Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Security

Skype Messages Monitored In China 223

Pickens writes "Human-rights activists have discovered a huge surveillance system in China that monitors and archives Internet text conversations sent by customers of Tom-Skype, a joint venture between a Chinese wireless operator and eBay. Researchers say the system monitors a list of politically charged words that includes words related to the religious group Falun Gong, Taiwan independence, the Chinese Communist Party and also words like democracy, earthquake and milk powder. The encrypted list of words inside the Tom-Skype software blocks the transmission of these words and records personal information about the customers who send the messages. Researchers say their discovery contradicts a public statement made by Skype executives in 2006 that 'full end-to-end security is preserved and there is no compromise of people's privacy.' The Chinese government is not alone in its Internet surveillance efforts. In 2005, The New York Times reported that the National Security Agency was monitoring large volumes of telephone and Internet communications flowing into and out of the United States as part of an eavesdropping program that President Bush approved after the Sept. 11 attacks. 'This is the worst nightmares of the conspiracy theorists around surveillance coming true,' says Ronald J. Deibert, an associate professor of political science at the University of Toronto. 'It's "X-Files" without the aliens.'"

Comment Speeds are much higher than 300kbps (Score 1) 356

My cellular (AT&T) sees more like 1.2+ Mbps down, regularly. Occasional high latency and dropped packets, but pretty reliable as far as availability and uptime. Uploading is around 400 Kbps. These are similar statistics to EVDO-RevA (Sprint) and WiMax (Clearwire). Many devices being sold now are capable of 3.6 or 7.2 Mbps once the network supports it.

At ~$60/mo. for 'unlimited' computer (not just phone/PDA) access, it may be an option. Note that providers have cut off customers for 'bandwidth abuse' despite being 'unlimited', so take care to choose the provider that best fits your location and situation.

Google

Security Holes In Google's Android SDK 77

Redon Buckeye writes "Google's Android software development kit is using several outdated and vulnerable open-source image processing libraries, some of which can be exploited to take complete control of mobile devices running the Android platform. From the article: 'Several vulnerabilities have been found in Android's core libraries for processing graphic content in some of the most used image formats (PNG, GIF, and BMP). While some of these vulnerabilities stem from the use of outdated and vulnerable open source image-processing libraries, other were introduced by native Android code that uses them or that implements new functionality.'"
Cellphones

Analog Cell Phone Network Shuts Down Monday 205

I Don't Believe in Imaginary Property writes "AT&T and Verizon will be shutting down their old, analog AMPS networks next Monday, and AT&T will also turn off its old TDMA network, with smaller providers expected to follow thanks to a sunset date set by the FCC. After these old networks are shut down, the networks will be all digital. Of course, if you have one of those old fashioned 'just a phone' cellphones and it happens to be analog, you'd best enjoy the last few days before it becomes useless."
Security

Multifunction Printers — The Forgotten Security Risk? 153

eweekhickins writes to share an article in eWeek highlighting the forgotten risks that a multifunction printer could possibly offer. Brendan O'Connor first called attention to the vulnerabilities of these new devices at a Black Hat talk in '06 and warns that these are no longer "dumb" machine sitting in the corner and should be treated with their own respective security strategy. "During his Black Hat presentation in 2006, O'Connor picked apart the security model of a Xerox WorkCentre MFP, showing how the device operated more like a low-end server or workstation than a copier or printer--complete with an AMD processor, 256MB of SDRAM and an 80GB hard drive and running Linux, Apache and PostGreSQL. He showed how the authentication on the device's Web interface can be easily bypassed to launch commands to completely hijack a new Xerox WorkCentre machine."
Security

Hardware Based OpenID Service Available 119

An anonymous reader writes "TrustBearer Labs has announced a new service that lets you use various hardware based security tokens like smartcards and biometric devices with OpenID. A hardware based connection to OpenID allows higher levels of security and makes it easier for the end-user to control their credentials. OpenID is a decentralized cross-site authentication system that has been gaining momentum for quite a while now with major supporters like AOL, Google and Microsoft already announced."
Space

Submission + - Corkscrew cups could keep space drinks flowing

holy_calamity writes: A Canadian chemical engineer has a novel solution to containing liquids in space. He has been experimenting with corkscrews of ribbon-like material that keep liquids suspended in their centre in microgravity thanks to surface tension. The helical containers allow the fluid to be sucked out of the coil in one go — unlike more conventional shapes like coffee cups where interaction between a liquid's internal pressure and the container makes it break into annoying globules you have to chase with a straw.

Slashdot Top Deals

Men of lofty genius when they are doing the least work are most active. -- Leonardo da Vinci

Working...