posted 11 days ago on ars technica
Can a city make it easier for cell phone users to learn about RF energy?A federal judge in San Francisco is set to hear arguments today on a city's ability to force cell phone retailers to reiterate government information regarding radiofrequency (RF) energy absorption. In the civil suit, the American cell phone trade group wants a judge to declare Berkeley’s new municipal ordinance, which would require new such disclosures at the point of sale, invalid. The law, which passed in May 2015, was scheduled to take effect in August 2015, but the legal case aims to halt it. The case, known as CTIA v. City of Berkeley, pits two giants of the legal world against one another: on the side of the plaintiffs is Ted Olson, a former solicitor general under the George W. Bush Administration. Meanwhile, the defendants are armed with presidential hopeful and rockstar Harvard law professor Lawrence Lessig. Read 29 remaining paragraphs | Comments

Read More...
posted 11 days ago on ars technica
Road safety is a serious public health issue worldwide: 1.3 million people are killed in road transportation accidents every year, most of which occur in the developing world. In a study published in PNAS, researchers present the results of a randomized intervention to test whether a simple sticker could be enough to change people’s behavior behind the wheel. This extremely simple and cost-effective approach reduced insurance claims by 25 to 33 percent. The road safety experiment was conducted in Kenya between 2011 and 2013. Stickers with evocative messages were posted inside the country’s 14-seater minibuses, suggesting that passengers speak up if their driver was being unsafe. Vehicles (and their drivers) were recruited into the study at the point of insurance purchase then randomized into one of the treatment groups or one of the control groups. The experiment included several different treatment groups, including a placebo set that saw a neutral sticker saying "Travel Well." The other three groups all saw stickers intended to catch eyes:  the first used evocative messages with text about dangerous driving and no images; the second saw evocative messages with text about dangerous driving and images of people speaking up; and the third viewed evocative messages about dangerous driving with images of post-accident riders. Within each of these groups, there were subgroups in which the message encouraged either individual action or collective action—the latter involved a message roughly equivalent to “together we can.” Read 7 remaining paragraphs | Comments

Read More...
posted 11 days ago on ars technica
Of all the features that Windows 10 brings to the table—the return of the Start menu, Cortana, the Xbox App—the most interesting for gamers, DirectX 12, has remained the most mysterious. Sure, the promise of a graphics API that allows console-like low-level access to the GPU and CPU, as well as improved performance for existing graphics cards, is tremendously exciting—but there's been no way to actually test those features and see just what kind of performance uplift (if any) there is. Until now. Enter Oxide Games' real-time strategy game Ashes of the Singularity, the very first publicly available game that natively uses DirectX 12. Even better, it has a DX11 mode, too, which means for the first time we can make a direct comparison between the real-world (i.e. actual game) performance of the two APIs across different hardware. Earlier benchmarks like 3DMark's API Overhead feature test were interesting, but entirely synthetic, and focused on the maximum number of draw calls per second (which allows a game engine to draw more objects, textures, and effects) achieved by each API. What's so special about DirectX 12? DirectX 12 features an entirely new programming model, one that works on a wide range of existing hardware. On the AMD side, that means any GPU featuring GCN 1.0 or higher (cards like the R9 270, R9 290X, and Fury X) are supported, while Nvidia says anything from Fermi (400-series and up) will work. Not every one of those graphics cards will support every feature of DirectX 12, though, thanks to how the API is split into different feature levels. Those levels include extra features like Conservative Rasterization, Tiled Resources, Raster Order Views, and Typed UAV Formats. Read 36 remaining paragraphs | Comments

Read More...
posted 11 days ago on ars technica
The abundance of password leaks over the past decade has revealed some of the most commonly used—and consequently most vulnerable—passphrases, including "password", "p@$$w0rd", and "1234567". The large body of data has proven invaluable to whitehats and blackhats alike in identifying passwords that on their face may appear strong but can be cracked in a matter of seconds. Now, Android lock patterns—the password alternative Google introduced in 2008 with the launch of its Android mobile OS—are getting the same sort of treatment. The Tic-Tac-Toe-style patterns, it turns out, frequently adhere to their own sets of predictable rules and often possess only a fraction of the complexity they're capable of. The research is in its infancy since Android lock Patterns (ALPs) are so new and the number of collected real-world-patterns is comparatively miniscule. Still, the predictability suggests the patterns could one day be subject to the same sorts of intensive attacks that regularly visit passwords. Marte Løge, a 2015 graduate of the Norwegian University of Science and Technology, recently collected and analyzed almost 4,000 ALPs as part of her master's thesis. She found that a large percentage of them—44 percent—started in the top left-most node of the screen. A full 77 percent of them started in one of the four corners. The average number of nodes was about five, meaning there were fewer than 9,000 possible pattern combinations. A significant percentage of patterns had just four nodes, shrinking the pool of available combinations to 1,624. More often than not, patterns moved from left to right and top to bottom, another factor that makes guessing easier. Read 11 remaining paragraphs | Comments

Read More...
posted 12 days ago on ars technica
The third technical preview of Windows Server 2016 was released today, with one new feature in particular sure to attract interest: container support. Microsoft announced two kinds of container support for Windows Server 2016 back in April. The containers included in today's release are comparable to similar offerings on Linux, Solaris, FreeBSD; while they provide an isolated environment for deploying applications into, they don't shield apps from the underlying operating system or its version. Redmond is also promising a second kind of container, Hyper-V containers, which will use operating system virtualization to allow containers to use a different operating system or version from their host. They're not in today's build. Read 4 remaining paragraphs | Comments

Read More...
posted 12 days ago on ars technica
Jeb Bush, one of the leading Republican presidential candidates, told a national security forum that Washington, DC needs a stronger link to Silicon Valley. "There's a place to find common ground between personal civil liberties and NSA doing its job," Bush said Tuesday, according to the Associated Press. "I think the balance has actually gone the wrong way." The former Florida governor's statement puts him not only at odds with rival Republican candidates like Rand Paul, but also against a number of government committees and federal judges. Read 5 remaining paragraphs | Comments

Read More...
posted 12 days ago on ars technica
A Minnesota court has ordered Paul Hansmeier, one of two lawyers considered the creators of the Prenda Law copyright-trolling scheme, to pay sanctions in a case where he and his colleague John Steele were accused of trying to collude with a defendant. An order published Monday by a Minnesota appeals court describes how Hansmeier tried to dodge a $64,000 judicial sanction in the Guava LLC v. Spencer Merkel case by moving money out of his Alpha Law Firm then dissolving it. A district court previously found that Hansmeier's actions and inconsistent explanations warranted a piercing of the "corporate veil," and that court ruled that Hansmeier should be held personally responsible for the debt. Now, an appeals court has agreed (PDF) with that conclusion. Show us your "co-conspirators" The Guava LLC v. Spencer Merkel case was filed in early 2013. The lawsuit accused an Oregon man, Merkel, of downloading a porn movie entitled Amateur Allure—MaeLynn. Merkel called Prenda Law and admitted he did the downloading, but the man said he didn't have the $3,400 they were asking for as compensation. Read 6 remaining paragraphs | Comments

Read More...
posted 12 days ago on ars technica
On Tuesday, Target and Visa confirmed that they had reached a settlement in which Target would pay up to $67 million to Visa card issuers for a security breach in 2013 that left 40 million customer credit card numbers compromised. Visa brokered the deal and will pass the award on to the card issuers that work within its network. The settlement deal is considerably larger than the $19 million settlement that Target reached with MasterCard earlier in the proceedings. That settlement was not approved because MasterCard issuers rejected it for being too low. The Wall Street Journal reports that Target’s deal with Visa is much more likely to succeed this time around because the agreement had "already received support from Visa’s largest card issuers.” A representative from JP Morgan Chase & Co. told Ars in an e-mail that the company was “pleased” with the settlement, but he would not go into detail about specifics. It also seems that Target is working on a new deal with MasterCard comparable to the one it cut with Visa. Read 4 remaining paragraphs | Comments

Read More...
posted 12 days ago on ars technica
British health officials said Wednesday that e-cigarettes are about 95 percent less harmful than smoking, and added that they do not serve as a gateway or "route into smoking for children or non-smokers." "E-cigarettes are not completely risk free but when compared to smoking, evidence shows they carry just a fraction of the harm. The problem is people increasingly think they are at least as harmful and this may be keeping millions of smokers from quitting. Local stop smoking services should look to support e-cigarette users in their journey to quitting completely," said Kevin Fenton, director of Health and Wellbeing at Public Health England. There's plenty of competing literature about the hot-button issue as vaping, or using e-cigarettes, has been growing in popularity across the globe. Read 6 remaining paragraphs | Comments

Read More...
posted 12 days ago on ars technica
Ron Amadeo The OnePlus 2. 10 more images in gallery .related-stories { display: none !important; } Specs at a glance: OnePlus 2 Screen 1920×1080 5.5"(401 ppi) LCD OS Android Lollipop 5.1 with Oxygen UI CPU Eight-core Qualcomm Snapdragon 810 (Four 1.8 GHz Cortex-A57 cores and four Cortex-A53 cores) RAM 3GB (16GB version)4GB (64GB version) GPU Adreno 430 Storage 16GB, or 64GB Networking 802.11b/g/n/ac, Bluetooth 4.1, GPS Bands US Model GSM: 850, 900, 1800, 1900MHz WCDMA: 1/2/4/5/8 FDD-LTE: 1/2/4/5/7/8/12/17Europe Model GSM: 850, 900, 1800, 1900MHz WCDMA: 1/2/5/8 FDD-LTE: 1/3/5/7/8/20 Ports Micro USB 2.0 Type-C, headphones Camera 13MP rear camera with OSI and laser autofocus, 5MP front camera Size 151.8 x 74.9 x 9.9 mm Weight 175 g Battery 3300 mAh Price $329 (16GB version) $389 (64GB version) Other perks Fingerprint reader, 3-position physical notification mode switch, RGB notification LED, Dual SIM As a company, OnePlus' most distinctive quality has always been its aggressive marketing strategy. Despite only selling about a million phones so far, the company's slow drip of launch info and any-press-is-good-press mentality keeps it in the news almost as much as companies that sell 100x more units. OnePlus has made a name for itself by aggressively targeting enthusiasts with a "flagship" level device priced at less-than-flagship prices. Its software strategy fully embraces the modding community. The OnePlus One, like several of Google's Nexus phones before it, did a great job of being cheap without feeling cheap. Google has a ton of money to burn with a pricing scheme like that, but things appear different for OnePlus. It seems like reality has kicked in with the company's second phone, and you can really feel the cost cutting issues with the OnePlus 2. In an attempt to stand out on a budget, OnePlus removed some "standard" features you would expect on a smartphone, replacing them with unique items it thought consumers would like. We imagine the company made a list of things users do and don't care about, which came out like this: Read 45 remaining paragraphs | Comments

Read More...
posted 12 days ago on ars technica
After being caught in a legal tug of war for nearly a year and a half, the storied (and battered) Duke Nukem franchise has finally ended up in the hands of Gearbox Software. The Borderlands developer, which finally published the long-delayed and ill-received Duke Nukem Forever in 2011, said in a statement this morning that all pending litigation had been settled and that it "is the full and rightful owner of the Duke Nukem franchise." The legal battle started in February 2014, after 3D Realms and licensee Interceptor started teasing "an isometric action role-playging game" called Duke Nukem: Mass Destruction. That got the attention of Gearbox, which thought it had purchased all rights to the Duke Nukem name and franchise in 2010, when it took over work on Forever. 3D Realms CEO Mike Nielsen said that the company's attempt to license the Duke Nukem name was done "in good faith and were not aware of any conflict. We never intended to cause any harm to Gearbox or Duke, which is why we immediately ceased development after Gearbox reached out." In any case, Nielsen said, "to secure the future of Duke, 3D Realms has agreed with Gearbox that a single home serves the IP best. And as big Duke fans, we’re excited to see what Gearbox has in store for the ‘King.’" Read 2 remaining paragraphs | Comments

Read More...
posted 12 days ago on ars technica
Superconductivity was first seen in metals cooled down to close to absolute zero. But after exhausting every metal on the periodic table, the critical temperature at which the metal transitions to superconductivity never budged far from those extremely low temperatures. That changed dramatically with the development of cuprate superconductors, copper-containing ceramics that could superconduct in liquid nitrogen—still very cold (138K or −135°C), but relatively easy to achieve. But progress has stalled, in part because we don't have a solid theory to explain superconductivity in these materials. Now, taking advantage of the fact that we do understand what's going on in superconducting metals, a German research team has reached a new record critical temperature: 203K, or -70°C, a temperature that is sometimes seen in polar regions. The material they used, however, isn't a metal that appears on the periodic table. In fact, they're not even positive they know what the material is, just that it forms from hydrogen sulfide at extreme pressures. Read 8 remaining paragraphs | Comments

Read More...
posted 12 days ago on ars technica
ars.AD.queue.push(["xrailTop", {sz:"300x251", kws:["bottom"], collapse: true}]);I'll be honest with you: the 2015 Audi R8 wasn't a car we were intending to review. It's an outgoing model. The first R8s hit the street way back in 2007, so there isn't really much clever new technology for me to write about. I hadn't even scheduled a loan of the press car; an e-mail telling me it was being delivered was the first anyone at Ars knew we'd have a week with an R8 V10 Plus. But when there's a bright red mid-engined sports car parked outside your house you may as well drive it, and if I was going to drive it I may as well write about it, so here we are. Elle Cayabyab Gitlin The car was a massive hit with the younger demographic. 3 more images in gallery .related-stories { display: none !important; } The R8 first appeared in 2006. It took its name from Audi's Le Mans racer, one of the most dominant racing cars ever to turn a wheel. The R8 was near-unbeatable for a five year stretch beginning in the year 2000, even when hobbled by power-sapping air restrictors. Audi wanted to celebrate (and capitalize on) its racing success, leveraging the hard-won credibility of the R8 name and the fact that it now owned Lamborghini to create the company's idea of the every day sports car—something to rival Porsche's ubiquitous 911. Jonathan Gitlin An Audi R8 LMP1 racer. This is the actual car that won Le Mans in 2000, and it still wears the coat of grime that built up over those 24 hours. 2 more images in gallery .related-stories { display: none !important; } The R8 took the Lamborghini Gallardo's extruded aluminum spaceframe and all-wheel drive system as a starting point. The chassis got expanded it a bit in the interest of interior space, and Audi swapped out the Italian engine for a direct injection (FSI in Audi-speak) V8, the company having proven FSI engines with the racing car. Before long the V8 was joined by a 5.2l V10 engine with more than 500hp (372kW), a credible answer to the question "can you build an everyday supercar?" It's the ultimate expression of that car that we've been driving, the R8 V10 Plus. Read 10 remaining paragraphs | Comments

Read More...
posted 12 days ago on ars technica
Canadian authorities quickly apprehended an Ontario man after he fired a laser beam at a York Regional Police helicopter early Sunday morning. According to Canadian media accounts, a police helicopter dubbed Air2 was aloft over Vaughan, Ontario, north of Toronto helping ground units respond to a weapons call. The helicopter itself was then struck by a laser—but by switching to an infrared system, Air2 was easily able to locate the shooter on the ground who appeared to have a handgun of some kind. This suspected firearm turned out to be an air gun with a laser sight. Within minutes, patrol officers with the Canine Unit and Emergency Response Unit responded on foot—the suspect fled into a wooded area nearby, discarding the gun. Read 5 remaining paragraphs | Comments

Read More...
posted 12 days ago on ars technica
Nvidia is adding a new feature to its GeForce Experience software that will allow users to stream a game to another user's PC over the Internet, and play cooperatively with a just a single copy. The feature, dubbed GameStream co-op, is launching as part of a beta release of GeForce Experience in the coming weeks. GameStream co-op, which is similar to Sony's Share Play feature on PlayStation 4, offers users three different modes. The first allows a friend to observe the game; the second mirrors the controls of the host PC on the guest PC, allowing the user to take over control of the game; and the third enables co-op play. While the observation and mirror modes will require no extra work from developers to implement, some may be required for co-op play. GameStream co-op uses the same technology behind Nvidia's GameStream service, which allows users to stream a game over a local network from their PC to another device like a Shield tablet. However, unlike the 1080p support of GameStream, GameStream co-op will initially only support 720p streaming at 60 FPS using h.264 encoding, with a minimum 6Mbps upload speed recommended. Streaming will also only be compatible with the Google Chrome browser via a plug-in. Read 2 remaining paragraphs | Comments

Read More...
posted 12 days ago on ars technica
Carlos Garza, a former employee of a now-collapsed Bitcoin mining company, must respond to a subpoena as part of an ongoing fraud investigation by the Securities and Exchange Commission, a federal judge in Massachusetts ruled on Tuesday. The implosion of GAW Miners marks yet another example of incompetence and possible criminal behavior associated with a number of firms selling hardware to mine new bitcoins. Previously, CoinTerra, Butterfly Labs, and HashFast have also faced similar legal battles. The SEC alleges millions of dollars in possible fraudulent sales by GAW Miners—the case could also expand to criminal charges. Read 9 remaining paragraphs | Comments

Read More...
posted 12 days ago on ars technica
12 more images in gallery .related-stories { display: none !important; } Mike Bithell, developer of the sleeper hit platformer Thomas Was Alone, likes to share his opinions about the games industry. Whether it's the suitability of free-to-play hooks, virtual reality, or just the general state of indie development, he's managed to leverage the success of his sole produced game into a high-profile industry soapbox. Volume, his sophomore effort, seems like his attempt to work through opinions of a different sort. The stealthy Metal Gear send-up is set in a post-artificial intelligence England, where former arms dealer Guy Gisborne has dispensed with pretenses and declared the country a corporatocracy (there are some hints that this all takes place after the events of Thomas Was Alone). Army brat Rob Locksley, fed up with the classism Gisborne's regime reinforces, steals an antique AI-cum-holographic projector (the titular “Volume”), and proffers an active yet non-violent solution: to livestream lessons in how to steal from Gisborne and his cohorts, effectively taking back England one priceless painting and bank account PIN at a time. It's cyberpunk Robin Hood, with the genre's requisite dose of social commentary. As for how the game plays, it's more in line with the overhead, third-person sneaking of Metal Gear Solid and its 2D predecessors (and its V.R. Missions spin-off) than with a first-person game like Deus Ex or Thief. You maneuver Rob from a top-down perspective, collecting gems and avoiding guards while reaching the goal in the shortest time possible. There are gadgets and hidey holes doled out over the 100 levels of the campaign, but the core objective remains the same throughout: don't get caught. Read 12 remaining paragraphs | Comments

Read More...
posted 13 days ago on ars technica
SAN FRANCISCO—Intel today gave the first peek at what makes its new Skylake processors tick. The company is still being peculiarly coy about the new processors—many details won't be revealed until the company announces its Xeon server processors—but shared some details of the processor's architecture, and described its many and varied tricks to cut power usage. As has been the case for many years now, reducing power consumption remains Intel's top priority for Skylake. Not only does reduced power consumption enable the company's processors to be used more widely—client Skylake processors will span everything from 4.5W tablet and ultralight systems up to 95W desktop devices, a 20-fold difference in power envelope—it also enables greater performance. Reduce the power used by one part of the chip and the extra thermal headroom (and current draw) can be spent on other parts of the chip; this is the underlying principle of Turbo Boost. Intel's focus on Skylake's power-saving capabilities isn't too much of a surprise, given this overriding concern. But it's not the sole concern. The greater power flexibility has in turn created other demands. For example, the package size and motherboard size matter: it's no good having a 4.5W processor for laptops and tablets if the package is huge. The difference between the smallest and largest packages in Skylake isn't as pronounced as the power difference—only a four-fold difference—but it's still significant. Skylake's mobile and SoC processor packages are smaller than those of comparable Broadwell packages, enabling smaller, lighter systems. Its motherboards should be smaller too, thanks to power supply optimizations. Read 18 remaining paragraphs | Comments

Read More...
posted 13 days ago on ars technica
The massive leak attributed to the hackers who rooted to the Ashley Madison dating website for cheaters has been confirmed to be genuine. As if that wasn't bad enough, the 10 gigabytes of data—compressed, no less—is far more wide ranging than almost anyone could have imagined. Researchers are still poring over the unusually large dump, but already they say it includes user names, first and last names, and hashed passwords for 33 million accounts, partial credit card data, street names, and phone numbers for huge numbers of users, records documenting 9.6 million transactions, and 36 million email addresses. While much of the data is sure to correspond to anonymous burner accounts, it's a likely bet many of them belong to real people who visited the site for clandestine encounters. For what it's worth, more than 15,000 of the e-mail addresses are hosted by US government and military servers using the .gov and .mil top-level domains. The leak also includes PayPal accounts used by Ashley Madison executives, Windows domain credentials for employees, and a large number of proprietary internal documents. Also found: huge numbers of internal documents, memos, org charts, contracts, sales techniques, and more. Read 5 remaining paragraphs | Comments

Read More...
posted 13 days ago on ars technica
If you want to use Windows 10 on a Mac with either Parallels Desktop or VMware Fusion, you’ll have to strongly consider buying a new version of your virtualization software of choice. Parallels on Wednesday this week is releasing its latest upgrade, Parallels Desktop 11 for Mac, for $79.99 per device (or $49.99 if you're upgrading from version 9 or 10). VMware should be following up soon with its next version, Fusion 8. You may have spent money on either Parallels 10 or Fusion 7 just a year ago, but that year-old software will only provide bare-bones support for Windows 10, which Microsoft released last month. Read 27 remaining paragraphs | Comments

Read More...
posted 13 days ago on ars technica
Intel Intel has dedicated an ever-larger portion of its chips to the GPU in the last half-decade or so. 4 more images in gallery .related-stories { display: none !important; } ars.AD.queue.push(["xrailTop", {sz:"300x251", kws:["bottom"], collapse: true}]);This morning's Intel Developer Forum keynote was a bust for anyone hoping for more news about the company's forthcoming Skylake processors. Its chips may make the company most of its money, but CEO Brian Krzanich and crew seem more interested in keynotes-as-forward-looking-spectacles. Interacting with smart vending machines and spider robots get you and your company on late-night TV, but Jimmy Fallon usually doesn't have people on to talk about processor microarchitecture. We get it. The post-keynote sessions were somewhat more productive. They gave us at least a few architectural details on the Skylake CPUs and their accompanying GPUs, though Intel somewhat frustratingly isn’t using its own developer conference to make specific product announcements. For now, the only GPU we truly know about for sure is the HD 530 that shipped with the high-end overclockable Core i5 and i7 chips (though leaked slides point to a few lower-end mobile GPUs). Here’s the Skylake graphics breakdown, to the best of our knowledge as of this date. Look for more about the CPUs soon. Read 23 remaining paragraphs | Comments

Read More...
posted 13 days ago on ars technica
Microsoft said that the Insider Program for Windows 10 beta releases would continue after Windows 10's official launch, and today it made good on that promise with the release of the first post-launch preview. Build 10525 is now available to fast track insiders. Opting in to the preview is done in the Update page of the settings tab; check a box and the system will start offering preview releases. What's new in the new build? As ever, Microsoft isn't publishing an exhaustive list of fixes or known defects, but there's one notable inclusion that'll make many happy: title bars can now follow the theme color, instead of being fixed at white. If the "Show color on Start, taskbar, and action center" option is enabled (it's off by default) then title bars will pick up the color too. Read 1 remaining paragraphs | Comments

Read More...
posted 13 days ago on ars technica
Microsoft has issued an emergency update for its Internet Explorer browser to patch a critical vulnerability attackers are actively exploiting to install malware on targeted computers. CVE-2015-2502, as the remote code-execution flaw is indexed, can be exploited when vulnerable computers visit booby-trapped websites or possibly when they open malicious HTML-based e-mails. The bug involves the way IE stores objects in memory and results in an error that corrupts memory contents. The vulnerability, which is present in all supported versions of IE, carries Microsoft's top severity of critical for all desktop versions of Windows. The rating is one step lower for server OSes because IE on those versions runs in a restricted mode known as enhanced security configuration. In an advisory posted Tuesday afternoon, Microsoft officials wrote: Read 2 remaining paragraphs | Comments

Read More...
posted 13 days ago on ars technica
Gigabytes worth of data taken during last month's hack of the Ashley Madison dating website for cheaters has purportedly been published online—an act that, if true, could prove highly embarrassing for the men and women who have used the service over the years. A 10-gigabyte file purportedly containing e-mails, member profiles, credit-card transactions and other sensitive Ashley Madison information became available as a BitTorrent download in the past few hours. Ars hasn't had an opportunity to download the massive file to confirm its contents. As the screenshot above indicates, the dump contains files with titles including "aminno_member_dump.gz," "aminno_member_email.dump.gz," "CreditCardTransactions7z," and "member_details.dump.gz," an indication that the download could contain highly personal details. People have already taken to 8chan and other sites to discuss the contents of the data. Their posts unsurprisingly report that many of the names and other identifying information appear to be falsified. Assuming the download turns out to be authentic, people should remember that it was possible for anyone to create an account using the name and e-mail address of other individuals. That means an entry for a given individual doesn't automatically prove the person was behind it. Still, it would be harder for hoaxters to falsify credit card transactions and member profiles. As a result, the data could prove devastating if used by divorce attorneys, blackmailers, and others. This post will be updated as this story develops. Read on Ars Technica | Comments

Read More...
posted 13 days ago on ars technica
Federal prosecutors asked a federal judge in Washington on Tuesday to dismiss the government's prosecution of a South Korean businessman accused of illegally selling technology used in aircraft and missiles to Iran. The move comes three months after a judge ruled that the government unlawfully seized and searched the suspect's computer at Los Angeles International Airport as Jae Shik Kim was to catch a flight home in 2012. The government decided not to appeal and said it was "unable to continue prosecuting this matter." As we previously reported in this case, the authorities who were investigating Kim exercised the border exception rule that allows them "to seize and search goods and people—without court warrants—along the border and at airport international terminals. US District Court judge Amy Berman Jackson of the District of Columbia noted that the Supreme Court has never directly addressed the issue of warrantless computer searches at an international border crossing, but she ruled the government used Kim's flight home as an illegal pretext to seize his computer." Authorities then shipped it 150 miles south to San Diego where the hard drive was copied and examined for weeks. Read 2 remaining paragraphs | Comments

Read More...