Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Businesses

Comcast 'Blocks' an Encrypted Email Service: Yet Another Reminder Why Net Neutrality Matters (zdnet.com) 106

Zack Whittaker, writing for ZDNet: For about twelve hours earlier this month, encrypted email service Tutanota seemed to fall off the face of the internet for Comcast customers. Starting in the afternoon on March 1, people weren't sure if the site was offline or if it had been attacked. Reddit threads speculated about the outage. Some said that Comcast was actively blocking the site, while others dismissed the claims altogether. Several tweets alerted the Hanover, Germany-based encrypted messaging provider to the alleged blockade, which showed a "connection timed out" message to Comcast users. It was as if to hundreds of Comcast customers, Tutanota didn't exist. But as soon as users switched to another non-Comcast internet connection, the site appeared as normal. "To us, this came as a total surprise," said Matthias Pfau, co-founder of Tutanota, in an email. "It was quite a shock as such an outage shows the immense power [internet providers] are having over our Internet when they can block sites...without having to justify their action in any way," he said.

By March 2, the site was back, but the encrypted email provider was none the wiser to the apparent blockade. The company contacted Comcast for answers, but did not receive a reply. When contacted, a Comcast spokesperson couldn't say why the site was blocked -- or even if the internet and cable giant was behind it. According to a spokesperson, engineers investigated the apparent outage but found there was no evidence of a connection breakage between Comcast and Tutanota. The company keeps records of issues that trigger incidents -- but found nothing to suggest an issue. It's not the first time Comcast customers have been blocked from accessing popular sites. Last year, the company purposefully blocked access to internet behemoth Archive.org for more than 13 hours.

Government

Washington Post Retracts Story About Russian Hackers Penetrating US Electricity Grid (washingtonpost.com) 574

Those anonymous U.S. officials who reported Russian hacking code had been found "within the system" of a Vermont power utility must've been surprised to learn the code was on a laptop that wasn't actually connected to the grid. The Washington Post has updated their original story, which now reports that "authorities" say there's no indication that Russian hackers have penetrated the U.S. electric grid.

The Post's newly-edited version now appears below (with their original and now-deleted text preseved inside brackets). A code associated with the Russian hacking operation dubbed Grizzly Steppe by the Obama administration has been detected within the system of a Vermont utility, according to U.S. officials. While the Russians did not actively use the code to disrupt operations of the utility, according to officials who spoke on condition of anonymity in order to discuss a security matter, the discovery underscores the vulnerabilities of the nation's electrical grid... [Was "the penetration of the nation's electrical grid is significant because it represents a potentially serious vulnerability."]

American officials, including one senior administration official, said they are not yet sure what the intentions of the Russians might have been. The incursion [was "penetration"] may have been designed to disrupt the utility's operations or as a test by the Russians to see whether they could penetrate a portion of the grid... According to the report by the FBI and DHS, the hackers involved in the Russian operation used fraudulent emails that tricked their recipients into revealing passwords.

The Vermont utility does report that they'd "detected suspicious Internet traffic" on the laptop, but they believe subsequent news coverage got the story wrong. "It's unfortunate that an official or officials improperly shared inaccurate information with one media outlet, leading to multiple inaccurate reports around the country."
Social Networks

Why Does Twitter Refuse To Shut Down Donald Trump? (vortex.com) 832

Lauren Weinstein writes: The conclusion appears inescapable. Twitter apparently has voluntarily chosen to 'look the other way' while Donald Trump spews forth a trolling stream of hate and other abuses that would cause any average Twitter user to be terminated in a heartbeat. There's always room to argue the proprietary or desirability of any given social media content terms of service — or the policy precepts through which they are applied. It is also utterly clear that if such rules are not applied to everyone with the same vigor, particularly when there's an appearance of profiting by making exceptions for particular individuals, the moral authority on which those rules are presumably based is decimated, pointless, and becomes a mere fiction. Would you rather Twitter shut down no account ever, apply a sort of white-listing policy, or something in the middle?

Comment What's the problem? (Score 5, Informative) 294

I don't understand the concern, at least if I'm reading the documentation for the speculative connect API correctly (first link in blurb).

All this seems to do is make the TCP connection (whether SSL or not) in anticipation of a link being clicked. The speculative connect API does not send any data in the TCP pipe it is creating. By opening the TCP link early, once the link is clicked, the TCP connection is probably ready to go, cutting down a bit on setup delay (which can sometimes be substantial if DNS is slow to resolve or the connection is using SSL), thus making the click seem more responsive to the user.

But nowhere in the docs is any mention of actual requests made to the server or any data downloaded from the server... until you click the link. Thus, the only information leaked by hovering over a link but not clicking on it is your externally-known IP address, which may show up in the error logs of the webserver as a dropped connection. There seems to be no danger of accidentally downloading a virus simply by hovering over a click.

If I'm missing something, please let me know.

Comment Re:Why not promote a Dvorak keyboard instead? (Score 1) 258

Maybe you should have a look at the wiki page with references before making up complete bullshit.

As of 2005, writer Barbara Blackburn was the fastest alphanumerical English language typist in the world, according to The Guinness Book of World Records. Using the Dvorak Simplified Keyboard, she has maintained 150 wpm for 50 minutes, and 170 wpm for shorter periods. She has been clocked at a peak speed of 212 wpm.

Google

Google Found Guilty of Libel For Search Results In Australia 223

Meshach writes "Google has been found guilty for refusing to take down a libelous search result in an Australian court (ruling). Music promoter Milorad Trkulja sued Google for refusing to take down links to website articles promoting libelous claims that Trkulja was connected to organized crime in Melbourne. Google told Trkulja to contact the sites on which the offensive materials were posted, as those webmasters controlled the content. But the Supreme Court of Victoria decided Google was responsible for removing the damaging links the moment Trkulja asked them to remove the content. As a result of the jury's decision in the case, Google will have to pay $200,000 in damages to Trkulja."
Politics

Ask Slashdot: How Should Tech Conferences Embrace Diversity? 343

An anonymous reader writes "The Register is reporting on how debate over diversity has managed to get a Ruby conference in the UK cancelled, as the speakers were 100% white male. The person running the conference, Chuck Hardy, said he 'was not prepared to put [himself] in the position of legal liability and cost ramifications if a sponsor were to pull out under social media strain.' He added, 'The ramifications of comments such as race and gender can have financial and legal consequences for the conference organizer. Raise these issues but allow the conference organizers the chance to highlight and act on these industry level issues. Accusation and slander is not a solution.' Should conferences embrace diversity from the start, or should they go forward even if the speakers are all of the same denomination? How far do we have to go to ensure we are diverse?"
Software

Apple Orders Memory Game Developers To Stop Using 'Memory' In Names 409

An anonymous reader writes with this bit of trademark absurdity from geek.com: "Ravensburger is a German gaming company that specializes in jigsaw puzzles, but has also expanded into other areas such as children's books and games. The company owns the trademark to a board game called 'Memory' and has demanded Apple stop offering apps that have the word 'memory' in their title or as a keyword associated with an app. It may seem ludicrous such a common word can be trademarked, but apparently this is a valid claim as Apple is now serving notices to app developers. The choice an infringing app developer has is to either rename their app or remove it from the App Store."
Democrats

Barack Obama Retains US Presidency 1576

Fox News, NBC, and CNN have called the U.S. election for incumbent Barack Obama. Of the so-called 'battleground states,' Obama carried Ohio, Iowa, Wisconsin, and New Hampshire, which, along with all of the solidly Democrat-leaning states, was enough to push him beyond the 270 required for victory. You can check this chart to see the full list of states that have currently been called, and by which news networks. The NY Times has an excellent interactive map showing all election results updated in real time, as does CNN. It's currently projected that the Republicans will retain control of the House of Representatives, and the Democrats will retain control of the Senate.
Privacy

California AG Gives App Developers 30 Days To Post Privacy Notice 108

Trailrunner7 writes "California Attorney General Kamala D. Harris today announced a crackdown on mobile application developers and companies that haven't posted privacy policies, at least where users can easily find them. The attorney general is giving recipients 30 days 'to conspicuously post a privacy policy within their app that informs users of what personally identifiable information about them is being collected and what will be done with that private information,' according to a prepared statement. A sample letter defines the issue at hand. 'An operator of a mobile application ("app") that uses the Internet to collect PII is an "online service" within the meaning of CalOPPA. An app's commercial operator must therefore conspicuously post its privacy policy in a means that is reasonably accessible to the consumer. Having a Web site with the applicable privacy policy conspicuously posted may be adequate, but only if a link to that Web site is "reasonably accessible" to the user within the app.'"

Slashdot Top Deals

A budget is just a method of worrying before you spend money, as well as afterward.

Working...