Skip to main content

Home/ Indie Nation/ Group items matching "useful" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
John Lemke

A Social Networking Site For Criminals Lands Two Teens In Jail « The Blade by Ron Schenone, MVP - 0 views

  •  
    Most of us are familiar with Facebook, but has anyone heard of 'Crimebook'? The novel social networking site was set up by two British teens to entertain the criminal element of society. These teens were raking in the money to the tune of some $26M with some 8,000 crooks using the social site to exchange stolen credit card information. The teens also shared the bank accounts of some 65,000 customers who had their accounts hacked by the thieves.
John Lemke

Roxxxy the US$7,000 companion/sex robot (NSFW) - 0 views

  •  
    When it comes to technology, the sex industry is no laggard, and as robots become more human-like in their appearance and abilities, US-based company TrueCompany is poised to launch Roxxxy - the world's first sex robot - that has many more capabilities than your average sex doll. Apart from having better defined physical features than previous dolls, Roxxxy has been programmed with her own personality and her manufacturers say she can listen, talk, carry on a conversation, feel your touch and respond to it, as well as move her private areas inside when she is being "utilized" to deliver an unforgettable erotic experience. There are even plans for a male version - Rocky the Robot.
John Lemke

CRIA Watches Massive Music Piracy Crisis Devastate Unknown Band | TorrentFreak - 0 views

  •  
    "The Canadian Recording Industry Association (CRIA) states that, to achieve Platinum status, an album must achieve sales of 100,000 copies/downloads of an album. Sales…that's the key. A random polling of several torrent site's downloads-ILLEGAL downloads-has shown that 1ST, the debut cd by ONE SOUL THRUST has been downloaded over 100,000 times," he wrote. Now, 100,000 downloads is a lot, especially for a band like One Soul Thrust who have just 176 Twitter followers and a single short, non-musical video on their YouTube channel which at the time of writing has 79 views. Incidentally, the video is quite nice, since they have actually taken the time out to thank a radio station for playing one of their songs. However, the band are less pleased that people are apparently sampling their music using newer methods, i.e BitTorrent. "We paid to create that album totally out of our own pockets. People think of illegal downloading not hurting anyone, but we're real people too- with real mortgages, real family to feed and real bills to pay," said lead-vocalist Salem Jones. "By downloading our album from pirate sites, people have stolen from us, our families, everyone involved in the production of our album, and their families."
John Lemke

BGU Students Develop Thought-Controlled, Hands-Free Computer For The Disabled - 0 views

  •  
    BGU software engineering students have developed innovative technology that could enable people to operate a computer without using a keyboard or mouse - only their brainwaves. While there have been previous attempts to develop devices to read brainwaves and operate specific programs, they were cumbersome and not feasible outside of a laboratory setting. The BGU technology features a helmet equipped with 14 EEG connect points that sense brain activity. According to Dr. Rami Puzis, "The technology is designed to assist those who are physically disabled who might otherwise be unable to manipulate a computer mouse or keyboard." The student team, Ori Ossmy, Ofir Tam and Ariel Rozen, developed the prototype application for their bachelor's degree project under supervision at BGU by Prof. Mark Last, Dr. Rami Puzis, Prof. Yuval Elovich and Dr. Lior Rokah. As part of a recent demonstration, a student composed and sent a hands-free e-mail using only thought combined with the adaptive hardware. The students and BGU team plan to continue research working with the disabled.
John Lemke

UK prime minister wants backdoors into messaging apps or he'll ban them | Ars Technica - 0 views

  • He said the Paris attacks, including the one last week on satirical newspaper Charlie Hebdo, underscored the need for greater access.
    • John Lemke
       
      Did they use such encryption in the attack? Would they have been caught even if encryption were not being used? what is up with that, we didn't do any better at catching thugs when they used CBs and many thugs are no smart enough to use encryption and still go uncaught.
John Lemke

Boston Police Used Facial Recognition Software To Grab Photos Of Every Person Attending Local Music Festivals | Techdirt - 0 views

  • Ultimately, taking several thousand photos with dozens of surveillance cameras is no greater a violation of privacy than a single photographer taking shots of crowd members. The problem here is the cover-up and the carelessness with which the gathered data was (and is) handled.
  • law enforcement automatically assumes a maximum of secrecy in order to "protect" its investigative techniques
  • The city claims it's not interested in pursuing this sort of surveillance at the moment, finding it to be lacking in "practical value." But it definitely is interested in all the aspects listed above, just not this particular iteration. It also claims it has no policies on hand governing the use of "situational awareness software," but only because it's not currently using any. Anyone want to take bets that the eventual roll out of situational awareness software will be far in advance of any guidance or policies?
John Lemke

Guitar maker sues Web-based t-shirt vendor for shirts reading "born to rock" | Ars Technica - 0 views

  • A guitar design firm called Born to Rock has won an initial victory over the user-generated T-shirt-printing website CafePress in a legal battle over whether CafePress users will be allowed to use the company's name as part of their T-shirt designs. While the guitar firm initially registered the phrase only for use selling guitars, it has taken the position that any use of the phrase "born to rock" by a CafePress user infringes its trademarks.
John Lemke

David Byrne and Cory Doctorow Explain Music and the Internet | culture | Torontoist - 0 views

  • Byrne and Doctorow were there to talk about how the internet has affected the music business. While that was certainly a large part of the discussion, the conversation also touched on all the ways technology and music interact, from file sharing to sampling.
  • Doctorow pointed out that two of the best-selling and most critically acclaimed hip-hop records of the 1980s—Public Enemy’s It Takes a Nation of Millions to Hold Us Back, and the Beastie Boys Paul’s Boutique—would have each cost roughly $12 million to make given today’s rules surrounding sample clearance.
  • “In the world of modern music, there are no songs with more than one or two samples, because no one wants to pay for that,” Doctorow said. “So, there’s a genre of music that, if it exists now, exists entirely outside the law. Anyone making music like Paul’s Boutique can’t make money from it, and is in legal jeopardy for having done it. Clearly that’s not what we want copyright to do.” When the conversation turned to downloads and digital music distribution, both men were surprisingly passionate on the topic of digital rights management, and how it’s fundamentally a bad idea.
  • ...1 more annotation...
  • Doctorow argued that the way humans have historically shared music is totally antithetical to the idea of copyright laws. He pointed out that music predates not only the concept of copyright, but language itself. People have always wanted to share music, and, in an odd way, the sharing of someone else’s music is embedded in the industry’s business model, no matter how badly some may want to remove it.
  •  
    "Doctorow pointed out that two of the best-selling and most critically acclaimed hip-hop records of the 1980s-Public Enemy's It Takes a Nation of Millions to Hold Us Back, and the Beastie Boys Paul's Boutique-would have each cost roughly $12 million to make given today's rules surrounding sample clearance."
John Lemke

Ain't No Science Fiction, Suspended Animation Is FDA Approved and Heading To Clinical Trials | Singularity Hub - 0 views

  • The Food and Drug Administration has already approved his technique for human trials, and he has secured funding from the Army to conduct the feasibility phase. Dr. Rhee is currently lobbying for funds to conduct a full trial. If he’s successful human trials could begin as early as next year.
  • What Dr. Rhee hopes to test on humans is a method he worked out for the past couple decades on pigs. Patients would be injected with a cold fluid to induce severe hypothermia. Clinically hypothermia is characterized by the drop of a person’s body temperature from its normal 98.6 degrees Fahrenheit (37 degrees Celcius) to lower than 95 degrees (35 C). Below 95, the heart, nervous system and other organs begin to fail. The strict range is indicative of a metabolic system with strict temperature requirements for proper function (death waits only a few degrees the other way as well). Dr. Rhee’s method involves injecting patients with a cold fluid that would bring the body’s temperature down to 50 degrees Fahrenheit (10 C). Sounds chilling, but when he induced the extreme hypothermia in pigs they came out just fine. Heart function, breathing, and brain function was completely normal.
  • Dr. Rhee is no stranger to high-stakes medicine. The native South Korean was trained at the Uniformed Services University Medical School in Bethesda, Maryland. Following a fellowship in trauma and critical care at the University of Washington’s Harborview Medical Center he served in the US Navy as director of the University of South California’s Navy Trauma Training Center at Los Angeles County. He was then sent to Afghanistan where he was one of the first surgeons at Camp Rhino. Later he started the first surgical unit at Ramadi, Iraq. His cool under fire was on display nationally as he performed surgery on US Representative Gabrielle Giffords after she was shot through the skull in the Tucson shootings this past January. His experience with induced hypothermia came into play the night of the shootings when Dr. Rhee removed part of the congresswoman’s skull. The wound had raised her body temperature and began “cooking the brain.” He used a device to cool Rep. Giffords’ skin.
John Lemke

Rent-to-own PCs surreptitiously captured users' most intimate moments | Ars Technica - 0 views

  • The software, known as PC Rental Agent, was developed by Pennsylvania-based DesignerWare. It was licensed by more than 1,617 rent-to-own stores in the US, Canada, and Australia to report the physical location of rented PCs. A feature known as Detective Mode also allowed licensees to surreptitiously monitor the activities of computer users. Managers of rent-to-own stores could use the feature to turn on webcams so anyone in front of the machine would secretly be recorded. Managers could also use the software to log keystrokes and take screen captures.
  • In some cases, webcam activations captured images of children, individuals not fully clothed, and people engaged in sexual activities, the complaint alleged. Rental agreements never disclosed the information that was collected, FTC lawyers said.
  • PC Rental Agent also had the capability to display fake registration pages for Microsoft Windows, Internet Explorer, Microsoft Office, and Yahoo Messenger. When customers entered their names, addresses, and other personal information in the forms, the data was sent to DesignerWare servers and then e-mailed to the rent-to-own licensees.
John Lemke

New Zealand Spy Agency Deleted Evidence About Its Illegal Spying On Kim Dotcom | Techdirt - 0 views

  • I have to admit that I'm consistently amazed at just how badly law enforcement in both the US and New Zealand appeared to screw up the raid and the case against Kim Dotcom. I've said it a few times before, but it really feels like authorities in both places actually believed the bogus Hollywood hype being spread by the MPAA about how Dotcom was really a James Bondian-villain, and acted accordingly, while ignoring any evidence to the contrary.
  •  
    "I have to admit that I'm consistently amazed at just how badly law enforcement in both the US and New Zealand appeared to screw up the raid and the case against Kim Dotcom. I've said it a few times before, but it really feels like authorities in both places actually believed the bogus Hollywood hype being spread by the MPAA about how Dotcom was really a James Bondian-villain, and acted accordingly, while ignoring any evidence to the contrary."
John Lemke

Japanese company proposes to build solar power cells on the Moon to provide clean energy to Earth. | Space Industry News - 0 views

  • the 11,000 mile Lunar equator
  • will beam microwave and laser energy to giant energy conversion facilities on Earth. These beams will travel to semiconductors and inverters which will convert that energy to clean electricity to the grid that will power households, businesses and factories.
  • Shimizu’s plan uses Earthly materials, ceramics, water, glass, concrete, oxygen and solar cells. They would not ship water from Earth, they will make user of the Moon’s own resources and reduce the lunar soil using hydrogen shipped from our planet and then extract the water for use in construction.
John Lemke

NSA paid $10 Million bribe to RSA Security for Keeping Encryption Weak - 0 views

  • According to an exclusive report published by Reuters, there is a secret deal between the NSA and respected encryption company RSA to implement a flawed security standard as the default protocol in its products.
  • Earlier Edward Snowden leaks had revealed that the NSA created a flawed random number generation system (Dual_EC_DRBG), Dual Elliptic Curve, which RSA used in its Bsafe security tool and now Snowden has revealed that RSA received $10 million from NSA for keeping Encryption Weak. So, anyone who knows the right numbers used in Random number generator program, can decipher the resulting cryptotext easily.
John Lemke

Exclusive: Secret contract tied NSA and security industry pioneer | Reuters - 0 views

  • Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.
  • RSA, meanwhile, was changing. Bidzos stepped down as CEO in 1999 to concentrate on VeriSign, a security certificate company that had been spun out of RSA. The elite lab Bidzos had founded in Silicon Valley moved east to Massachusetts, and many top engineers left the company, several former employees said.And the BSafe toolkit was becoming a much smaller part of the company. By 2005, BSafe and other tools for developers brought in just $27.5 million of RSA's revenue, less than 9% of the $310 million total."When I joined there were 10 people in the labs, and we were fighting the NSA," said Victor Chan, who rose to lead engineering and the Australian operation before he left in 2005. "It became a very different company later on."By the first half of 2006, RSA was among the many technology companies seeing the U.S. government as a partner against overseas hackers.New RSA Chief Executive Art Coviello and his team still wanted to be seen as part of the technological vanguard, former employees say, and the NSA had just the right pitch. Coviello declined an interview request.An algorithm called Dual Elliptic Curve, developed inside the agency, was on the road to approval by the National Institutes of Standards and Technology as one of four acceptable methods for generating random numbers. NIST's blessing is required for many products sold to the government and often sets a broader de facto standard.RSA adopted the algorithm even before NIST approved it. The NSA then cited the early use of Dual Elliptic Curve inside the government to argue successfully for NIST approval, according to an official familiar with the proceedings.RSA's contract made Dual Elliptic Curve the default option for producing random numbers in the RSA toolkit. No alarms were raised, former employees said, because the deal was handled by business leaders rather than pure technologists.
  • Within a year, major questions were raised about Dual Elliptic Curve. Cryptography authority Bruce Schneier wrote that the weaknesses in the formula "can only be described as a back door."
John Lemke

The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks - SPIEGEL ONLINE - 0 views

  • According to internal NSA documents viewed by SPIEGEL, these on-call digital plumbers are involved in many sensitive operations conducted by American intelligence agencies. TAO's area of operations ranges from counterterrorism to cyber attacks to traditional espionage. The documents reveal just how diversified the tools at TAO's disposal have become -- and also how it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks. The unit is "akin to the wunderkind of the US intelligence community," says Matthew Aid, a historian who specializes in the history of the NSA. "Getting the ungettable" is the NSA's own description of its duties. "It is not about the quantity produced but the quality of intelligence that is important," one former TAO chief wrote, describing her work in a document. The paper seen by SPIEGEL quotes the former unit head stating that TAO has contributed "some of the most significant intelligence our country has ever seen." The unit, it goes on, has "access to our very hardest targets."
  •  
    Page One of a good three page read on just how extensive the government's illegal spying operations actually are... the worst part is it is just how extensive the portions of it we know about are!
John Lemke

NSA reportedly intercepting laptops purchased online to install spy malware | The Verge - 0 views

  • According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations. According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access. While the report does not indicate the scope of the program, or who the NSA is targeting with such wiretaps, it's a unique look at the agency's collaborative efforts with the broader intelligence community to gain hard access to communications equipment. One of the products the NSA appears to use to compromise target electronics is codenamed COTTONMOUTH, and has been available since 2009; it's a USB "hardware implant" that secretly provides the NSA with remote access to the compromised machine.
  • The Der Spiegel report, which gives a broad look at TAO operations, also highlights the NSA's cooperation with other intelligence agencies to conduct Hollywood-style raids. Unlike most of the NSA's operations which allow for remote access to targets, Der Spiegel notes that the TAO's programs often require physical access to targets. To gain physical access, the NSA reportedly works with the CIA and FBI on sensitive missions that sometimes include flying NSA agents on FBI jets to plant wiretaps. "This gets them to their destination at the right time and can help them to disappear again undetected after even as little as a half hour's work," the report notes.
  •  
    While the scope or the targets are reportedly not known, the article also does not mention anything about a search warrant. This is what happens when the government feels they are above the law.
John Lemke

US Court Secretly Lets Government Share Megaupload Evidence With Copyright Industry | Techdirt - 0 views

  • Apparently part of the issue for the original filing to reveal this information was that some copyright holders are getting antsy that as the case drags on, they won't also be able to file civil cases against Megaupload before the three-year statute of limitations expires. However, as Megaupload's lawyers point out, there is no urgency here since the government itself made no move to share this information over the past two years. If it really wanted to share the information it had ample time to make the request and allow Megaupload's lawyers to review and take part in the process, rather than trying to route around them entirely. I'm guessing the recent successes against IsoHunt and Hotfile may have contributed to the timing as well. The MPAA pretty clearly thinks it can use those two cases to go after Megaupload as well, outside of the criminal case which will continue.
John Lemke

Shellshock: Code injection vulnerability found in Bash | LIVE HACKING - 0 views

  • A code injection vulnerability in the Bourne again shell (Bash) has been disclosed on the internet. If exploited then arbitrary commands can be executed, and where Bash is used in relation to a network service, for example in CGI scripts on a web server, then the vulnerability will allow remote code execution.
  • The problem is that Bash does not stop after processing the function definition; it continues to parse and execute any shell commands following the function definition
  • The vulnerability is deemed as critical because Bash is used widely on many types of UNIX-like operating systems including Linux, BSD, and Mac OS X.
  • ...1 more annotation...
  • The most prominent attack vector is via HTTP requests sent to CGI scripts executed by Bash. Also, if SSH has been configured to allow remote users to run a set of restricted commands, like rsync or git, this bug means that an attacker can use SSH to execute any command and not just the restricted command.
John Lemke

Active malware operation let attackers sabotage US energy industry | Ars Technica - 0 views

  • Researchers have uncovered a malware campaign that gave attackers the ability to sabotage the operations of energy grid owners, electricity generation firms, petroleum pipelines, and industrial equipment providers.
  • the hacking group managed to install one of two remote access trojans (RATs) on computers belonging to energy companies located in the US and at least six European countries, according to a
  • Called Dragonfly
  • ...3 more annotations...
  • "This campaign follows in the footsteps of Stuxnet, which was the first known major malware campaign to target ICS systems," the Symantec report stated. "While Stuxnet was narrowly targeted at the Iranian nuclear program and had sabotage as its primary goal, Dragonfly appears to have a much broader focus with espionage and persistent access as its current objective with sabotage as an optional capability if required."
  • been in operation since at least 2011
  • "The Dragonfly group is technically adept and able to think strategically," the Symantec report stated. "Given the size of some of its targets, the group found a 'soft underbelly' by compromising their suppliers, which are invariably smaller, less protected companies."
John Lemke

Comcast Declares War on Tor? - Deep Dot Web - 0 views

  • Comcast agents have contacted customers using Tor and instructed them to stop using the browser or risk termination of service. A Comcast agent named Jeremy allegedly called Tor an “illegal service.” The Comcast agent told its customer that such activity is against usage policies.
  • Users who try to use anonymity, or cover themselves up on the internet, are usually doing things that aren’t so-to-speak legal. We have the right to terminate,   fine, or suspend your account at anytime due to you violating the rules. Do you have any other questions? Thank you for contacting Comcast, have a great day.
  • Comcast previously corroborated with the FBI by providing information on alleged Silk Road mastermind Ross Ulbricht’s internet usage. Ulbricht’s legal defense without a warrant. Ulbricht was most certainly never given a warning by Comcast or given time to contact a lawyer before he was arrested in a San Francisco library last October. Comcast already monitors its customers internet usage to prevent them from downloading pirated media in violation of copyright laws. Under the “Six Strikes” plan, Comcast customers who are caught by Comcast pirating copy-written material are emailed by Comcast and told to cease the activity. Comcast will continue monitoring them, and if they violate the “Six Strikes” plan five more times, their internet service will be terminated.
‹ Previous 21 - 40 of 122 Next › Last »
Showing 20 items per page