Skip to main content

Home/ Future of the Web/ Group items tagged Tech

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

US Congressman: To stop ISIS, let's shut down websites and social media | Ars Technica UK - 0 views

  •  
    Terrorists are using the Internet against us, lawmaker says. by Jon Brodkin (US) - Nov 18, 2015 7:12am CET
Gonzalo San Gil, PhD.

France looking at banning Tor, blocking public Wi-Fi | Ars Technica UK [# ! Note] - 0 views

  •  
    "Leaked documents from Ministry of Interior show a worryingly illiberal trend for France. by Sebastian Anthony - Dec 7, 2015 12:01pm CET"
Gonzalo San Gil, PhD.

Authors side with Apple in e-book price-fixing Supreme Court appeal | Ars Technica UK - 0 views

  •  
    "Case undermines "the very objective of antitrust law-to ensure robust competition." by David Kravets (US) - Dec 4, 2015 12:37am CET"
Alexandra IcecreamApps

Best Charging Stations - Icecream Tech Digest - 0 views

  •  
    Living in a modern world, we tend to use plenty of devices at one time. We chat with friends and family using smartphones, we choose the best route to destination using a GPS navigator, we enjoy our music on an iPod or MP3 player, and we browse the …
  •  
    Living in a modern world, we tend to use plenty of devices at one time. We chat with friends and family using smartphones, we choose the best route to destination using a GPS navigator, we enjoy our music on an iPod or MP3 player, and we browse the …
Alexandra IcecreamApps

Free Printable Calendars: Best Websites - Icecream Tech Digest - 0 views

  •  
    It's hard to believe, but it's already December. Brace yourselves, winter is coming. In a little less than a month a new calendar year will start. All the mistypes and crossed out 5s in the date fields of all documents and papers will appear. Due to…
  •  
    It's hard to believe, but it's already December. Brace yourselves, winter is coming. In a little less than a month a new calendar year will start. All the mistypes and crossed out 5s in the date fields of all documents and papers will appear. Due to…
Gonzalo San Gil, PhD.

You may soon need a licence to take photos of that classic designer chair you bought | ... - 0 views

  •  
    "Changes to UK copyright law will soon mean that you may need to take out a licence to photograph classic designer objects even if you own them."
Alexandra IcecreamApps

Best ePub Readers for Windows - Icecream Tech Digest - 0 views

  •  
    One of the best ways of spending a winter evening is with a great book. Right away we imagine super cozy pictures of a person being in a comfortable position on a sofa under a warm blanket with a book in hand. However, the number of people that imag…
  •  
    One of the best ways of spending a winter evening is with a great book. Right away we imagine super cozy pictures of a person being in a comfortable position on a sofa under a warm blanket with a book in hand. However, the number of people that imag…
Gonzalo San Gil, PhD.

Copyright case over "Happy Birthday" is done, trial cancelled | Ars Technica UK - 0 views

  •  
    "Settlement details aren't yet public, but Warner/Chappell isn't happy. by Joe Mullin (US) - Dec 10, 2015 8:22am CET"
Paul Merrell

Bulk Collection Under Section 215 Has Ended… What's Next? | Just Security - 0 views

  • The first (and thus far only) roll-back of post-9/11 surveillance authorities was implemented over the weekend: The National Security Agency shuttered its program for collecting and holding the metadata of Americans’ phone calls under Section 215 of the Patriot Act. While bulk collection under Section 215 has ended, the government can obtain access to this information under the procedures specified in the USA Freedom Act. Indeed, some experts have argued that the Agency likely has access to more metadata because its earlier dragnet didn’t cover cell phones or Internet calling. In addition, the metadata of calls made by an individual in the United States to someone overseas and vice versa can still be collected in bulk — this takes place abroad under Executive Order 12333. No doubt the NSA wishes that this was the end of the surveillance reform story and the Paris attacks initially gave them an opening. John Brennan, the Director of the CIA, implied that the attacks were somehow related to “hand wringing” about spying and Sen. Tom Cotton (R-Ark.) introduced a bill to delay the shut down of the 215 program. Opponents of encryption were quick to say: “I told you so.”
  • But the facts that have emerged thus far tell a different story. It appears that much of the planning took place IRL (that’s “in real life” for those of you who don’t have teenagers). The attackers, several of whom were on law enforcement’s radar, communicated openly over the Internet. If France ever has a 9/11 Commission-type inquiry, it could well conclude that the Paris attacks were a failure of the intelligence agencies rather than a failure of intelligence authorities. Despite the passage of the USA Freedom Act, US surveillance authorities have remained largely intact. Section 702 of the FISA Amendments Act — which is the basis of programs like PRISM and the NSA’s Upstream collection of information from Internet cables — sunsets in the summer of 2017. While it’s difficult to predict the political environment that far out, meaningful reform of Section 702 faces significant obstacles. Unlike the Section 215 program, which was clearly aimed at Americans, Section 702 is supposedly targeted at foreigners and only picks up information about Americans “incidentally.” The NSA has refused to provide an estimate of how many Americans’ information it collects under Section 702, despite repeated requests from lawmakers and most recently a large cohort of advocates. The Section 215 program was held illegal by two federal courts (here and here), but civil attempts to challenge Section 702 have run into standing barriers. Finally, while two review panels concluded that the Section 215 program provided little counterterrorism benefit (here and here), they found that the Section 702 program had been useful.
  • There is, nonetheless, some pressure to narrow the reach of Section 702. The recent decision by the European Court of Justice in the safe harbor case suggests that data flows between Europe and the US may be restricted unless the PRISM program is modified to protect the information of Europeans (see here, here, and here for discussion of the decision and reform options). Pressure from Internet companies whose business is suffering — estimates run to the tune of $35 to 180 billion — as a result of disclosures about NSA spying may also nudge lawmakers towards reform. One of the courts currently considering criminal cases which rely on evidence derived from Section 702 surveillance may hold the program unconstitutional either on the basis of the Fourth Amendment or Article III for the reasons set out in this Brennan Center report. A federal district court in Colorado recently rejected such a challenge, although as explained in Steve’s post, the decision did not seriously explore the issues. Further litigation in the European courts too could have an impact on the debate.
  • ...2 more annotations...
  • The US intelligence community’s broadest surveillance authorities are enshrined in Executive Order 12333, which primarily covers the interception of electronic communications overseas. The Order authorizes the collection, retention, and dissemination of “foreign intelligence” information, which includes information “relating to the capabilities, intentions or activities of foreign powers, organizations or persons.” In other words, so long as they are operating outside the US, intelligence agencies are authorized to collect information about any foreign person — and, of course, any Americans with whom they communicate. The NSA has conceded that EO 12333 is the basis of most of its surveillance. While public information about these programs is limited, a few highlights give a sense of the breadth of EO 12333 operations: The NSA gathers information about every cell phone call made to, from, and within the Bahamas, Mexico, Kenya, the Philippines, and Afghanistan, and possibly other countries. A joint US-UK program tapped into the cables connecting internal Yahoo and Google networks to gather e-mail address books and contact lists from their customers. Another US-UK collaboration collected images from video chats among Yahoo users and possibly other webcam services. The NSA collects both the content and metadata of hundreds of millions of text messages from around the world. By tapping into the cables that connect global networks, the NSA has created a database of the location of hundreds of millions of mobile phones outside the US.
  • Given its scope, EO 12333 is clearly critical to those seeking serious surveillance reform. The path to reform is, however, less clear. There is no sunset provision that requires action by Congress and creates an opportunity for exposing privacy risks. Even in the unlikely event that Congress was inclined to intervene, it would have to address questions about the extent of its constitutional authority to regulate overseas surveillance. To the best of my knowledge, there is no litigation challenging EO 12333 and the government doesn’t give notice to criminal defendants when it uses evidence derived from surveillance under the order, so the likelihood of a court ruling is slim. The Privacy and Civil Liberties Oversight Board is currently reviewing two programs under EO 12333, but it is anticipated that much of its report will be classified (although it has promised a less detailed unclassified version as well). While the short-term outlook for additional surveillance reform is challenging, from a longer-term perspective, the distinctions that our law makes between Americans and non-Americans and between domestic and foreign collection cannot stand indefinitely. If the Fourth Amendment is to meaningfully protect Americans’ privacy, the courts and Congress must come to grips with this reality.
Alexandra IcecreamApps

Android vs. iPhone - Icecream Tech Digest - 0 views

  •  
    Lately, smartphone users are divided into two groups: Android supporters and iPhone worshipers. Not mentioning Windows phones, basically the majority of all users tend to have either an Android phone or an iPhone. The Android vs. iPhone battle is a …
  •  
    Lately, smartphone users are divided into two groups: Android supporters and iPhone worshipers. Not mentioning Windows phones, basically the majority of all users tend to have either an Android phone or an iPhone. The Android vs. iPhone battle is a …
Gonzalo San Gil, PhD.

EU vice-president: Copyright legislation is "pushing people to steal" | Ars Technica UK - 1 views

  •  
    "Ansip says people will pay for legal services if they are made available. by Glyn Moody - Jun 9, 2015 6:53pm CEST"
Gonzalo San Gil, PhD.

Linux Kernel 4.2.4 Is Now Available for Download, Has Hundreds of Changes - Softpedia - 0 views

  •  
    "All users of the Linux 4.2 kernel must upgrade It looks like it's still October 22 in some countries, so Greg Kroah-Hartman announced just a few minutes ago the immediate availability for download of the fourth maintenance release of Linux kernel 4.2."
  •  
    "All users of the Linux 4.2 kernel must upgrade It looks like it's still October 22 in some countries, so Greg Kroah-Hartman announced just a few minutes ago the immediate availability for download of the fourth maintenance release of Linux kernel 4.2."
Alexandra IcecreamApps

New Features of Icecream Ebook Reader - Icecream Tech Digest - 0 views

  •  
    Recently, we did a huge and important update on the Icecream Ebook Reader and added new and awesome features to it for an even better eBook reading process. Finding a decent software to manage eBooks is a rather complicated process. That's why we wa…
  •  
    Recently, we did a huge and important update on the Icecream Ebook Reader and added new and awesome features to it for an even better eBook reading process. Finding a decent software to manage eBooks is a rather complicated process. That's why we wa…
Gonzalo San Gil, PhD.

Pre-crime arrives in the UK: Better make sure your face stays off the crowdsourced watc... - 0 views

  •  
    "You can now be ushered out of a shop, even if you haven't done anything wrong yet. by Sebastian Anthony - Dec 17, 2015 1:15pm CET"
  •  
    "You can now be ushered out of a shop, even if you haven't done anything wrong yet. by Sebastian Anthony - Dec 17, 2015 1:15pm CET"
Gonzalo San Gil, PhD.

French government rejects crypto backdoors as "the wrong solution" | Ars Technica UK - 0 views

  •  
    "Why can't we have cabinet ministers as clued-up as Axelle Lemaire? by Glyn Moody - Jan 14, 2016 3:22pm CET"
Gonzalo San Gil, PhD.

[# ! (#Free) #Tech:] Manage your Linux Box with htop - Freedom Penguin - 0 views

  •  
    "January 14, 2016 Joe Collins 0 Comment How To There is one application that I simply must have on every Linux system I install and that's htop. It doesn't matter whether it's a virtual machine or installed on hardware. It doesn't matter what distribution it is or whether the system is running a GUI Desktop Environment or not, I gotta have htop. It has become such an integral part of "
  •  
    "January 14, 2016 Joe Collins 0 Comment How To There is one application that I simply must have on every Linux system I install and that's htop. It doesn't matter whether it's a virtual machine or installed on hardware. It doesn't matter what distribution it is or whether the system is running a GUI Desktop Environment or not, I gotta have htop. It has become such an integral part of "
Gonzalo San Gil, PhD.

Florida sheriff pledges to arrest CEO Tim Cook if Apple resists crypto cooperation | Ar... - 1 views

  •  
    "If Apple wouldn't comply with a court order, sheriff vows: "I'll lock the rascal up." by Cyrus Farivar (US) - Mar 12, 2016 8:15pm CET"
Alexandra IcecreamApps

Five Reasons to Use Cross-Platform Software - Icecream Tech Digest - 0 views

  •  
    Cross-platform software is the type of program that can be installed on multiple OSs (Windows, Mac and smartphones). These types of apps are highly convenient to use and are preferred by plenty of computer and mobile users. Many software developers … Continue reading →
  •  
    Cross-platform software is the type of program that can be installed on multiple OSs (Windows, Mac and smartphones). These types of apps are highly convenient to use and are preferred by plenty of computer and mobile users. Many software developers … Continue reading →
Gonzalo San Gil, PhD.

Patent that cost Microsoft millions gets invalidated | Ars Technica UK - 1 views

  •  
    "For over a decade, Uniloc pursued royalties for various anti-piracy schemes. by Joe Mullin (US) - Mar 26, 2016 9:22am CET"
Paul Merrell

Apple's New Challenge: Learning How the U.S. Cracked Its iPhone - The New York Times - 0 views

  • Now that the United States government has cracked open an iPhone that belonged to a gunman in the San Bernardino, Calif., mass shooting without Apple’s help, the tech company is under pressure to find and fix the flaw.But unlike other cases where security vulnerabilities have cropped up, Apple may face a higher set of hurdles in ferreting out and repairing the particular iPhone hole that the government hacked.The challenges start with the lack of information about the method that the law enforcement authorities, with the aid of a third party, used to break into the iPhone of Syed Rizwan Farook, an attacker in the San Bernardino rampage last year. Federal officials have refused to identify the person, or organization, who helped crack the device, and have declined to specify the procedure used to open the iPhone. Apple also cannot obtain the device to reverse-engineer the problem, the way it would in other hacking situations.
  •  
    It would make a very interesting Freedom of Information Act case if Apple sued under that Act to force disclosure of the security hole iPhone product defect the FBI exploited. I know of no interpretation of the law enforcement FOIA exemption that would justify FBI disclosure of the information. It might be alleged that the information is the trade secret of the company that disclosed the defect and exploit to the the FBI, but there's a very strong argument that the fact that the information was shared with the FBI waived the trade secrecy claim. And the notion that government is entitled to collect product security defects and exploit them without informing the exploited product's company of the specific defect is extremely weak.  Were I Tim Cook, I would have already told my lawyers to get cracking on filing the FOIA request with the FBI to get the legal ball rolling. 
« First ‹ Previous 321 - 340 of 383 Next › Last »
Showing 20 items per page