Skip to main content

Home/ Future of the Web/ Group items tagged impossible

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Popcorn Time Now "Impossible" to Shut Down | TorrentFreak - 1 views

  •  
    " Ernesto on November 6, 2014 C: 17 News The Popcorn Time fork formally known as Time4Popcorn has released a new version of its client which they say is "impossible" to take down. The change is a direct response to the EURid domain suspension last month. In addition, the fork promises to enable seeding support so its users have the option not to leech from the BitTorrent network."
  •  
    " Ernesto on November 6, 2014 C: 17 News The Popcorn Time fork formally known as Time4Popcorn has released a new version of its client which they say is "impossible" to take down. The change is a direct response to the EURid domain suspension last month. In addition, the fork promises to enable seeding support so its users have the option not to leech from the BitTorrent network."
Gonzalo San Gil, PhD.

Researchers Make BitTorrent Anonymous and Impossible to Shut Down | TorrentFreak [# Via... - 1 views

  •  
    [ Ernesto on December 18, 2014 C: 0 Breaking While the BitTorrent ecosystem is filled with uncertainty and doubt, researchers at Delft University of Technology have released the first version of their anonymous and decentralized BitTorrent network. "Tribler makes BitTorrent anonymous and impossible to shut down," lead researcher Prof. Pouwelse says. ...]
Gonzalo San Gil, PhD.

KickassTorrents Goes Secure, Encrypts Traffic For All Visitors | TorrentFreak - 0 views

  •  
    " Ernesto on August 31, 2014 C: 50 News KickassTorrents is the first large torrent site to bump up its security and force SSL encryption for all visitors. This makes it impossible for outsiders, Internet providers included, to monitor page visits or snoop on data being sent."
  •  
    " Ernesto on August 31, 2014 C: 50 News KickassTorrents is the first large torrent site to bump up its security and force SSL encryption for all visitors. This makes it impossible for outsiders, Internet providers included, to monitor page visits or snoop on data being sent."
  •  
    " Ernesto on August 31, 2014 C: 50 News KickassTorrents is the first large torrent site to bump up its security and force SSL encryption for all visitors. This makes it impossible for outsiders, Internet providers included, to monitor page visits or snoop on data being sent."
Gonzalo San Gil, PhD.

Chile's New Copyright Legislation Would Make Creative Commons Licensing Impossible For ... - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! Copyright to stiffle the right to creation... ()# ! Think that, in fact, every work is always a 'derivative' work...( :/
  •  
    "Techdirt has written many times about the way in which copyright only ever seems to get stronger, and how different jurisdictions point to other examples of excessive copyright to justify making their own just as bad. In Chile, there's an interesting example of that kind of copyright ratchet being applied in the same country but to different domains. It concerns audiovisual works, and aims to give directors, screenwriters and others new rights to "match" those that others enjoy"
  •  
    "Techdirt has written many times about the way in which copyright only ever seems to get stronger, and how different jurisdictions point to other examples of excessive copyright to justify making their own just as bad. In Chile, there's an interesting example of that kind of copyright ratchet being applied in the same country but to different domains. It concerns audiovisual works, and aims to give directors, screenwriters and others new rights to "match" those that others enjoy"
Gonzalo San Gil, PhD.

http://www.linux-server-security.com/linux_servers_howtos/linux_monitor_network_nload.html - 0 views

  •  
    "©2016 Chris Binnie On a continually changing network it is often difficult to spot issues due to the amount of noise generated by expected network traffic. Even when communications are seemingly quiet a packet sniffer will display screeds of noisy data. That data might be otherwise unseen broadcast traffic being sent to all hosts willing to listen and respond on a local network. Make no mistake, noise on a network link can cause all sorts of headaches because it can be impossible to identify trends quickly, especially if a host or the network itself is under attack. Packet sniffers will clearly display more traffic for the busiest connections which ultimately obscures the activities of less busy hosts."
  •  
    "©2016 Chris Binnie On a continually changing network it is often difficult to spot issues due to the amount of noise generated by expected network traffic. Even when communications are seemingly quiet a packet sniffer will display screeds of noisy data. That data might be otherwise unseen broadcast traffic being sent to all hosts willing to listen and respond on a local network. Make no mistake, noise on a network link can cause all sorts of headaches because it can be impossible to identify trends quickly, especially if a host or the network itself is under attack. Packet sniffers will clearly display more traffic for the busiest connections which ultimately obscures the activities of less busy hosts."
Paul Merrell

Surveillance scandal rips through hacker community | Security & Privacy - CNET News - 0 views

  • One security start-up that had an encounter with the FBI was Wickr, a privacy-forward text messaging app for the iPhone with an Android version in private beta. Wickr's co-founder Nico Sell told CNET at Defcon, "Wickr has been approached by the FBI and asked for a backdoor. We said, 'No.'" The mistrust runs deep. "Even if [the NSA] stood up tomorrow and said that [they] have eliminated these programs," said Marlinspike, "How could we believe them? How can we believe that anything they say is true?" Where does security innovation go next? The immediate future of information security innovation most likely lies in software that provides an existing service but with heightened privacy protections, such as webmail that doesn't mine you for personal data.
  • Wickr's Sell thinks that her company has hit upon a privacy innovation that a few others are also doing, but many will soon follow: the company itself doesn't store user data. "[The FBI] would have to force us to build a new app. With the current app there's no way," she said, that they could incorporate backdoor access to Wickr users' texts or metadata. "Even if you trust the NSA 100 percent that they're going to use [your data] correctly," Sell said, "Do you trust that they're going to be able to keep it safe from hackers? What if somebody gets that database and posts it online?" To that end, she said, people will start seeing privacy innovation for services that don't currently provide it. Calling it "social networks 2.0," she said that social network competitors will arise that do a better job of protecting their customer's privacy and predicted that some that succeed will do so because of their emphasis on privacy. Abine's recent MaskMe browser add-on and mobile app for creating disposable e-mail addresses, phone numbers, and credit cards is another example of a service that doesn't have access to its own users' data.
  • Stamos predicted changes in services that companies with cloud storage offer, including offering customers the ability to store their data outside of the U.S. "If they want to stay competitive, they're going to have to," he said. But, he cautioned, "It's impossible to do a cloud-based ad supported service." Soghoian added, "The only way to keep a service running is to pay them money." This, he said, is going to give rise to a new wave of ad-free, privacy protective subscription services.
  • ...2 more annotations...
  • The issue with balancing privacy and surveillance is that the wireless carriers are not interested in privacy, he said. "They've been providing wiretapping for 100 years. Apple may in the next year protect voice calls," he said, and said that the best hope for ending widespread government surveillance will be the makers of mobile operating systems like Apple and Google. Not all upcoming security innovation will be focused on that kind of privacy protection. Security researcher Brandon Wiley showed off at Defcon a protocol he calls Dust that can obfuscate different kinds of network traffic, with the end goal of preventing censorship. "I only make products about letting you say what you want to say anywhere in the world," such as content critical of governments, he said. Encryption can hide the specifics of the traffic, but some governments have figured out that they can simply block all encrypted traffic, he said. The Dust protocol would change that, he said, making it hard to tell the difference between encrypted and unencrypted traffic. It's hard to build encryption into pre-existing products, Wiley said. "I think people are going to make easy-to-use, encrypted apps, and that's going to be the future."
  • Companies could face severe consequences from their security experts, said Stamos, if the in-house experts find out that they've been lied to about providing government access to customer data. You could see "lots of resignations and maybe publicly," he said. "It wouldn't hurt their reputations to go out in a blaze of glory." Perhaps not surprisingly, Marlinspike sounded a hopeful call for non-destructive activism on Defcon's 21st anniversary. "As hackers, we don't have a lot of influence on policy. I hope that's something that we can focus our energy on," he said.
  •  
    NSA as the cause of the next major disruption in the social networking service industry?  Grief ahead for Google? Note the point made that: "It's impossible to do a cloud-based ad supported service" where the encryption/decryption takes place on the client side. 
Gonzalo San Gil, PhD.

Audio-Video Production On Linux: Best Software - Datamation - 0 views

  •  
    "Over the years, I've heard both Windows users and Linux enthusiasts make the claim that professional media production on Linux is impossible. While there may be some workflows so over-engineered that legacy software is a must, I firmly believe that, with effort, using Linux for media production is doable."
  •  
    "Over the years, I've heard both Windows users and Linux enthusiasts make the claim that professional media production on Linux is impossible. While there may be some workflows so over-engineered that legacy software is a must, I firmly believe that, with effort, using Linux for media production is doable."
Gonzalo San Gil, PhD.

YEAR of the PENGUIN: A Linux mobile in 2015? * The Register - 0 views

  •  
    "It's nearly impossible to sum up an entire year of developments in something as large and nebulous as the world of desktop Linux, especially in a year like this one which has seen some the best releases that projects like Mint, Fedora and openSUSE have put out to date."
  •  
    "It's nearly impossible to sum up an entire year of developments in something as large and nebulous as the world of desktop Linux, especially in a year like this one which has seen some the best releases that projects like Mint, Fedora and openSUSE have put out to date."
Gonzalo San Gil, PhD.

How to Save the Net | Magazine | WIRED - 1 views

  •  
    By Wired Magazine 08.19.14 | 6:30 am | Permalink It's impossible to overstate how much the Internet matters. It has forever altered how we share information and store it for safekeeping, how we communicate with political leaders, how we document atrocities and hold wrongdoers accountable, how we consume entertainment and create it, even how we meet others and maintain relationships."
  •  
    By Wired Magazine 08.19.14 | 6:30 am | Permalink It's impossible to overstate how much the Internet matters. It has forever altered how we share information and store it for safekeeping, how we communicate with political leaders, how we document atrocities and hold wrongdoers accountable, how we consume entertainment and create it, even how we meet others and maintain relationships."
Gonzalo San Gil, PhD.

The Copyright Lobotomy: How Intellectual Property Makes Us Pretend To Be Stupid | Techdirt - 0 views

  •  
    "from the or:-how-to-build-an-intellectual-cage dept Here are two words that have no business hanging out together: "used MP3s." If you know anything about how computers work, that concept is intellectually offensive. Same goes for "ebook lending", "digital rental" and a host of other terms that have emerged from the content industries' desperate scramble to do the impossible: adapt without changing. "
  •  
    "from the or:-how-to-build-an-intellectual-cage dept Here are two words that have no business hanging out together: "used MP3s." If you know anything about how computers work, that concept is intellectually offensive. Same goes for "ebook lending", "digital rental" and a host of other terms that have emerged from the content industries' desperate scramble to do the impossible: adapt without changing. "
Alexandra IcecreamApps

How to Extend the Battery Life of Your Smartphone - Icecream Tech Digest - 0 views

  •  
    The usage of the smartphones has become so widely spread that for the majority of people it’s impossible to get through a day without such a device. Indeed, you are always aware of all the latest news and updates from … Continue reading →
  •  
    The usage of the smartphones has become so widely spread that for the majority of people it’s impossible to get through a day without such a device. Indeed, you are always aware of all the latest news and updates from … Continue reading →
Paul Merrell

German Parliament Says No More Software Patents | Electronic Frontier Foundation - 0 views

  • The German Parliament recently took a huge step that would eliminate software patents (PDF) when it issued a joint motion requiring the German government to ensure that computer programs are only covered by copyright. Put differently, in Germany, software cannot be patented. The Parliament's motion follows a similar announcement made by New Zealand's government last month (PDF), in which it determined that computer programs were not inventions or a manner of manufacture and, thus, cannot be patented.
  • The crux of the German Parliament's motion rests on the fact that software is already protected by copyright, and developers are afforded "exploitation rights." These rights, however, become confused when broad, abstract patents also cover general aspects of computer programs. These two intellectual property systems are at odds. The clearest example of this clash is with free software. The motion recognizes this issue and therefore calls upon the government "to preserve the precedence of copyright law so that software developers can also publish their work under open source license terms and conditions with legal security." The free software movement relies upon the fact that software can be released under a copyright license that allows users to share it and build upon others' works. Patents, as Parliament finds, inhibit this fundamental spread.
  • Just like in the New Zealand order, the German Parliament carved out one type of software that could be patented, when: the computer program serves merely as a replaceable equivalent for a mechanical or electro-mechanical component, as is the case, for instance, when software-based washing machine controls can replace an electromechanical program control unit consisting of revolving cylinders which activate the control circuits for the specific steps of the wash cycle This allows for software that is tied to (and controls part of) another invention to be patented. In other words, if a claimed process is purely a computer program, then it is not patentable. (New Zealand's order uses a similar washing machine example.) The motion ends by calling upon the German government to push for this approach to be standard across all of Europe. We hope policymakers in the United States will also consider fundamental reform that deals with the problems caused by low-quality software patents. Ultimately, any real reform must address this issue.
  •  
    Note that an unofficial translation of the parliamentary motion is linked from the article. This adds substantially to the pressure internationally to end software patents because Germany has been the strongest defender of software patents in Europe. The same legal grounds would not apply in the U.S. The strongest argument for the non-patentability in the U.S., in my opinion, is that software patents embody embody both prior art and obviousness. A general purpose computer can accomplish nothing unforeseen by the prior art of the computing device. And it is impossible for software to do more than cause different sequences of bit register states to be executed. This is the province of "skilled artisans" using known methods to produce predictable results. There is a long line of Supreme Court decisions holding that an "invention" with such traits is non-patentable. I have summarized that argument with citations at . 
Gonzalo San Gil, PhD.

Invisible Web: What it is, Why it exists, How to find it, and Its inherent ambiguity - 1 views

  •  
    [What is the "Invisible Web", a.k.a. the "Deep Web"? The "visible web" is what you can find using general web search engines. It's also what you see in almost all subject directories. The "invisible web" is what you cannot find using these types of tools. The first version of this web page was written in 2000, when this topic was new and baffling to many web searchers. Since then, search engines' crawlers and indexing programs have overcome many of the technical barriers that made it impossible for them to find "invisible" web pages. These types of pages used to be invisible but can now be found in most search engine results: Pages in non-HTML formats (pdf, Word, Excel, PowerPoint), now converted into HTML. Script-based pages, whose URLs contain a ? or other script coding. Pages generated dynamically by other types of database software (e.g., Active Server Pages, Cold Fusion). These can be indexed if there is a stable URL somewhere that search engine crawlers can find. ]
Paul Merrell

In Cryptography, Advances in Program Obfuscation | Simons Foundation - 0 views

  • “A program obfuscator would be a powerful tool for finding plausible constructions for just about any cryptographic task you could conceive of,” said Yuval Ishai, of the Technion in Haifa, Israel. Precisely because of obfuscation’s power, many computer scientists, including Sahai and his colleagues, thought it was impossible. “We were convinced it was too powerful to exist,” he said. Their earliest research findings seemed to confirm this, showing that the most natural form of obfuscation is indeed impossible to achieve for all programs. Then, on July 20, 2013, Sahai and five co-authors posted a paper on the Cryptology ePrint Archive demonstrating a candidate protocol for a kind of obfuscation known as “indistinguishability obfuscation.” Two days later, Sahai and one of his co-authors, Brent Waters, of the University of Texas, Austin, posted a second paper that suggested, together with the first paper, that this somewhat arcane form of obfuscation may possess much of the power cryptographers have dreamed of. “This is the first serious positive result” when it comes to trying to find a universal obfuscator, said Boaz Barak, of Microsoft Research in Cambridge, Mass. “The cryptography community is very excited.” In the six months since the original paper was posted, more papers have appeared on the ePrint archive with “obfuscation” in the title than in the previous 17 years.
Gonzalo San Gil, PhD.

Google's Fallacious Piracy Self-Study (Part 1) | MUSIC * TECHNOLOGY * POLICY - 1 views

  •  
    "The White Queen] "Why, sometimes I've believed as many as six impossible things before breakfast." Alice in Wonderland, by Lewis Carroll Google has released a self-study (How Google Fights Piracy). While hope springs eternal, the self-study falls quite short of both truth and reality. Let's see why. The Context Even if you discount the moral hazard involved with funding a study of yourself, the Google survey of Google's involvement with piracy is a breathtaking document. I would suggest that the self-study rests on a number of core principles for Google's business: 1. Nothing to See Here, Move Along: First and foremost is Google's deep and abiding desire"
Gonzalo San Gil, PhD.

Dangerous Ruling: EU Says Google Must Help People Disappear Stuff They Don't Like From ... - 0 views

  •  
    "from the right-to-be-forgotten dept For years now we've explained why Europe's concept of a "right to be forgotten" is a terrible, dangerous and impossible idea. The basic idea is that if you were involved in something that you're not happy about later, you can demand that the incident be stricken from the record... everywhere. It's a clear attack on free speech -- allowing people to censor others from saying truthful and accurate things about someone. "
Paul Merrell

6 Anti-NSA Technological innovations that May Just Change the World | StormCloudsGathering - 2 views

  • Rather than grovel and beg for the U.S. government to respect our privacy, these innovators have taken matters into their own hands, and their work may change the playing field completely.
  • People used to assume that the United States government was held in check by the constitution, which prohibits unreasonable searches and seizures and which demands due process in criminal investigations, but such illusions have evaporated in recent years. It turns out that the NSA considers itself above the law in every respect and feels entitled to spy on anyone anywhere in the world without warrants, and without any real oversight. Understandably these revelations shocked the average citizen who had been conditioned to take the government's word at face value, and the backlash has been considerable. The recent "Today We Fight Back" campaign to protest the NSA's surveillance practices shows that public sentiment is in the right place. Whether these kinds of petitions and protests will have any real impact on how the U.S. government operates is questionable (to say the least), however some very smart people have decided not to wait around and find out. Instead they're focusing on making the NSA's job impossible. In the process they may fundamentally alter the way the internet operates.
  • People used to assume that the United States government was held in check by the constitution, which prohibits unreasonable searches and seizures and which demands due process in criminal investigations, but such illusions have evaporated in recent years. It turns out that the NSA considers itself above the law in every respect and feels entitled to spy on anyone anywhere in the world without warrants, and without any real oversight. Understandably these revelations shocked the average citizen who had been conditioned to take the government's word at face value, and the backlash has been considerable. The recent "Today We Fight Back" campaign to protest the NSA's surveillance practices shows that public sentiment is in the right place. Whether these kinds of petitions and protests will have any real impact on how the U.S. government operates is questionable (to say the least), however some very smart people have decided not to wait around and find out. Instead they're focusing on making the NSA's job impossible. In the process they may fundamentally alter the way the internet operates.
Gonzalo San Gil, PhD.

6 steps to achieve cyber resilience | ITworld - 0 views

  •  
    "By Ryan Francis, CSO | June 9, 2015 It is nearly impossible to stop attacks, but the key is how quickly can you keep that attack from spreading throughout your network. "
Gary Edwards

Google Apps no threat to Microsoft? Too Little Too Late - 0 views

  •  
    The race is on. Google will win the consumer Web. Microsoft will win the business Web. Sadly i don't think there is any way for Google to challenge Microsoft with regard for the privilege of transitioning existing MSOffice bound workgroup- workflow business processes to the Web. Even if Google Docs could match MSOffice feature to feature, cracking into existing MSOffice workgroups is impossibly hard. Anyone who doubts this ought to take a second look at the Massachusetts ODF Pilot Study, or the recently released Belgium Pilot results. Replacing MSOffice in a workgroup setting is simply too disruptive and costly because of the shared business process problem.
Gonzalo San Gil, PhD.

Dark Reading - 10 Strategies To Fight Anonymous DDoS Attacks - 0 views

  •  
    "10 Strategies To Fight Anonymous DDoS Attacks Preventing distributed denial of service attacks may be impossible. But with advance planning, they can be mitigated and stopped. Learn where to begin."
1 - 20 of 52 Next › Last »
Showing 20 items per page