Skip to main content

Home/ Future of the Web/ Group items tagged computing

Rss Feed Group items tagged

Paul Merrell

ISPs take GCHQ to court in UK over mass surveillance | World news | theguardian.com - 0 views

  • Internet service providers from around the world are lodging formal complaints against the UK government's monitoring service, GCHQ, alleging that it uses "malicious software" to break into their networks.The claims from seven organisations based in six countries – the UK, Netherlands, US, South Korea, Germany and Zimbabwe – will add to international pressure on the British government following Edward Snowden's revelations about mass surveillance of the internet by UK and US intelligence agencies.The claims are being filed with the investigatory powers tribunal (IPT), the court in London that assesses complaints about the agencies' activities and misuse of surveillance by government organisations. Most of its hearings are held at least partially in secret.
  • The IPT is already considering a number of related submissions. Later this month it will investigate complaints by human rights groups about the way social media sites have been targeted by GCHQ.The government has defended the security services, pointing out that online searches are often routed overseas and those deemed "external communications" can be monitored without the need for an individual warrant. Critics say that such a legal interpretation sidesteps the need for traditional intercept safeguards.The latest claim is against both GCHQ, located near Cheltenham, and the Foreign Office. It is based on articles published earlier this year in the German magazine Der Spiegel. That report alleged that GCHQ had carried out an attack, codenamed Operation Socialist, on the Belgian telecoms group, Belgacom, targeting individual employees with "malware (malicious software)".One of the techniques was a "man in the middle" attack, which, according to the documents filed at the IPT, bypasses modern encryption software and "operates by interposing the attacker [GCHQ] between two computers that believe that they are securely communicating with each other. In fact, each is communicating with GCHQ, who collect the communications, as well as relaying them in the hope that the interference will be undetected."The complaint alleges that the attacks were a breach of the Computer Misuse Act 1990 and an interference with the privacy rights of the employees under the European convention of human rights.
  • The organisations targeted, the submission states, were all "responsible and professional internet service providers". The claimants are: GreenNet Ltd, based in the UK, Riseup Networks in Seattle, Mango Email Service in Zimbabwe, Jinbonet in South Korea, Greenhost in the Netherlands, May First/People Link in New York and the Chaos Computer Club in Hamburg.
  • ...1 more annotation...
  • Among the programs said to have been operating were Turbine, which automates the injection of data and can infect millions of machines and Warrior Pride, which enables microphones on iPhones and Android devices to be remotely activated.
Gonzalo San Gil, PhD.

Organize a Giving Guide Giveaway - Free Software Foundation - December 1, 2014 - 0 views

  •  
    "by Free Software Foundation - Published on Nov 17, 2014 04:18 PM Organize an event to help people choose electronics gifts that actually give more than they take. In the flurry of holiday advertising that happens at the end of the year, many people are swept into buying freedom-denying and DRM-laden gifts that take more than they give. Each holiday season the FSF releases a Giving Guide to make it easy for you to choose tech gifts that respect your rights as a computer user and avoid those that don't. We'll be launching 2014's guide on Black Friday (November 28th), full of gifts that are fun and free, made by companies that share your values. It will be similar to 2013's Giving Guide, but more extensive and spruced up with a new design. It'll even have discounts on some of our favorite items, and translations into multiple languages."
  •  
    "by Free Software Foundation - Published on Nov 17, 2014 04:18 PM Organize an event to help people choose electronics gifts that actually give more than they take. In the flurry of holiday advertising that happens at the end of the year, many people are swept into buying freedom-denying and DRM-laden gifts that take more than they give. Each holiday season the FSF releases a Giving Guide to make it easy for you to choose tech gifts that respect your rights as a computer user and avoid those that don't. We'll be launching 2014's guide on Black Friday (November 28th), full of gifts that are fun and free, made by companies that share your values. It will be similar to 2013's Giving Guide, but more extensive and spruced up with a new design. It'll even have discounts on some of our favorite items, and translations into multiple languages."
Gonzalo San Gil, PhD.

5 Best Open Source Web Browser Security Apps - 0 views

  •  
    "The Web browser acts as the gateway for a myriad of online services these days. Computer security problems are far from solved, and technology advances provide new ways for malware to infect our devices and enter our business networks. For example, smartphones and tablets offer fresh new fields for malware-and its malicious cousin, "malvertising"-to exploit" [# ! And don't miss... # ! ... the ( 'my' ;) ) Favorite: # http://noscript.net/ (suggested in the article's readers' comments...)]
  •  
    "The Web browser acts as the gateway for a myriad of online services these days. Computer security problems are far from solved, and technology advances provide new ways for malware to infect our devices and enter our business networks. For example, smartphones and tablets offer fresh new fields for malware-and its malicious cousin, "malvertising"-to exploit"
Gonzalo San Gil, PhD.

Computer Scientists, Legal Experts Explain To Supreme Court Why APIs Are Not Copyrighta... - 0 views

  •  
    "Today, open, uncopyrightable APIs continue to spur the creation and adoption of new technologies. When programmers can freely reimplement or reverse engineer an API without obtaining a costly license or risking a lawsuit, they can create compatible software that the interface's original creator might never have envisioned or had the resources to develop."
  •  
    "Today, open, uncopyrightable APIs continue to spur the creation and adoption of new technologies. When programmers can freely reimplement or reverse engineer an API without obtaining a costly license or risking a lawsuit, they can create compatible software that the interface's original creator might never have envisioned or had the resources to develop."
Gonzalo San Gil, PhD.

Open Source Software List: 2015 Ultimate List - Datamation - 0 views

  •  
    "Every month, Datamation highlights a list of open source software related to a particular category, such as security, cloud computing, small businesses, big data, games, etc."
  •  
    "Every month, Datamation highlights a list of open source software related to a particular category, such as security, cloud computing, small businesses, big data, games, etc."
Gonzalo San Gil, PhD.

Libreboot project - 0 views

  •  
    "ibreboot is a coreboot distribution (distro) with proprietary software removed, intended to be a free (libre) 'BIOS' replacement for your computer. The project is aimed at users, attempting to make coreboot as easy to use as possible. Learn more about libreboot. 'Free' in this sense refers to freedom (liberty); read the full Free Software definition. "
Gonzalo San Gil, PhD.

Sony BMG copy protection rootkit scandal - Wikipedia, the free encyclopedia - 0 views

  •  
    "The Sony BMG CD copy protection rootkit scandal of 2005-2007 concerns deceptive, illegal, and potentially harmful copy protection measures implemented by Sony BMG on about 22 million CDs. When inserted into a computer, the CDs installed one of two pieces of software which provided a form of digital rights management (DRM) by modifying the operating system to interfere with CD copying. " [Source: arstechnica.com # ! … coming from one of the main #Malware #distributors… # ! :D [# Just one Reference: http://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal] See on Scoop.it - The Benefits of Sharing]
  •  
    "The Sony BMG CD copy protection rootkit scandal of 2005-2007 concerns deceptive, illegal, and potentially harmful copy protection measures implemented by Sony BMG on about 22 million CDs. When inserted into a computer, the CDs installed one of two pieces of software which provided a form of digital rights management (DRM) by modifying the operating system to interfere with CD copying. "
Gonzalo San Gil, PhD.

​Supercomputer leaders come together on new open-source framework | ZDNet - 0 views

  •  
    "Linux has long ruled supercomputing. In the latest TOP500 supercomputer ranking, 97 percent of the world's fastest supercomputers were running Linux. There's more to running a high-performance computer (HPC) than the operating system, and open-source software is getting organized to support it."
Gonzalo San Gil, PhD.

What's Your Threat Score? | Alternet [Via] - 1 views

  •  
    "it's a computer algorithm that steals your data and calculates your likelihood of risk and threat for the fuzz." [# Via Janet Innes-Kirkwood https://www.linkedin.com/in/janet-innes-kirkwood-23669b64]
  •  
    "it's a computer algorithm that steals your data and calculates your likelihood of risk and threat for the fuzz." [# Via Janet Innes-Kirkwood https://www.linkedin.com/in/janet-innes-kirkwood-23669b64]
Gonzalo San Gil, PhD.

LibrePlanet 2016 [March 19-20 MIT Cambridge, Massachusetts] - 0 views

  •  
    "LibrePlanet is an annual conference hosted by the Free Software Foundation for people who care about their digital freedoms, bringing together software developers, policy experts, activists, and computer users to learn skills, share accomplishments, and address challenges facing the free software movement"
  •  
    "LibrePlanet is an annual conference hosted by the Free Software Foundation for people who care about their digital freedoms, bringing together software developers, policy experts, activists, and computer users to learn skills, share accomplishments, and address challenges facing the free software movement"
Gonzalo San Gil, PhD.

Take Control of Your PC with UEFI Secure Boot | Linux Journal - 1 views

  •  
    "Nov 30, 2015 By Greig Paul in HOW-TOs Security UEFI (Unified Extensible Firmware Interface) is the open, multi-vendor replacement for the aging BIOS standard, which first appeared in IBM computers in 1976. The UEFI standard is extensive, covering the full boot architecture. This article focuses on a single useful but typically overlooked feature of UEFI: secure boot. "
Gonzalo San Gil, PhD.

Microsoft Office comes to Google's Chrome OS -- now who's Scroogled? - 1 views

  •  
    "What was once the crown jewel of software, Microsoft Office, has arguably been devalued by free offerings. It used to be that when you bought a computer, you pretty much had to buy Office too. Sure, some people got by with the low-rent Works package, but that was not the same."
  •  
    "What was once the crown jewel of software, Microsoft Office, has arguably been devalued by free offerings. It used to be that when you bought a computer, you pretty much had to buy Office too. Sure, some people got by with the low-rent Works package, but that was not the same."
Alexandra IcecreamApps

Five Reasons to Use Cross-Platform Software - Icecream Tech Digest - 0 views

  •  
    Cross-platform software is the type of program that can be installed on multiple OSs (Windows, Mac and smartphones). These types of apps are highly convenient to use and are preferred by plenty of computer and mobile users. Many software developers … Continue reading →
  •  
    Cross-platform software is the type of program that can be installed on multiple OSs (Windows, Mac and smartphones). These types of apps are highly convenient to use and are preferred by plenty of computer and mobile users. Many software developers … Continue reading →
Gonzalo San Gil, PhD.

Why open source has been a tremendous accelerator for Monsanto | The Enterprisers Proje... - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! #Identification of #OpenSource with #Monsanto # ! is a #wrong #move.. # ! more yet, coming from a '#RedHat sponsored' publication # ! ... despite it could represent a good 'investor support' issue... # ! :(
  •  
    "Our IT organization is continuing to evolve as we engage more in open source. Whether it be what we use for distributed processing, for databases, or to accelerate our compute power or data visualization, we continue to expand the number of open technologies we explore."
  •  
    "Our IT organization is continuing to evolve as we engage more in open source. Whether it be what we use for distributed processing, for databases, or to accelerate our compute power or data visualization, we continue to expand the number of open technologies we explore."
Gonzalo San Gil, PhD.

What's your vision for the FSF? Fill out our survey - Free Software Foundation - workin... - 1 views

  •  
    [ by Zak Rogoff - Published on Jan 08, 2016 08:01 PM 2015 was the Free Software Foundation's (FSF) thirtieth year defending and advancing computer users' rights. The free software community has sustained the Foundation throughout these decades and been deeply involved in our work. We continue to rely on the expertise of the free software movement to inform our initiatives and strategies. Taking the first step into our next thirty years, we want to hear your feedback, your suggestions, and your vision for the future of the FSF. Fill out the survey now!]
  •  
    [ by Zak Rogoff - Published on Jan 08, 2016 08:01 PM 2015 was the Free Software Foundation's (FSF) thirtieth year defending and advancing computer users' rights. The free software community has sustained the Foundation throughout these decades and been deeply involved in our work. We continue to rely on the expertise of the free software movement to inform our initiatives and strategies. Taking the first step into our next thirty years, we want to hear your feedback, your suggestions, and your vision for the future of the FSF. Fill out the survey now!]
Paul Merrell

What are rare earth metals & why they are China's 'nuclear option' in trade war with US... - 0 views

  • The escalating US-China trade conflict has raised concerns about the measures each side could use in their fight, including Beijing’s option to restrict exports of rare earth metals. The economic measure is dubbed as one of Beijing’s nuclear options in its battle with Washington due to the fact that China is the top producer of rare earth metals and holds the largest reserves.
  • The United States relies on China, the leading global supplier, for about 80 percent of its rare earths.
  • China controls around 85-95 percent of all the rare earths’ production and supply. Last year, the country produced about 78 percent of the global volume of rare earths.
  • ...2 more annotations...
  • The metals and alloys that contain them are used in many devices that people use every day such as computer memory, DVDs, rechargeable batteries, cell phones, catalytic converters, magnets, fluorescent lighting and so on.During the past 20 years, there has been an explosion in demand for many items that require rare earth metals. There were very few cell phones in use then but the number has risen to over seven billion in use today. Rare earths’ use in computers has grown almost as fast as the number of cell phones.Many rechargeable batteries are made with rare earth compounds. Demand for the batteries is being driven by demand for portable electronic devices such as cell phones, readers, portable computers, and cameras.Rare earths are also used as catalysts, phosphors, and polishing compounds for air pollution control, illuminated screens on electronic devices, and much more. All of those products are expected to experience rising demand.
  • He explained that China could cripple global industry, especially emerging technologies, if it were to ban exports of rare earth materials. There are very few options in sourcing those essential technology metals from anywhere else, the analyst said. “Of course, China does not necessarily want to do this, because, it plays a long game – and it does not want the West to develop alternatives.”
Paul Merrell

The Spectre of an Advertising Meltdown: What You Need to Know - Lawfare - 0 views

  • The information security world is focused on two new security vulnerabilities, “Spectre” and “Meltdown”, that represent vulnerabilities embedded in computer hardware. Lawfare readers should respond in two ways: keep their operating systems up to date and, critically, install an ad-blocker for your web browser. (Here are guides on how to do so in Chrome and Firefox.) In fact, a proper response to Spectre should involve ad-blocking on all government computers. Other than that, don’t worry. Readers who just wanted to know what to do can stop reading. But for those curious about some of the technical background on these vulnerabilities and why ad-blocking is an essential security measure for a modern computer, read on.
Paul Merrell

Elon Musk wants brain implants to merge humans with artificial intelligence | Science |... - 0 views

  • Elon Musk and his team of boffins are exploring ways in which they can connect a computer interface to the mind. The South African-born billionaire claims to have already trialled the revolutionary device on a monkey which was able to control the computer with its brain. Mr Musk said at a presentation on Tuesday: “A monkey has been able to control the computer with his brain.”
  • NeuraLink describes the device as “sewing machine-like”. The system implants ultra-thin threads deep into the brain’s nervous system.The company has applied to US regulators in the hopes of beginning trials on humans next year.Primarily, the firm states that initially it wants to help people with severe neurological conditions, but as with all of his companies, Mr Musk is aiming for more and sees humanity’s future as having “superhuman cognition”.The device in question, which is nameless so far, will see the tiny thread fitted with 3,000 electrodes which can monitor the activity of 1,000 neurons.
  • Mr Musk hopes the product will be on the market within four years.
Gonzalo San Gil, PhD.

copyleft [www.computerlaw.com.au] - 0 views

  •  
    [Steve White, Principal - White SW Computer Law In Australia, copyright protection arises as soon as an original copyright work is created. The copyright laws dictate who the copyright owner is and how long the protection lasts. Copyleft is a form of licensing by which the copyright owner may waive their rights and allow other people to share and make further amendments to the work. The concept of Copyleft is used particularly in relation to software. The idea behind Copyleft is to ensure that an individual cannot take advantage of being able to modify a free software program and then sell the resulting modified program as a new work. In some cases, any modifications made to a Copyleft program must be made freely available to all parties interested in using them. The GNU public licence is an example of a Copyleft licence. ]
  •  
    The Future is Free or it won't be.
Paul Merrell

Smartphone innovation: Where we're going next (Smartphones Unlocked) | Dialed In - CNET... - 0 views

  • With his shaggy, sandy blond hair and a 5-o'clock shadow, Mark Rolston, the creative director for Frog Design, has studied technology for the better part of two decades. As he sees it, smartphones are just about out of evolutionary advances. Sure, form factors and materials might alter as manufacturers grasp for differentiating design, but in terms of innovative leaps, Rolston says, "we're at the end of gross innovation for smartphones." That isn't to say smartphones are dead or obsolete. Just the contrary. As Rolston and other future thinkers who study the mobile space conclude, smartphones will become increasingly impactful in interacting with our surrounding world, but more as one smaller piece of a much large, interconnected puzzle abuzz with data transfer and information. We'll certainly see more crazy camera software and NFC features everywhere, but there's much, much more to look forward to besides.
  • You may have never given two thoughts to the sensors that come on you smartphone. They don't mind. They're still there anyway, computing data on your phone's movement and speed, rotation, and lighting conditions. These under-appreciated components -- the gyroscope, accelerometer, magnetometer, and so forth -- are starting to get more friends in the neighborhood. Samsung, for instance, slipped pressure, temperature, and humidity sniffers into the Galaxy S4. They may not be the sexiest feature in your phone, but in the future, sensors like accelerometers will be able to collect and report much more detailed information.
  • If you've made it here, you'll start seeing a general theme: in the forward-looking smartphone environment of our future, our devices are anything but isolated. Instead, smartphones will come with more components and communications tools to interact more than ever before with people and other devices. We already see some communication with Wi-Fi Direct, Bluetooth, and NFC communications protocols, plus newcomers like the Miracast standard. In short, the kind of innovation we see in the mobile space may have more to do with getting your smartphone to communicate with other computing devices in the ecosystem than it will have with how many megapixels or ultrapixels your camera lens possesses or what kind of leather was used to finish the chassis.
  • ...5 more annotations...
  • An extension of the smartphone as medical device is what Ideo's Blakely terms "appcessories," a set of highly specialized peripheral software that fulfills very targeted needs, stuff that most people wouldn't want their everyday phone.
  • . Let's say you're in a bar or at a conference and you want to meet people, he says. Extremely precise sensors track exactly where you are indoors. Point the phone toward a person in the crowd and her pertinent information pops onto the screen: who she is, what she does, and maybe some backgrou
  • Into the coffee shop of tomorrow walks a techie of tomorrow. He or she is decked out in wearable tech from head to toe -- the Bluetooth earring or ear cuff tucked into a lobe; Google glasses beaming up maps and directions; a smartwatch that takes your vitals, deals with mobile payments, and serves as a console for the most important functions. Then there's the smartphone slipped into the pocket for more complicated tasks or to serve as a "big" screen, and the smart shoes that calculate distance, underfoot conditions, and analyze your gait. Your smartphone is still there, still essential for communicating with your environment, but it becomes only one device in a collection of other, even more personal or convenient gadgets, that solve some of the same sorts of problems in different or complimentary ways.
  • The scenario above isn't all that outlandish, especially given the rise of smartwatches, which still have a ways to go before becoming truly well-rounded devices. Crazy tech that interacts with your body has been in development for some time. To illustrate the point, Frog's Rolston brought a pair of Necomimi Brainwave Cat Ears to our interview. The fuzzy "ears," which have been on sale for about two years, sit atop a headband. A sensor protrudes from the band onto your forehead and a dangling clip closes the circuit when you attach it to your earlobe. The cat ears swivel and twitch in concert with your brain waves, a bizarre and surprisingly giddy sensation. Necomimi's contraption isn't particularly useful or flattering, but its brain-reading sensors underscore the kind of close, personal interaction that can occur when tech "talks." Paired with a smartphone app, what could this contraption share about our brains when we wake or sleep?
  • The point is this: smartphones aren't going anywhere. But instead of a focusing on the world within the phone's screen, the smartphone will be tuned more than ever before to the world around you.
« First ‹ Previous 141 - 160 of 387 Next › Last »
Showing 20 items per page