Wastholm.com

In a paper presented earlier this week at the Usenix Workshop on Large-Scale Exploits and Emergent Threats, the researchers demonstrated how they used the technique to continuously spy on BitTorrent users for 103 days. They collected 148 million IP addresses and identified 2 billion copies of downloads, many of them copyrighted.

The researchers, from the French National Institute for Research in Computer Science and Control, also identified the IP addresses where much of the content originated. They discovered the the vast majority of the material on BitTorrent started with a relatively small number of individuals.

In other words, the entertainment industry thinks consumers should voluntarily install software that constantly scans our computers and identifies (and perhaps deletes) files found to be "infringing." It's hard to believe the industry thinks savvy, security-conscious consumers would voluntarily do so. But those who remember the Sony BMG rootkit debacle know that the entertainment industry is all too willing to sacrifice consumers at the altar of copyright enforcement.

New information uncovered by Silicon Alley Insider suggests that some of the complaints against Mark Zuckerberg are valid.

It also suggests that, on at least one occasion in 2004, Mark used private login data taken from Facebook's servers to break into Facebook members' private email accounts and read their emails--at best, a gross misuse of private information. Lastly, it suggests that Mark hacked into the competing company's systems and changed some user information with the aim of making the site less useful.

We'd like to think of ourselves as dynamic, unpredictable individuals, but according to new research, that's not the case at all. In a study published in last week's Science, researchers looked at customer location data culled from cellular service providers. By looking at how customers moved around, the authors of the study found that it may be possible to predict human movement patterns and location up to 93 percent of the time. These findings may be useful in multiple fields, including city planning, mobile communication resource management, and anticipating the spread of viruses.

Let's just say it: Nobody has changed the way we interact with technology like Apple has over the last 10 years. Even if the iPad turns out to be the disaster that many are anticipating, Steve Jobs will still be seen as the hero who turns top-end technology into friendly little gadgets even your grandma can use.

But recently, a faint chorus has been growing--thousands of tech geeks suggesting that if you look under Apple's shiny white veneer, you'll find some practices that are less than user friendly. In fact, some of the things Jobs and Apple are being accused of are so over the top, Lex Luthor would have to take off his hat ... and then use it to cover the dark stain spreading across the front of his pants.

In this short essay, written for a symposium in the San Diego Law Review, Professor Daniel Solove examines the nothing to hide argument. When asked about government surveillance and data mining, many people respond by declaring: "I've got nothing to hide." According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private. The nothing to hide argument and its variants are quite prevalent, and thus are worth addressing. In this essay, Solove critiques the nothing to hide argument and exposes its faulty underpinnings.

TrackMeNot runs in Firefox as a low-priority background process that periodically issues randomized search-queries to popular search engines, e.g., AOL, Yahoo!, Google, and Bing. It hides users' actual search trails in a cloud of 'ghost' queries, significantly increasing the difficulty of aggregating such data into accurate or identifying user profiles. To better simulate user behavior TrackMeNot uses a dynamic query mechanism to 'evolve' each client (uniquely) over time, parsing the results of its searches for 'logical' future query terms with which to replace those already used.

The new Microsoft WAT [Windows Activation Technologies] regime relies upon a series of autonomous "cradle to grave" authentication verification connections to a central and ever-expanding Microsoft piracy signature database, even in the absence of major hardware changes or other significant configuration alterations that might otherwise cause the OS or local applications to query the user for explicit permission to reauthenticate.

Microsoft will trigger forced downgrading to non-genuine status if they believe a Windows 7 system is potentially pirated based on their "phone home" checks that will occur at (for now) 90 day intervals during the entire life of Windows 7 on a given PC, even months or years after purchase.

EU-parlamentet röstade i dag ned det omstridda Swiftavtalet. Den konservativa gruppen försökte in i det sista få omröstningen uppskjuten – men nejsidan segrade. Välinformerade källor säger dock till DN.se att USA oavsett detta kommer att skaffa sig tillgång till sekretssbelagda uppgifter från europeiska banker.

...

Men EU-parlamentets skepsis mot Swiftavtalet ingår också dragkampen med ministerrådet och kommissionen om hur makten ska fördelas nu när Lissabonfördragets nya regler trätt i kraft. Fördraget ger parlamentet väsentligt mer makt, men hur det kommer att se ut på detaljnivå är inte klart.

En av dessa saker är argumentet om att den som har rent mjöl i påsen inte har något att frukta. Det är ett sånt där argument som 'vanligt hederligt' folk går med på, och kanske till och med använder själva lite då och då. Problemet med det här argumentet är dock att det inte är ett argument. Det är inte heller ett pseudoargument. Det är - och jag gör här ett noggrant och väl avvägt urval av de många begrepp jag har lärt mig använda under mina år på universitetet - ett skitargument.

|< First   < Previous   81–90 (151)   Next >   Last >|