Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Submission + - City Council Candidate Censors Debate with DMCA (gvtexas.com) 4

claytongulick writes: I've become involved in a local city council election in Grapevine, Texas. Normally, these elections are pretty friendly affairs, but this one has turned nasty: one of the city council candidates has been using the DMCA to censor websites that are critical of her.

    The website "comecleankathleen.com" contained information and questions critical of the candidate Kathleen Thompson. The site contained public records information about the funding sources of Kathleen's campaign and questions about her background and organizational affiliation.

    In a chilling example of the censorship powers of the DMCA, this website was taken down only a week before the election. Kathleen's DMCA claims were clearly bogus (she claimed copyright on public records) but according to the DMCA, this doesn't matter — when a DMCA takedown notice is filed, the ISP removes the site, then has fourteen days to notify the owner of the website of the alleged infringment, whereupon the owner can file a counter-notice.

    The problem here, is that the DMCA is clearly being abused — and by the time a counter notice could be filed, the election will be over. The owner of the site has no recourse, and in this way any information that is damaging to a candidate can be censored until after the election.

    The only penalties, according to the DMCA section 512, for filing a fradulent notice are that the filer will have to pay the expense of putting the site back up (and attourney fees, if applicable). Well, in the case of a political election, the filers wouldn't even fight the counter-notice and would be happy to pay the penalty to restore the site — after the election has passed.

    Clearly, this was never the intended purpose of the DMCA — but what she has done doesn't appear to be in any way illegal.

    Is this the future of politics? Will political candidates be able to censor information on the web at any time using bogus copyright claims and the DMCA?

(Disclaimer: as I mentioned, I became involved with this election when I created a campaign site for a different candidate — not the one that was taken town)

Security

Submission + - When vuln disclosures are outlawed (theregister.co.uk)

doperative writes: 'Legal goons from Magix AG sent a nasty gram to a researcher who goes by "Acidgen" after he reported the stack buffer overflow in the company's Music Maker 16. According to the report, Acidgen alerted Magix representatives to the bug in several emails that also included proof-of-concept code that forced the Windows calculator to open, indicating the flaw could be exploited to execute malicious code on a victim's computer.

"They misunderstood that I was getting money for doing this ... and illegally breaking into networks" link

Comment: of course the vulnerability isn't in the application but in the underlying Operating System ...

Network

Submission + - US Senator Calls for DOJ Investigation of Sony PSN (ngohq.com)

An anonymous reader writes: US Senator Richard Blumenthal (D-CT) today called for the Department of Justice to investigate all aspects of the Sony PlayStation Network data breach, sending Attorney General Eric Holder a letter urging DOJ “to immediately open an investigation to track down and hold accountable those who have stolen sensitive personal information, and to examine any potential wrongdoing in Sony’s response to this matter.”
Space

Submission + - Space Telescope to track objects in GEO orbit (spacenews.com)

FullBandwidth writes: A while back we reported on the DARPA Space Surveillance Telescope, though loyal slashdotters were divided on exactly what astronomers would be looking for. DARPA now makes it clear that the telescope will "enable wide-field views of objects in geostationary orbit" in support of the Air Force mission of "tracking satellites and other objects in Earth orbit and reporting that information to U.S. Strategic Command."
Science

Submission + - Supercomputers Crack Sixty-Trillionth Binary Digit (energy.gov) 1

Dr.Who writes: According to http://blog.energy.gov/blog/2011/04/28/supercomputers-crack-sixty-trillionth-binary-digit-pi-squared, "a value of Pi to 40 digits would be more than enough to compute the circumference of the Milky Way galaxy to an error less than the size of a proton." The article goes on to cite use of computationally complex algorithms to detect errors in computer hardware.

The article references a blog http://experimentalmath.info/blog/2011/03/Pi-goes-on-forever/ which has more background.

Disclaimers: I attended graduate school at U.C. Berkley. I am presently employed by a software company that sells an infrastructure product named PI.

Iphone

Submission + - Apple Lied: Filed Patent for Mobile Device Trackin (infosecisland.com)

Nyder writes: Apple filed for a patent in September of 2009 titled "Location Histories for Location Aware Devices" with the intent to develop services based around the company's ability to locate and track mobile devices running the iOS operating system.

The abstract of the patent reads as follows:

"A location aware mobile device can include a baseband processor for communicating with one or more communication networks, such as a cellular network or WiFi network. In some implementations, the baseband processor can collect network information (e.g., transmitter IDs) over time. Upon request by a user or application, the network information can be translated to estimated position coordinates (e.g., latitude, longitude, altitude) of the location aware device for display on a map view or for other purposes. A user or application can query the location history database with a timestamp or other query to retrieve all or part of the location history for display in a map view."

The patent text goes on to outline how the tracking data could be accessed by applications, indicating Apple intends to build salable services around the collected data and allow third parties the ability to access it:

"A user or application can query the location history database with a timestamp or other query to retrieve all or part of the location history for display in a map view. In some implementations, the size and "freshness" of the location history database can be managed by eliminating duplicate entries in the database and/or removing older entries. The location history can be used to construct a travel timeline for the location aware device. The travel timeline can be displayed in a map view or used by location aware applications running on the location aware device or on a network. In some implementations, an Application Programming Interface (API) can be used by an application to query the location history database."

The patent application then goes on to describe how the location tracking data can include transmitter identifiers that correlate the data to a specific phone — which means a specific user — and how the data can be transmitted to network servers for processing:

"In some implementations, the network information can include transmitter identifiers (IDs). For example, Cell IDs can be tracked and recorded. The Cell IDs can be mapped to corresponding cell tower locations which can be used to provide estimated position coordinates of the location aware device. When a location history is requested by a user or application (e.g., through an API), the transmitter IDs can be translated to position coordinates of the location aware device which can be reverse geocoded to map locations for display on a map view or for other purposes. In other implementations, the network information can include WiFi scan data (e.g., access point IDs) which can be used to determine position coordinates of the location aware device, which can be reverse geocoded for display on a map view. In some implementations, the network information can be sent to a network server, which can translate the network information into position coordinates, which can be returned to the location aware device for processing by a location aware application."

Revelations of the patent application now confirm suspicions that Apple was quite aware of the storage of geolocation tracking data, that it was not merely a database of Wi-Fi locations, and the building of location histories on their customers was not due to a software glitch.

NASA

Submission + - NASA Satellite Shows Southern Tornadoes From Space (ibtimes.com)

gabbo529 writes: "NASA has gotten pretty good at using satellites to track natural disasters; and a tornado that twisted through the south was no different. Like it has done previously with earthquakes, hurricanes and tsunamis, a NASA satellite has captured a devastating natural disaster from a space satellite. An image acquired by the Moderate Resolution Imaging Spectroradiometer (MODIS) from NASA's Aqua satellite on April 28, distinctly shows three tornado tracks in Tuscaloosa, Ala."
Intel

Submission + - Silicon odometer might soon boost your CPU (extremetech.com)

An anonymous reader writes: Manufacturers like Intel and AMD criminally underclock their processors because they lack a way to accurately measure the aging of MOSFET transistors. A new silicon odometer, which uses a pair of ring oscillators to measure the "beat" of transistors, should enables on-die monitoring of transistor aging, and thus allows for much higher clock speeds.
Mozilla

Submission + - Mozilla patches Firefox 4, fixes coding bungle (computerworld.com)

CWmike writes: "Mozilla patched Firefox 4 for the first time on Thursday, fixing eight flaws, including a major programming oversight that left the browser as vulnerable to attack on Windows 7 as on the 10-year-old Windows XP.The company also plugged 15 holes in the still-supported Firefox 3.6, and issued its last security update for Firefox 3, which debuted in mid-2008. The most important of the bugs: a programming lapse that left Firefox 4 open to less-sophisticated attacks. 'The WebGLES libraries in the Windows version of Firefox were compiled without ASLR protection,' stated the advisory labeled MSFA 2011-17. 'An attacker who found an exploitable memory corruption flaw could then use these libraries to bypass ASLR on Windows Vista and Windows 7, making the flaw as exploitable on those platforms as it would be on Windows XP or other platforms.'"
Open Source

Submission + - If you're going to kill it, open source it! (makezine.com) 2

ptorrone writes: "MAKE Magzine is proposing big companies like Cisco and Sony consider "open sourcing" their failed or discontinued products. The list includes: Sony's AIBO & QRIO robots, IBM's Deep Blue chess computer, Ricochet Wireless, Potenco’s Pull-Cord Generator, Palm, Microsoft’s SPOT Watch, CISCO Flip Camera and more. MAKE is also encourage everyone to post about what products they'd like to see open sourced. What does the Slashdot community want opened up?"
Sony

Submission + - Sony PlayStation Network Breached, 77 Million User (cyberinsecure.com)

Runaway1956 writes: Sony is warning its millions of PlayStation Network users to watch out for identity-theft scams after hackers breached its security and plundered the user names, passwords, addresses, birth dates, and other information used to register accounts. Sony’s stunning admission came six days after the PlayStation Network was taken down following what the company described as an “external intrusion”.

The stolen information may also include payment-card data, purchase history, billing addresses, and security answers used to change passwords, Sony said on Tuesday. The company plans to keep the hacked system offline for the time being, and to restore services gradually. The advisory also applies to users of Sony’s related Qriocity network.

In short, Sony has been pwned — AGAIN!

AMD

Submission + - ARM To Keynote at AMD Fusion Developer Conference (hothardware.com)

MojoKid writes: "AMD is hosting its first AMD Fusion Developer Summit (AFDS) this summer, from June 13-16. The conference will focus on OpenCL and
upcoming AMD Llano performance capabilities under various related usage models. One interesting twist is that the keynote address will be given by Jem Davies, currently ARM's VP of technology. To date, AMD's efforts to push OpenCL as a programming environment have been limited, particularly compared to the work NV has sunk into CUDA. With its profit margins and sales figures improving, AMD is apparently turning back to address the situation—and ARM's a natural ally. The attraction of OpenCL is that it can potentially be used to improve handheld device performance. AMD's explicit mention of ARM hints that there might be more than meets the eye to this conference as well."

Submission + - Netflix Now Largest Media Provider in US (nytimes.com)

artor3 writes: Netflix now has more subscribers than any other video provider in the United States, with 22.8 million. Comcast, now in second place, also has approximately 22.8 million subscribers, but is expected to fall further behind as Netflix continues to add around a million members each month.

Given the rapid rise of online video streaming, and the fact that traditional distributors still control access to the medium, it is increasingly likely that companies like Comcast will fight back by limiting consumers' access.

Slashdot Top Deals

"More software projects have gone awry for lack of calendar time than for all other causes combined." -- Fred Brooks, Jr., _The Mythical Man Month_

Working...