Skip to main content

Home/ Indie Nation/ Group items tagged mobile phone

Rss Feed Group items tagged

John Lemke

Rep. Goodlatte Slips Secret Change Into Phone Unlocking Bill That Opens The DMCA Up For... - 0 views

  • Because of section 1201 of the DMCA, the "anti-circumvention" provision, companies have been abusing copyright law to block all sorts of actions that are totally unrelated to copyright. That's because 1201 makes it illegal to circumvent basically any "technological protection measures." The intent of the copyright maximalists was to use this section to stop people from breaking DRM. However, other companies soon distorted the language to argue that it could be used to block certain actions totally unrelated to copyright law -- such as unlocking garage doors, ink jet cartridges, gaming accessories... and phones
  • Separately, every three years, the Librarian of Congress gets to announce "exemptions" to section 1201 where it feels that things are being locked up that shouldn't be. Back in 2006, one of these exemptions involved mobile phone unlocking.
  • Every three years this exemption was modified a bit, but in 2012, for unexplained reasons, the Librarian of Congress dropped that exemption entirely, meaning that starting in late January of 2013, it was possible to interpret the DMCA to mean that phone unlocking was illegal. In response to this there was a major White House petition -- which got over 100,000 signatures, leading the White House to announce (just weeks later) that it thought unlocking should be legal -- though, oddly, it seemed to place the issue with the FCC to fix, rather than recognizing the problem was with current copyright law.
  • ...2 more annotations...
  • While this gives Goodlatte and other maximalists some sort of plausible deniability that this bill is making no statement one way or the other on bulk unlocking, it certainly very strongly implies that Congress believes bulk unlocking is, in fact, still illegal. And that's massively problematic on any number of levels, in part suggesting that the unlocker's motives in unlocking has an impact on the determination under Section 1201 as to whether or not it's legal. And that's an entirely subjective distinction when a bill seems to assume motives, which makes an already problematic Section 1201 much more problematic. Without that clause, this seemed like a bill that was making it clear that you can't use the DMCA to interfere with an issue that is clearly unrelated to copyright, such as phone unlocking. But with this clause, it suggests that perhaps the DMCA's anti-circumvention clause can be used for entirely non-copyright issues if someone doesn't like the "motive" behind the unlocker.
  • Unfortunately, the bill was deemed so uncontroversial that it's been listed on the suspension calendar of the House, which is where non-controversial bills are put to ensure quick passage. That means that, not only did Goodlatte slip in a significant change to this bill that impacts the entire meaning and intent of the bill long after it went through the committee process (and without informing anyone about it), but he also got it put on the list of non-controversial bills to try to have it slip through without anyone even noticing.
John Lemke

New mobile can check pulse, send ambulance - 0 views

  •  
    The new EPI Life mobile phone comes complete with mini electrocardiogram. "We think it's a revolution. It has clinical significance," EPI medical chief Dr. Chow U-Jin said at the mobile industry's annual conference in Barcelona. "Anywhere in the world you can use it as a phone but you are also able to transfer an ECG and get a reply," Chow said. "If you get a normal reply it will just be an SMS," he added. "If it's severe, you get a call: 'Sir, an ambulance is on the way'." EPI Life has three hospitals in Singapore, all of which carry the phone users' history. EPI Life costs $700 (516 euros), the price of a top range smartphone, and 2,000 of them have been on the market since 2010.
John Lemke

FCC to buy out TV broadcasters to free up mobile spectrum | Ars Technica - 0 views

    • John Lemke
       
      I had my first issue at step one, "asks broadcasters to tell the FCC how much it wold take for the agency to buy them out".  They claim that this is a way to keep cost down by hopefully grabbing the least popular via low bids.   I see two issues immediately.  Number one by asking them what they want they are going to immediately INCREASE the bids.  Two, if you are asking me what I want for my business to change how it broadcasts why would I not include any expense to make the switch. By asking them what they think a fair bid would be, they are, more or less, giving them a blank check.
  • the commission will put the newly-freed blocks of spectrum up for auction. If, as expected, the spectrum is more valuable when used for mobile services than broadcast television, then the FCC should reap significantly more from these traditional auctions than it had to pay for the spectrum in the original reverse auctions, producing a tidy profit for taxpayers.
    • John Lemke
       
      The objective at an auction is to purchase the object at the lowest possible cost.  How much mobile providers are willing to pay will determine how high bids will climb.  Based on how our current mobile providers already provide poor service when compared to the rest of the world, how much is that bandwidth actually worth to these companies that, more or less, have a lobbied stranglehold on the consumer?
  • ...6 more annotations...
  • Bergmayer also praised an FCC proposal to update its "spectrum screen," a set of rules that prevent any single provider from gaining too large a share of the spectrum available in a particular market. The current scheme, he said, "treats all spectrum alike, even though some spectrum bands are better-suited to mobile broadband than others." As a result, he argued, it has become ineffective at preventing Verizon and AT&T from gaining enough spectrum to threaten competition. He urged the FCC to revise the rules to ensure the new auctions don't further entrench the dominance of the largest incumbents.
    • John Lemke
       
      It is the stuff like this that worries me, on one hand they want a high bid, and on the other it is going to be regulated.
  • Over the last decade, it has become increasingly obvious that America's spectrum resources are mis-allocated. The proliferation of cell phones, and more recently smartphones and tablets, has given mobile providers a voracious appetite for new spectrum. But a big chunk of the available spectrum is currently occupied by broadcast television stations. With more and more households subscribed to cable, satellite, and Internet video services, traditional broadcast television is looking like an increasingly outmoded use of the scarce and valuable airwaves.
  • incumbent broadcasters have controlled their channels for so long that they've come to be regarded as de facto property rights. And needless to say, the politically powerful broadcasters have fiercely resisted any efforts to force them to relinquish their spectrum.
  • incentive auctions
  • The plan has three phases. In the first phase, the FCC will conduct a reverse auction in which it asks broadcasters to tell the FCC how much it would take for the agency to buy them out. Presumably, the least popular (and, therefore, least profitable) channels will submit the lowest bids. By accepting these low bids, the FCC can free up the maximum possible spectrum at the minimum cost
John Lemke

FBI Arrested CEO of 'StealthGenie' for Selling Mobile Spyware Apps - 0 views

  • The Federal Bureau of Investigation (FBI) has arrested the CEO of a UK-based company for allegedly advertising and selling a spyware app to individuals who suspect their romantic partners of cheating on them.
  • The dodgy cell phone spyware application, dubbed as StealthGenie, monitors victims’ phone calls, text messages, videos, emails and other communications "without detection" when it is installed on a target's phone, according to the Department of Justice.
  • Once installed on the phone, it allows conversations to be monitored as they take place, enables the purchaser to call the phone and activate it at any time to monitor all surrounding conversations within a 15-foot radius, and collects the user’s incoming and outgoing email and SMS messages, incoming voicemail, address book, calendar, photographs, and videos. All of these functions are enabled without the knowledge of the user of the phone.
  • ...1 more annotation...
  • Akbar was charged with conspiracy, sale of a surreptitious interception device, advertisement of a known interception device and advertising a device as a surreptitious interception device in US District Court for the Eastern District of Virginia.
John Lemke

NSA Is Tracking Mobile Phone Location On So Many People It Can't Handle The Data Storag... - 0 views

  • The NSA cannot know in advance which tiny fraction of 1 percent of the records it may need, so it collects and keeps as many as it can — 27 terabytes, by one account, or more than double the text content of the Library of Congress’s print collection.
  • NSA defends the program by saying that it uses the location data to find "unknown associates of known intelligence targets." Basically, it's tracking where everyone goes, just in case people end up spending time with people the NSA deems as being terrorists.
  • Elsewhere in the article, they quote NSA officials repeatedly saying that the program is "tuned to be looking outside the United States," but not saying it only collects info outside the US. Also, they make clear, once a person leaves the US, the NSA no longer believes the 4th Amendment applies to them, so their location is fair game in this giant database.. Asked for specific numbers, an NSA person said:
  • ...1 more annotation...
  • It’s awkward for us to try to provide any specific numbers..."
    • John Lemke
       
      Sad day when accountability becomes awkward.
    • John Lemke
       
      Sad day when accountability becomes awkward.
John Lemke

Acoustic cryptanalysis - 0 views

  • Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate that such attacks can be carried out, using either a plain mobile phone placed next to the computer, or a more sensitive microphone placed 4 meters away.
  •  
    When I first read the article, I though it would take some sensitive mics but, quoting the article "Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate that such attacks can be carried out, using either a plain mobile phone placed next to the computer, or a more sensitive microphone placed 4 meters away."
John Lemke

In News That Will Surprise No One, NSA Has Cracked Mobile Phone Encryption To Listen In... - 0 views

  •  
    Just in case you have spent the past few presidencies in a closet.
John Lemke

The White House Big Data Report: The Good, The Bad, and The Missing | Electronic Fronti... - 0 views

  • the report recognized that email privacy is critical
  • one issue was left conspicuously unaddressed in the report. The Securities and Exchange Commission, the civil agency in charge of protecting investors and ensuring orderly markets, has been advocating for a special exception to the warrant requirement. No agency can or should have a get-out-of-jail-free card for bypassing the Fourth Amendment.
  • the algorithm is only as fair as the data fed into it.
  • ...22 more annotations...
  • the danger of discrimination remains due to the very digital nature of big data
  • especially the elderly, minorities, and the poor
  • an example of this in Boston, which had a pilot program to allow residents to report potholes through a mobile app but soon recognized that the program was inherently flawed because “wealthy people were far more likely to own smart phones and to use the Street Bump app. Where they drove, potholes were found; where they didn’t travel, potholes went unnoted.”
  • The authors of the report agree, recommending that the Privacy Act be extended to all people, not just US persons.
  • metadata (the details associated with your communications, content, or actions, like who you called, or what a file you uploaded file is named, or where you were when you visited a particular website) can expose just as much information about you as the “regular” data it is associated with, so it deserves the same sort of privacy protections as “regular” data.
    • John Lemke
       
      What is Metadate... then discuss
  • The report merely recommended that the government look into the issue.
    • John Lemke
       
      Did the report give a strong enough recommendation? "looking into" and doing are much different
  • several other government reports have taken a much stronger stance and explicitly stated that metadata deserves the same level of privacy protections as “regular” data.
  • We think the report should have followed the lead of the PCAST report and acknowledged that the distinction between data and metadata is an artificial one, and recommended the appropriate reforms.
    • John Lemke
       
      I very strongly agree.  The report failed in this area.
  • the White House suggested advancing the Consumer Privacy Bill of Rights, which includes the idea that “consumers have a right to exercise control over what personal data companies collect from them and how they use it,” as well as “a right to access and correct personal data.”
  • Consumers have a right to know when their data is exposed, whether through corporate misconduct, malicious hackers, or under other circumstances. Recognizing this important consumer safeguard, the report recommends that Congress “should pass legislation that provides a single national data breach standard along the lines of the Administration's May 2011 Cybersecurity legislative proposal.”
  • While at first blush this may seem like a powerful consumer protection, we don’t think that proposal is as strong as existing California law. The proposed federal data breach notification scheme would preempt state notification laws, removing the strong California standard and replacing it with a weaker standard.
    • John Lemke
       
      In other words, it failed at what can be done and it would actually lower standards when compared to what California has in place currently.
  • We were particularly disconcerted
  • the Fort Hood shooting by Major Nidal Hasan
    • John Lemke
       
      WTF? how did he get in this group?
  • two big concerns
  • First, whistleblowers are simply not comparable to an Army officer who massacres his fellow soldiers
  • Secondly, the real big-data issue at play here is overclassification of enormous quantities of data.
  • Over 1.4 million people hold top-secret security clearances. In 2012, the government classified 95 million documents. And by some estimates, the government controls more classified information than there is in the entire Library of Congress.
    • John Lemke
       
      Don't leave this stat out.  More classified documents than LOC documents.  WTF? A "democracy" with more secret documents than public?
  • The report argues that in today’s connected world it’s impossible for consumers to keep up with all the data streams they generate (intentionally or not), so the existing “notice and consent” framework (in which companies must notify and get a user’s consent before collecting data) is obsolete. Instead, they suggest that more attention should be paid to how data is used, rather than how it is collected.
    • John Lemke
       
      This is the most troubling part perhaps,  isn't the collection without consent where the breech of privacy begins?
    • John Lemke
       
      "notice and consent"
  • An unfortunate premise of this argument is that automatic collection of data is a given
  • While we agree that putting more emphasis on responsible use of big data is important, doing so should not completely replace the notice and consent framework.
  • Despite being a fairly thorough analysis of the privacy implications of big data, there is one topic that it glaringly omits: the NSA’s use of big data to spy on innocent Americans.
    • John Lemke
       
      If we ignore it, it will go away?  Did they not just mostly ignore it and accept it as a given for corporations and completely ignore it regarding the government? Pretty gangster move isn't it?
  • Even though the review that led to this report was announced during President Obama’s speech on NSA reform, and even though respondents to the White House’s Big Data Survey “were most wary of how intelligence and law enforcement agencies are collecting and using data about them,” the report itself is surprisingly silent on the issue.2 This is especially confusing given how much the report talks about the need for more transparency in the private sector when it comes to big data. Given that this same logic could well be applied to intelligence big data programs, we don’t understand why the report did not address this vital issue.
1 - 8 of 8
Showing 20 items per page