Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission + - Top VPNs secretly owned by Chinese firms (computerweekly.com)

SonicSpike writes: Almost a third (30%) of the world’s top virtual private network (VPN) providers are secretly owned by six Chinese companies, according to a study by privacy and security research firm VPNpro.

The study shows that the top 97 VPNs are run by just 23 parent companies, many of which are based in countries with lax privacy laws.

Six of these companies are based in China and collectively offer 29 VPN services, but in many cases, information on the parent company is hidden to consumers.

Researchers at VPNpro have pieced together ownership information through company listings, geolocation data, the CVs of employees and other documentation.

In some instances, ownership of different VPNs is split amongst a number of subsidiaries. For example, Chinese company Innovative Connecting owns three separate businesses that produce VPN apps: Autumn Breeze 2018, Lemon Cove and All Connected. In total, Innovative Connecting produces 10 seemingly unconnected VPN products, the study shows.

Although the ownership of a number of VPN services by one company is not unusual, VPNpro is concerned that so many are based in countries with lax or non-existence privacy laws.

For example, seven of the top VPN services are owned by Gaditek, based in Pakistan. This means the Pakistani government can legally access any data without a warrant and data can also be freely handed over to foreign institutions, according to VPNpro.

The ability to access the data held by VPN providers, the researchers said, could enable governments or other organisations to identify users and their activity online. This potentially puts human rights activists, privacy advocates, investigative journalists and whistleblowers in jeopardy.

This lack of privacy, the study notes, extends to ordinary consumers, who are also coming under greater government surveillance.

“We’re not accusing any of these companies of doing anything underhand. However, we are concerned that so many VPN providers are not fully transparent about who owns them and where they are based,” said Laura Kornelija Inamedinova, research analyst at VPNpro.

“Many VPN users would be shocked to know that data held on them could be legally requested by governments in countries such as China and Pakistan.

“Our recommendation is that people do a lot of due diligence on the VPN that they want to use, since they aren’t all created equal and simply using a VPN does not guarantee privacy or security.”

VPNpro identified a further four companies: Super VPN & Free Proxy, Giga Studios, Sarah Hawken, and Fifa VPN, which together own 10 VPN services – where the parent company, and therefore company of origin, is completely hidden.

In February 2019, two US senators raised concerns about this issue and the potential threat to consumers and government agencies, calling on the Department of Homeland Security to investigate the possibility that VPNs are allowing valuable information to be routed to foreign adversaries.

In a letter, Democrat Ron Wyden and Republican Marco Rubio asked Christopher Krebs, director of the Cybersecurity and Infrastructure Security Agency (CISA) under the DHS, to perform a VPN threat assessment to determine potential risks to the US government, SearchSecurity reported.

In a factsheet on VPNs, civil liberties and privacy group Big Brother Watch warns that VPN providers have the potential to see users’ internet activity, “but many paid for VPNs make it clear that they do not log any of their user’s traffic”.

This prevents VPN providers from giving a document of any of the websites users visit, the guidance states.

Big Brother Watch recommends that free VPNs should be avoided because they may not be secure and could track users.

“If you want to be sure your online activity stays private, make sure you choose a VPN which does not log your internet activity and online traffic,” the guidance says. “Not all VPNs are the same. Make sure you do your research before choosing a VPN.”

Comment Easy answer? Maybe not? (Score 1) 183

Buy or have reason to have the latest McMaster Carr catalogue. Or just go to: https://www.mcmaster.com/
There are sliding scales for quantities for components and you **could** figure out how much the wholesale cost of every part would be. Many people in America would call what you are asking for as some form of socialism which is associated for some reason to Communism.
Notwithstanding the foregoing, you should roughly be able to quantify costs (other than custom components), but that will never be the true cost.
All of the above requires your ability and willingness to spend the time and preform the research. Thereâ(TM)s many sites that do tear-downs, I would start there if you really care.
Itâ(TM)s people who do this type of practical sourcing that ends up as entrepreneurs.

Comment The Law Changes (Score 1) 937

Back in 1860 nobody had even conceived of an automobile or the telephone.

They had plenty of laws for cutting telegraph lines, which did exist at the time.

When the telephone and automobile were each widely deployed, laws were created to address the social affects brought on by these advances in technology such as negligent vehicle operation and wiretapping.

The fact that the laws Had to evolve was a result of society recognizing the utility these inventions brought to bear.

The law is not a static thing, it is constantly evolving to match the needs and whims of society.

Insurance companies, on the other hand will require standardized testing at some point for policies to be granted. I suspect that the car makers have been developing such standards with the insurance companies, as such the law will have to catch up.

My prediction is:
Ultimately, autonomous cars will be subject to two standards:
1) if the on board computer/data logger indicates there was user intervention, and
2) if there was no user intervention.

United Kingdom

Dogs Can Be Pessimistic 99

Not that it will change anything, but researchers at Bristol University say that your dog might be a gloom-monger. In addition to the downer dogs, the study also found a few that seemed happy no matter how uncaring the world around them was. "We know that people's emotional states affect their judgments and that happy people are more likely to judge an ambiguous situation positively. What our study has shown is that this applies similarly to dogs," said professor Mike Mendl, an author of the study and head of animal welfare and behavior at Bristol University.
HP

Submission + - HP restores creased photos with flatbed scanners (cnet.co.uk)

An anonymous reader writes: A crease can ruin an often-irreplaceable printed photograph. But new research from HP Labs points towards a future where this is much less of a problem. Scientists at HP have developed a technique to detect creases in photographs using standard, unmodified flatbed scanners. Once correctly scanned into a computer, software can determine where the photograph's defect is, and artificially correct it to remove any trace of a crease or fold. The result is a spotless JPEG scan from a creased photo, with absolutely no modified hardware and no technical know-how required on the part of the user.
Input Devices

Submission + - Researchers Debut Barcode Replacement (bbc.co.uk)

eldavojohn writes: MIT Researchers have unveiled a new potential replacement for barcodes. Using an LED covered with a tiny mask and a lens, these new bokodes can be processed by a standard mobile phone camera and can encode thousands of times more information than your average barcode. New applications are being dreamed up by the team. Dr. Mohan of MIT said, 'Let's say you're standing in a library with 20 shelves in front of you and thousands of books. You could take a picture and you'd immediately know where the book you're looking for is.'
Internet Explorer

IE 8.1 Supports Firefox Plugins, Rendering Engine 283

KermodeBear writes in to note that according to Smashing Magazine, the newest version of Internet Explorer, codenamed "Eagle Eyes," supports Firefox plugins, the Gecko and Webkit rendering engines, and has scored a 71 / 100 on the Acid3 test. The article is pretty gee-whiz, and I don't entirely believe the claims that IE's JavaScript performance will trounce the others. (And note that the current Firefox, 3.0.8, scores 71 on Acid3, and Safari 3.1.2 hits 75.) No definitive date from Microsoft, but "sources" say that an IE 8.1 beta will be released in the summer.
Security

UK Court Rejects Encryption Key Disclosure Defense 708

truthsearch writes "Defendants can't deny police an encryption key because of fears the data it unlocks will incriminate them, a British appeals court has ruled. The case marked an interesting challenge to the UK's Regulation of Investigatory Powers Act (RIPA), which in part compels someone served under the act to divulge an encryption key used to scramble data on a PC's hard drive. The appeals court heard a case in which two suspects refused to give up encryption keys, arguing that disclosure was incompatible with the privilege against self incrimination. In its ruling, the appeals court said an encryption key is no different than a physical key and exists separately from a person's will."
Image

Researchers Claim To Be Able To Determine Political Leaning By How Messy You Are 592

According to a study to be published in The Journal of Political Psychology, you can tell someone's political affiliation by looking at the condition of their offices and bedrooms. Conservatives tend to be neat and liberals love a mess. Researchers found that the bedrooms and offices of liberals tend to be colorful and full of books about travel, ethnicity, feminism and music, along with music CDs covering folk, classic and modern rock, as well as art supplies, movie tickets and travel memorabilia. Their conservative contemporaries, on the other hand, tend to surround themselves with calendars, postage stamps, laundry baskets, irons and sewing materials. Their bedrooms and offices are well lit and decorated with sports paraphernalia and flags — especially American ones. Sam Gosling, an associate professor of psychology at the University of Texas at Austin, says these room cues are "behavioral residue." The findings are just the latest in a series of recent attempts to unearth politics in personality, the brain and DNA. I, for one, support a woman's right to clean.
Portables (Apple)

Top Apple Rumors, Bricks, Low Price, NVIDIA 283

Vigile writes "With the news that Apple will be releasing new MacBook products on October 14th, speculation has begun on what exactly those new products will be. Tips of a manufacturing process involving lasers and a single 'brick' of aluminum are catching on, as is the idea of a sub-$1000 netbook-type device. More interesting might be the persistent rumors of an NVIDIA chipset adoption that would drastically increase gaming ability, allow MacBooks to improve their support for OpenCL and take advantage of the new Adobe CS4 software with GPU acceleration. Will NVIDIA's ailing chipset business get a shot in the arm next week?"
Security

World Bank Under Cybersiege In "Unprecedented Crisis" 377

JagsLive sends in a Fox News report on large-scale and possibly ongoing security breaches at the World Bank. "The World Bank Group's computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year, FOX News has learned. It is still not known how much information was stolen. But sources inside the bank confirm that servers in the institution's highly-restricted treasury unit were deeply penetrated with spy software last April. Invaders also had full access to the rest of the bank's network for nearly a month in June and July. In total, at least six major intrusions — two of them using the same group of IP addresses originating from China — have been detected at the World Bank since the summer of 2007, with the most recent breach occurring just last month. In a frantic midnight e-mail to colleagues, the bank's senior technology manager referred to the situation as an 'unprecedented crisis.' In fact, it may be the worst security breach ever at a global financial institution. And it has left bank officials scrambling to try to understand the nature of the year-long cyber-assault, while also trying to keep the news from leaking to the public." Update: 10/11 01:15 GMT by T : Massive spyware infestations might be good cause to reevaluate the TCO of non-Windows systems on the desktop.

Slashdot Top Deals

There is no likelihood man can ever tap the power of the atom. -- Robert Millikan, Nobel Prize in Physics, 1923

Working...