Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - What Does Google Do With All The Information It Collects? 1

An anonymous reader writes: About two thirds of websites run Google code (mostly Analytics, AdSense, and +1) that tells Google what you do there and where you came from. (Also Analytics is used by 63% of Fortune 500 companies and 71% of the top 10k websites.) 800 million Android phones are in use (that's 11% of all humans), telling Google pretty much everywhere they go, everything they do, and everyone they talk to. Hundreds of millions of people use Google Maps. Over 400 million people use Gmail, telling Google everything they write and receive by email. Plus untold millions use Google Toolbar. Does Google do anything with this data? And even if they "don't be evil" with it today, is there anything stopping them from "being evil" with it tomorrow? What about 20 years from now when they are a second-rate company and some investment group buys out their assets? Do you block Google code in your browsing habits? Do you run Google code on your websites?

Submission + - Researchers Say Neanderthals created cave art

An anonymous reader writes: Belying their reputation as the dumb cousins of early modern humans, Neanderthals created cave art, an activity regarded as a major cognitive step in the evolution of humankind, scientists reported on Monday in a paper describing the first discovery of artwork by this extinct species. The discovery is "a major contribution to the redefinition of our perception of Neanderthal culture," said prehistorian William Rendu of the French National Centre for Scientific Research, who was not involved in the work. "It is a new and even stronger evidence of the Neanderthal capacity for developing complex symbolic thought" and "abstract expression," abilities long believed exclusive to early modern humans.

Submission + - Searching The Internet For Evidence Of Time Travelers 2

Hugh Pickens DOT Com writes: Here's an interesting paper by two physicists at Michigan Technological University who have come up with a practical methodology for finding time travelers through the internet. "Time travel has captured the public imagination for much of the past century, but little has been done to actually search for time travelers. Here, three implementations of Internet searches for time travelers are described, all seeking a prescient mention of information not previously available. The first search covered prescient content placed on the Internet, highlighted by a comprehensive search for specific terms in tweets on Twitter. The second search examined prescient inquiries submitted to a search engine, highlighted by a comprehensive search for specific search terms submitted to a popular astronomy web site. The third search involved a request for a direct Internet communication, either by email or tweet, pre-dating to the time of the inquiry. Given practical verifiability concerns, only time travelers from the future were investigated. No time travelers were discovered. Although these negative results do not disprove time travel, given the great reach of the Internet, this search is perhaps the most comprehensive to date." Steven Hawkings' similar search also provided negative results.

Submission + - SD Card Hack Shows Flash Storage Is Programmable: Unreliable Memory (technabob.com) 1

An anonymous reader writes: Ever wonder why SD cards are dirt cheap? At the 2013 Chaos Computer Congress, a hacker going by the moniker Bunnie recently revealed part of the reason: “In reality, all flash memory is riddled with defects — without exception.” But that tidbit is nothing compared to the point of his presentation, in which he and fellow hacker Xobs revealed that SD cards and other flash storage formats contain programmable computers.

Submission + - Scary: Detecting or preventing abusive devices (antipope.org)

Keybounce writes: This isn't "new"; but it's getting scarier.

Small computers that can run a wifi stack are small. Tiny. Getting even cheaper with their power requirements.

This blog post indicates that kettles can — and *DO* — contain computers that want to infect your home network.

With a little thought, there is no clear end in sight. We know that batteries are fairly big compared to the rest of the computer, and there's no reason not to think that the inside of an "AA" battery might be a smaller power cell and a computer.

And it's not just wireless. Heck, any USB device — and this is old now — can be given "free" power to run a wifi. As much as a USB device can do all sorts of things by pretending to be something else, consider what can happen with a USB device that doesn't lie about what it does, just sends information off elsewhere? That USB memory stick you found doesn't have to attack your computer, it just sends copies of what you put on it to someone else over any open wifi it finds — such as your trip to the coffee house.

And where does it end? Right now we have smart inventory control tags — in the future, those can be strong computers. That might either be data gatherers, or outright compromised.

How can this be detected?
How can this be stopped?

As far as I can tell, there's no good way to detect, any "security" has to start with "don't plug anything into your computer" (apparently, not even a cable is safe), and the only hope of "stopping" this would be to have the entire US government's court and law-enforcement system get involved — as in, make this sort of thing illegal.

After all, illegal activities by corporate businesses for private gain always generates appropriate penalties, fines, and jail time for the people involved, right?

So what can end users do? Anything? Nothing?

Submission + - Illinois Law Grounds PETA Drones Meant to Harass Hunters (breitbart.com) 1

schwit1 writes: Illinois passed a new state law that set back the efforts of the People for the Ethical Treatment of Animals (PETA), making the use of drones to interfere with hunters and fishermen prohibited.

The law was created in response to PETA’s plan to employ drones called “air angels” to monitor outdoors enthusiasts engaged in hunting and fishing nationwide. Of course, the motivation for many outdoorsman is to get away from technology and be in harmony with nature.

Submission + - What Are the Books that EVERYONE Should Read? 3

dpu writes: Part of my NYR is to encourage reading as a hobby in those around me — especially my friends' children (ages 2 to 22), but my wife and I as well. There is a lot of "classic" literature out there I'm familiar with and will be pimping to the short masses here (Fahrenheit 451, To Kill A Mockingbird, In The Heat of the Night, Huckleberry Finn, Cryptonomicon, One Flew Over the Cuckoo's Nest, A Wrinkle In Time, When Rabbit Howls, etc.), but I know many of you are much better read than I am.

What recommendations would you make? What are the books that everyone should read? I don't care if it's been banned by schools, burned by communists, or illuminated by 15th century monks. If you think everyone around you should read it, I'd love to know about it.

Submission + - Chaos Communication Congress : X11/X.Org Security In Bad Shape (phoronix.com)

An anonymous reader writes: A presentation at the Chaos Communication Congress (CCC), riled upon the X11 Server security with being "worse than it looks", "sheer terror", and the presenter having found more than 120 bugs in a few months of security research and not being close to being done in his work. Upstream X.Org developers have begun to call most of his claims valid. The presentation by Ilja van Sprunde is available for streaming.

Submission + - New York Investigators Obtain Fraudulent Ballots 97 Percent of Time (nationalreview.com) 8

cold fjord writes: National Review reports, "New York City’s Department of Investigation (DOI) has just shown how easy it is to commit voter fraud that is almost undetectable. Its undercover agents were able to obtain ballots for city elections a total of 61 times — 39 times using the names of dead people, 14 times using the names of incarcerated felons, and eight times using the names of non-residents. On only two occasions, or about 3 percent of the time, were the agents stopped by polling-place officials. In one of the two cases, an investigator was stopped only because the felon he was trying to vote in the name of was the son of the election official he was dealing with. Ballot security in checking birth dates or signatures was so sloppy that young undercover agents were able to vote using the name of someone three times their age who had died. As the New York Post reports: “A 24-year female was able to access the ballot at a Manhattan poll site in November under the name of a deceased female who was born in 1923 and died in April 25, 2012 — and would have been 89 on Election Day.” All of the agents who got ballots wrote in the names of fictitious candidates so as not to actually influence election outcomes."

Submission + - Unhappy with your government? Start a new one. 11

An anonymous reader writes: Stories like the NSA revelations (among many others) suggest that modern governments may be getting the sense that they exist of their own right and independent of the people who allegedly democratically control them. When faced with trying to "fix" this situation, individuals are daunted by the scope of the task. The institutions of government are huge and difficult to imagine changing. However, apart from changing from the inside or revolting against the system, there is a very different alternative: just set up a new government. Of course current governments frown on that, but there are ways around it. Seasteading advocates creating new nations in newly-created lands (i.e., on the seas). Open source governance advocates setting up new, internet-based communities with their own governance system and allowing those communities to gradually push out the antiquated systems. What's your plan for living in democracy in the coming year?

Submission + - Public Domain Day 2014 (duke.edu)

An anonymous reader writes: What could have been entering the public domain in the US on January 1, 2014? Under the law that existed until 1978.... Works from 1957. The books “On The Road,” “Atlas Shrugged,” "Empire of the Atom," and “The Cat in the Hat,” the films "The Incredible Shrinking Man," “The Bridge on the River Kwai,” and “12 Angry Men,” the article "Theory of Superconductivity," the songs “All Shook Up” and “Great Balls of Fire,” and more.... What is entering the public domain this January 1? Not a single published work. http://web.law.duke.edu/cspd/publicdomainday/2014/pre-1976

Submission + - The Shadowy Darknet will be the Only Truly World-wide Web (ibtimes.co.uk)

DavidGilbert99 writes: “The shadowy Darknet then will be the only truly world-wide web” — this is the view of Alexander Gostev, chief security expert at Kaspersky Lab who believes the fallout from Edward Snowden's leaks may lead at some point to the "collapse of the current Internet, which will break into dozens of national networks."

Submission + - U.S. home electricity use declines for 3rd straight year (www.cbc.ca) 2

An anonymous reader writes: For a third year in a row the U.S. home has used less electricity. The continuing focus on energy conservation combined with new technology has and probably will continue to show promise.

Submission + - Using tech to evolve democracy beyond majority rule

An anonymous reader writes: We generally understand 'democracy' to be government by the people. And historically, we've taken that to mean by the greatest number of people: the majority. But there's no inherent requirement that democracy be rule (or tyranny, some would say) of the majority. Among the many emerging governance software tools, one of the most common principles is collaborative governance. In these paradigms, direct democracy is supported not through having everyone vote on everything and making laws out of anything with more than 50% of the vote, but rather by having anyone who wants to vote on a succession of proposals until someone can come up with a proposal that works for (most) everyone. Welcome to the new era of governance, where decisions are made because they are good ones — a novel idea for sure.

Submission + - US Spy Agency Boasts 'Nothing Is Beyond Our Reach'

An anonymous reader writes: The National Reconnaissance Office launched a new satellite called NROL-39 from Vandenberg Air Force Base in California late Thursday, but it's their mission logo that's getting much more interest. The logo, featuring a planet-sized octopus enveloping the Earth above the phrase "Nothing Is Beyond Our Reach" is probably not the best choice from a public-relations standpoint these days. “That’s reconnaissance on other nations, not on citizens,” we are assured. Though note, while it is devouring North America, the octopus' tentacle is resting on Afghanistan. That's cool then.

Slashdot Top Deals

"It's ten o'clock... Do you know where your AI programs are?" -- Peter Oakley