Skip to main content

Home/ Future of the Web/ Group items tagged while

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Thanks for the Really Counter-Productive DMCA Complaints | TorrentFreak - 1 views

  •  
    " Andy on May 24, 2015 C: 0 Opinion While plenty of sites infringe copyright on a regular basis, this site is never one of them. However, that doesn't stop copyright holders from trying to disappear our pages from Google search. Sadly, the latest sorry efforts only attracted our attention to even bigger mistakes, such as the Web Sheriff trying to take down a movie's own Kickstarter page."
  •  
    " Andy on May 24, 2015 C: 0 Opinion While plenty of sites infringe copyright on a regular basis, this site is never one of them. However, that doesn't stop copyright holders from trying to disappear our pages from Google search. Sadly, the latest sorry efforts only attracted our attention to even bigger mistakes, such as the Web Sheriff trying to take down a movie's own Kickstarter page."
Gonzalo San Gil, PhD.

Cox Accuses Rightscorp of Mass Copyright Infringement - TorrentFreak - 0 views

  •  
    " Ernesto on September 24, 2015 C: 7 Breaking Internet provider Cox Communications has hit back at anti-piracy company Rightscorp. While denying responsibility for the alleged copyright infringements of its subscribers, Cox turns the tables, accusing Rightscorp of sharing thousands of copyrighted works without permission."
  •  
    " Ernesto on September 24, 2015 C: 7 Breaking Internet provider Cox Communications has hit back at anti-piracy company Rightscorp. While denying responsibility for the alleged copyright infringements of its subscribers, Cox turns the tables, accusing Rightscorp of sharing thousands of copyrighted works without permission."
Gonzalo San Gil, PhD.

Video game industry grew 4 times faster than US economy in 2012, study says - CNET - 0 views

  •  
    "The games industry continues to boom while other sectors of the economy sputter, according to a new report from the Entertainment Software Association. by Nick Statt @nickstatt November 11, 2014 2:54 PM PST "
  •  
    "The games industry continues to boom while other sectors of the economy sputter, according to a new report from the Entertainment Software Association. by Nick Statt @nickstatt November 11, 2014 2:54 PM PST "
Gonzalo San Gil, PhD.

Audio-Video Production On Linux: Best Software - Datamation - 0 views

  •  
    "Over the years, I've heard both Windows users and Linux enthusiasts make the claim that professional media production on Linux is impossible. While there may be some workflows so over-engineered that legacy software is a must, I firmly believe that, with effort, using Linux for media production is doable."
  •  
    "Over the years, I've heard both Windows users and Linux enthusiasts make the claim that professional media production on Linux is impossible. While there may be some workflows so over-engineered that legacy software is a must, I firmly believe that, with effort, using Linux for media production is doable."
Gonzalo San Gil, PhD.

Protecting your Linux system | Opensource.com - 0 views

  •  
    "Recently, Lee Brian wrote a great article about her own Linux story in My Dad, Linux and Me. In some of the comments to that article, a discussion of viruses and Linux emerged. While most of the Linux community would agree that viruses are less of an issue in Linux than some other operating systems, there are some people we share files with who are affected by viruses and other malware."
  •  
    "Recently, Lee Brian wrote a great article about her own Linux story in My Dad, Linux and Me. In some of the comments to that article, a discussion of viruses and Linux emerged. While most of the Linux community would agree that viruses are less of an issue in Linux than some other operating systems, there are some people we share files with who are affected by viruses and other malware."
Gonzalo San Gil, PhD.

MPAA: Google Assists and Profits from Piracy | TorrentFreak - 0 views

  •  
    " Ernesto on June 17, 2015 C: 0 Breaking The MPAA is refusing to hand over documentation discussing the legal case it helped Mississippi State Attorney General Jim Hood build against Google. According to the Hollywood group, Google is waging a PR war against Hollywood while facilitating and profiting from piracy."
  •  
    " Ernesto on June 17, 2015 C: 0 Breaking The MPAA is refusing to hand over documentation discussing the legal case it helped Mississippi State Attorney General Jim Hood build against Google. According to the Hollywood group, Google is waging a PR war against Hollywood while facilitating and profiting from piracy."
Gary Edwards

Convergence of Web, Mobile and Desktop Apps is the Next Phase: AJAX World RIA with Jere... - 0 views

  • For SOA applications, the best way to modernize is to componentize and extend the user experience aspect of the application that will in turn enable the applications composition and mashup.
  • While there are many ways that companies measure productivity, Nexaweb has found that the three key criteria for enabling the productivity driven enterprise are based on 1) cost savings resulting from reduced development time and application maintainability; 2) extending the value of existing applications with a future-proof architecture (adding RIA without breaking existing enterprise architecture); and 3) faster time to market by providing a consistent user experience across the various interfaces available throughout the organization.
  •  
    While the last decade was focused on the Web, the next phase in the evolution of our industry will be on the convergence of Web, mobile and desktop applications and the ability to extend existing applications with these new technologies for a consistent user experience regardless of how and where the information is viewed,' says Nexaweb CTO Jeremy Chone
Paul Merrell

Reset The Net - Privacy Pack - 1 views

  • This June 5th, I pledge to take strong steps to protect my freedom from government mass surveillance. I expect the services I use to do the same.
  • Fight for the Future and Center for Rights will contact you about future campaigns. Privacy Policy
  •  
    I wound up joining this campaign at the urging of the ACLU after checking the Privacy Policy. The Reset the Net campaign seems to be endorsed by a lot of change-oriented groups, from the ACLU to Greenpeac to the Pirate Party. A fair number of groups with a Progressive agenda, but certainly not limited to them. The right answer to that situation is to urge other groups to endorse, not to avoid the campaign. Single-issue coalition-building is all about focusing on an area of agreement rather than worrying about who you are rubbing elbows with.  I have been looking for a a bipartisan group that's tackling government surveillance issues via mass actions but has no corporate sponsors. This might be the one. The reason: Corporate types like Google have no incentive to really butt heads with the government voyeurs. They are themselves engaged in massive surveillance of their users and certainly will not carry the battle for digital privacy over to the private sector. But this *is* a battle over digital privacy and legally defining user privacy rights in the private sector is just as important as cutting back on government surveillance. As we have learned through the Snowden disclosures, what the private internet companies have, the NSA can and does get.  The big internet services successfully pushed in the U.S. for authorization to publish more numbers about how many times they pass private data to the government, but went no farther. They wanted to be able to say they did something, but there's a revolving door of staffers between NSA and the big internet companies and the internet service companies' data is an open book to the NSA.   The big internet services are not champions of their users' privacy. If they were, they would be featuring end-to-end encryption with encryption keys unique to each user and unknown to the companies.  Like some startups in Europe are doing. E.g., the Wuala.com filesync service in Switzerland (first 5 GB of storage free). Compare tha
  •  
    "This June 5th, I pledge to take strong steps to protect my freedom from government mass surveillance. I expect the services I use to do the same."
  •  
    I wound up joining this campaign at the urging of the ACLU after checking the Privacy Policy. The Reset the Net campaign seems to be endorsed by a lot of change-oriented groups, from the ACLU to Greenpeac to the Pirate Party. A fair number of groups with a Progressive agenda, but certainly not limited to them. The right answer to that situation is to urge other groups to endorse, not to avoid the campaign. Single-issue coalition-building is all about focusing on an area of agreement rather than worrying about who you are rubbing elbows with.  I have been looking for a a bipartisan group that's tackling government surveillance issues via mass actions but has no corporate sponsors. This might be the one. The reason: Corporate types like Google have no incentive to really butt heads with the government voyeurs. They are themselves engaged in massive surveillance of their users and certainly will not carry the battle for digital privacy over to the private sector. But this *is* a battle over digital privacy and legally defining user privacy rights in the private sector is just as important as cutting back on government surveillance. As we have learned through the Snowden disclosures, what the private internet companies have, the NSA can and does get.  The big internet services successfully pushed in the U.S. for authorization to publish more numbers about how many times they pass private data to the government, but went no farther. They wanted to be able to say they did something, but there's a revolving door of staffers between NSA and the big internet companies and the internet service companies' data is an open book to the NSA.   The big internet services are not champions of their users' privacy. If they were, they would be featuring end-to-end encryption with encryption keys unique to each user and unknown to the companies.  Like some startups in Europe are doing. E.g., the Wuala.com filesync service in Switzerland (first 5 GB of storage free). Com
Gonzalo San Gil, PhD.

Disney Patents a Piracy Free Search Engine | TorrentFreak - 0 views

  •  
    " Ernesto on October 31, 2014 C: 56 News Disney has just obtained a patent for a search engine that ranks sites based on various "authenticity" factors. One of the goals of the technology is to filter pirated material from search results while boosting the profile of copyright and trademark holders' websites." [# ! #Imagine... # ! ... this kind of '#artifacts' mandatory to the computer # ! manufacturers... [# Additional #WARNING: #Disney to #Decide the "#Authenticity" of web #contents... what's next?]]
  •  
    " Ernesto on October 31, 2014 C: 56 News Disney has just obtained a patent for a search engine that ranks sites based on various "authenticity" factors. One of the goals of the technology is to filter pirated material from search results while boosting the profile of copyright and trademark holders' websites."
Gonzalo San Gil, PhD.

Fixing The Broadband Market And Protecting Net Neutrality By Prying Open Incumbent Netw... - 1 views

  •  
    "from the your-promised-broadband-Utopia-never-arrived dept While Title II is the best net neutrality option available in the face of a lumbering broadband duopoly, it still doesn't fix the fact that the vast majority of customers only have the choice of one or two broadband options. It's this lack of competition that not only results in net neutrality violations (as customers can't vote down stupid ISP behavior with their wallet), but the higher prices and abysmal customer service so many of us have come to know and love"
  •  
    "from the your-promised-broadband-Utopia-never-arrived dept While Title II is the best net neutrality option available in the face of a lumbering broadband duopoly, it still doesn't fix the fact that the vast majority of customers only have the choice of one or two broadband options. It's this lack of competition that not only results in net neutrality violations (as customers can't vote down stupid ISP behavior with their wallet), but the higher prices and abysmal customer service so many of us have come to know and love"
Gonzalo San Gil, PhD.

Hundreds of Pirate Bay Copies Emerge, Is The Hydra Alive? | TorrentFreak - 0 views

  •  
    " Ernesto on December 27, 2014 C: 0 News While the Pirate Bay's domain continues to wave a pirate flag, there's no sign of a pending return yet. However, many supporters of the notorious torrent site are keeping its torrents widely available. I"
  •  
    " Ernesto on December 27, 2014 C: 0 News While the Pirate Bay's domain continues to wave a pirate flag, there's no sign of a pending return yet. However, many supporters of the notorious torrent site are keeping its torrents widely available. I"
Gonzalo San Gil, PhD.

Children Are Leading The Cord Cutting Revolution | Techdirt - 1 views

  •  
    "from the mikey-doesn't-like-it dept The cable industry has long pretended that the cord cutting phenomenon either isn't real or that the only people cutting the cord are aging losers living in their parents' basement. Of course when you actually look at the data, while cord cutting remains a slow but growing phenomenon, most of the cord cutters are young, highly educated, employed, and make a good amount of money." [# ! … #Freedom from The #Start: #Good #Move. # ! Notwithstanding '#OldSchool' #manipulators' #criticism…]
  •  
    "from the mikey-doesn't-like-it dept The cable industry has long pretended that the cord cutting phenomenon either isn't real or that the only people cutting the cord are aging losers living in their parents' basement. Of course when you actually look at the data, while cord cutting remains a slow but growing phenomenon, most of the cord cutters are young, highly educated, employed, and make a good amount of money."
Gonzalo San Gil, PhD.

Linux Distribution Chooser - 0 views

  •  
    [# ! Por cortesía de vinagreasesino.com a través de Google Alerts 'Linux'] "This test should help you while choosing the best Linux Distribution for you. The test contains several question to find the suitable distribution for you. Please note that the result is only a suggestion." [# ! #choose # ! … #Your #Perfect #FreeSoftware #Match. (# And don't scare about the opening home page written in #German… # ! #English version available, too)]
  •  
    [# ! Por cortesía de vinagreasesino.com a través de Google Alerts 'Linux'] "This test should help you while choosing the best Linux Distribution for you. The test contains several question to find the suitable distribution for you. Please note that the result is only a suggestion."
Paul Merrell

For sale: Systems that can secretly track where cellphone users go around the globe - T... - 0 views

  • Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.
  • The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.
  • It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. “Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world,” said Eric King, deputy director of Privacy International, a London-based activist group that warns about the abuse of surveillance technology. “This is a huge problem.”
  • ...9 more annotations...
  • Security experts say hackers, sophisticated criminal gangs and nations under sanctions also could use this tracking technology, which operates in a legal gray area. It is illegal in many countries to track people without their consent or a court order, but there is no clear international legal standard for secretly tracking people in other countries, nor is there a global entity with the authority to police potential abuses.
  • tracking systems that access carrier location databases are unusual in their ability to allow virtually any government to track people across borders, with any type of cellular phone, across a wide range of carriers — without the carriers even knowing. These systems also can be used in tandem with other technologies that, when the general location of a person is already known, can intercept calls and Internet traffic, activate microphones, and access contact lists, photos and other documents. Companies that make and sell surveillance technology seek to limit public information about their systems’ capabilities and client lists, typically marketing their technology directly to law enforcement and intelligence services through international conferences that are closed to journalists and other members of the public.
  • Yet marketing documents obtained by The Washington Post show that companies are offering powerful systems that are designed to evade detection while plotting movements of surveillance targets on computerized maps. The documents claim system success rates of more than 70 percent. A 24-page marketing brochure for SkyLock, a cellular tracking system sold by Verint, a maker of analytics systems based in Melville, N.Y., carries the subtitle “Locate. Track. Manipulate.” The document, dated January 2013 and labeled “Commercially Confidential,” says the system offers government agencies “a cost-effective, new approach to obtaining global location information concerning known targets.”
  • (Privacy International has collected several marketing brochures on cellular surveillance systems, including one that refers briefly to SkyLock, and posted them on its Web site. The 24-page SkyLock brochure and other material was independently provided to The Post by people concerned that such systems are being abused.)
  • Verint, which also has substantial operations in Israel, declined to comment for this story. It says in the marketing brochure that it does not use SkyLock against U.S. or Israeli phones, which could violate national laws. But several similar systems, marketed in recent years by companies based in Switzerland, Ukraine and elsewhere, likely are free of such limitations.
  • The tracking technology takes advantage of the lax security of SS7, a global network that cellular carriers use to communicate with one another when directing calls, texts and Internet data. The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say. All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems.
  • Companies that market SS7 tracking systems recommend using them in tandem with “IMSI catchers,” increasingly common surveillance devices that use cellular signals collected directly from the air to intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations. IMSI catchers — also known by one popular trade name, StingRay — can home in on somebody a mile or two away but are useless if a target’s general location is not known. SS7 tracking systems solve that problem by locating the general area of a target so that IMSI catchers can be deployed effectively. (The term “IMSI” refers to a unique identifying code on a cellular phone.)
  • Verint can install SkyLock on the networks of cellular carriers if they are cooperative — something that telecommunications experts say is common in countries where carriers have close relationships with their national governments. Verint also has its own “worldwide SS7 hubs” that “are spread in various locations around the world,” says the brochure. It does not list prices for the services, though it says that Verint charges more for the ability to track targets in many far-flung countries, as opposed to only a few nearby ones. Among the most appealing features of the system, the brochure says, is its ability to sidestep the cellular operators that sometimes protect their users’ personal information by refusing government requests or insisting on formal court orders before releasing information.
  • Another company, Defentek, markets a similar system called Infiltrator Global Real-Time Tracking System on its Web site, claiming to “locate and track any phone number in the world.” The site adds: “It is a strategic solution that infiltrates and is undetected and unknown by the network, carrier, or the target.”
  •  
    The Verint company has very close ties to the Iraeli government. Its former parent company Comverse, was heavily subsidized by Israel and the bulk of its manufacturing and code development was done in Israel. See https://en.wikipedia.org/wiki/Comverse_Technology "In December 2001, a Fox News report raised the concern that wiretapping equipment provided by Comverse Infosys to the U.S. government for electronic eavesdropping may have been vulnerable, as these systems allegedly had a back door through which the wiretaps could be intercepted by unauthorized parties.[55] Fox News reporter Carl Cameron said there was no reason to believe the Israeli government was implicated, but that "a classified top-secret investigation is underway".[55] A March 2002 story by Le Monde recapped the Fox report and concluded: "Comverse is suspected of having introduced into its systems of the 'catch gates' in order to 'intercept, record and store' these wire-taps. This hardware would render the 'listener' himself 'listened to'."[56] Fox News did not pursue the allegations, and in the years since, there have been no legal or commercial actions of any type taken against Comverse by the FBI or any other branch of the US Government related to data access and security issues. While no real evidence has been presented against Comverse or Verint, the allegations have become a favorite topic of conspiracy theorists.[57] By 2005, the company had $959 million in sales and employed over 5,000 people, of whom about half were located in Israel.[16]" Verint is also the company that got the Dept. of Homeland Security contract to provide and install an electronic and video surveillance system across the entire U.S. border with Mexico.  One need not be much of a conspiracy theorist to have concerns about Verint's likely interactions and data sharing with the NSA and its Israeli equivalent, Unit 8200. 
Gonzalo San Gil, PhD.

Movie Boss Loses the Plot Over ISP Piracy Liability | TorrentFreak - 0 views

  •  
    [... Should a knife manufacturer be held responsible for what happened in the Psycho shower scene? ...] " Andy on June 26, 2014 C: 44 News The fight between a movie studio and an Australian ISP has today taken another odd turn. Village Roadshow's co-CEO now suggests that iiNet must take responsibility for piracy in the same way a car manufacturer apparently would if one of its vehicles killed someone while being driven by a customer. Except they don't, of course."
  •  
    [... Should a knife manufacturer be held responsible for what happened in the Psycho shower scene? ...] " Andy on June 26, 2014 C: 44 News The fight between a movie studio and an Australian ISP has today taken another odd turn. Village Roadshow's co-CEO now suggests that iiNet must take responsibility for piracy in the same way a car manufacturer apparently would if one of its vehicles killed someone while being driven by a customer. Except they don't, of course."
Gary Edwards

Duke Engines' incredibly compact, lightweight valveless axial engine - 0 views

  • The Duke engine is an axial design, meaning that its five cylinders encircle the drive shaft and run parallel with it. The pistons drive a star-shaped reciprocator, which nutates around the drive shaft, kind of like a spinning coin coming to rest on a table.
  • The reciprocator's center point is used to drive the central drive shaft, which rotates in the opposite direction to the reciprocator. "That counter-rotation keeps it in tidy balance," says Duke co-founder John Garvey. "If you lay your hand on it while it's running, you can barely detect any motion at all, it's quite remarkable." That's borne out by the video below, where the engine revving doesn't even cause enough vibrations to tip a coin off its side.
  • Instead of cam- or pneumatically-operated intake and outlet valves, the cylinders rotate past intake and outlet ports in a stationary head ring. The spark plugs are also mounted in this stationary ring – the cylinders simply slide past each port or plug at the stage of the cycle it's needed for and move on. In this way, Duke eliminates all the complexity of valve operation and manages to run a five-cylinder engine with just three spark plugs and three fuel injectors. The Duke engine ends up delivering as many power strokes per revolution as a six cylinder engine, but with huge weight savings and a vast reduction in the number of engine parts.
  • ...1 more annotation...
  • The engine has shown excellent resistance to pre-ignition (or detonation) – potentially because its cylinders tend to run cooler than comparable engines. Duke has run compression ratios as high as 14:1 with regular 91-octane gasoline. This suggests that further developments will pull even more power out of a given amount of fuel, increasing the overall efficiency of the unit.
  •  
    Watch the second video! This is extraordinary. "New Zealand's Duke Engines has been busy developing and demonstrating excellent results with a bizarre axial engine prototype that completely does away with valves, while delivering excellent power and torque from an engine much smaller, lighter and simpler than the existing technology. We spoke with Duke co-founder John Garvey to find out how the Duke Axial Engine project is going."
Gonzalo San Gil, PhD.

Piracy and Movie Revenues: Evidence from Megaupload: A Tale of the Long Tail?... - 0 views

  •  
    " Christian Peukert University of Zurich - Department of Business Administration Jörg Claussen Copenhagen Business School - Department of Innovation and Organizational Economics Tobias Kretschmer Ludwig-Maximilians-Universität München - Faculty of Business Administration (Munich School of Management); London School of Economics & Political Science (LSE) - Centre for Economic Performance (CEP) August 20, 2013 Abstract: In this paper we make use of a quasi-experiment in the market for illegal downloading to study movie box office revenues. Exogenous variation comes from the unexpected shutdown of the popular file hosting platform Megaupload.com on January 19, 2012. The estimation strategy is to compare box office revenues before and after the shutdown, controlling for various factors that potentially explain intertemporal differences. We find that box office revenues of a majority of movies did not increase. While for a mid-range of movies the effect of the shutdown is even negative, only large blockbusters could benefit from the absence of Megaupload. We argue that this is due to social network effects, where online piracy acts as a mechanism to spread information about a good from consumers with low willingness to pay to consumers with high willingness to pay. This information-spreading effect of illegal downloads seems to be especially important for movies with smaller audiences."
  •  
    " Christian Peukert University of Zurich - Department of Business Administration Jörg Claussen Copenhagen Business School - Department of Innovation and Organizational Economics Tobias Kretschmer Ludwig-Maximilians-Universität München - Faculty of Business Administration (Munich School of Management); London School of Economics & Political Science (LSE) - Centre for Economic Performance (CEP) August 20, 2013 Abstract: In this paper we make use of a quasi-experiment in the market for illegal downloading to study movie box office revenues. Exogenous variation comes from the unexpected shutdown of the popular file hosting platform Megaupload.com on January 19, 2012. The estimation strategy is to compare box office revenues before and after the shutdown, controlling for various factors that potentially explain intertemporal differences. We find that box office revenues of a majority of movies did not increase. While for a mid-range of movies the effect of the shutdown is even negative, only large blockbusters could benefit from the absence of Megaupload. We argue that this is due to social network effects, where online piracy acts as a mechanism to spread information about a good from consumers with low willingness to pay to consumers with high willingness to pay. This information-spreading effect of illegal downloads seems to be especially important for movies with smaller audiences."
Paul Merrell

European Lawmakers Demand Answers on Phone Key Theft - The Intercept - 0 views

  • European officials are demanding answers and investigations into a joint U.S. and U.K. hack of the world’s largest manufacturer of mobile SIM cards, following a report published by The Intercept Thursday. The report, based on leaked documents provided by NSA whistleblower Edward Snowden, revealed the U.S. spy agency and its British counterpart Government Communications Headquarters, GCHQ, hacked the Franco-Dutch digital security giant Gemalto in a sophisticated heist of encrypted cell-phone keys. The European Parliament’s chief negotiator on the European Union’s data protection law, Jan Philipp Albrecht, said the hack was “obviously based on some illegal activities.” “Member states like the U.K. are frankly not respecting the [law of the] Netherlands and partner states,” Albrecht told the Wall Street Journal. Sophie in ’t Veld, an EU parliamentarian with D66, the Netherlands’ largest opposition party, added, “Year after year we have heard about cowboy practices of secret services, but governments did nothing and kept quiet […] In fact, those very same governments push for ever-more surveillance capabilities, while it remains unclear how effective these practices are.”
  • “If the average IT whizzkid breaks into a company system, he’ll end up behind bars,” In ’t Veld added in a tweet Friday. The EU itself is barred from undertaking such investigations, leaving individual countries responsible for looking into cases that impact their national security matters. “We even get letters from the U.K. government saying we shouldn’t deal with these issues because it’s their own issue of national security,” Albrecht said. Still, lawmakers in the Netherlands are seeking investigations. Gerard Schouw, a Dutch member of parliament, also with the D66 party, has called on Ronald Plasterk, the Dutch minister of the interior, to answer questions before parliament. On Tuesday, the Dutch parliament will debate Schouw’s request. Additionally, European legal experts tell The Intercept, public prosecutors in EU member states that are both party to the Cybercrime Convention, which prohibits computer hacking, and home to Gemalto subsidiaries could pursue investigations into the breach of the company’s systems.
  • According to secret documents from 2010 and 2011, a joint NSA-GCHQ unit penetrated Gemalto’s internal networks and infiltrated the private communications of its employees in order to steal encryption keys, embedded on tiny SIM cards, which are used to protect the privacy of cellphone communications across the world. Gemalto produces some 2 billion SIM cards a year. The company’s clients include AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers. “[We] believe we have their entire network,” GCHQ boasted in a leaked slide, referring to the Gemalto heist.
  • ...4 more annotations...
  • While Gemalto was indeed another casualty in Western governments’ sweeping effort to gather as much global intelligence advantage as possible, the leaked documents make clear that the company was specifically targeted. According to the materials published Thursday, GCHQ used a specific codename — DAPINO GAMMA — to refer to the operations against Gemalto. The spies also actively penetrated the email and social media accounts of Gemalto employees across the world in an effort to steal the company’s encryption keys. Evidence of the Gemalto breach rattled the digital security community. “Almost everyone in the world carries cell phones and this is an unprecedented mass attack on the privacy of citizens worldwide,” said Greg Nojeim, senior counsel at the Center for Democracy & Technology, a non-profit that advocates for digital privacy and free online expression. “While there is certainly value in targeted surveillance of cell phone communications, this coordinated subversion of the trusted technical security infrastructure of cell phones means the US and British governments now have easy access to our mobile communications.”
  • For Gemalto, evidence that their vaunted security systems and the privacy of customers had been compromised by the world’s top spy agencies made an immediate financial impact. The company’s shares took a dive on the Paris bourse Friday, falling $500 million. In the U.S., Gemalto’s shares fell as much 10 percent Friday morning. They had recovered somewhat — down 4 percent — by the close of trading on the Euronext stock exchange. Analysts at Dutch financial services company Rabobank speculated in a research note that Gemalto could be forced to recall “a large number” of SIM cards. The French daily L’Express noted today that Gemalto board member Alex Mandl was a founding trustee of the CIA-funded venture capital firm In-Q-Tel. Mandl resigned from In-Q-Tel’s board in 2002, when he was appointed CEO of Gemplus, which later merged with another company to become Gemalto. But the CIA connection still dogged Mandl, with the French press regularly insinuating that American spies could infiltrate the company. In 2003, a group of French lawmakers tried unsuccessfully to create a commission to investigate Gemplus’s ties to the CIA and its implications for the security of SIM cards. Mandl, an Austrian-American businessman who was once a top executive at AT&T, has denied that he had any relationship with the CIA beyond In-Q-Tel. In 2002, he said he did not even have a security clearance.
  • AT&T, T-Mobile and Verizon could not be reached for comment Friday. Sprint declined to comment. Vodafone, the world’s second largest telecom provider by subscribers and a customer of Gemalto, said in a statement, “[W]e have no further details of these allegations which are industrywide in nature and are not focused on any one mobile operator. We will support industry bodies and Gemalto in their investigations.” Deutsche Telekom AG, a German company, said it has changed encryption algorithms in its Gemalto SIM cards. “We currently have no knowledge that this additional protection mechanism has been compromised,” the company said in a statement. “However, we cannot rule out this completely.”
  • Update: Asked about the SIM card heist, White House press secretary Josh Earnest said he did not expect the news would hurt relations with the tech industry: “It’s hard for me to imagine that there are a lot of technology executives that are out there that are in a position of saying that they hope that people who wish harm to this country will be able to use their technology to do so. So, I do think in fact that there are opportunities for the private sector and the federal government to coordinate and to cooperate on these efforts, both to keep the country safe, but also to protect our civil liberties.”
  •  
    Watch for massive class action product defect litigation to be filed against the phone companies.and mobile device manufacturers.  In most U.S. jurisdictions, proof that the vendors/manufacturers  knew of the product defect is not required, only proof of the defect. Also, this is a golden opportunity for anyone who wants to get out of a pricey cellphone contract, since providing a compromised cellphone is a material breach of warranty, whether explicit or implied..   
Gonzalo San Gil, PhD.

Germany Expels Top US Intelligence Official, Says It Will (Officially) Spy Back On US A... - 1 views

  •  
    [# ! Welcome to The #NWO # ! ... and , The #Citizens', caught in '#Their' #Crossfire...] "from the no-more-no-spy dept Techdirt has been following the complicated German reaction to Edward Snowden's revelations about US and UK surveillance of people in that country, whether or not in high places, for some while now. "
  •  
    "from the no-more-no-spy dept Techdirt has been following the complicated German reaction to Edward Snowden's revelations about US and UK surveillance of people in that country, whether or not in high places, for some while now. "
Gonzalo San Gil, PhD.

Spotify Reminded of uTorrent Past After Branding Grooveshark 'Pirates' | TorrentFreak - 0 views

  •  
    " Andy on November 12, 2014 C: 0 Breaking Spotify's Daniel Ek has poured fuel onto the raging Taylor Swift controversy. While explaining how less availability of Swift's music will lead some to obtain it without paying, Ek labeled rival Grooveshark a 'pirate' service. Now Grooveshark is biting back by reminding Ek that he was once the CEO of uTorrent. " # ! what a bad memory... # ! ... for not to say #disloyal #competence, # ! ... or morbid envy of others success # ! ... where the first one failed... [# ! Or the fiasco of many so-called legit music services with their limited music supply: a few bucks in royalties will never compensate the broad exposition of artists through 'irregular' sites...]
  •  
    " Andy on November 12, 2014 C: 0 Breaking Spotify's Daniel Ek has poured fuel onto the raging Taylor Swift controversy. While explaining how less availability of Swift's music will lead some to obtain it without paying, Ek labeled rival Grooveshark a 'pirate' service. Now Grooveshark is biting back by reminding Ek that he was once the CEO of uTorrent. "
‹ Previous 21 - 40 of 336 Next › Last »
Showing 20 items per page