Skip to main content

Home/ Future of the Web/ Group items tagged media

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

File sharing is alive and well, to the tune of 300 million users a month - Tech News an... - 0 views

  •  
    "Americans download more movies, music and TV shows that BitTorrent users in any other country. So why is everyone talking about the decline of P2P?"
Paul Merrell

ISPs take GCHQ to court in UK over mass surveillance | World news | theguardian.com - 0 views

  • Internet service providers from around the world are lodging formal complaints against the UK government's monitoring service, GCHQ, alleging that it uses "malicious software" to break into their networks.The claims from seven organisations based in six countries – the UK, Netherlands, US, South Korea, Germany and Zimbabwe – will add to international pressure on the British government following Edward Snowden's revelations about mass surveillance of the internet by UK and US intelligence agencies.The claims are being filed with the investigatory powers tribunal (IPT), the court in London that assesses complaints about the agencies' activities and misuse of surveillance by government organisations. Most of its hearings are held at least partially in secret.
  • The IPT is already considering a number of related submissions. Later this month it will investigate complaints by human rights groups about the way social media sites have been targeted by GCHQ.The government has defended the security services, pointing out that online searches are often routed overseas and those deemed "external communications" can be monitored without the need for an individual warrant. Critics say that such a legal interpretation sidesteps the need for traditional intercept safeguards.The latest claim is against both GCHQ, located near Cheltenham, and the Foreign Office. It is based on articles published earlier this year in the German magazine Der Spiegel. That report alleged that GCHQ had carried out an attack, codenamed Operation Socialist, on the Belgian telecoms group, Belgacom, targeting individual employees with "malware (malicious software)".One of the techniques was a "man in the middle" attack, which, according to the documents filed at the IPT, bypasses modern encryption software and "operates by interposing the attacker [GCHQ] between two computers that believe that they are securely communicating with each other. In fact, each is communicating with GCHQ, who collect the communications, as well as relaying them in the hope that the interference will be undetected."The complaint alleges that the attacks were a breach of the Computer Misuse Act 1990 and an interference with the privacy rights of the employees under the European convention of human rights.
  • The organisations targeted, the submission states, were all "responsible and professional internet service providers". The claimants are: GreenNet Ltd, based in the UK, Riseup Networks in Seattle, Mango Email Service in Zimbabwe, Jinbonet in South Korea, Greenhost in the Netherlands, May First/People Link in New York and the Chaos Computer Club in Hamburg.
  • ...1 more annotation...
  • Among the programs said to have been operating were Turbine, which automates the injection of data and can infect millions of machines and Warrior Pride, which enables microphones on iPhones and Android devices to be remotely activated.
Paul Merrell

How to Encrypt the Entire Web for Free - The Intercept - 0 views

  • If we’ve learned one thing from the Snowden revelations, it’s that what can be spied on will be spied on. Since the advent of what used to be known as the World Wide Web, it has been a relatively simple matter for network attackers—whether it’s the NSA, Chinese intelligence, your employer, your university, abusive partners, or teenage hackers on the same public WiFi as you—to spy on almost everything you do online. HTTPS, the technology that encrypts traffic between browsers and websites, fixes this problem—anyone listening in on that stream of data between you and, say, your Gmail window or bank’s web site would get nothing but useless random characters—but is woefully under-used. The ambitious new non-profit Let’s Encrypt aims to make the process of deploying HTTPS not only fast, simple, and free, but completely automatic. If it succeeds, the project will render vast regions of the internet invisible to prying eyes.
  • Encryption also prevents attackers from tampering with or impersonating legitimate websites. For example, the Chinese government censors specific pages on Wikipedia, the FBI impersonated The Seattle Times to get a suspect to click on a malicious link, and Verizon and AT&T injected tracking tokens into mobile traffic without user consent. HTTPS goes a long way in preventing these sorts of attacks. And of course there’s the NSA, which relies on the limited adoption of HTTPS to continue to spy on the entire internet with impunity. If companies want to do one thing to meaningfully protect their customers from surveillance, it should be enabling encryption on their websites by default.
  • Let’s Encrypt, which was announced this week but won’t be ready to use until the second quarter of 2015, describes itself as “a free, automated, and open certificate authority (CA), run for the public’s benefit.” It’s the product of years of work from engineers at Mozilla, Cisco, Akamai, Electronic Frontier Foundation, IdenTrust, and researchers at the University of Michigan. (Disclosure: I used to work for the Electronic Frontier Foundation, and I was aware of Let’s Encrypt while it was being developed.) If Let’s Encrypt works as advertised, deploying HTTPS correctly and using all of the best practices will be one of the simplest parts of running a website. All it will take is running a command. Currently, HTTPS requires jumping through a variety of complicated hoops that certificate authorities insist on in order prove ownership of domain names. Let’s Encrypt automates this task in seconds, without requiring any human intervention, and at no cost.
  • ...2 more annotations...
  • The benefits of using HTTPS are obvious when you think about protecting secret information you send over the internet, like passwords and credit card numbers. It also helps protect information like what you search for in Google, what articles you read, what prescription medicine you take, and messages you send to colleagues, friends, and family from being monitored by hackers or authorities. But there are less obvious benefits as well. Websites that don’t use HTTPS are vulnerable to “session hijacking,” where attackers can take over your account even if they don’t know your password. When you download software without encryption, sophisticated attackers can secretly replace the download with malware that hacks your computer as soon as you try installing it.
  • The transition to a fully encrypted web won’t be immediate. After Let’s Encrypt is available to the public in 2015, each website will have to actually use it to switch over. And major web hosting companies also need to hop on board for their customers to be able to take advantage of it. If hosting companies start work now to integrate Let’s Encrypt into their services, they could offer HTTPS hosting by default at no extra cost to all their customers by the time it launches.
  •  
    Don't miss the video. And if you have a web site, urge your host service to begin preparing for Let's Encrypt. (See video on why it's good for them.)
Gonzalo San Gil, PhD.

Piracy Monetization Firm Rightscorp Sued for Harassment and Abuse | TorrentFreak - 1 views

  •  
    "Rightscorp, a piracy monetization company that works with Warner Bros. and other prominent copyright holders, has been sued for harassment, abuse and deception. A class action suit filed in California accuses the company of breaking several laws in their attempt to extract settlements from alleged pirates."
  •  
    "Rightscorp, a piracy monetization company that works with Warner Bros. and other prominent copyright holders, has been sued for harassment, abuse and deception. A class action suit filed in California accuses the company of breaking several laws in their attempt to extract settlements from alleged pirates."
Paul Merrell

The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus - The Intercept - 1 views

  • “Is this related to what we talked about before?” Bencsáth said, referring to a previous discussion they’d had about testing new services the company planned to offer customers. “No, something else,” Bartos said. “Can you come now? It’s important. But don’t tell anyone where you’re going.” Bencsáth wolfed down the rest of his lunch and told his colleagues in the lab that he had a “red alert” and had to go. “Don’t ask,” he said as he ran out the door. A while later, he was at Bartos’ office, where a triage team had been assembled to address the problem they wanted to discuss. “We think we’ve been hacked,” Bartos said.
  • They found a suspicious file on a developer’s machine that had been created late at night when no one was working. The file was encrypted and compressed so they had no idea what was inside, but they suspected it was data the attackers had copied from the machine and planned to retrieve later. A search of the company’s network found a few more machines that had been infected as well. The triage team felt confident they had contained the attack but wanted Bencsáth’s help determining how the intruders had broken in and what they were after. The company had all the right protections in place—firewalls, antivirus, intrusion-detection and -prevention systems—and still the attackers got in.
  • Bencsáth was a teacher, not a malware hunter, and had never done such forensic work before. At the CrySyS Lab, where he was one of four advisers working with a handful of grad students, he did academic research for the European Union and occasional hands-on consulting work for other clients, but the latter was mostly run-of-the-mill cleanup work—mopping up and restoring systems after random virus infections. He’d never investigated a targeted hack before, let alone one that was still live, and was thrilled to have the chance. The only catch was, he couldn’t tell anyone what he was doing. Bartos’ company depended on the trust of customers, and if word got out that the company had been hacked, they could lose clients. The triage team had taken mirror images of the infected hard drives, so they and Bencsáth spent the rest of the afternoon poring over the copies in search of anything suspicious. By the end of the day, they’d found what they were looking for—an “infostealer” string of code that was designed to record passwords and other keystrokes on infected machines, as well as steal documents and take screenshots. It also catalogued any devices or systems that were connected to the machines so the attackers could build a blueprint of the company’s network architecture. The malware didn’t immediately siphon the stolen data from infected machines but instead stored it in a temporary file, like the one the triage team had found. The file grew fatter each time the infostealer sucked up data, until at some point the attackers would reach out to the machine to retrieve it from a server in India that served as a command-and-control node for the malware.
  • ...1 more annotation...
  • Bencsáth took the mirror images and the company’s system logs with him, after they had been scrubbed of any sensitive customer data, and over the next few days scoured them for more malicious files, all the while being coy to his colleagues back at the lab about what he was doing. The triage team worked in parallel, and after several more days they had uncovered three additional suspicious files. When Bencsáth examined one of them—a kernel-mode driver, a program that helps the computer communicate with devices such as printers—his heart quickened. It was signed with a valid digital certificate from a company in Taiwan (digital certificates are documents ensuring that a piece of software is legitimate). Wait a minute, he thought. Stuxnet—the cyberweapon that was unleashed on Iran’s uranium-enrichment program—also used a driver that was signed with a certificate from a company in Taiwan. That one came from RealTek Semiconductor, but this certificate belonged to a different company, C-Media Electronics. The driver had been signed with the certificate in August 2009, around the same time Stuxnet had been unleashed on machines in Iran.
Gonzalo San Gil, PhD.

Columbia Pictures Wants Anti-Piracy Policies Kept Secret, Indefinitely | TorrentFreak - 0 views

  •  
    " Ernesto on November 13, 2014 C: 1 Breaking Columbia Pictures has asked a Florida federal court to keep its anti-piracy policies secret forever. The records in question are part of the now closed case between Hotfile and the MPAA. Previously, U.S. District Judge Kathleen Williams ruled that the information should be unsealed in the public's interest. " [# ! '#Secret' #policies...? # ! This is proper of long ago past # ! dark mankind ages...]
  •  
    " Ernesto on November 13, 2014 C: 1 Breaking Columbia Pictures has asked a Florida federal court to keep its anti-piracy policies secret forever. The records in question are part of the now closed case between Hotfile and the MPAA. Previously, U.S. District Judge Kathleen Williams ruled that the information should be unsealed in the public's interest. "
Paul Merrell

Spain moves to protect domestic media with new 'Google tax' | Technology | The Guardian - 1 views

  • Newspapers in Spain will now be able to demand a monthly fee from the search engine before it can list them on Google News
  • A similar law passed in Germany saw Google removing the affected newspapers from Google news altogether – before the publishers eventually came back and asked to be relisted after seeing their traffic plummet, a step they said they had to take because of the “overwhelming market power of Google”.
Gonzalo San Gil, PhD.

The Linux Foundation Releases Report Detailing Linux User Trends Among World's Largest ... - 0 views

  •  
    "SAN FRANCISCO, December 3, 2014 - The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux and collaborative development, today announced the immediate release of the "2014 Enterprise End User Trends Report," which shares new and trending data that reveals Linux is the primary platform for the cloud and users consider the operating system more secure than alternative platforms. The findings also show a 14-point increase in Linux deployments over the last four years, while deployments on Windows have experienced a 9-point decline. "
  •  
    "SAN FRANCISCO, December 3, 2014 - The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux and collaborative development, today announced the immediate release of the "2014 Enterprise End User Trends Report," which shares new and trending data that reveals Linux is the primary platform for the cloud and users consider the operating system more secure than alternative platforms. The findings also show a 14-point increase in Linux deployments over the last four years, while deployments on Windows have experienced a 9-point decline. "
Gonzalo San Gil, PhD.

Germany's Spies Grab 11 Billion Pieces Of Phone Metadata A Year -- And Pass On 6 Billio... - 1 views

    • Gonzalo San Gil, PhD.
       
      [U.S. Spying On Europe: EU Confronts Washington Reports Of Spying On Allies [06/30/2013] ]
  •  
    "from the bad-sex dept Given Germany's high-profile attachment to privacy, it's always interesting to hear about ways in which its spies have been ignoring that tradition. Here, for example, is a story in the German newspaper Die Zeit about the country's foreign intelligence agency BND gathering metadata from millions of phone records every day: "
  •  
    "from the bad-sex dept Given Germany's high-profile attachment to privacy, it's always interesting to hear about ways in which its spies have been ignoring that tradition. Here, for example, is a story in the German newspaper Die Zeit about the country's foreign intelligence agency BND gathering metadata from millions of phone records every day: "
Gonzalo San Gil, PhD.

Piracy Settlement Firm Sued Over Intimidating Robocalls and Text Messages | TorrentFrea... - 2 views

Gonzalo San Gil, PhD.

Hollywood vs. Silicon Valley (AAPL, CSCO, DIS, INTC, MSFT, TWX, VIA) - 0 views

  •  
    "By Anders Bylund | More Articles January 7, 2011 | Comments (0) The entertainment industry has always been split in two very distinct, extremely incompatible sides: content and technology. Let's call these factions "Hollywood" and "Silicon Valley" for the sake of discussion, because it just sounds a lot nicer."
  •  
    "By Anders Bylund | More Articles January 7, 2011 | Comments (0) The entertainment industry has always been split in two very distinct, extremely incompatible sides: content and technology. Let's call these factions "Hollywood" and "Silicon Valley" for the sake of discussion, because it just sounds a lot nicer."
Gonzalo San Gil, PhD.

How the US could block the Comcast/Time Warner Cable merger | Ars Technica - 0 views

  •  
    "Comcast's $45.2 billion acquisition of Time Warner Cable (TWC) is expected to be thoroughly scrutinized by the Department of Justice (DOJ) and Federal Communications Commission (FCC), and it could be blocked if the agencies decide the merger would significantly reduce competition and harm consumers"
  •  
    "Comcast's $45.2 billion acquisition of Time Warner Cable (TWC) is expected to be thoroughly scrutinized by the Department of Justice (DOJ) and Federal Communications Commission (FCC), and it could be blocked if the agencies decide the merger would significantly reduce competition and harm consumers"
Gonzalo San Gil, PhD.

International Day Against DRM is Wednesday, May 6th 2015 | Defective by Design - 0 views

  •  
    "On Wednesday, May 6th, 2015, activists across the world will come together to say no to Digital Restrictions Management. You can read about last year's actions here. Day Against DRM 2014 in Dhaka, Bangladesh See how you can get involved leading up to the Day, by planning an event or an individual action."
  •  
    "On Wednesday, May 6th, 2015, activists across the world will come together to say no to Digital Restrictions Management. You can read about last year's actions here. Day Against DRM 2014 in Dhaka, Bangladesh See how you can get involved leading up to the Day, by planning an event or an individual action."
Gonzalo San Gil, PhD.

¿Siguen siendo realmente los blogs y bloggers los grandes influyentes que fue... - 0 views

  •  
    [Los blogs no son como eran y sobre todo lo que las empresas buscan en ellos ya no es lo mismo que buscaban antes]
  •  
    [Los blogs no son como eran y sobre todo lo que las empresas buscan en ellos ya no es lo mismo que buscaban antes tags marketingsocial mediabloggerinfluencer]
Gonzalo San Gil, PhD.

Filmmakers Sue Dutch State Over Lost Piracy Revenue - TorrentFreak - 0 views

  •  
    " Ernesto on November 12, 2015 C: 10 Breaking A coalition of Dutch film producers and distributors has today announced a lawsuit against the local Government. The filmmakers argue that the authorities are not doing enough to combat piracy and want pirate website operators and their users to face serious legal consequences."
Gonzalo San Gil, PhD.

Swedish Pirates are More Likely to Buy Legal Content - TorrentFreak - 0 views

  •  
    " Andy on November 12, 2015 C: 27 Breaking As the entertainment industries catch up, fewer and fewer Swedish citizens are using unauthorized file-sharing networks. That's according to a new study which has found that just 18% of the population now engages in the hobby. Nevertheless, those that do pirate are dramatically more likely to buy legal content than those who don't."
Gonzalo San Gil, PhD.

Netgear Shows Customers How to Share Pirate Movies - TorrentFreak - 1 views

  •  
    " Andy on December 26, 2015 C: 86 Opinion Showing users how to send large video files is a task undertaken by dozens of software and hardware manufacturers but for the folks at Netgear the issue is now a controversial one. Want to send a pirate movie to a friend after downloading it from a torrent site? Netgear apparently has an app for that."
  •  
    " Andy on December 26, 2015 C: 86 Opinion Showing users how to send large video files is a task undertaken by dozens of software and hardware manufacturers but for the folks at Netgear the issue is now a controversial one. Want to send a pirate movie to a friend after downloading it from a torrent site? Netgear apparently has an app for that."
Gonzalo San Gil, PhD.

Anti-Piracy Education Enters UK Classrooms - TorrentFreak - 0 views

  •  
    " By Andy on January 4, 2016 C: 78 News A new component of the Creative Content UK initiative is set to discourage Internet piracy via the classroom. Encouraging students to think about who will pay for Vin Diesel's socks if everyone pirates movies, the UK government, The Industry Trust and Federation Against Copyright Theft have a lesson plan up their collective sleeves."
Gonzalo San Gil, PhD.

Some Pirate Sites Have Little Respect For Their Users - TorrentFreak [#! Note] - 0 views

  •  
    " Andy on January 24, 2016 C: 74 Opinion Basic rules of economics dictate that websites need a way to monetize their operations but with pressure in the advertising world increasing, options for pirate sites are more narrow than they were. However, while many still do their best to deliver a decent experience to users, others are letting everyone down."
Alexandra IcecreamApps

How to Convert Video to MP3 - Icecream Tech Digest - 0 views

  •  
    We noticed that because of the popularity of YouTube, the need for URL to MP3 converters has grown, and it’s much easier to find such a converter rather than a way to convert a video file to an audio one. … Continue reading →
  •  
    We noticed that because of the popularity of YouTube, the need for URL to MP3 converters has grown, and it’s much easier to find such a converter rather than a way to convert a video file to an audio one. … Continue reading →
« First ‹ Previous 301 - 320 of 355 Next › Last »
Showing 20 items per page