snydeq writes "InfoWorld's Serdar Yegulalp takes an in-depth look at six Chromium-based spinoffs that bring privacy, security, social networking, and other interesting twists to Google's Chrome browser. 'When is it worth ditching Chrome for a Chromium-based remix? Some of the spinoffs are little better than novelties. Some have good ideas implemented in an iffy way. But a few point toward some genuinely new directions for both Chrome and other browsers.'"
BLACK FRIDAY DEAL: Trust the World's Fastest VPN with Your Internet Security & Freedom--A Lifetime Subscription of PureVPN at $48 with coupon code "BFRIDAY20" ×
pbahra writes in with the story of Khaled el Mufti, the network-security engineer who was in charge of providing telecommunications for the Libyan revolution. "It isn't often you get the chance to meet a real revolutionary. It is a term cheapened by misuse, but Khaled el Mufti is a revolutionary. It is no exaggeration to say that the role he played in the Libyan uprising last year was crucial; had he and his telecoms team failed, it isn't hard to think that Col. Muammar Gadhafi might still be in power. Today, Mr. Mufti is a telecoms adviser to the interim government and heads the e-Libya initiative, a bold plan to use the transformative powers of technology to modernize the Libyan state, overturning 40 years of corruption and misrule under Gadhafi. Mr. Mufti is an unlikely revolutionary, a softly spoken network-security engineer with a degree from Imperial College in London. Almost by chance he was in his native Libya when the revolution took place, working on a project with BT in the capital, Tripoli."
Hugh Pickens writes "Google's autonomous cars have demonstrated that self-driving vehicles are now largely workable and could greatly limit human error, but questions of legal liability, privacy and insurance regulation have yet to be addressed. Simple questions, like whether the police should have the right to pull over autonomous vehicles, have yet to be answered and legal scholars and government officials warn that society has only begun wrestling with laws required for autonomous vehicles. The big question remains legal liability for the designers and manufacturers as some point out that liability exemptions have been mandated for vaccines, which are believed to offer great value for the general health of the population, despite some risks. 'Why would you even put money into developing it?' says Gary E. Marchant, director of the Center for Law, Science and Innovation at the Arizona State University law school. 'I see this as a huge barrier to this technology unless there are some policy ways around it.' Congress could consider creating a comprehensive regulatory regime to govern the use of these technologies say researchers at the Rand Corporation adding that while federal preemption has important disadvantages, it might speed the development and utilization of these technologies (PDF) and should be considered, if accompanied by a comprehensive federal regulatory regime. 'This may minimize the number of inconsistent legal regimes that manufacturers face and simplify and speed the introduction of these technologies.'"
First time accepted submitter pscottdv writes "This year the artists formerly known as Palm had quite a rough few months with HP dumping the hardware side of their own webOS mobile computing platform – their most recent move, having been announced just last month, is live today: open sourced webOS for all. While the actual main product which will be known as Open webOS 1.0 will not be released until September, they've already got the Enyo piece of the pie available today."
First time accepted submitter AbilityLiving writes "Two high schoolers have launched a Lego Man to 80,000 feet — three times the height of a jet — in a homebrew project that involved a few Ebay-purchased cameras, a giant helium balloon and a star-ship full of ingenuity."
angry tapir writes "Linux vendors are rushing to patch a privilege escalation vulnerability in the Linux kernel that can be exploited by local attackers to gain root access on the system. The vulnerability, which is identified as CVE-2012-0056, was discovered by Jüri Aedla and is caused by a failure of the Linux kernel to properly restrict access to the '/proc//mem' file."
brothke writes "In the classic poem Inferno, Dante passes through the gates of Hell, which has the inscription abandon all hope, ye who enter here above the entrance. After reading The Tangled Web: A Guide to Securing Modern Web Applications, one gets the feeling the writing secure web code is akin to Dante's experience." Read below for Ben's review.
pigrabbitbear writes "Remember your first visit to the planetarium? Neil DeGrasse Tyson does — it was what inspired him to become an astrophysicist in the first place. That same planetarium, now under Tyson's direction, is currently undergoing a transformation the likes of which Neil's young self couldn't have possibly imagined: It's becoming a giant videogame."
bs0d3 writes "The music industry is seeking over a dozen changes to Canadian anti-piracy bill C-11, including website blocking, Internet termination for alleged repeat infringers, and an expansion of the "enabler" provision that is supposedly designed to target pirate sites. Meanwhile, the Entertainment Software Association of Canada also wants an expansion of the enabler provision along with further tightening of the already-restrictive digital lock rules. It's concerning that some of these expansions will create a risky situation for legitimate websites, as SOPA did in the U.S. Michael Geist outlines the legal history and complications here."
An anonymous reader writes "A guy who goes by the online handle DDRBoxman decided it would be fun to blow up his Samsung Galaxy Nexus display onto the wall by connecting his phone to a projector. He then connected the whole thing to a PC and, thanks to Microsoft's open-source Kinect platform for Windows, he was able to create a custom ROM that mapped out the phone interface to the Kinect sensors. Pretty neat!"
coondoggie writes "The impact of social media such as Twitter, Facebook and Google+ and others on federal juries is a concern that judges are frequently taking steps to curb. According to a study 94% of the 508 federal judges who responded said they have specifically barred jurors from any case-connected use of social media."
kkleiner writes "You think European cars are small now, wait till the Hiriko takes to the roads in Spain's northern Basque country. The two-seater is about the size of a SmartCar, but when parked, the car can actually fold. After folding, the car takes up about a third of a normal parking space. The Hiriko, Basque for 'urban car,' folds as the rear of the car slides underneath its chassis. Every square foot counts."
gManZboy writes "If a ballot was lost in the cloud, would anyone know? Several states are using an online balloting website based on Microsoft's Azure cloud-computing platform to allow U.S. voters living overseas to cast their votes via the Web in 2012 primary elections. In addition to a now complete Florida primary, Virginia and California will use the system for their primaries, and Washington state will use it for its caucus. To ensure the ballots are from legitimate voters, people use unique identifying information to access their ballots online, according to Microsoft. Once received, the signature on the ballot is matched with registration records to further verify identity."