Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Privacy

EFF Launches Surveillance Self-Defense Site 94

justin.foell writes "The Electronic Frontier Foundation (EFF) has created a Surveillance Self-Defense site. Created with the help of the Open Society Institute, the site intends to serve as a how-to guide for protecting your private data against government spying. From their press release, they 'aim to educate Americans about the law and technology of communications surveillance and computer searches and seizures, and to provide the information and tools necessary to keep their private data out of the government's hands.'"
Privacy

Should Job Seekers Tell Employers To Quit Snooping? 681

onehitwonder writes in with a CIO opinion piece arguing that potential employees need to stand up to employers who snoop the Web for insights into their after-work activities, often disqualifying them as a result. "Employers are increasingly trolling the web for information about prospective employees that they can use in their hiring decisions. Consequently, career experts advise job seekers to not post any photos, opinions or information on blogs and social networking websites (like Slashdot) that a potential employer might find remotely off-putting. Instead of cautioning job seekers to censor their activity online, we job seekers and defenders of our civil liberties should tell employers to stop snooping and to stop judging our behavior outside of work, writes CIO.com Senior Online Editor Meridith Levinson. By basing professional hiring decisions on candidates' personal lives and beliefs, employers are effectively legislating people's behavior, and they're creating an online environment where people can't express their true beliefs, state their unvarnished opinions, be themselves, and that runs contrary to the free, communal ethos of the Web. Employers that exploit the Web to snoop into and judge people's personal lives infringe on everyone's privacy, and their actions verge on discrimination."
Government

Diebold Election Audit Logs Defective 256

mtrachtenberg writes "Premier Election Solutions' (formerly Diebold) GEMS 1.18.19 election software audit logs don't record the deletion of ballots, don't always record correct dates, and can be deleted by the operator, either accidentally or intentionally. The California Secretary of State's office has just released a report about the situation (PDF) in the November 2008 election in Humboldt County, California (which we discussed at the time). Here's the California Secretary of State's links page on Diebold. The conclusion of the 13-page report reads: 'GEMS version 1.18.19 contains a serious software error that caused the omission of 197 ballots from the official results (which was subsequently corrected) in the November 4, 2008, General Election in Humboldt County. The potential for this error to corrupt election results is confined to jurisdictions that tally ballots using the GEMS Central Count Server. Key audit trail logs in GEMS version 1.18.19 do not record important operator interventions such as deletion of decks of ballots, assign inaccurate date and time stamps to events that are recorded, and can be deleted by the operator. The number of votes erroneously deleted from the election results reported by GEMS in this case greatly exceeds the maximum allowable error rate established by HAVA. In addition, each of the foregoing defects appears to violate the 1990 Voting System Standards to an extent that would have warranted failure of the GEMS version 1.18.19 system had they been detected and reported by the Independent Testing Authority that tested the system.'"
Government

German Court Bans E-Voting As Currently Employed 82

Kleiba writes "The highest German Court (Bundesverfassungsgericht, Federal Constitutional Court) ruled that electronic voting machines like Nedap ESD1 and ESD2 are not permissible in Germany. Der Spiegel, a well-known German newspaper, is featuring article on today's decision (in German; Babelfish translation here) which was the result of a lawsuit by physicist Ulrich Wiesner and his father Joachim Wiesner, a professor emeritus of political science. The main argument against the voting machines in the eyes of the Court is that they conflict with the principle of transparency. 2009 is a major election year for Germany, with parliamentary elections in the fall." Reader Dr. Hok writes "Voting machines are not illegal per se, but with these machines it wasn't possible to verify the results after the votes were cast. The verification procedure by the German authorities was flawed, too: only specimens were tested, not the machines actually used in the elections, and the detailed results (including the source code) were not made public. The results of the election remain legally valid, though."
Games

Does a Game Have To Fail To Get a Real Ending? 178

After the closure of Tabula Rasa over the weekend, the Opposable Thumbs blog asks if that's what it takes for a game to have an actual ending these days. Quoting: "It's no surprise that most games hope for a sequel, as it's the easiest way to get some of that money back while taking advantage of the staff, engine, assets, and other advantages you've banked while creating the first title. The problem? This has lead to a generation of cliff-hangers at worst, and endings that hedge their bets at best. ... As all the game's characters die, as the servers are shut down, as the data is erased or backed up and then boxed or whatever happens to MMO data once the game is done, it's hard not to be a little sad. The sights and sounds of the world of Tabula Rasa are gone, forever. All the memories written into those ones and zeroes will quickly be forgotten, and no one will walk those grounds again." Massively put together a few screenshots and videos to commemorate the ending of the game.
Privacy

Bill Would Require ISPs, Wi-Fi Users To Keep Logs 857

suraj.sun notes CNet reporting on bills filed in the US House and Senate that would require all ISPs and operators of Wi-Fi hotspots — including home users — to maintain access logs for 2 years to aid in law enforcement. The bills were filed by Republicans, but the article notes that the idea of forcing data retention has been popular on both sides of the aisle over the years. "Republican politicians on Thursday called for a sweeping new federal law that... would impose unprecedented data retention requirements on a broad swath of Internet access providers and is certain to draw fire from businesses and privacy advocates. ... Each [bill] contains the same language: 'A provider of an electronic communication service or remote computing service shall retain for a period of at least two years all records or other information pertaining to the identity of a user of a temporarily assigned network address the service assigns to that user [i.e., DHCP].'"
Science

Human Eye Could Detect Spooky Action At a Distance 255

KentuckyFC writes "The human eye is a good photon detector--it's sensitive enough to spot photons in handfuls. So what if you swapped a standard photon detector with a human eye in the ongoing experiments to measure spooky-action-at-a-distance? (That's the ability of entangled photons to influence each other, no matter how far apart they might be.) A team of physicists in Switzerland have worked out the details and say that in principle there is no reason why human eyes couldn't do this kind of experiment. That would be cool because it would ensure that the two human observers involved in the test would become entangled, albeit for a short period time. The team, led by Nic Gisin, a world leader on entanglement, says it is actively pursuing this goal (abstract) so we could have the first humans to experience entanglement within months."
Google

Obama Anti-Trust Chief on Google the Monopoly Threat 364

CWmike writes "The blogosphere regularly excoriates Microsoft for being a monopoly, but Google may be in the cross-hairs of the nation's next anti-trust chief for monopolistic behavior, writes Preston Gralla. Last June, Christine A. Varney, President Obama's nominee to be the next antitrust chief, warned that Google already had a monopoly in online advertising. 'For me, Microsoft is so last century. They are not the problem,' Varney said at a June 19 panel discussion sponsored by the American Antitrust Institute, according to a Bloomberg report. The US economy will 'continually see a problem — potentially with Google' because it already 'has acquired a monopoly in Internet online advertising.' Varney has yet to be confirmed as antitrust chief, and she said all this before she was nominated. Still, it spells potentially bad news for Google. It may be time for the company to start adding to its legal staff."
Businesses

Restauranteurs Say Yelp Uses Extortion To Ply Ad Sales 202

Readers Mike Van Pelt and EricThegreen point out a story in the East Bay Express alleging that online restaurant review site Yelp is doing more than providing a nice interface for foodies to share their impressions of restaurants. Instead, says the article, representatives from the site have called restaurants in the Bay area to solicit advertising, but with an interesting twist: the ad sales reps let restaurant owners know that, if they buy advertising at around $300 a month, Yelp can "do something" about prominently displayed negative reviews of their restaurants. If the claims are true, it sure lowers my opinion of Yelp, which I'd thought of as one of the good guys (and a useful site). I wonder how many other online review sites might be doing something similar.
The Internet

Bittorrent To Cause Internet Meltdown 872

Gimble writes "Richard Bennett has an article at the Register claiming that a recent uTorrent decision to use UDP for file transfers to avoid ISP 'traffic management' restrictions will cause a meltdown of the internet reducing everybody's bandwidth to a quarter of their current value. Other folks have also expressed concern that this may not be the best thing for the internet."
Hardware Hacking

From "Happy Hacking" to "Screw You" 243

tquid writes "Trying to bridge the digital divide in Canada's poorest postal code, a principled group of hackers adopt "open source"-based technology spun off from an MIT project. Then the terms on the hardware are changed, and changed again, and then firmware to lock out the frustrated group's software is installed, screwing them out of their investment and many hours of development work."
It's funny.  Laugh.

Nuclear Scanning Catches a Radioactive Cat On I-5 594

Jeff recommends Seattle Times columnist Danny Westneat's story from a community meeting with Northwest border control agents. Seems their monitoring for dirty bombs from the median of Interstate 5 caught a car transporting a radioactive cat. "It turns out the feds have been monitoring Interstate 5 for nuclear 'dirty bombs.' They do it with radiation detectors so sensitive it led to the following incident. 'Vehicle goes by at 70 miles per hour... Agent is in the median, a good 80 feet away from the traffic. Signal went off and identified an isotope [in the passing car]. The agent raced after the car, pulling it over not far from the monitoring spot.' Did he find a nuke? 'Turned out to be a cat with cancer that had undergone a radiological treatment three days earlier.'"
Google

A New Tool From Google Worries Brand-Name Sites 168

Google has quietly introduced a new feature, called search-within-search, that is alarming some big-name Web publishers and retailers. They worry that users will be siphoned away through ad sales to competitors. What Google is doing is offering a secondary search option if the user initially searches explicitly for one of the brand-name destinations that Google has identified, such as "Best Buy." This secondary search lets users refine their query entirely within the pages of the desired site — but using Google's search, not the site's, and showing Google ads on the result pages, quite possibly ads from competitors. "Analysts generally praise the feature as helping users save steps, but for Web publishers and retailers, there are trade-offs... 'Google is showing a level of aggressiveness with this that's just not needed,' said [one Internet consultant]... Take, for instance, a [test where] users of Google searched The Washington Post and were given a secondary search box. Those who typed 'jobs' into that second box saw related results for The Post's employment pages, but the results were bordered by ads for competing employment sites like CareerBuilder or Monster.com. So even though users began the process by stating their intention to reach The Post, Google's ads steered at least some of them to competitors. Similar situations arose when users relied on Google to search nytimes.com."
Security

Submission + - Cambridge researchers break chip-and-pin... again (lightbluetouchpaper.org)

An anonymous reader writes: Now-infamous University of Cambridge security researchers Ross Anderson, Saar Drimer, and Steven Murdoch, who last year showed us Tetris on a payment terminal, have now shown how a paperclip can be used to bypass the UK banks' snake-oil "tamper-resistance" in their paper at the IEEE Security and Privacy conference. Why does this matter? Because the banks were sticking their customers with the bills when cloned cards were used, since the system was supposed to be invulnerable. Despite the banks' claims, the devices weren't even certified! The BBC featured the attack on the news last night. Hopefully this will lead to thousands of customers getting their money back.

Slashdot Top Deals

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...