Skip to main content

Home/ Indie Nation/ Group items tagged change

Rss Feed Group items tagged

John Lemke

Climate change is 'absolutely' linked to wildfires, says UN chief | The Verge - 0 views

  •  
    "The head of a United Nations committee on climate change said this week that global warming is "absolutely" linked to a recent spate of wildfires and heat waves, while calling upon international leaders to address the matter with more urgency. Christiana Figueres, the Executive Secretary of the United Nations Framework Convention on Climate Change (UNFCCC), made the comments in a recent interview with CNN, as massive brushfires continue to rage across Australia"
John Lemke

DOJ Lawyer Explores 'Copyright Freeconomics'; Suggests Copyright Needs To Change | Tech... - 0 views

  • Industry organizations have abandoned litigation efforts, and many copyright owners now compete directly with infringing products by offering licit content at a price of $0.
  • This sea change has ushered in an era of “copyright freeconomics.” Drawing on an emerging body of behavioral economics and consumer psychology literature, this Article demonstrates that, when faced with the “magic” of zero prices, the neoclassical economic model underpinning modern U.S. copyright law collapses. As a result, the shift to a freeconomic model raises fundamental questions that lie at the very heart of copyright law and theory. What should we now make of the established distinction between “use” and “ownership”? To what degree does the dichotomy separating “utilitarian” from “moral” rights remain intact? And — perhaps most importantly — has copyright’s ever-widening law/norm divide finally been stretched to its breaking point? Or can copyright law itself undergo a sufficiently radical transformation and avoid the risk of extinction through irrelevance?
  • The other interesting bit of the report is Newman's suggestion that an interesting proposal for changing copyright laws that might actually make traditional "maximalists" and "minimalists" both happy is to increase more moral rights for copyright -- and allow copyright holders to effectively choose if they want to enforce the "economic" rights to exclude by going after statutory damages, or, alternatively, enforce the "moral" rights to protect their reputation. His argument is that this might fit better with the nature of content creation today:
  •  
    "John Newman"
John Lemke

Rep. Goodlatte Slips Secret Change Into Phone Unlocking Bill That Opens The DMCA Up For... - 0 views

  • Because of section 1201 of the DMCA, the "anti-circumvention" provision, companies have been abusing copyright law to block all sorts of actions that are totally unrelated to copyright. That's because 1201 makes it illegal to circumvent basically any "technological protection measures." The intent of the copyright maximalists was to use this section to stop people from breaking DRM. However, other companies soon distorted the language to argue that it could be used to block certain actions totally unrelated to copyright law -- such as unlocking garage doors, ink jet cartridges, gaming accessories... and phones
  • Separately, every three years, the Librarian of Congress gets to announce "exemptions" to section 1201 where it feels that things are being locked up that shouldn't be. Back in 2006, one of these exemptions involved mobile phone unlocking.
  • Every three years this exemption was modified a bit, but in 2012, for unexplained reasons, the Librarian of Congress dropped that exemption entirely, meaning that starting in late January of 2013, it was possible to interpret the DMCA to mean that phone unlocking was illegal. In response to this there was a major White House petition -- which got over 100,000 signatures, leading the White House to announce (just weeks later) that it thought unlocking should be legal -- though, oddly, it seemed to place the issue with the FCC to fix, rather than recognizing the problem was with current copyright law.
  • ...2 more annotations...
  • While this gives Goodlatte and other maximalists some sort of plausible deniability that this bill is making no statement one way or the other on bulk unlocking, it certainly very strongly implies that Congress believes bulk unlocking is, in fact, still illegal. And that's massively problematic on any number of levels, in part suggesting that the unlocker's motives in unlocking has an impact on the determination under Section 1201 as to whether or not it's legal. And that's an entirely subjective distinction when a bill seems to assume motives, which makes an already problematic Section 1201 much more problematic. Without that clause, this seemed like a bill that was making it clear that you can't use the DMCA to interfere with an issue that is clearly unrelated to copyright, such as phone unlocking. But with this clause, it suggests that perhaps the DMCA's anti-circumvention clause can be used for entirely non-copyright issues if someone doesn't like the "motive" behind the unlocker.
  • Unfortunately, the bill was deemed so uncontroversial that it's been listed on the suspension calendar of the House, which is where non-controversial bills are put to ensure quick passage. That means that, not only did Goodlatte slip in a significant change to this bill that impacts the entire meaning and intent of the bill long after it went through the committee process (and without informing anyone about it), but he also got it put on the list of non-controversial bills to try to have it slip through without anyone even noticing.
John Lemke

Keurig Will Use DRM In New Coffee Maker To Lock Out Refill Market | Techdirt - 0 views

  • The plan was confirmed by Keurig's CEO who stated on a recent earnings call that the new maker indeed won't work with "unlicensed" pods as part of an effort to deliver "game-changing performance." "Keurig 2.0" is expected to launch this fall. French Press and pour-over manufacturers like Chemex have plenty of time to get their thank you notes to Keurig in the mail ahead of time as users are hopefully nudged toward the realization they could be drinking much better coffee anyway
John Lemke

Ask Ethan #55: Could a Manned Mission to Mars Abort? - Starts With A Bang! - Medium - 0 views

  • No humans have ever traveled farther away from Earth than the crew of Apollo 13 did, as they circled around the far side of the Moon close to lunar apogee, achieving a maximum distance of 400,171 km above the Earth’s surface on April 15, 1970. But when the first manned spaceflight to another planet occurs, that record will be shattered, and in a mere matter of days.
  • The way we currently reach other worlds with our present technology — or any remote location in the Universe — involves three distinct stages:The initial launch, which overcomes the Earth’s gravitational binding energy and starts our spacecraft off with a reasonably large (on the order of a few km/s) velocity relative to the Earth’s motion around the Sun.On-board course corrections, where very small amounts of thrust accelerate the spacecraft to its optimal trajectory.And gravity assists, where we use the gravitational properties of other planets in orbit around the Sun to change our spacecraft’s velocity, either increasing or decreasing its speed with every encounter.It’s through the combination of these three actions that we can reach any location — if we’re patient and we plan properly — with only our current rocket technology.
    • John Lemke
       
      How we can do it now, if we plan right.
  • The initial launch is a very hard part right now. It takes a tremendous amount of resources to overcome the Earth’s gravitational pull, to accelerate a significant amount of mass to the Earth’s escape velocity, and to raise it all the way up through the Earth’s atmosphere.
  • ...2 more annotations...
  • The most optimal one for a one-way trip to Mars, for those of you wondering, that minimizes both flight time and the amount of energy needed, involves simply timing your launch right.
    • John Lemke
       
      The cheapest and the fastest. The one way ticket option.
  • When a planet orbits the Sun, there’s a lot of energy in that system, both gravitational energy and kinetic energy. When a third body interacts gravitationally as well, it can either gain some energy by stealing it from the Sun-planet system, or it can lose energy by giving it up to the Sun-planet system. The amount of energy performed by the spacecraft’s thrusters is often only 20% (or less) of the energy either gained-or-lost from the interaction!
    • John Lemke
       
      The transfer of energy involved to change speeds.
John Lemke

The Internet Isn't Broken; So Why Is The ITU Trying To 'Fix' It? | Techdirt - 0 views

  • Of course, internet access has already been spreading to the far corners of the planet without any "help" from the ITU. Over two billion people are already online, representing about a third of the planet. And, yes, spreading that access further is a good goal, but the ITU is not the player to do it. The reason that the internet has been so successful and has already spread as far as it has, as fast as it has, is that it hasn't been controlled by a bureaucratic government body in which only other governments could vote. Instead, it was built as an open interoperable system that anyone could help build out. It was built in a bottom up manner, mainly by engineers, not bureaucrats. Changing that now makes very little sense.
  • And that's the thing. The internet works just fine. The only reason to "fix" it, is to "break" it in exactly the way the ITU wants, which is to favor a few players who have done nothing innovative to actually deserve it.
John Lemke

FCC to buy out TV broadcasters to free up mobile spectrum | Ars Technica - 0 views

    • John Lemke
       
      I had my first issue at step one, "asks broadcasters to tell the FCC how much it wold take for the agency to buy them out".  They claim that this is a way to keep cost down by hopefully grabbing the least popular via low bids.   I see two issues immediately.  Number one by asking them what they want they are going to immediately INCREASE the bids.  Two, if you are asking me what I want for my business to change how it broadcasts why would I not include any expense to make the switch. By asking them what they think a fair bid would be, they are, more or less, giving them a blank check.
  • the commission will put the newly-freed blocks of spectrum up for auction. If, as expected, the spectrum is more valuable when used for mobile services than broadcast television, then the FCC should reap significantly more from these traditional auctions than it had to pay for the spectrum in the original reverse auctions, producing a tidy profit for taxpayers.
    • John Lemke
       
      The objective at an auction is to purchase the object at the lowest possible cost.  How much mobile providers are willing to pay will determine how high bids will climb.  Based on how our current mobile providers already provide poor service when compared to the rest of the world, how much is that bandwidth actually worth to these companies that, more or less, have a lobbied stranglehold on the consumer?
  • ...6 more annotations...
  • Bergmayer also praised an FCC proposal to update its "spectrum screen," a set of rules that prevent any single provider from gaining too large a share of the spectrum available in a particular market. The current scheme, he said, "treats all spectrum alike, even though some spectrum bands are better-suited to mobile broadband than others." As a result, he argued, it has become ineffective at preventing Verizon and AT&T from gaining enough spectrum to threaten competition. He urged the FCC to revise the rules to ensure the new auctions don't further entrench the dominance of the largest incumbents.
    • John Lemke
       
      It is the stuff like this that worries me, on one hand they want a high bid, and on the other it is going to be regulated.
  • Over the last decade, it has become increasingly obvious that America's spectrum resources are mis-allocated. The proliferation of cell phones, and more recently smartphones and tablets, has given mobile providers a voracious appetite for new spectrum. But a big chunk of the available spectrum is currently occupied by broadcast television stations. With more and more households subscribed to cable, satellite, and Internet video services, traditional broadcast television is looking like an increasingly outmoded use of the scarce and valuable airwaves.
  • incumbent broadcasters have controlled their channels for so long that they've come to be regarded as de facto property rights. And needless to say, the politically powerful broadcasters have fiercely resisted any efforts to force them to relinquish their spectrum.
  • incentive auctions
  • The plan has three phases. In the first phase, the FCC will conduct a reverse auction in which it asks broadcasters to tell the FCC how much it would take for the agency to buy them out. Presumably, the least popular (and, therefore, least profitable) channels will submit the lowest bids. By accepting these low bids, the FCC can free up the maximum possible spectrum at the minimum cost
John Lemke

DDoS attacks on major US banks are no Stuxnet-here's why | Ars Technica - 0 views

  • More unusually, the attacks also employed a rapidly changing array of methods to maximize the effects of this torrent of data. The uncommon ability of the attackers to simultaneously saturate routers, bank servers, and the applications they run—and to then recalibrate their attack traffic depending on the results achieved—had the effect of temporarily overwhelming the targets."This very well could be a kid sitting in his mom's basement in Ohio launching these attacks." "It used to be DDoS attackers would try one method and they were kind of one-trick ponies," Matthew Prince, CEO and founder of CloudFlare, told Ars. "What these attacks appear to have shown is there are some attackers that have a full suite of DDoS methods, and they're trying all kinds of different things and continually shifting until they find something that works. It's still cavemen using clubs, but they have a whole toolbox full of different clubs they can use depending on what the situation calls for."
John Lemke

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputatio... - 0 views

  • “The Art of Deception: Training for Online Covert Operations.”
  • Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. 
  • Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends. The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
    • John Lemke
       
      Wow, how is not changing pictures and creating false victims not identity theft and conspiracy?  
  • ...4 more annotations...
  • it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption.
    • John Lemke
       
      Not only are you now guilty until proven innocent but, if you are guilty enough, we shall create a situation so that you are.
  • Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).
    • John Lemke
       
      So one of the guys who advocates this and approves of it, gets to be on the NSA review committee?  Isn't that like Ted Kennedy on the Ethics Review Committee or the Warren Commission?
  • Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
John Lemke

Exclusive: Secret contract tied NSA and security industry pioneer | Reuters - 0 views

  • Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.
  • RSA, meanwhile, was changing. Bidzos stepped down as CEO in 1999 to concentrate on VeriSign, a security certificate company that had been spun out of RSA. The elite lab Bidzos had founded in Silicon Valley moved east to Massachusetts, and many top engineers left the company, several former employees said.And the BSafe toolkit was becoming a much smaller part of the company. By 2005, BSafe and other tools for developers brought in just $27.5 million of RSA's revenue, less than 9% of the $310 million total."When I joined there were 10 people in the labs, and we were fighting the NSA," said Victor Chan, who rose to lead engineering and the Australian operation before he left in 2005. "It became a very different company later on."By the first half of 2006, RSA was among the many technology companies seeing the U.S. government as a partner against overseas hackers.New RSA Chief Executive Art Coviello and his team still wanted to be seen as part of the technological vanguard, former employees say, and the NSA had just the right pitch. Coviello declined an interview request.An algorithm called Dual Elliptic Curve, developed inside the agency, was on the road to approval by the National Institutes of Standards and Technology as one of four acceptable methods for generating random numbers. NIST's blessing is required for many products sold to the government and often sets a broader de facto standard.RSA adopted the algorithm even before NIST approved it. The NSA then cited the early use of Dual Elliptic Curve inside the government to argue successfully for NIST approval, according to an official familiar with the proceedings.RSA's contract made Dual Elliptic Curve the default option for producing random numbers in the RSA toolkit. No alarms were raised, former employees said, because the deal was handled by business leaders rather than pure technologists.
  • Within a year, major questions were raised about Dual Elliptic Curve. Cryptography authority Bruce Schneier wrote that the weaknesses in the formula "can only be described as a back door."
John Lemke

DARPA Robotics Challenge Trials Day 1 - 0 views

  • Pictured above is Valkyrie from NASA JPL. We reported on Valkyrie earlier this month. Arguably one of the better looking robots of the bunch, Valkyrie proved to be all show and no go today, failing to score any points in its day 1 trials. The day one lead went to Team Schaft, a new robot from Tokyo based startup company Schaft inc. Schaft scored 18 points in its first day. In second place is the MIT team  with 12 points. Third place is currently held by Team TRACLabs with 9 points. All this can change tomorrow as the second day of trials take place. The live stream will be available from 8am to 7pm EST on DARPA’s robotics challenge page.
John Lemke

Video: Sun has 'flipped upside down' as new magnetic cycle begins - Science - News - Th... - 0 views

  • The sun has "flipped upside down", with its north and south poles reversed to reach the midpoint of Solar Cycle 24, Nasa has said. Now, the magnetic fields will once again started moving in opposite directions to begin the completion of the 22 year long process which will culminate in the poles switching once again."A reversal of the sun's magnetic field is, literally, a big event," said Nasa’s Dr. Tony Phillips."The domain of the sun's magnetic influence (also known as the 'heliosphere') extends billions of kilometers beyond Pluto. Changes to the field's polarity ripple all the way out to the Voyager probes, on the doorstep of interstellar space."
  •  
    It is topics like these that Lumpy and Brian often discuss on Tech Net News and Opinion which airs Monday's from 8-10 PM EST. Feel free to join us in geekshed.net IRC in #indienation. We encourage listener participation and having listeners on the air.
John Lemke

Hubble spots water spurting from Europa : Nature News & Comment - 0 views

  • “If this pans out, it’s potentially the biggest news in the outer Solar System since the discovery of the Enceladus plume,” says Robert Pappalardo, a planetary scientist at the Jet Propulsion Laboratory in Pasadena, California, who was not involved in the research.
  • Roth’s team spotted the plumes when Europa was at its greatest distance from Jupiter. Changing stresses in the moon's crust, caused by tidal forces between the moon and planet, may explain why the researchers didn't see any plumes in the November observation when Europa and Jupiter were close. “Maybe Europa is just burping once in a while,” Pappalardo says.
John Lemke

Scientists May Have Decoded One of the Secrets to Superconductors | Science | WIRED - 0 views

  • “In the same way that a laser is a hell of a lot more powerful than a light bulb, room-temperature superconductivity would completely change how you transport electricity and enable new ways of using electricity,” said Louis Taillefer, a professor of physics at the University of Sherbrooke in Quebec.
  • ripples of electrons inside the superconductors that are called charge density waves. The fine-grained structure of the waves, reported in two new papers by independent groups of researchers, suggests that they may be driven by the same force as superconductivity. Davis and his colleagues directly visualized the waves in a study posted online in April, corroborating indirect evidence reported in February by a team led by Riccardo Comin, a postdoctoral fellow at the University of Toronto.
  • Taken together, the various findings are at last starting to build a comprehensive picture of the physics behind high-temperature superconductivity. “This is the first time I feel like we’re making real progress,” said Andrea Damascelli, a professor of physics at the University of British Columbia who led two recent studies on charge density waves. “A lot of different observations which have been made over decades did not make sense with each other, and now they do.”
  • ...4 more annotations...
  • The community remained divided until 2012, when two groups using a technique called resonant X-ray scattering managed to detect charge density waves deep inside cuprates, cementing the importance of the waves. As the groups published their findings in Science and Nature Physics, two new collaborations formed, one led by Damascelli and the other by Ali Yazdani of Princeton University, with plans to characterize the waves even more thoroughly. Finishing in a dead heat, the rival groups’ independent studies appeared together in Science in January 2014. They confirmed that charge density waves are a ubiquitous phenomenon in cuprates and that they strenuously oppose superconductivity, prevailing as the temperature rises.
  • y applying Sachdev’s algorithm to a new round of data, Davis and his group mapped out the structure of the charge density waves, showing that the d-wave distribution of electrons was, indeed, their source.
  • The waves’ structure is particularly suggestive, researchers say, because superconducting pairs of electrons also have a d-wave configuration. It’s as if both arrangements of electrons were cast from the same mold. “Until a few months ago my thought was, OK, you have charge density waves, who cares? What’s the relevance to the high-temperature superconductivity?” Damascelli said. “This tells me these phenomena feed off the same interaction.”
  • In short, antiferromagnetism could generate the d-wave patterns of both superconductivity and its rival, charge density waves.
John Lemke

Report: NSA among worst offenders of mass surveillance, Snowden says - CNN.com - 0 views

  • "The world has learned a lot in a short amount of time about irresponsibly operated security agencies and, at times, criminal surveillance programs. Sometimes the agencies try to avoid controls," Snowden wrote, according to the news magazine. "While the NSA and GCHQ (the British national security agency) appear to be the worst offenders -- at least according to the documents that are currently public -- we cannot forget that mass surveillance is a global problem and needs a global solution."
  • A recent report by Der Spiegel, citing documents provided by Snowden, alleged the NSA monitored German Chancellor Angela Merkel's cell phone. Some reports also suggest the United States carried out surveillance on French and Spanish citizens.
  • "If he wants to come back and open up to the responsibility of the fact that he took and stole information, he violated his oath, he disclosed classified information -- that by the way has allowed three different terrorist organizations, affiliates of al Qaeda to change the way they communicate -- I'd be happy to have that discussion with him," Rogers said on "Face the Nation."
John Lemke

Payback time: First patent troll ordered to pay "extraordinary case" fees | Ars Technica - 0 views

  • In the recent Octane Fitness case (PDF), the Supreme Court changed the test for fee-shifting precisely to deter behavior such as Lumen's, Cote found. Lumen didn't do "any reasonable pre-suit investigation," and filed a number of near-identical "boilerplate" complaints in a short time frame. That all suggests "Lumen’s instigation of baseless litigation is not isolated to this instance, but is instead part of a predatory strategy aimed at reaping financial advantage from the inability or unwillingness of defendants to engage in litigation against even frivolous patent lawsuits."
John Lemke

Stealing Encryption Keys Just by Touching a Laptop - 0 views

  • A team of computer security experts at Tel Aviv University (Israel) has come up with a new potentially much simpler method that lets you steal data from computers — Just Touch it — literally.
  • In order to victimize any computer, all you need to do is wear a special digitizer wristband and touch the exposed part of the system. The wristband will measure all the tiny changes in the ground electrical potential that can reveal even stronger encryption keys, such as a 4,096-bit RSA key.
  • in some cases, you don't even have to touch the system directly with your bare hands. You can intercept encryption keys from attached network and video cables as well. Researchers called it a side-channel attack.
  • ...1 more annotation...
  • The actual attack can be performed quickly. According to the research, "despite the GHz-scale clock rate of the laptops and numerous noise sources, the full attacks require a few seconds of measurements using medium frequency signals (around 2 MHz), or one hour using low frequency signals (up to 40 kHz)."
1 - 17 of 17
Showing 20 items per page