Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Submission + - Early Apple internal memos found at Seattle thrift shop (blogspot.com)

An anonymous reader writes: "I was at the Seattle Goodwill outlet recently and I noticed the Apple logo on letterhead sticking out from a bin of books, so I started digging. What I found were the 1979-1980 files of Jack MacDonald, manager of system software for the Apple II and /// at the time.

"They tell the story of project "SSAFE" or "Software Security from Apples Friends and Enemies." This was a proposal to bring disk copy protection in-house to sell as a service to outside developers. Inter-office memos, meeting notes and progress reports all give a good idea of what a project life cycle looked like. Different schemes and levels of protection are considered, as well as implementation primarily on the Apple II+ and the upcoming SARA (The Apple ///) and Lisa computers."

Submission + - Study Reveals Bot-On-Bot Editing Wars Raging On Wikipedia's Pages (theguardian.com)

An anonymous reader writes: A new study from computer scientists has found that the online encyclopedia is a battleground where silent wars have raged for years. Since Wikipedia launched in 2001, its millions of articles have been ranged over by software robots, or simply “bots," that are built to mend errors, add links to other pages, and perform other basic housekeeping tasks. In the early days, the bots were so rare they worked in isolation. But over time, the number deployed on the encyclopedia exploded with unexpected consequences. The more the bots came into contact with one another, the more they became locked in combat, undoing each other’s edits and changing the links they had added to other pages. Some conflicts only ended when one or other bot was taken out of action. The findings emerged from a study that looked at bot-on-bot conflict in the first ten years of Wikipedia’s existence. The researchers at Oxford and the Alan Turing Institute in London examined the editing histories of pages in 13 different language editions and recorded when bots undid other bots’ changes. While some conflicts mirrored those found in society, such as the best names to use for contested territories, others were more intriguing. Describing their research in a paper entitled Even Good Bots Fight in the journal Plos One, the scientists reveal that among the most contested articles were pages on former president of Pakistan Pervez Musharraf, the Arabic language, Niels Bohr and Arnold Schwarzenegger. One of the most intense battles played out between Xqbot and Darknessbot which fought over 3,629 different articles between 2009 and 2010. Over the period, Xqbot undid more than 2,000 edits made by Darknessbot, with Darknessbot retaliating by undoing more than 1,700 of Xqbot’s changes. The two clashed over pages on all sorts of topics, from Alexander of Greece and Banqiao district in Taiwan to Aston Villa football club.

Submission + - NIST: Cybersecurity Framework Webinars

Presto Vivace writes: Cybersecurity Framework Webinars

This webinar introduces the audience to the Framework for Improving Critical Infrastructure Cybersecurity (“The Framework”). NIST will provide a brief history about why and how the Framework was developed, and an understanding of each of the three primary Framework components (the Core, Implementation Tiers, and Profiles). Participants will gain an understanding of potential benefits of Framework, and how the Framework can be used. NIST will highlight industry resources, progress in Roadmap areas, and future direction of the Framework program. A Q&A session with participants will follow. ... Cybersecurity Framework Update Webinar On January 10, 2017 NIST released proposed updates to the Cybersecurity Framework. This draft Version 1.1 of the Cybersecurity Framework seeks to clarify, refine, and enhance the Framework. Updates were derived from feedback NIST received since publication of Cybersecurity Framework Version 1.0.

Submission + - FBI Has a National Watchlist That Gives Companies Real Time Updates on Employees (theintercept.com)

schwit1 writes: Rap Back has been advertised by the FBI as an effort to target individuals in "positions of trust," such as those who work with children, the elderly, and the disabled. According to a Rap Back spokesperson, however, there are no formal limits as to "which populations of individuals can be enrolled in the Rap Back Service." Civil liberties advocates fear that under Trump's administration the program will grow with serious consequences for employee privacy, accuracy of records, and fair employment practices.

Rap Back has been advertised by the FBI as an effort to target individuals in "positions of trust," such as those who work with children, the elderly, and the disabled. According to a Rap Back spokesperson, however, there are no formal limits as to "which populations of individuals can be enrolled in the Rap Back Service." Civil liberties advocates fear that the program will grow with serious consequences for employee privacy, accuracy of records, and fair employment practices.

Submission + - SPAM: Social Media And The 2017 Elections

Presto Vivace writes: DownWithTyranny

Create news alerts on the names of every local politician you wish to track, and then share those links on social media whenever you think appropriate. If you are on your neighborhood or civic association's email list, that is a good place to share news articles. You could share press releases of your favorite politician on such lists, but I would advise caution in that regard. The same people who might be interested in a news article might not be receptive to a politician's press release. ... Don't worry if your link doesn't receive any clicks or shares. The power of precinct work is in its cumulative effect. It is sufficient to make your point, it is not necessary to “win the internet.” What you are attempting here is to draw the connection between your elected official's actions and what is happening in your community.

Submission + - Signal, spies and the cult of crypto

Presto Vivace writes: Surveillance Valley

Signal (like Tor and other related "grassroots" crypto Internet Freedom projects) are creations of America's spooky military-corporate machine. They are regime change weapons, designed to project American imperial power in the age of the Internet. Signal might work if you're chatting with your local neighborhood dealer to score a few grams of coke, but don’t expect it to protect you if you decide to do anything really transgressive — like organizing against concentrated corporate political power in the United States. ... And that's what makes Signal's successful marketing to activists in America so disturbing.

Submission + - How to Use Social Media at a Protest Without Big Brother Snooping

Presto Vivace writes: Timothy Fadek for WIRED

Your smartphone can reveal essentially your entire digital life, so part of protecting your privacy while protesting is making sure that data doesn’t fall into the wrong hands. Should an altercation with police take place, they could seize your phone and may have cause to search it. Leaving it at home and packing only a standalone camera, or bringing a burner phone, are two ways to ensure that the device you have on you isn’t tied to your online identity. ... ... If you do bring your everyday device, encrypting it with a passcode, using the camera while the phone is still locked, and using end-to-end encrypted messaging services are all ways to protect yourself from proactive government surveillance at marches and rallies. And make sure you have a backup of the data on the device. That way if you want to ditch it, you won’t lose everything.

Submission + - Cybercrooks can crack Android devices' unlock pattern in seconds (ibtimes.co.uk)

drunkdrone writes: The pattern lock system used by millions of Android users to secure their phones can be cracked in just five attempts simply by observing hand movements, security experts have claimed.

A study by universities in the UK and China revealed found that the system can be compromised by covertly filming someone unlocking their phone from and feeding this into a computer vision program capable of matching finger movement with the position of the device.

During tests involving 120 participants, the software was able to guess 95% of patterns within five attempts even when the device's screen wasn't visible. Interestingly, the researchers found that more complex patterns were easier to crack than simpler ones.

Submission + - Trump's Treasury pick appears to be part of a federal investigation (muckrock.com)

v3rgEz writes: Trump's transition strategy of picking some of the shadiest people on earth is still going strong. The latest: According to the FBI, his Treasury pick Steven Mnuchin is involved with an "ongoing investigation", as reported by Mike Best over at the FOIA site MuckRock. Best requested Mnuchin's FBI files, but the request was rejected under the grounds of an open investigation, likely related to Mnuchin's superbly-timed exit from Relativity Media — right before it cratered.

Submission + - Vapour Voting in Montgomery County, Pennsylvania

Presto Vivace writes: Jill Stein has done the nation a tremendous public service

Pennsylvania has the worst voting system of all. The vast majority of voters use machines with no paper ballot to verify the vote. According to leading computer scientists, these direct recording electronic machines, or DREs, are unreliable, antiquated and easy to hack. ... ... The machines claim, for example, that more than 4,000 voters in Montgomery County , Pa., took the trouble to go to the polls, then supposedly voted for no one in any election. In reality, when these voters in Montgomery selected candidates on the machine, a “no vote” box popped up, meaning thousands of votes were lost inside those machines.

Submission + - Parents sue Apple for toddler's death after a traffic accident. (fox5sandiego.com)

sabri writes: A Texas couple is going after the money by suing Apple for the tragic death of their daughter. How Apple contributed to the girl's death?

Garrett Wilhelm, 22, was able to use FaceTime while driving 65mph on Interstate I-35 near Dallas on Christmas Eve in 2014, when he slammed into the back of someone else's vehicle.

Wait while I sue McDonalds for being fat.

Slashdot Top Deals

Just about every computer on the market today runs Unix, except the Mac (and nobody cares about it). -- Bill Joy 6/21/85

Working...