Forgot your password?
typodupeerror

Submission + - iOS 8 strikes an unexpected blow against location tracking (theverge.com)

schwit1 writes: It wasn't touted onstage, but a new iOS 8 feature is set to cause havoc for location trackers, and score a major win for privacy.As spotted by Frederic Jacobs, the changes have to do with the MAC address used to identify devices within networks. When iOS 8 devices look for a connection, they randomize that address, effectively disguising any trace of the real device until it decides to connect to a network.

Submission + - US Working to Kill UN Privacy Resolutions (foreignpolicy.com)

schwit1 writes: The United States and its key intelligence allies are quietly working behind the scenes to kneecap a mounting movement in the United Nations to promote a universal human right to online privacy, according to diplomatic sources and an internal American government document obtained by The Cable.

American representatives have made it clear that they won't tolerate such checks on their global surveillance network.

Submission + - Linus Torvalds Admits He's Been Asked to Insert NSA Backdoor (eweek.com)

darthcamaro writes: At the Linuxcon conference in New Orleans today, Linus Torvalds joined fellow kernel developers in answering a barrage of questions about Linux development. One question he was asked was whether a government agency had ever asked about inserting a back-door into Linux.

Torvalds responded "no" while shaking his head "yes," as the audience broke into spontaneous laughter.

Torvalds also admitted that while he as a full life outside of Linux he couldn't imagine his life without it.

While Torvalds has a full life outside Linux, it is at the core of his existence, he said. "I don't see any project coming along being more interesting to me than Linux," Torvalds said. "I couldn't imagine filling the void in my life if I didn't have Linux." /blockquote.


Submission + - Report: US Power Grid Highly Vulnerable to Cyberattack (techpolitik.com)

An anonymous reader writes: Despite warnings that a cyberattack could cripple the nation's power supply, a Congressional report finds that what power companies are doing to protect the power grid are insufficient. Attacks are apparently commonplace, with one utility cited by TechPolitik claiming they fight off some 10,000 attempted attacks every month. The report also found that while most power companies are complying with mandatory standards for protection, few do much else above and beyond that to protect the grid.

Submission + - Google converts links sent via Google Chat to referral links 1

MotorMachineMercenar writes: Google has apparently introduced a new feature to track user behavior in the revamped Google Chat, called Hangouts.

A friend of mine sent me a link, incidentally about an MIT study about the futility of folio hats in blocking the thought police. I use Chrome for Gmail, but being the folio-hat -wearing type, I do all my other browsing in a tightly locked down FF. I copy-pasted the link to FF, and noticed that there was flash of a Google URL before it went to the right URL.

After pasting the link to a note, I noticed it's a Google referral link, similar to the ones most (all?) links on Google search are — in case you weren't aware. So now Google knows who sent what link to whom. The only way around that is to select the entire link, and copy the text.

Now, I'm aware that by definition of me being on a Google platform they implicitly know our conversations. But the fact that they bother to make a referral link means there is even more datamining going on behind the scenes than what we already knew of.

Submission + - Linode hacked, CCs and passwords leaked 6

An anonymous reader writes: On Friday Linode announced a precautionary password reset due to an attack despite claiming that they were not compromised. The attacker has claimed otherwise, claiming to have obtained card numbers and password hashes. Password hashes, source code fragments and directory listings have been released as proof. Linode has yet to comment on or deny these claims.
Security

Will 2011 Be the Year of Mobile Malware? 111

alphadogg writes "Perhaps one of the most common predictions of the last six years has been that mobile malicious software will suddenly proliferate, driven by widespread adoption of smartphones with advanced OSes. None of those prognostications has really come to fruition, but it's likely that the coming year will bring a host of new malicious applications. Users — while generally aware of threats aimed at their desktop computers and laptops — have a good chance of being caught flat-footed with their mobile phones. In the third quarter of this year, up to 80 million smartphones were sold around the world, which accounted for about 20 percent of the total number of mobile phones sold, according to statistics published last month by analyst firm Gartner. Experts say the threats against those devices are going to come in several categories, including rogue applications. In September, researchers from security vendor Fortinet discovered a mobile component for Zeus, a notorious piece of banking malware that steals account credentials. The mobile component, which targeted Symbian Series 60 devices or BlackBerrys, intercepted one-time passcodes used to verify transactions."
Graphics

First Installment of Xiph.org's 'Digital Video Primer For Geeks' 86

Ignorant Aardvark writes "Xiph.org just released the first installment in its video series 'A Digital Video Primer For Geeks,' which covers digital audio and video fundamentals. The first video covers basic concepts of how digital audio and video are encoded, and does so in an understandable fashion. The video is hosted by Monty, the founder of Xiph.org (the people who brought you Ogg), and explains a lot of concepts (FourCC codes, YUV color space, gamma, etc.) that many watchers of digital video have long been exposed to, but don't quite understand themselves. The intent of the video series (in addition to general education) is to spur interest in digital encoding and get more free software hackers involved in digital audio/video."
Games

Study Finds That "Extreme Gamers" Play 48 Hours a Week 272

An anonymous reader writes "Think you're a big gamer? According to a new study from market research firm NPD Group, to be considered among the real hardcore you'll need to play an average of 48.5 hours a week — nearly seven hours a day. This group of gamers is, on average, '29 years old, and — perhaps surprisingly — one-third of them are female. They're more likely to play on consoles than on the PC, and on average they've purchased 24 titles in the past three months — a bill that could easily run over a thousand dollars. But dedicated though they may be, the Extreme Gamers are just a small minority: a mere 4% of the US's 174-million-strong gaming public. '"

Slashdot Top Deals

"I have just one word for you, my boy...plastics." - from "The Graduate"

Working...