Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 7 declined, 4 accepted (11 total, 36.36% accepted)

Media

Submission + - Fake news are good news (wired.com) 2

Virtual_Raider writes: Wired is running a story about a new twist in the never ending struggle to make true Barnum's adage. Old: Scammers are creating fake news sites that look almost like the real thing. New: They are advertising on real news sites, making it hard for unwary readers to realize they are being duped with fake coverage of get-rich-quick scams. Amongst those affected are the Huffington Post and Salon

From the article, "The story has art, it has a sidebar, there's weather, supposed reader comments — even ads. Steadman is described as "a mother from San Francisco" — at least, when I read the article. Thanks to cutting-edge reporting techniques perfected by News 5, she will automatically move to the geolocation of your internet IP address when you read it. Look, she lives right in your neighborhood!"

The Internet

Submission + - Youtube bans Terrorist Training Videos 1

Virtual_Raider writes: Terrorist training videos will be banned from appearing on YouTube, under revised new guidelines being implemented by the popular video-sharing site.

The Google-owned portal will ban footage that advertises terrorism or extremist causes and supporters of the change hope it will blunt al-Qaeda's strong media online campaign.

Along with other uncomfortable subjects such as sniper footage and home-made bombs. Is this a sensible move or plain censorship?
Privacy

Submission + - Computer's heat may pose security threat

Virtual_Raider writes: Wired is carrying a story about the method that a security researched used to identify anonymous computers behind anonymity services.

From TFA

His victim is the Onion Router, or "Tor" — a sophisticated privacy system that lets users surf the web anonymously. Tor encrypts a user's traffic, and bounces it through multiple servers, so the final destination doesn't know where it came from. Murdoch set up a Tor network at Cambridge to test his technique, which works like this: If an attacker wants to learn the IP address of a hidden server on the Tor network, he'll suddenly request something difficult or intensive from that server. The added load will cause it to warm up.
From The Onion Router's site:

Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security.
I'm left with a couple of questions such as, what additional meassures could a private person take to prevent against this new vector of attack? What legitimate uses can this technique have for law enforcement seeking to pinpoint a criminal? Interesting all around.
Portables (Apple)

Submission + - Ipod owners not as loyal to brand as Mac owners

Virtual_Raider writes: A survey indicates that iPod owners may not be as loyal to their devices as Mac owners are to their computers, thus opening the possibility for Microsoft's Zune to enter the market. Surveyed people also indicated a high likelyness of buying the much maligned brown device. But that doesn't mean that the market is now at Microsoft's mercy. RTFA for a change!

Slashdot Top Deals

Time is the most valuable thing a man can spend. -- Theophrastus

Working...