Forgot your password?
typodupeerror
Censorship

Submission + - Google Reveals 'Terrorism Video' Removals

jones_supa writes: Google has revealed it removed about 640 videos from YouTube that allegedly promoted terrorism over the second half of 2011 after complaints from the UK's Association of Chief Police Officers. The news was contained in its latest Transparency Report which discloses requests by international authorities to remove or hand over material. YouTube had also rejected many other state's requests for action. Overall, Google summed it had received 461 court orders covering a total of 6,989 items between July and December 2011. From those, it said 68% of the orders were complied with. Google added that it had received a further 546 informal requests covering 4,925 items, of which it had agreed to 43% of the cases. The BBC article lists some examples of videos that were either terminated or allowed to stay.
Censorship

Submission + - China tries to get the UN to censor the net (wsj.com) 1

Omnifarious writes: "China (along with other member nations) is trying to push a proposal through a little known UN agency called the International Telecommunications Union (aka ITU). This proposal contains a wide variety of problematic provisions that represent a huge power grab on the part of the UN, and a severe threat to a continued global and open Internet."
Firefox

Submission + - SPDY Not as Speedy as Thought? (guypo.com)

Freshly Exhumed writes: Akamai's Guy Podjarny reveals after testing: SPDY is different than HTTP in many ways, but its primary value comes from being able to multiplex many requests/responses from client to server over a single (or few) TCP connections.

Previous benchmarks tout great benefits, ranging from making pages load 2x faster to making mobile sites 23% faster using SPDY and HTTPS than over clear HTTP. However, when testing real world sites I did not see any such gains. In fact, my tests showed SPDY is only marginally faster than HTTPS and is slower than HTTP.

Security

Submission + - Ask Slashdot: Is HTTPS snooping becoming more acceptable? 4

jez9999 writes: "I recently worked for a relatively large company that imposed so-called transparent HTTPS proxying on their network. In practice, what this means is that they allow you to use HTTPS through their network, but it must be proxied through their server and their server must be trusted as a root CA. They were using the Cisco IronPort device to do this. The "transparency" seems to come from the fact that they tend to install their root CA into Internet Explorer's certificate store, so IE won't actually warn you that your HTTPS traffic may be being snooped on (nor will any other browser that uses IE's cert store, like Chrome). Is this a reasonable policy? Is it worth leaving a job over? Should it even be legal? It seems to me rather mad to go to huge effort to create a secure channel of communication for important data like online banking, transactions, and passwords, and then to just effectively hand over the keys to your employer. Or am I overreacting?"

Slashdot Top Deals

It's time to boot, do your boot ROMs know where your disk controllers are?

Working...