used to flag devices, credit cards and accounts that a vendor may want to block based on a person or entity's overall "trustworthiness" score, according to a company spokeswoman.

From the Sift website: "Each time we get an event be it a page view or an API event we extract features related to those events and compute the Sift Score. These features are then weighed based on fraud we've seen both on your site and within our global network, and determine a user's Score. There are features that can negatively impact a Score as well as ones which have a positive impact."

The system is similar to a credit score except there's no way to find out your own Sift score.


Factors which contribute to one's Sift score (per the WSJ):
  • Is the account new?
  • Are there are a lot of digits at the end of an email address?
  • Is the transaction coming from an IP address that's unusual for your account?
  • Is the transaction coming from a region where there are a lot of hackers, such as China, Russia or Eastern Europe?
  • Is the transaction coming from an anonymization network?
  • Is the transaction happening at an odd time of day?
  • Has the credit card being used had chargebacks associated with it?
  • Is the browser different from what you typically use?
  • Is the device different from what you typically use?
  • Is the cadence of the way you typed out your password typical for you? (tracked by some advanced systems)

Microsoft

Microsoft Says Some Webmail Accounts Were Compromised (techcrunch.com) 23

A "limited" number of users of Microsoft's webmail services -- which include Hotmail, Outlook.com, and MSN -- "had their accounts compromised, TechCrunch reports. "We addressed this scheme, which affected a limited subset of consumer accounts, by disabling the compromised credentials and blocking the perpetrators' access," said a Microsoft spokesperson in an email. According to an email Microsoft has sent out to affected users, malicious hackers were potentially able to access an affected user's e-mail address, folder names, the subject lines of e-mails, and the names of other e-mail addresses the user communicates with -- "but not the content of any e-mails or attachments," nor -- it seems -- login credentials like passwords. Microsoft is still recommending that affected users change their passwords regardless.

The breach occurred between January 1 and March 28, Microsoft's letter to users said. The hackers got into the system by compromising a customer support agent's credentials, according to the letter. Once identified, those credentials were disabled. Microsoft told users that it didn't know what data was viewed by the hackers or why, but cautioned that users might as a result see more phishing or spam emails as a result.

Facebook

Facebook Shareholders Force A Vote On Ousting Mark Zuckerberg (businessinsider.com) 107

On May 30th, Facebook's shareholder's will vote on whether to remove Mark Zuckerberg as chairman of the board, reports Business Insider: Business Insider broke the news of the proposal in July last year after revealing the plans of activist shareholder Trillium Asset Management, which had grown tired of the "mishandling" of scandals including the Cambridge Analytica data breach. Responding to the proposal in the SEC filing, Facebook called on investors to vote it down. "We believe our board of directors is functioning effectively under its current structure, and that the current structure provides appropriate oversight protections," Facebook said...

The chance of it becoming a reality is extremely slim, despite it being backed by investors that control around $3 billion of Facebook stock. A similar proposal in 2017 was popular among independent investors but was crushed because of Zuckerberg's voting power. This is because of Facebook's dual-class share structure. Class B shares have 10 times the voting power of class A shares, and it just so happens that Zuckerberg owns more than 75% of class B stock. It means he has more than half of the voting power at Facebook....

Facebook will almost certainly get its way. But the two investor proposals mark continued dissatisfaction among shareholders about the way Facebook is run following a year from hell for the company. It also shows that investors continue to believe that Zuckerberg has too much power.

Cellphones

Police Are Using Google's Location Data From 'Hundreds of Millions' of Phones (cnet.com) 125

"When law enforcement investigations get cold, there's a source authorities can turn to for location data that could produce new leads: Google."

An anonymous reader quotes CNET: Police have used information from the search giant's Sensorvault database to aid in criminal cases across the country, according to a report Saturday by The New York Times. The database has detailed location records from hundreds of millions of phones around the world, the report said. It's meant to collect information on the users of Google's products so the company can better target them with ads, and see how effective those ads are. But police have been tapping into the database to help find missing pieces in investigations.

Law enforcement can get "geofence" warrants seeking location data. Those kinds of requests have spiked in the last six months, and the company has received as many as 180 requests in one week, according to the report.... For geofence warrants, police carve out a specific area and time period, and Google can gather information from Sensorvault about the devices that were present during that window, according to the report. The information is anonymous, but police can analyze it and narrow it down to a few devices they think might be relevant to the investigation. Then Google reveals those users' names and other data, according to the Times...

[T]he AP reported last year that Google tracked people's location even after they'd turned off location-sharing on their phones.

Google's data dates back "nearly a decade," the Times reports -- though in a statement, Google's director of law enforcement and information security insisted "We vigorously protect the privacy of our users while supporting the important work of law enforcement." (The Times also interviewed a man who was arrested and jailed for a week last year based partly on Google's data -- before eventually being released after the police found a more likely suspect.)

"According to the Times, Google is the primary company that appears to be fulfilling the warrants," reports Gizmodo, adding that Apple "says it can't provide this information to authorities..."

"A thriving black market in location data has persisted despite promises from carriers to stop selling it to middlemen, who divert it from intended uses in marketing and other services."

Slashdot Top Deals