Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Submission + - 'SPURV' project brings windowed Android apps to desktop Linux (androidpolice.com)

mfilion writes: New experimental containerized Android environment allows Android apps to run in floating windows alongside native applications on desktop Linux. "You can read all the technical details at the source link, but put simply, 'SPURV' creates a virtual Android device on your Linux computer, much like Bluestacks and other similar tools. There are various components of SPURV that allow the Android environment to play audio, connect to networks, and display hardware-accelerated graphics through the underlying Linux system."

Submission + - Google Will Require Temp Workers Receive $15 Minimum Wage, Parental Leave (theverge.com) 1

An anonymous reader writes: Google said today that it would require its extended, non-employee workforce in the United States receive comprehensive health care coverage, a $15 minimum wage, and 12 weeks of parental leave. The move follows protests from employees and other workers at Google who have pushed the company to offer more benefits. Google relies on a massive staff of temporary, vendor, and contract workers, many of whom are supplied by third parties and aren’t offered the same benefits as full Google employees. The disparity has led to calls for better conditions for the workers. Today, The Guardian reported that more than 900 employees have signed a letter supporting temporary workers whose contracts for work on Google Assistant were shortened.

In a statement announcing the changes, Google said it would require companies that provide temporary and vendor staff to offer health care benefits, including mental health, pediatric, oral, and dental services, as well as a minimum of eight paid days of sick leave. Workforce providers will also be required to pay workers at least $15 per hour and offer $5,000 per year in tuition reimbursement. The wage requirements will go into effect at the end of the year, Google said, and the health care requirements will start before 2022. The Tech Workers Coalition, which has organized tech industry workers, criticized that timeline. “Changes announced today apply to no one working right now—but workers can’t wait years to pay rent, see doctors and care for their families,” the organization said in a tweet.

Submission + - Google Helps Government Conduct Warrantless Searches, Alleges EPIC (tomshardware.com)

schwit1 writes: The Electronic Privacy Information Center (“EPIC”), a civil liberties group based in Washington D.C., filed an amicus brief in the United States vs. Wilson case concerning Google scanning billions of users’ files for unlawful content and then sending that information to law enforcement agencies.

EPIC alleges that law enforcement is using Google, a private entity, to bypass the Fourth Amendment, which requires due process and probable cause before “searching or seizing” someone’s property.

As a private entity, Google doesn’t have to abide by the Fourth Amendment as the government has to, so it can do those mass searches on its behalf and then give the government the results. The U.S. government has been increasingly using this strategy to bypass Fourth Amendment protections of U.S. citizens and to expand its warrantless surveillance operations further.

Google and a few other companies have “voluntarily” agreed to use a database of images hashes from the National Center for Missing and Exploited Children (NCMEC) to help the agency find exploited children.

More than that, the companies would also give any information they have on the people who owned those images, given they are users of said companies’ services and have shared the images through those services.

Submission + - Can Switzerland become a safe haven for the world's data?

An anonymous reader writes: As United States and European Union regulators debate a sweeping new data-privacy agreement, Switzerland is presenting itself as a viable neutral location for storing the world’s data thanks to strict privacy laws and ideal infrastructure. The Swiss constitution guarantees data privacy under Article 13. The country’s laws protecting privacy are similar to those enacted by the E.U. Swiss data protections are also, in some cases, much stricter than those of the E.U., according to Nicola Benz, attorney at Swiss law firm Froriep. And since Switzerland is not part of the E.U., data stored there remains outside the reach of the union’s authorities. “Swiss law contains things that we call blocking statutes,” Benz said, “which mean that foreign authorities can’t conduct their authority’s functions on Swiss soil unless they follow the proper judicial channels.” The country’s tight privacy laws could make the small nation more attractive to privacy-focused start-ups. And it already has that momentum. After the former NSA contractor Edward Snowden 2013 revelations about the National Security Agency’s secret surveillance activities, Switzerland witnessed something of a boom in its data-center business. Phil Zimmermann, creator of the popular PGP encryption protocol and founder of Silent Circle, even left the U.S. for Switzerland last year, citing the overreach of American authorities.

Submission + - Stephen Fry Urges Young To Flee 'Dystopian' Social Networks

An anonymous reader writes: Technology evangelist and Twitter phenomenon Stephen Fry has urged his fans to abandon social networks, comparing them to the 'dystopian' forms of government seen in 1970s sci-fi films such as Logan's Run and Soylent Green. In the 2600+ word essay, the comedian, who had over four million Twitter followers prior to deleting his account in February, also compares the current state of the internet unfavourably to its pioneer days and compares the surveilled conformity of social media to the unreal state of society depicted in The Matrix:

'Who most wants you to stay on the grid? The advertisers. Your boss. Human Resources. The advertisers. Your parents (irony of ironies – once they distrusted it, now they need to tag you electronically, share your Facebook photos and message you to death). The advertisers. The government. Your local authority. Your school. Advertisers.. Well, if you’re young and have an ounce of pride, doesn’t that list say it all?'

Submission + - FBI Accuses Researcher of Hacking Plane, Seizes Equipment (securityledger.com)

chicksdaddy writes: The Feds are listening and they really can't take a joke. That's the apparent moral of security researcher Chris Roberts' legal odyssey on Wednesday, which saw him escorted off a plane in Syracuse by two FBI agents and questioned for four hours over a humorous tweet Roberts posted about his ability to hack into the cabin control systems of the Boeing 737 he was flying.(https://twitter.com/Sidragon1/status/588433855184375808) Roberts (aka @sidragon1), joked that he could "start playing with EICAS messages," a reference to the Engine Indicating and Crew Alerting System (http://en.wikipedia.org/wiki/Engine-indicating_and_crew-alerting_system).

Roberts was traveling to Syracuse to give a presentation. He said local law enforcement and FBI agents boarded the plane on the tarmac and escorted him off. He was questioned for four hours, with officers alleging they had evidence he had tampered with in-flight systems on an earlier leg of his flight from Colorado to Chicago.

In an interview with The Security Ledger (https://securityledger.com/2015/04/hacker-on-a-plane-fbi-seizes-researchers-gear/), Roberts said the agents questioned him about his tweet and whether he tampered with the systems on the United flight -something he denies doing.

Roberts had been approached earlier by the Denver office of the FBI which warned him away from further research on airplanes. The FBI was also looking to approach airplane makers Boeing and Airbus and wanted him to rebuild a virtualized environment he built to test airplane vulnerabilities to verify what he was saying.

Roberts refused, and the FBI seized his encrypted laptop and storage devices and has yet to return them, he said. The agents said they wished to do a forensic analysis of his laptop. Roberts said he declined to provide that information and requested a warrant to search his equipment. As of Friday, Roberts said he has not received a warrant.

Submission + - Google Announces "End-To-End" Encryption Extension for Chrome

Nexus Unplugged writes: On their security blog today, Google announced a new Chrome extension called "End-To-End" intended to make browser-based encryption of messages easier for users. The extension, which was rumored to be "underway" a couple months ago, is currently in an "alpha" version and is not yet available pre-packaged or in the Chrome Web Store. It utilizes a Javascript implementation of OpenPGP, meaning that your private keys are never sent to Google. However, if you'd like to use the extension on multiple machines, its keyring is saved in localStorage, which can be encrypted with a passphrase before being synced. The extension still qualifies for Google's Vulnerability Reward Program, and joins a host of PGP-related extensions already available for Chrome.

Submission + - SPAM: Try Out Chrome OS In a Virtual Machine

itwbennett writes: Some very generous Alpha OS geeks have snagged the Chrome OS source code and compiled a version to share with the rest of us, writes blogger Peter Smith. 'The build comes in the form of a virtual machine, when means you'll need VMWare or VirtualBox running, and of course the image of Chrome OS itself. The folks at gdgt are distributing the latter and they've set up a page with all the links you'll need. You'll need to create a gdgt account if you don't have one yet. The Chrome OS image is only a bit over 300 megs so it's a fast download. If you need a little more handholding, TechCrunch has a step-by-step guide to getting Chrome OS installed and running using VirtualBox and a Chrome OS torrent they link to.'
Link to Original Source
Privacy

Submission + - Which ISPs Are Spying on You? (wired.com)

firesquirt writes: In an article from WIRED http://www.wired.com/politics/onlinerights/news/20 07/05/isp_privacy The few souls that attempt to read and understand website privacy policies know they are almost universally unintelligible and shot through with clever loopholes. But one of the most important policies to know is your internet service provider's — the company that ferries all your traffic to and from the internet, from search queries to BitTorrent uploads, flirty IMs to porn.
User Journal

Journal Journal: Predictions of Doom 2

There was a time they trained us to "Duck And Cover" to protect
ourselves from nuclear attack. (helpful I am sure)
Then we were told of the coming food riots.
Then of the coming Ice Age.
Next we were told to fear the hole in the ozone.
Don't forget the dire warnings of the breakdown in society due to Y2K.
We were told how to seal our houses, to protect against terrorist biological attack.

Now we are to fear GLOBAL WARMING.
Music

College Demands RIAA Pay Up For Wasting Its Time 261

An anonymous reader writes "We've already seen the University of Wisconsin tell the RIAA to go away, but the University of Nebaska has gone one step further: it's asking the RIAA to pay up for wasting its time with the silly demand to push students into paying up. The spokesperson for the University also notes that since they constantly rotate IP addresses and have no need to hang onto that information for very long, they simply cannot help the RIAA. They have no clue who was attached to which IP address at the time the RIAA is complaining about."
Censorship

Judge Strikes Down COPA, 1998 Online Porn Law 348

Begopa sends in word that a federal judge has struck down the Child Online Protection Act. The judge said that parents can protect their children through software filters and other less restrictive means that do not limit others' rights to free speech. This was the case for which the US Department of Justice subpoenaed several search companies for search records; only Google fought the order. The case has already been to the Supreme Court. Senior U.S. District Judge Lowell Reed Jr. wrote in his decision: "Perhaps we do the minors of this country harm if First Amendment protections, which they will with age inherit fully, are chipped away in the name of their protection."
The Internet

Web Censorship on the Increase 132

mid-devonian writes "Close on the heels of the temporary blocking of YouTube by a Turkish judge, a group of academics has published research showing that Web censorship is on the increase worldwide. As many as two dozen countries are blocking content using a variety of techniques. Distressingly, the most censor-heavy countries (which includes China, Iran, Saudi Arabia, Tunisia, Burma and Uzbekistan) seem to be passing on their technologically sophisticated techniques to other areas of the world. 'New censorship techniques include the periodic barring of complete applications, such as China's block on Wikipedia or Pakistan's ban on Google's blogging service, and the use of more advanced technologies such as 'keyword filtering', which is used to track down material by identifying sensitive words.'"

Slashdot Top Deals

Some people manage by the book, even though they don't know who wrote the book or even what book.

Working...