Skip to main content

Home/ Future of the Web/ Group items matching "top" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

No Fake Internet - 0 views

  • Zuckerberg's Internet.org will control what billions do online People in countries like India,1,2,3 Zimbabwe,4 Brazil,5 and Paraguay6 are speaking out about Facebook's so-called Internet.org platform and its ability to control what billions of Internet users can do online.7,8   Zuckerberg's partnership with telecom giants, Internet.org, provides access to a fake Internet where selected services are prioritized over others.9 This scheme threatens innovation,10 free expression,11 and privacy online12   It blocks many of the websites, apps, and services the world loves from being made available on equal terms.13   The fake Internet will also restrict access to local service providers struggling to get a foothold online.14   We all deserve access to the real open Internet. Stand with people around the world demanding Zuckerberg stops restricting access to the open Internet.
Gary Edwards

Be Prepared: 5 Android Apps You Must Have in Case of Emergency - Best Android Apps - 2 views

  •  
    "WHEN CALAMITY STRIKES The unpredictable nature of most emergencies often puts us in dangerous situations. But today's technology has come far enough to inform, alert, secure and guide us through dangerous situation, if we happen to face any. Emergencies may come in the form of environmental or circumstantial problems. Therefore it is always better to accompany yourself with at least 5 apps that can help you in case of any emergency. Here is the list of top 5 emergency apps for Android."
Paul Merrell

Profiled From Radio to Porn, British Spies Track Web Users' Online Identities | Global Research - Centre for Research on Globalization - 0 views

  • One system builds profiles showing people’s web browsing histories. Another analyzes instant messenger communications, emails, Skype calls, text messages, cell phone locations, and social media interactions. Separate programs were built to keep tabs on “suspicious” Google searches and usage of Google Maps. The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens  all without a court order or judicial warrant.
  • The power of KARMA POLICE was illustrated in 2009, when GCHQ launched a top-secret operation to collect intelligence about people using the Internet to listen to radio shows. The agency used a sample of nearly 7 million metadata records, gathered over a period of three months, to observe the listening habits of more than 200,000 people across 185 countries, including the U.S., the U.K., Ireland, Canada, Mexico, Spain, the Netherlands, France, and Germany.
  • GCHQ’s documents indicate that the plans for KARMA POLICE were drawn up between 2007 and 2008. The system was designed to provide the agency with “either (a) a web browsing profile for every visible user on the Internet, or (b) a user profile for every visible website on the Internet.” The origin of the surveillance system’s name is not discussed in the documents. But KARMA POLICE is also the name of a popular song released in 1997 by the Grammy Award-winning British band Radiohead, suggesting the spies may have been fans. A verse repeated throughout the hit song includes the lyric, “This is what you’ll get, when you mess with us.”
  • ...3 more annotations...
  • GCHQ vacuums up the website browsing histories using “probes” that tap into the international fiber-optic cables that transport Internet traffic across the world. A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events”  a term the agency uses to refer to metadata records  with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held  41 percent  was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it saidwould be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.” HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs.
  • The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
Gonzalo San Gil, PhD.

How to install closed drivers, media codecs, and other forbidden stuff on Linux PCs | PCWorld - 0 views

  •  
    "Linux is famous for its open-source nature, but sometimes you just need to use proprietary drivers or codecs. Here's how to do so on many of the top Linux distros."
Paul Merrell

Security Experts Oppose Government Access to Encrypted Communication - The New York Times - 0 views

  • An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.A new paper from the group, made up of 14 of the world’s pre-eminent cryptographers and computer scientists, is a formidable salvo in a skirmish between intelligence and law enforcement leaders, and technologists and privacy advocates. After Edward J. Snowden’s revelations — with security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds — encryption has emerged as a major issue in the debate over privacy rights.
  • That has put Silicon Valley at the center of a tug of war. Technology companies including Apple, Microsoft and Google have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers.
  • Yet law enforcement and intelligence agency leaders argue that such efforts thwart their ability to monitor kidnappers, terrorists and other adversaries. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data, but to divide the key into pieces and secure it so that no one person or government agency could use it alone.The encryption debate has left both sides bitterly divided and in fighting mode. The group of cryptographers deliberately issued its report a day before James B. Comey Jr., the director of the Federal Bureau of Investigation, and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to testify before the Senate Judiciary Committee on the concerns that they and other government agencies have that encryption technologies will prevent them from effectively doing their jobs.
  • ...2 more annotations...
  • The new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers, including Whitfield Diffie, a pioneer of public key cryptography, and Ronald L. Rivest, the “R” in the widely used RSA public cryptography algorithm. In the report, the group said any effort to give the government “exceptional access” to encrypted communications was technically unfeasible and would leave confidential data and critical infrastructure like banks and the power grid at risk. Handing governments a key to encrypted communications would also require an extraordinary degree of trust. With government agency breaches now the norm — most recently at the United States Office of Personnel Management, the State Department and the White House — the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals. They added that if the United States and Britain mandated backdoor keys to communications, China and other governments in foreign markets would be spurred to do the same.
  • “Such access will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend,” the report said. “The costs would be substantial, the damage to innovation severe and the consequences to economic growth hard to predict. The costs to the developed countries’ soft power and to our moral authority would also be considerable.”
  •  
    Our system of government does not expect that every criminal will be apprehended and convicted. There are numerous values our society believes are more important. Some examples: [i] a presumption of innocence unless guilt is established beyond any reasonable doubt; [ii] the requirement that government officials convince a neutral magistrate that they have probable cause to believe that a search or seizure will produce evidence of a crime; [iii] many communications cannot be compelled to be disclosed and used in evidence, such as attorney-client communications, spousal communications, and priest-penitent communications; and [iv] etc. Moral of my story: the government needs a much stronger reason to justify interception of communications than saying, "some crooks will escape prosecution if we can't do that." We have a right to whisper to each other, concealing our communicatons from all others. Why does the right to whisper privately disappear if our whisperings are done electronically? The Supreme Court took its first step on a very slippery slope when it permitted wiretapping in Olmstead v. United States, 277 U.S. 438, 48 S. Ct. 564, 72 L. Ed. 944 (1928). https://goo.gl/LaZGHt It's been a long slide ever since. It's past time to revisit Olmstead and recognize that American citizens have the absolute right to communicate privately. "The President … recognizes that U.S. citizens and institutions should have a reasonable expectation of privacy from foreign or domestic intercept when using the public telephone system." - Brent Scowcroft, U.S. National Security Advisor, National Security Decision Memorandum 338 (1 September 1976) (Nixon administration), http://www.fas.org/irp/offdocs/nsdm-ford/nsdm-338.pdf   
Gonzalo San Gil, PhD.

Apple and Other Tech Companies Tangle With U.S. Over Data Access - The New York Times - 0 views

  •  
    "...While that prospect has been shelved for now, the Justice Department is engaged in a court dispute with another tech company, Microsoft. The case, which goes before a federal appeals court in New York on Wednesday and is being closely watched by industry officials and civil liberties advocates, began when the company refused to comply with a warrant in December 2013 for emails from a drug trafficking suspect. ..."
Gonzalo San Gil, PhD.

Top Torrent Trackers Now Handle Up to 56 Million Peers - Each | TorrentFreak - 0 views

  •  
    Demonii and OpenBitTorrent, the two most popular torrent trackers on the Internet, are now regularly handling up to 56 million peers - each. The operator of Demonii informs TF that limitations in the software used by both sites means a usable ceiling of around 35 million peers, but the addition of new hardware has enabled a massive increase to today's levels.
Paul Merrell

Germany's top prosecutor fired over treason probe - Yahoo News - 0 views

  • A treason investigation against two German journalists claimed its first casualty Tuesday — the country's top prosecutor who ordered the probe.
  • Justice Minister Heiko Maas announced he was seeking the dismissal of Harald Range hours after the chief federal prosecutor accused the government of interfering in his investigation.Maas said he made the decision in consultation with Chancellor Angela Merkel's office, indicating that the sacking was approved at the highest level.The Justice Ministry had questioned Range's decision to open the investigation against two journalists from the website Netzpolitik.org who had reported that Germany's domestic spy agency plans to expand surveillance of online communication.The treason probe was widely criticized and regarded as an embarrassment to the government. Senior officials stressed in recent days that Germany is committed to protecting press freedom.
Gonzalo San Gil, PhD.

Fun Open Source Games and Apps: 112 Top Picks - Datamation - 1 views

  •  
    "Open source downloads galore: arcade, board, puzzle, shooter, adventure, simulator and role-playing games -- something for everyone."
  •  
    "Open source downloads galore: arcade, board, puzzle, shooter, adventure, simulator and role-playing games -- something for everyone."
Paul Merrell

Microsoft Ordered to Delete Browser - NYTimes.com - 0 views

  • BRUSSELS (AP) — The European Union said Friday that Microsoft’s practice of selling the Internet Explorer browser together with its Windows operating system violated the union’s antitrust rules. It ordered the software giant to untie the browser from its operating system in the 27-nation union, enabling makers of rival browsers to compete fairly.
  •  
    The Times goes farther than the DG Competition announcement, saying that Microsoft has been ordered to untie MSIE from Windows throughout the E.U. No source is attributed for the statement. The DG Competition announcement does not state what remedy it proposes to order. So take this report with a grain of salt. The Times is well capable of error.
Gary Edwards

Palm Pre in-depth impressions, video, and huge hands-on gallery - Engadget - 0 views

  •  
    the Palm Pre WebOS is based on Linux, and is in some way an extension of what they've been crafting for a while now, but on top of that Linux core is a display layer that is basically WebKit: all of the apps, including Palms own, are built in HTML, CSS and Javascript, and can make calls deeper into the OS for certain functionalities. That means almost any web developer can build an app for the phone, but there are limitations; like no 3D in this first release. .... excellent review! The Palm Pre is a huge win for the WebKit layout and sugarplum document model (highly advanced, graphical and interactive HTML-CSS-SVG-JS)
Gary Edwards

Clearing the air about Silverlight and the CLR - DLR | Microsoft's John Lam on Software - 0 views

  •  
    Short and too the point. Silverlight is limited to JavaScript - ES3. They will not support the Adobe-Mozilla-Opera-WebKit push for ES4!!! Silverlight will run any and all compiled .NET code in the browser. The DLR runs on top of the desktop CLR (no browser) as well as the Silverlight CLR.
Gary Edwards

The cross-platform option: Web apps for smartphones | InfoWorld | Analysis | 2009-01-20 | By Peter Wayner - 0 views

  •  
    Tailoring a Web application for iPhone, BlackBerry, and other top devices has many advantages over costly native development, and new techniques and approaches are closing the functionality gap. This article walks through the many different issues confronting Web developers and, the many innovations developers are using to close the gap between the Web and increasingly visual devices. Excellent article! Covers the iPhone WebKit - CSS transformations, iUI and PhoneGAP
Gary Edwards

IT Vendors Are Cautious On Web 2.0, Embrace SaaS -- Information Technology -- InformationWeek - 0 views

  • At the same time, IT vendors are less enthusiastic about Web-based collaboration tools.
  •  
    IT companies love software as a service. The sector is one of the most enthusiastic users of Web-only applications such as Salesforce (NYSE: CRM).com, according to the 2008 InformationWeek 500 survey. Seventy-one percent of IT vendors use online business apps, making IT one of the top three out of 21 industries in that category.
Matteo Spreafico

Top 1000 sites - DoubleClick Ad Planner - 3 views

  • The 1000 most-visited sites on the web
Gary Edwards

The Cloud Computing Tsunami | The Numbers from Gartner and Cyrus Golkar - 0 views

  •  
    The cloud computing wave is the most dramatic change I have observed in the computing industry since the wave of the Internet. Cloud computing will significantly change data centers and IT organizations as well as the infrastructure and software vendors' business models. In fact, the cloud computing wave is not just a wave - it is more like a tsunami. What is causing this cloud tsunami? I start with listing 4 of the Gartner top 10 IT predictions for the next three to five years for cloud computing, software as service (SaaS), data center power/cooling efficiency and open source software. All of these predictions indicate that data center efficiency and cost containment will transform the IT industry over the next 5 years. Key Gartner predictions for the data center for the next 5 years:
Gary Edwards

That Reinvention Of The Web Thing Opera Was Talking About? It's Called Opera Unite - 0 views

  •  
    this morning Opera unveiled a P2P based technology called Opera Unite that essentially turns every computer running the Opera browser into a full-fledged Web server. Opera Unite can be used to directly share documents, music, photos, videos, or run websites, or even chat rooms without third-party requirements. The company extended the collaborative technology to a platform that comes with a set of open APIs, encouraging developers to create their own applications (known as Opera Unite services) on top of it, directly linking personal computers together, no matter which OS they are running and without the need to download additional software. Networking above and beyond the OS. Catch the video on this page! Although it doesn't explain much by way of the underlying technology, it's really well done and very stylish. It's interesting the way they paint "the Servers" as threatening and evil.
Gonzalo San Gil, PhD.

Big Content, ISPs nearing agreement on piracy crackdown system - 1 views

  •  
    [A post from CNET's Greg Sandoval reports that United States ISPs and top content providers are "closer than ever" to a regimen for punishing ISP subscribers who engage in illegal file sharing. The story suggests that AT&T, Comcast, Verizon, the Recording Industry Association of America, and the Motion Picture Association of America are key negotiators. The White House is also involved in the discussions. Ars has been able to confirm the discussions with an industry source. ...]
Gonzalo San Gil, PhD.

Canonical, Microsoft, and Apple Want OS Convergence - Who Will Get There First? - 0 views

  •  
    "- The Ubuntu Family The idea of OS convergence is starting to take a hold in the world and major companies like Microsoft, Apple, and Canonical are working hard to achieve it. There seems to be a race going on and all the players want to reach the finish as soon as possible." [# ! It's #not a #Race... # ! It should be seen -and promoted- more than #mountaineering: # ! T@gether -as a '(Dream) Team'- to Reach The Same Top: # ! An #Open, #Free, #Fast, #Secure & #Reliable #OperatingSystem for #Everyone # ! Leave the #business for #differentiated #hardware & #specialized #services...]
« First ‹ Previous 61 - 80 of 192 Next › Last »
Showing 20 items per page