Forgot your password?
typodupeerror
Education

Univ. of California Faculty May Boycott Nature Publisher 277

Marian the Librarian writes "Nature Publishing Group (NPG), which publishes the prestigious journal Nature along with 67 affiliated journals, has proposed a 400% increase in the price of its license to the University of California. UC is poised to just say no to exorbitant price gouging. If UC walks, the faculty are willing to stage a boycott; they could, potentially, decline to submit papers to NPG journals, decline to review for them and resign from their editorial boards."
The Courts

Writer Peter Watts Sentenced; No Jail Time 299

shadowbearer writes "SF writer Peter Watts, a Canadian citizen, whose story we have read about before in these pages, was sentenced three days ago in a Port Huron, MI court. There's not a lot of detail in the story, and although he is still being treated like a terrorist (cannot enter or pass through the US, DNA samples) he was not ordered to do any time in jail, was freed, and has returned home to his family. The judge in the case was, I believe, as sympathetic as the legal system would allow him to be."
Privacy

Why Tor Users Should Be Cautious About P2P Privacy 122

An anonymous reader writes "I went across your post a few days ago saying that a machine connected to the Internet was all one needed to spy on most BitTorrent users of the Internet. I followed the link to find out that those researchers from INRIA claimed their attacks also worked for BitTorrent users on Tor. I didn't believe it at first, but then today I found this link on the Tor Project. It seems their attacks don't only link your real IP to your BitTorrent files on Tor but also to the web pages that you're browsing! Tell me it's a joke." No joke, but according to Jacob Appelbaum (a Tor developer), the security flaw is more nuanced — and the fault of software outside of Tor. Read on for his explanation of how the privacy benefits of Tor can be easily lost.

Submission + - Consumer webcams with high quality sensors

xmas2003 writes: Since 2005, I've had a live webcam watching my grass grow — another is currently watching a bird nest on my front door — five babies! While I appreciate the 802.11g wireless and Pan/Tilt/Zoom (10x optical) of the 5 year old D-Link DCS-6620g, it has issues, especially image quality. I've investigated getting a new webcam, but except for high-end/security-related gear from companies such as Axis, there doesn't seem to be much improvement in the consumer space as most offerings are just cheaper and USB connected for tethered video conferencing, etc.

I have an 18 Megapixel Canon 7D DSLR that shoots gorgeous 1920x1080x30p hi-def video. While I don't expect that in a consumer webcam, their recently released T2i uses the same chip and sells for $800. And heck, point-n-shoots are a couple of hundred bucks and now many cell phones have cameras built in, so there's plenty of low power speedy CPU's in small packages these days to handle the signal processing.

So why hasn't someone taken a sensor with good image quality sensor, downsized to around 1024x768, and put it in a PTZ webcam package with 802.11n wireless for around $500?
Encryption

Parallel Algorithm Leads To Crypto Breakthrough 186

Hugh Pickens writes "Dr. Dobbs reports that a cracking algorithm using brute force methods can analyze the entire DES 56-bit keyspace with a throughput of over 280 billion keys per second, the highest-known benchmark speeds for 56-bit DES decryption and can accomplish a key recovery that would take years to perform on a PC, even with GPU acceleration, in less than three days using a single, hardware-accelerated server with a cluster of 176 FPGAs. The massively parallel algorithm iteratively decrypts fixed-size blocks of data to find keys that decrypt into ASCII numbers. Candidate keys that are found in this way can then be more thoroughly tested to determine which candidate key is correct." Update by timothy, 2010-01-29 19:05 GMT: Reader Stefan Baumgart writes to point out prior brute-force methods using reprogrammable chips, including Copacobana (PDF), have achieved even shorter cracking times for DES-56. See also this 2005 book review of Brute Force, about the EFF's distributed DES-breaking effort that succeeded in 1997 in cracking a DES-encrypted message.
The Media

Submission + - NY Times to Charge for Online Content

Hugh Pickens writes: "New York Magazine reports that the NY Times appears close to announcing that the paper will begin charging for access to its website, according to people familiar with internal deliberations. After a year of debate inside the paper, the choice has been between a Wall Street Journal-type pay wall and the metered system in which readers can sample a certain number of free articles before being asked to subscribe. The Times seems to have settled on the metered system. The decision to go paid is monumental for the Times, and culminates a yearlong debate that grew contentious, people close to the talks say. Hanging over the deliberations is the fact that the Times’ last experience with pay walls, TimesSelect, was deeply unsatisfying and exposed a rift between Sulzberger and his roster of A-list columnists, particularly Tom Friedman and Maureen Dowd, who grew frustrated at their dramatic fall-off in online readership. The argument for remaining free was based on the belief that nytimes.com is growing into an English-language global newspaper of record, with a vast audience — 20 million unique readers — that would prove lucrative as web advertising matured. But with the painful declines in advertising brought on by last year's financial crisis, the argument that online advertising might never grow big enough to sustain the paper's high-cost, ambitious journalism — gained more weight."
Encryption

A 1941 Paper-and-Pencil Cipher 75

Schneier's blog links to a photo of a 68-year-old code being employed in wartime, with a plausible explanation of what is going on in it. (The photo is from the Life Magazine archive we discussed when it went live.) "What you see here is a photo that never should have been allowed to be taken, and one which provides an amazing, one-of-a-kind glimpse into the world of WWII espionage and counter-espionage. As far as I can tell, what is shown in this picture is an FBI agent in New York encrypting a message, passed from 'DUNN'... through Sebold, prior to transmitting that message to Germany via shortwave radio. ... [T]his appears to be real cryptology at work."
Cellphones

Linux Kernel Booting On the iPhone 115

mhm was one of many readers to note that the Linux 2.6 kernel has been ported to the iPhone. "Planetbeing, one of the iPhone devteam members, has been working on porting Linux to the iPhone (along with a custom bootloader called OpeniBoot). Today they managed to boot the kernel! Video showing the boot process has been posted. Instructions and binaries are available on the project blog."
NASA

Hubble Repairs Hindered By Antiquated Computer Systems 193

Andrew Moseman writes "Part of the trouble NASA is encountering while fixing the Hubble Space Telescope comes from the fact that it's been up there for nearly two decades, and therefore carries computer systems long outdated here on Earth. 'One of the main computers that the Goddard team has been struggling with during the repair attempts runs on an Intel 486 chip, the height of 1989 technology.' Many of NASA's long-running missions rely on antiquated systems — the Voyager probes each have about 32k of memory — but the scientists say they can manage."
Privacy

ACLU Creates Map of US "Constitution-Free Zone" 979

trackpick points out a recent ACLU initiative to publicize a recent expansion of authority claimed by the Border Patrol to stop and search individuals up to 100 miles from any US border. They have created a map of what they call the US Constitution-Free Zone. "Using data provided by the US Census Bureau, the ACLU has determined that nearly 2/3 of the entire US population (197.4 million people) live within 100 miles of the US land and coastal borders. The government is assuming extraordinary powers to stop and search individuals within this zone. This is not just about the border: This 'Constitution-Free Zone' includes most of the nation's largest metropolitan areas.'"
Biotech

Patient "Roused From Coma" By a Magnetic Therapy 123

missb writes "Could the gentle currents from a fluctuating magnetic field be used to reverse the effects of traumatic brain injury? New Scientist reports on a patient in the US who was in a coma-like state, but can now speak very simple words after being given transcranial magnetic stimulation. This is the first time TMS has been used as a therapy to try and rouse a patient out of a coma."

Slashdot Top Deals

I have ways of making money that you know nothing of. -- John D. Rockefeller

Working...