Skip to main content

Home/ Internetni praktikum/ Group items tagged include

Rss Feed Group items tagged

Gabrijela Vrbnjak

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
Jernej Prodnik

Aaron Swartz files reveal how FBI tracked internet activist | Technology | guardian.co.uk - 0 views

  • Aaron Swartz files reveal how FBI tracked internet activist Firedoglake blogger Daniel Wright publishes once-classified FBI documents that show extent of agency's investigation into Swartz
  • Amanda Holpuch guardian.co.uk, Tuesday 19 February 2013 22.42 GMT
  • A blogger has published once-classified FBI files that show how the agency tracked and collected information on internet activist Aaron Swartz. Swartz, who killed himself in January aged 26, had previously requested his files and posted them on his blog, but some new documents and redactions are included in the files published by Firedoglake blogger Daniel Wright.Wright was given 21 of 23 declassified documents, thanks to a rule that declassifies FBI files on the deceased. Wright said that he was told the other two pages of documents were not provided because of freedom of information subsections concerning privacy, "sources and methods," and that can "put someone's life in danger."
  • ...3 more annotations...
  • The FBI's files concern Swartz's involvement in accessing the Public Access to Court Electronic Records (Pacer) documents. In pursuit of their investigation, the FBI had collected his personal information and was surveilling an Illinois address where he had his IP address registered. Aaron H. Swartz FBI File by Daniel Wright
  • One page reads: "Washington Field Office requests that the North RA attempt to locate Aaron Swartz, his vehicles, drivers license information and picture, and others. Since Swartz is the potential subject of an ongoing investigation, it is requested that Swartz not be approached by agents." The FBI also collected information from his social networking profiles, including Facebook and Linkedin. The latter proved to be a catalog of his many notable accomplishments, which include being a co-founder of Reddit, a founder of a website to improve the government, watchdog.net and as metadata adviser at Creative Commons.
  • Information from a New York Times article about his Pacer hack was also included in the files, though strangely, since the article can still be read online, the name of the article's other subject, Carl Malamud, was blocked out.Hacking collective Anonymous released a State Department database Monday in memory of Swartz. The files included employees' personal information such as addresses, phone number and emails.
manca_

Apollo Plus: Microsoft's next Windows Phone update to include Wi-Fi, audio, and other f... - 0 views

  • bring new features to Windows
  • // 33inShare Microsoft is currently preparing an update for Windows Phone 8, codenamed Apollo Plus.
  • A Wi-Fi connection fix is also planned to let connections always remain on, alongside some audio improvements. Apollo Plus will also test Microsoft's ability to deliver Windows Phone 8 updates over-the-air, a change from the previous OS that required users to plug devices into PCs to get similar updates.
donnamariee

BBC News - O2's Tu Go aims to challenge Skype and other Voip apps - 0 views

  • O2 has launched an app which lets users make and receive phone calls and texts via a tablet, computer or smartphone. Tu Go is available for Android, Apple's iOS devices and Windows 7 PCs but limited to "pay monthly" subscribers - so excludes corporate accounts.
  • Users can be logged into the service on up to five devices at once - meaning all will ring if they receive a call - including handsets using Sim cards associated with different networks and internet enabled gadgets such as iPods.
  • The effort represents the telecom industry's latest attempt to tackle competition from Skype and other third-party Voip services. These typically do not charge for app-to-app calls, but do require the user to buy credit if they want to call or send a text to a standard mobile or landline number.
  • ...2 more annotations...
  • But the scale of the threat was highlighted earlier this week when the chairman of China Mobile - the world's largest telecom carrier - said his firm was now more concerned about the challenge posed by Microsoft's Skype and Tencent's WeChat services than it was about competition from China's rival mobile networks.
  • There are already dozens of Voip apps on the market including lesser-known names such as Tango, Fring, Bria and Zerofone as well as manufacturer's own services including BlackBerry BBM and Apple's Facetime.
Jan Keček

Yahoo to shut down seven products, including BlackBerry app | Technology | guardian.co.uk - 0 views

  • Yahoo is shutting down seven products, including its mobile app for BlackBerry smartphones, as new chief executive Marissa Mayer emulates Google by eliminating unsuccessful products.
  • Mayer said at an investor conference last month that Yahoo would reduce its current 60 to 75 mobile apps to a more manageable 12 to 15.
  • The other Yahoo products to be terminated include Yahoo App Search, Yahoo Sports IQ, Yahoo Clues, the Yahoo Message Boards website and the Yahoo Updates API.
Miha Naprudnik

BBC - WebWise - How does the web work? - 1 views

  • Web pages can include embedded links or ’hyperlinks’, so simply clicking the link will take you to that page. Following a trail of links is called ‘web surfing’.
  • The web is also traversed by ’spiders’ (or software robots) that follow links and collect information that can be used by search engines such as Google. Not all web users are human!
  • As websites are becoming more sophisticated than static pages, web developers are using many more versatile tools. These include CSS (Cascading Style Sheets), scripting languages such as JavaScript and PHP (Hypertext Preprocessor), and Adobe Flash.
Janja Petek

Clashes over Internet regulation during UN talks - World Politics - World - The Indepen... - 0 views

  • The head of the UN's telecommunication overseers sought Monday to quell worries about possible moves toward greater Internet controls during global talks in Dubai, but any attempts for increased Web regulations are likely to face stiff opposition from groups led by a major US delegation.
  • he 11-day conference — seeking to update codes last reviewed when the Web was virtually unknown
  • highlights the fundamental shift from tightly managed telecommunications networks to the borderless sweep of the Internet. 
  • ...6 more annotations...
  • xpanding the Internet into developing nations.
  • Many countries will come to reaffirm their desire to see freedom of expression embedded in this conference,
  • The gathering is also powerless to force nations to change their Internet policies, such as China's notorious "Great Firewall" and widespread blackouts of political opposition sites in places including Iran and the Gulf Arab states.
  • That opens the door ... to content censorship
  • t is clear that some governments have an interest in changing the rules and regulations of the Internet,"
  • Over the decades, it has expanded to include telephone, satellite and other advances in communications.
anonymous

Google to be summoned over data grab 'excesses' | Technology | The Guardian - 0 views

  • Google representatives are to be summoned to appear before European data protection officials over concerns about the way it collects data on web users.
  • On Thursday, a coalition of 30 data protection officials, including Britain's information commissioner, demanded "significant progress" from Google before the summer
  • The authorities are concerned about changes Google introduced to its privacy policies in March last year. The changes were made to "unify" how information is collected across approximately 60 products, including YouTube GoogleMail, Google has said.
Katja Kotnik

Me and my data: how much do the internet giants really know? | Technology | The Guardian - 0 views

  • Google is not only the world's largest search engine, it's one of the top three email providers, a social network, and owner of the Blogger platform and the world's largest video site, YouTube. Facebook has the social contacts, messages, wallposts and photos of more than 750 million people.
  • The site also lists my most recent sent and received emails (in both cases a "no subject" conversation thread with a colleague).
  • The big relief comes when I note Google isn't tracking the internet searches I've made on my work account
  • ...12 more annotations...
  • only around 29% of the information Facebook possesses on any given user is accessible through the site's tools.
  • The Facebook extended archive is a little creepier, including "poke info", each instance of tracking cookies they possess, previous names, and full login and logout info
  • Looking through anyone's list of searches gives a distressing degree of insight into odder parts of their personality.
  • sell us stuff
  • how much do the internet giants really know?
  • picked up by hackers
  • how much the internet giants know about us.
  • Google isn't totally unhelpfu
  • Every event to which I've ever been invited is neatly listed, alongside its location, time, and whether I said I would attend .
  • One piece of information – a supposed engagement to a schoolfriend, Amy Holmes – stands out. A Facebook "joke" that seemed faintly funny for about a week several years ago was undone by hiding it from any and all Facebook users, friends or otherwise (to avoid an "… is now single!" status update). The forgotten relationship helpfully explains why Facebook has served me up with badly targeted bridalwear adverts for several years, and reassures me that Facebook doesn't know quite everything.
  • This is the core of the main comfort
  • despite their mountain of data, Google and Facebook seem largely clueless, too – they've had no more luck making any sense out of it than I have. And that, for now, is a relief.
metapavlin

A Year After the Closing of Megaupload, a File-Sharing Tycoon Opens a New Site - NYTime... - 0 views

  • A Year After the Closing of Megaupload, a File-Sharing Tycoon Opens a New Site
  • Kim Dotcom opened his new file-storage Web site to the public — one year to the minute after the police raided the mansion he rents in New Zealand.
  • Megaupload
  • ...10 more annotations...
  • the file-sharing business he had founded.
  • Mr. Dotcom faces charges in the United States of pirating copyrighted material and money laundering and is awaiting an extradition hearing in New Zealand. But on Sunday, he said his focus was on the new site, which was already straining under heavy traffic within two hours of its introduction.
  • including one that he would not start a Megaupload-style business until the criminal case was resolved.
  • Megaupload, knew its users were illegally uploading copyrighted material — and indeed sought to encourage the practice
  • conditions of the site do explicitly forbid uploading copyrighted material.
  • terms and
  • “This is us being innovators and executing our right to run a business.”
  • “Every pixel on the site has been checked for all kinds of illegal — potential legal challenges. We have a great team of very talented lawyers that are experts in intellectual property and Internet law, and they have worked together with us to create Mega.”
  • The service competes with online storage sites like Dropbox and Google Drive.
  • “We are still here. We are still breathing,” he said. “Consider what has happened to us a year ago — that is probably the least likely event that anyone would have expected.”
mancamikulic

Why We All Have 'Internet-Addiction Genes' - Robert Wright - The Atlantic - 0 views

  • : A gene that seems to be (very modestly) correlated with internet addiction also plays a role in nicotine addiction.
  • A gene that seems to be (very modestly) correlated with internet addiction also plays a role in nicotine addiction.
  • internet addiction is not a figment of our imagination
  • ...16 more annotations...
  • Whether heavy internet use deserves to be called an addiction or just a hard-to-break habit is a question about a behavior pattern and its attendant psychological states.
  • To answer it we ask such things as how strong the cravings for the internet are, what lengths a person will go to in order to satisfy them, and so on.
  • Human beings are biochemical machines "designed" by natural selection to, among other things, form habits.
  • The habit-forming machinery involves the release of reward chemicals, such as dopamine, that make us feel good upon attaining these goals
  • In the modern world, there are shortcuts to getting these rewards
  • And there's some evidence (though here I'm approaching the limits of my comprehension of the science) that people with a particular variant of a gene involved in building acetylcholine receptors are more susceptible to nicotine addiction than other people
  • the main point is this: the biochemical mechanisms (including genes) involved in chemical addictions will naturally be the mechanisms involved in habit formation more generally since habit formation is what they were originally designed for.
  • whether it's a habit or an addiction, it is going to involve pleasure-dispensing biochemical mechanisms of the sort that can get us addicted to such chemicals as nicotine and cocaine
  • After all, the internet, like these chemicals, allows us to trigger our neuronal reward mechanisms with much less work,
  • it wasn't possible, in a very small and technologically primitive social universe, to at any time of day launch an observation or joke
  • the internet, like a pack of cigarettes or lots of cocaine, lets you just sit in a room and repeatedly trigger reward chemicals that
  • And all of us have lots and lots of these genes--genes that make us susceptible to internet addiction.
  • some of these genes may vary from person to person in ways that make some people particularly susceptible to internet addiction
  • In fact, there will turn out to be so many genes which are so modestly correlated with internet addiction
  • that if journalists write stories every time such a gene is found, or is thought to have been found, they will find that they're not shedding much actual light on the situation.
  • These genes are really just genes for being human.
manca_

Make the unfiltered web illegal, says children's coalition | Technology | guardian.co.uk - 0 views

  • forced to filter the web
  • the government should legally compel ISPs to screen out images of child abuse and underage sex.
  • by blocking such material at source.
  • ...2 more annotations...
  • largely focuses on operating a notice-and-take-down system for illegal content hosted in the UK, including obscene or racially offensive material
  • peer-to-peer filesharing systems
Rebeka Aščerič

BBC News - Children 'must know web limits' says Wales commissioner - 0 views

  • Adults must impose the necessary checks and balances to keep children safe online, says the children's commissioner for Wales.
  • "All children and young people don't seem much of a distinction between their online and offline lives,"
  • Mr Towler told BBC Radio Wales. "It's all just one thing and they get really excited by the opportunities the internet affords and sometimes parents get a little scared about that and worried about what their children are accessing." 'Crossing the road' Continue reading the main story “Start Quote They're all running around with handheld computers these days, they're not just on phones ” End Quote Keith Towler Children's commissioner Mr Towler said he talks to children in lots of different settings and they "still enjoy playing outside as much as they ever did". He said we need to recognise that the internet provides fantastic opportunities for education and learning and its making sure that children access that safely. He said that was a real challenge for parents and carers. "It's a bit like crossing the road, you try to teach your children the best way of crossing the road well. We need to teach our children the best way of using this fantastic resource. "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'". Handheld computers The commissioner also praised Hwb, the virtual learning environment, which he said provides protection for children using the web in schools. Mr Towler said: "We've got to get parents and carers to recognise that children do operate in the digital world. They're all running around with handheld computers these days, they're not just on phones. "They can access whatever they want whenever they want and parents need to engage on that. " "We need to remember that children and young people are much more savvy than sometimes we think they are, and they are much more responsible than sometimes adults think they are so its not all doom and gloom. "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that." Sangeet Bhullar, executive director of Wise Kids, added that the digital landscape was "evolving rapidly" and up-to-date data was needed on how children and young people in Wales related to it. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Web safety lessons urged for infants 05 FEBRUARY 2013, EDUCATION &amp; FAMILY Online chat 'should be monitored' 22 JANUARY 2013, TECHNOLOGY Body to promote digital teaching 22 JUNE 2012, WALES $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Children's Commissioner for Wales The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this pageShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Wales stories RSS Army base shuts in defence shake-up An Army base in Pembrokeshire is to close with 600 troops transferred to St Athan in the Vale of Glamorgan. Soldiers' conman jailed three years Wales recall Warburton and Jones <!--
  • ...2 more annotations...
  • "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'".
  • "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that."
inesmag

Apple value falls below $400bn, as Warren Buffett says 'ignore critics' | Technology | ... - 0 views

  • Apple is still embroiled in a legal tussle with Samsung, once its biggest supplier of phone parts. Photograph: Michaela Rehle/Reuters
  • The company is under increasing pressure from rivals including Google and smartphone manufacturers like South Korean electronics giant Samsung, whose Galaxy line has challenged iPhone's success.
  • Samsung used to be Apple's biggest supplier for phone parts, and Apple its largest customer. But in 2010, Jobs vowed to go to "thermonuclear war" over what he saw as copying of iPhone features by phones using Google's Android operating system.
Rebeka Aščerič

Social media followers: Beware the tweeting crowds | The Economist - 0 views

  • IF YOU think money can't buy you friends, think again. In the online world, it’s possible to purchase a crowd of fans.
  • To decide whether a follower is human, Mr Camisani Calzolari used various criteria, including the number of posts from a fan’s Twitter account and the use of correct punctuation in tweets. According to this research, by June 2011 nearly half of Twitter followers of computer maker Dell—about 700,000—were bots.
  • On close inspection, a significant proportion of Mr Romney’s followers appeared to be fake profiles.
  • ...2 more annotations...
  • There is no indication that any of the companies mentioned in Mr Camisani Calzolari’s paper have bought followers—rogue bots often attach themselves to people and brands without payment. But some firms do buy a social media following.
  • For now, the trick works. “Normal people don't know yet that there is this black market. Most have total trust that a brand's followers are real,” says Mr Camisani Calzolari.
manca_

North Korea's 3G network won't be censored for foreigners | The Verge - 1 views

  • long maintained tight control over the flow of information within its borders
  • foreigners
  • unfettered mobile access to the web
  • ...7 more annotations...
  • thanks to new policies implemented by supreme leader Kim Jong Un
  • that required foreigners to hand over their devices to authorities.
  • country has finally begun opening its doors to the outside world,
  • some 3G services, including text messaging, video calls, and subscriptions to state-run newspapers, but their mobile internet will remain tightly filtered, since North Koreans are still "governed by a separate set of telecommunication rules,"
  • two parallel internets — one for foreigners, one for citizens
  • visitors
  • about $300 for the cheapest 2GB data package.
Jan Majdič

China to Web Users: Great Firewall? Just Be Glad We're Not North Korea - David Caraglia... - 1 views

  • Last week, Google Executive Chairman Eric Schmidt urged North Korean leaders to embrace the Internet. Only a small proportion of that country's 24 million people can access the World Wide Web, and the majority of the 1.5 million mobile phones there belong to political and military elites.
  • Meanwhile, in China, a country that has embraced the Internet to a much greater extent, the big story was about censorship, both online and off.
  • For Chinese social media users, the irony here was too perfect to go unnoticed
  • ...5 more annotations...
  • A number of social networking and sharing websites are blocked in China, including Facebook, Twitter, Youtube, Wikipedia, and certain Google applications
  • "China's progress must be viewed in the context of its unique historical and cultural circumstances.
  • Web users engage with and identify as part of a broader, sometimes international, online community
  • Chinese public preferences are shifting from broadcast media to networked media; with that shift, the expectation for public participation is growing.
  • Knowing well the impact and viral nature of social networking, editors loyal to propaganda authorities took control of the newspaper's microblogging account not long after the scandal broke.
Miha Naprudnik

Al Gore on How the Internet is Changing the Way We Think - Al Gore - The Atlantic - 0 views

  • we as individuals are becoming far more efficient and productive by instantly connecting our thoughts to computers, servers, and databases all over the world.
  • the large complex system includes not only the Internet and the computers, but also us.
  • Indeed, many now spend so much time on their smartphones and other mobile Internet -- connected devices that oral conversation sometimes almost ceases.
  • ...1 more annotation...
  • Human memory has always been affected by each new advance in communications technology. Psychological studies have shown that when people are asked to remember a list of facts, those told in advance that the facts will later be retrievable on the Internet are not able to remember the list as well as a control group not informed that the facts could be found online
donnamariee

Firefox OS won't magically succeed just because it's open source - see webOS | Technolo... - 0 views

  • Firefox OS won't magically succeed just because it's open source - see webOS The siren song of open source means some people think Firefox OS could take the smartphone market by storm - but that's what they thought about webOS
  • Open source" operating systems are the siren call of the internet. For years, we were promised, Linux was going to be the Next Big Thing on the desktop; the tired old empires of Windows and MacOS were going to be pushed aside, and everyone was going to embrace Linux (though quite which distro wasn't clear). From infants to grannies, they would all see the light, and install software that was built with the user in mind - as long as the user was someone who could hold the idea of the concentric circles of file ownership (root/wheel/std) in their head
  • Despite the fevered imaginings of a fair number at the time, there was simply no chance that webOS was going to go anywhere without direct help from HP; and HP wasn't going to give it that help, since it had plenty of troubles of its own.
  • ...8 more annotations...
  • LG has indicated that it will be using webOS in its Smart TV line (which, in passing, suggests that Google's hopes of having a multi-manufacturer-pronged assault on the living room with Google TV are being chipped away; Samsung has gone its own way, Sony offers a mixture of Google and its own smart TV offerings, and now it looks like LG isn't exactly all-in). Though that might, in time, become something that it uses on phones or tablets, you'd be crazy to bet on it. LG is smart enough to know that TVs are a world away from phones and tablets, both in terms of the user interaction experience, and the demands that they make for user acceptance.
  • But the siren song of open source OSs becomes deafening when you look at the other announcement to come out of Mobile World Congress, in which Mozilla is touting its Firefox OS as the anathema to the world's ills - or at least those afflicting the smartphone industry. What does Moziila chief executive Gary Kovacs think is going to be the unique selling point of the Firefox OS phones that he expects to see in 2014? "Our goal is to level the playing field and usher in an explosion of content and services that will meet the diverse needs of the next two billion people online," he said in Barcelona, adding "We're not trying to get in the middle of an operating system fight; what we are trying to do is be the catalyst to drive more development around the open web."
  • The problem for Firefox OS is that it doesn't have a dedicated hardware backer. Sure, Sony has said that it will make some phones using it. ZTE and Alcatel say they will build hardware that will run it. And Kovacs points to the fact that Firefox OS will run HTML5 apps - not "native" apps (in the sense that iOS or Android apps run natively). That might put a questionmark over whether, by some analysts' measure, the FFOS phone is truly a "smartphone", since their definition for that includes "running apps on a native API". (That's why Gartner and IDC don't class Nokia's Asha phones as smartphones.)
  • So how did Android succeed? Three things. First, Google get a vibrant app ecosystem going even before there was a single phone: it had competitions for apps, with a $10m fund to seed developer ideas. By April 2008 there were almost 2,000 Android applications; two-third came from outside the US. Among the offerings: photo-enhanced driving, on-the-fly party mashups with maps, maintaining passive surveillance on your family's whereabouts. (Some things never change.) Second, it was able to go to Verizon, which was looking enviously at how AT&amp;T was able to offer the iPhone, and suggest that Android phones - when they came along - could be the answer to that competitive challenge. And third, it was Google - the gigantic search-engine-and-everything-else company with the international reputation. If Google was doing a new generation of smartphone software (and if Apple had validated the idea), then it looked like a good deal for everyone. And handset manufacturers were eager to find an alternative to Microsoft.
  • Android is gigantic - some version of it might be on a billion phones this year - meaning there's no obvious need for another open source OS. What, after all, is FFOS actually going to do that Android doesn't, or that iOS or Windows Phone or BlackBerry can't? Yes, we've heard that the target isn't the west, but the developing world; that still doesn't explain why a Chinese handset manufacturer would deploy FFOS rather than Android, whether the Google version or a forked one that could connect to a local app store.
  • Even worse, FFOS is at an immediate competitive disadvantage because the principal browser on smartphones now is based on WebKit. Chrome uses it, MobileSafari uses it, BlackBerry uses it, and Opera uses it too now. That leaves only Internet Explorer on Windows Phone standing alone. Developers writing HTML5 apps will naturally write for compatibility with WebKit, which is always going to behave slightly differently from Firefox's Gecko rendering engine. For FFOS's sake, you have to hope the differences aren't big.
  • That's the trouble with the magical thinking that often attaches to open source projects. Making webOS open source didn't solve its problems; it simply shoved them off into a siding. Having an open source mobile OS didn't guarantee Android's success; the efforts of Google, and the timing in the market, did that.
  • Perhaps for that reason, people have high expectations for the Ubuntu OS and phone, with its fabulously complex array of gestures for control. Bad news, dreamers: it's going to fail in the market too if Canonical attempts to market it as a hardware-software combination - that is, sells Ubuntu phones at retail.
inesmag

How to keep your privacy online | Ask Jack | Technology | guardian.co.uk - 2 views

  • I would like my browsing and Google searches to be private. I don't want targeted advertising and I don't want to feel that anonymous companies are harvesting my clicks to learn all about me.
  • When the web was young, and a lot less shiny, web pages were fixed (static) and – barring browser quirks – everybody saw much the same thing. Today, much of the web is dynamic, which means that what you see has been adapted or possibly constructed on the fly just for you.
  • From your point of view, the advantage is that the websites you visit will be personalised to suit your needs and tastes. From the website's point of view, the advantage is that it can also personalise its prices and advertising to try to suit your needs and tastes, and increase your propensity to click and buy.
  • ...6 more annotations...
  • On the web, the rule is: if you're not paying, then you are what's being sold.
  • Probably the simplest way to reduce personalisation is to use an anonymising service. Instead of accessing the web directly, you access it via a third-party proxy server, so your that requests are mixed in with thousands of others. These services usually allow you to control cookies, turn JavaScript on and off, withhold "referrer details" and so on.
  • Nonetheless, it's often useful to have access to an anonymous proxy service, and everybody should find one they like. Examples include The Cloak, Megaproxy, Proxify and ID Zap. There are also networked open source privacy systems such as Tor and I2P.
  • Google also tracks your progress across hundreds of thousands of websites via Google Analytics. To opt out of this, install the Google Analytics Opt-out Browser Add-on (Beta), which Google offers for Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Apple Safari and Opera. However, some sites use different analytics software or track visitors in other ways you will be unaware of. Ghostery may help reduce these.
  • Finally, Facebook Connect is a potential privacy problem because it "allows users to 'connect' their Facebook identity, friends and privacy to any site".
  • In general, the more you do online – social networking, cloud computing etc – the more your privacy and security are at risk. Reducing that risk involves effort and inconvenience, so it's up to you to find an acceptable compromise
1 - 20 of 32 Next ›
Showing 20 items per page