posted 6 days ago on slashdot
An anonymous reader quotes Gizmodo: On Sunday, the European Commission warned Facebook, Twitter, Google, YouTube and Microsoft that if the companies do not address their hate speech problems, the EU will enact legislation that will force them to do so. In May, those five companies voluntarily signed a code of conduct to fight illegal hate speech on their platforms within 24 hours... But on Sunday, the European Commission revealed that the companies were not complying with this code in a satisfactory manner. "In practice the companies take longer and do not yet achieve this goal. They only reviewed 40 percent of the recorded cases in less than 24 hours," a Commission official told Reuters. The Commission's report found that YouTube responded to reports of harassment the fastest, and unsurprisingly, Twitter found itself in last place. "If Facebook, YouTube, Twitter and Microsoft want to convince me and the ministers that the non-legislative approach can work, they will have to act quickly and make a strong effort in the coming months," Jourova told the Financial Times on Sunday.

Read More...
posted 6 days ago on slashdot
An anonymous reader quotes CNET: Seattle police caught an alleged car thief by enlisting the help of car maker BMW to both track and then remotely lock the luckless criminal in the very car he was trying to steal... Turns out if you're inside a stolen car, it's perhaps not the best time to take a nap. "A car thief awoke from a sound slumber Sunday morning (November 27) to find he had been remotely locked inside a stolen BMW, just as Seattle police officers were bearing down on him," wrote Jonah Spangenthal-Lee [deputy director of communications for the Seattle Police Department]. The suspect found a key fob mistakenly left inside the BMW by a friend who'd borrowed the car from the owner and the alleged crime was on. But technology triumphed. When the owner, who'd just gotten married a day earlier, discovered the theft, the police contacted BMW corporate, who tracked the car to Seattle's Ravenna neighborhood. The 38-year-old inside was then booked for both auto theft and possession of methamphetamine.

Read More...
posted 6 days ago on slashdot
Tonight at NASA's Ames Research Center in Silicon Valley, Morgan Freeman emceed a glamorous, Oscars-style celebration that recognizes scientific achievements with money from tech billionaires. An anonymous reader writes: Donors for the Breakthrough Prize included Google's Sergey Brin, Facebook's Mark Zuckerberg and his wife Priscilla Chan, Alibaba founder Jack Ma and his wife Cathy Zhang, and billionaire venture capitalist Yuri Milner, according to an article in Fortune. TechCrunch has a list of the winners, which included Princeton math professor Jean Bourgain, who won a $3 million prize "for his many contributions to high-dimensional geometry, number theory, and many other theoretical contributions." Three more physics researchers -- two from Harvard, and one from U.C. Santa Barbara -- will share a $3 million prize recognizing "meaningful advances in string theory, quantum field theory, and quantum gravity." And another $1 million prize honored the leaders of three teams responsible for "collaborative research on gravitational waves and its implications for physics and astronomy," with another $2 million to be shared among the 1,012 members of their research groups. 17-year-old Deanna See from Singapore also won the $250,000 "Breakthrough Junior Challenge" prize -- and more money for her teachers and school -- for her video about antibiotic-resistant superbugs. Google has created a special page where you can read more about some of the other winners.

Read More...
posted 6 days ago on slashdot
In 1962, 24-year-old Donald Knuth began writing The Art of Computer Programming, publishing three volumes by 1973, with volume 4 arriving in 2005. (Volume 4A appeared in 2011, with new paperback fascicles planned for every two years, and fascicle 6, "Satisfiability," arriving last December). "You should definitely send me a resume if you can read the whole thing," Bill Gates once said, in a column where he described working through the book. "If somebody is so brash that they think they know everything, Knuth will help them understand that the world is deep and complicated." But now long-time Slashdot reader Qbertino has a question: I've had The Art of Computer Programming on my book-buying list for just about two decades now and I'm still torn...about actually getting it. I sometimes believe I would mutate into some programming demi-god if I actually worked through this beast, but maybe I'm just fooling myself... Have any of you worked through or with TAOCP or are you perhaps working through it? And is it worthwhile? I mean not just for bragging rights. And how long can it reasonably take? A few years? Share your answers and experiences in the comments. Have you read The Art of Computer Programming?

Read More...
posted 6 days ago on slashdot
jader3rd shares an article from PC World arguing that Windows 10's data collection "trades your privacy for Microsoft's security." [Anonymized] usage data lets Microsoft beef up threat protection, says Rob Lefferts, Microsoft's director of program management for Windows Enterprise and Security. The information collected is used to improve various components in Windows Defender... For example, Windows Defender Application Guard for Microsoft Edge will put the Edge browser into a lightweight virtual machine to make it harder to break out of the browser and attack the operating system. With telemetry, Microsoft can see when infections get past Application Guard defenses and improve the security controls to reduce recurrences. Microsoft also pulls signals from other areas of the Windows ecosystem, such as Active Directory, with information from the Windows 10 device to look for patterns that can indicate a problem like ransomware infections and other attacks. To detect those patterns, Microsoft needs access to technical data, such as what processes are consuming system resources, hardware diagnostics, and file-level information like which applications had which files open, Lefferts says. Taken together, the hardware information, application details, and device driver data can be used to identify parts of the operating system are exposed and should be isolated into virtual containers. The article points out that unlike home users, enterprise users of Windows 10 can select a lower level of data-sharing, but argues that enterprises "need to think twice before turning off Windows telemetry to increase corporate privacy" because Windows Update won't work without information about whether previous updates succeeded or failed.

Read More...
posted 6 days ago on slashdot
BrianFagioli shares his story on Beta News: Feeling fatigued by Windows 10 and its constant updates and privacy concerns? Can't afford one of those beautiful new MacBook Pro laptops? Don't forget, Linux-based desktop operating systems are just a free download away, folks! If you do decide to jump on the open source bandwagon, a good place to start is Linux Mint. Both the Mate and Cinnamon desktop environments should prove familiar to Windows converts, and since it is based on Ubuntu, there is a ton of compatible packages. Today, the first beta of Linux Mint 18.1 'Serena' becomes available for download. Here's the release notes for both Cinammon and MATE.

Read More...
posted 6 days ago on slashdot
An anonymous reader quotes OStatic: Canonical posted Thursday that they've been in a dispute with "a European cloud provider" over the use of their own homespun version of Ubuntu on their cloud servers. Their implementation disables even the most basic of security features and Canonical is worried something bad could happen and it'd reflect badly back on them... They said they've spent months trying to get the unnamed provider to use the standard Ubuntu as delivered to other commercial operations to no avail. Canonical feels they have no choice but to "take legal steps to remove these images." They're sure Red Hat and Microsoft wouldn't be treated like this. Mark Shuttleworth, the founder of Ubuntu, wrote in his blog post that Ubuntu is "the leading cloud OS, running most workloads in public clouds today," whereas these homegrown images "are likely to behave unpredictably on update in weirdly creative and mysterious ways... We hear about these issues all the time, because users assume there is a problem with Ubuntu on that cloud; users expect that 'all things that claim to be Ubuntu are genuine', and they have a right to expect that... "To count some of the ways we have seen home-grown images create operational and security nightmares for users: clouds have baked private keys into their public images, so that any user could SSH into any machine; clouds have made changes that then blocked security updates for over a week... When things like this happen, users are left feeling let down. As the company behind Ubuntu, it falls to Canonical to take action."

Read More...
posted 6 days ago on slashdot
America's Transportation Security Administration has been making some surprising announcements on social media. An anonymous reader writes: A TSA spokesperson says 70 laptops were left behind in just one month at an airport security checkpoint in Newark. "And yes, there are plenty of shiny MacBooks in that pile," reported BravoTV, "which can cost in the $2,000 range new." The TSA shared an image of the 70 laptops on their Instagram page and on Twitter, prompting at least one mobile project designer to reclaim his laptop. "The most common way laptops are forgotten is when traveler's stack a bin on top of the bin their laptop is in," the TSA warns. "Out of sight out of mind." The TSA is also sharing pictures on social media of the 70 guns they confiscated at security checkpoints in one week in November, reporting they've also confiscated a blowtorch, batarangs, and a replica of that baseball bat from "The Walking Dead". They're reporting they found 33 loaded firearms in carry-on luggage in one week, and remind readers that gun-carrying passengers "can face a penalty as high as $11,000. This is a friendly reminder to please leave these items at home."

Read More...
posted 6 days ago on slashdot
In June a California woman successfully sued Microsoft for $10,000 over forced Windows 10 upgrades, and she's now written a 58-page ebook about her battle (which she's selling for $9.99). But an anonymous Slashdot reader shares another inspiring story about a Texas IT worker and Linux geek who got Microsoft to pay him $650 for all the time that he lost. "Worley built a Windows 7 machine for his grandfather, who has Alzheimer's Disease, [customized] to look like Windows XP, an operating system his grandfather still remembered well..." writes Digital Trends. "But thanks to Microsoft's persistent Windows 10 upgrade program, Worley's grandfather unknowingly initiated the Win 10 upgrade by clicking the 'X' to close an upgrade window." After Worley filed a legal "Notice of Dispute," Microsoft quickly agreed to his demand for $650, which he donated to a non-profit focusing on Alzheimer's patients. But according to the article, that's just the beginning, since Worley now "hopes people impacted by the forced Windows 10 upgrade will write a complaint to Microsoft demanding a settlement for their wasted time and money in repairing the device," and on his web page suggests that if people don't need the money, they should give it to charities fighting Alzheimer's. "If Microsoft isn't going to wake up and realize that lobbing intentionally-tricky updates at people who don't need and can't use them actively damages not only the lives of the Alzheimer's sufferer, but those of their whole family, then let's cure the disease on Microsoft's dime so their tactics and those of companies that will follow their reckless example aren't as damaging." Worley suggests each Notice of Dispute should demand at least $50 per hour from Microsoft, adding "If recent history holds steady they might just write you a check!"

Read More...
posted 6 days ago on slashdot
After being let go over a series of "personal issues" with his employer, things got worse for 26-year-old network administrator Dariusz J. Prugar, who will now have to spend two years in prison for hacking the ISP where he'd worked. An anonymous reader writes: Prugar had used his old credentials to log into the ISP's network and "take back" some of the scripts and software he wrote... "Seeking to hide his tracks, Prugar used an automated script that deleted various logs," reports Bleeping Computer. "As a side effect of removing some of these files, the ISP's systems crashed, affecting over 500 businesses and over 5,000 residential customers." When the former ISP couldn't fix the issue, they asked Prugar to help. "During negotiations, instead of requesting money as payment, Prugar insisted that he'd be paid using the rights to the software and scripts he wrote while at the company, software which was now malfunctioning, a week after he left." This tipped off the company, who detected foul play, contacted the FBI and rebuilt its entire network. Six years later, Prugar was found guilty after a one-week jury trial, and was ordered by the judge to pay $26,000 in restitution to the ISP (which went out of business in October of 2015). Prugar's two-year prison sentence begins December 27.

Read More...
posted 6 days ago on slashdot
Cell-site simulators can intercept phone calls and even provide locations (using GPS data). But Virginia's state police force just revealed details about their actual use of the device -- and it's not pretty. Long-time Slashdot reader v3rgEz writes: In 2014, the Virginia State Police spent $585,265 on a specially modified Suburban outfitted with the latest and greatest in cell phone surveillance: the DRT 1183C, affectionately known as the DRTbox. But according to logs uncovered by public records website MuckRock, the pricey ride was only used 12 times — and only worked seven of those times. According to Virginia's ACLU director, "each of the 12 uses cost almost $50,000, and only 4 of them resulted in an arrest [raising] a significant question whether the more than half million dollars spent on the device and the vehicle...was a wise investment of public funds."

Read More...
posted 6 days ago on slashdot
MyFirstNameIsPaul was one of several readers who spotted this disturbing instance of fake news about fake news. An anonymous reader writes: Last week the Washington Post described "independent researchers" who'd identified "more than 200 websites as routine peddlers of Russian propaganda" that they estimated were viewed more than 200 million times on Facebook. But the researchers insisted on remaining anonymous "to avoid being targeted by Russia's legions of skilled hackers," and when criticized on Twitter, responded "Awww, wook at all the angwy Putinists, trying to change the subject -- they're so vewwy angwy!!" The group "seems to have been in existence for just a few months," writes Rolling Stone's Matt Taibbi, calling the Post's article an "astonishingly lazy report". (Chris Hedges, who once worked on a Pulitzer Prize-winning team at the New York Times, even found his site Truthdig on the group's dubious list of over 200 "sites that reliably echo Russian propaganda," along with other long-standing sites like Zero Hedge, Naked Capitalism, and the Ron Paul Institute for Peace and Prosperity.) "By overplaying the influence of Russia's disinformation campaign, the report also plays directly into the hands of the Russian propagandists that it hopes to combat," complains Adrian Chen, who in 2015 documented real Russian propaganda efforts which he traced to "a building in St. Petersburg where hundreds of young Russians worked to churn out propaganda." The Post's article was picked up by other major news outlets (including USA Today), and included an ominous warning that "The sophistication of the Russian tactics may complicate efforts by Facebook and Google to crack down on 'fake news'."

Read More...
posted 6 days ago on slashdot
The "Snoopers' Charter" passed in the U.K. greatly expands the government's surveillance power. But before they'd enact the new Investigatory Powers Act, Britain's elected officials first voted to make themselves exempt from it. Sort of. An anonymous reader writes: While their internet browsing history will still be swept up, just like everyone else's, no one will ever be able to access it without specific approval from the Prime Minister. And according to The Independent, "That rule applies not only to members of the Westminster parliament but also politicians in the devolved assembly and members of the European Parliament." The article adds that the exemption was the very first amendment they approved for the legislation. And for a very long time, the only amendment.

Read More...
posted 6 days ago on slashdot
Remember that story about the "artificial leaf" solar cells? Long-time Slashdot reader managerialslime quotes the Chicago Tribune: University of Illinois at Chicago researchers have developed a way to mimic plants' ability to convert carbon dioxide into fuel, a way to decrease the amounts of harmful gas in the atmosphere and produce clean energy. The artificial leaf essentially recycles carbon dioxide. And it's powered entirely by the sun, mimicking the real photosynthesis process. But meanwhile, in Germany: Biochemists led by Tobias Erb at the Max Planck Institute for Terrestrial Microbiology...have developed a new, super-efficient method for living organisms to suck CO2 out of the atmosphere. Plants, algae, and other organisms turn CO2 into fuel. Erb and his colleagues reengineered this process, making it about 25 percent more energy efficient and potentially up to two or three times faster... Erb hopes that one day the CETCH cycle could be genetically engineered into living organisms, helping them more rapidly reduce atmospheric CO2 while producing useful materials. The researchers created their new CO2-transforming cycle using 11 carefully chosen enzymes.

Read More...
posted 6 days ago on slashdot
Mark Wilson shares his article on Beta News: Health secretary Jeremy Hunt has made calls for technology companies and social media to do more to tackle the problems of cyberbullying, online intimidation and -- rather specifically -- under-18-year-olds texting sexually explicit images. Of course, he doesn't have the slightest idea about how to go about tackling these problems, but he has expressed his concern so that, in conjunction with passing this buck to tech companies, should be enough, right? Hunt apparently believes there's already a technology which can identify sexually explicit photos, and that social media networks should now also develop algorithms to identify and block cyberbullying, an idea the Guardian called "sadly laughable." "Is the blanket censorship of non-approved communications for all under 18s -- something that goes far further than even the Great Firewall of China -- really the kind of thing a government minister should be able to idly suggest in 2016?"

Read More...
posted 7 days ago on slashdot
schwit1 quotes The Independent: Criminals can work out the card number, expiration date, and security code for a Visa debit or credit card in as little as six seconds using guesswork, researchers have found... Fraudsters use a so-called Distributed Guessing Attack to get around security features put in place to stop online fraud, and this may have been the method used in the recent Tesco Bank hack... According to a study published in the academic journal IEEE Security & Privacy, fraudsters could use computers to systematically fire different variations of security data at hundreds of websites simultaneously. Within seconds, by a process of elimination, the criminals could verify the correct card number, expiration date and the three-digit security number on the back of the card. One of the researchers explained this attack combines two weaknesses into one powerful attack. "Firstly, current online payment systems do not detect multiple invalid payment requests from different websites... Secondly, different websites ask for different variations in the card data fields to validate an online purchase. This means it's quite easy to build up the information and piece it together like a jigsaw puzzle."

Read More...
posted 7 days ago on slashdot
Bre PettisâS once said MakerBot gave you a superpower -- "You can make anything you need." But four years later, mirandakatz writes that though MakerBot promised to revolutionize society, "That never happened." At Backchannel, Andrew Zaleski has the definitive, investigative account of why the 3D printing revolution hasn't yet come to pass, culled from interviews with industry observers, current MakerBot leadership, and a dozen former MakerBot employees. As he tells it, "In the span of a few years, MakerBot had to pull off two very different coups. It had to introduce millions of people to the wonders of 3D printing, and then convince them to shell out more than $1,000 for a machine. It also had to develop the technology fast enough to keep its customers happy. Those two tasks were too much for the fledgling company."

Read More...
posted 7 days ago on slashdot
Long-time Slashdot reader Billly Gates writes, "For all the systemd haters who want a modern distro feel free to rejoice. The Debian fork called Devuan is almost done, completing a daunting task of stripping systemd dependencies from Debian." From The Register: Devuan came about after some users felt [Debian] had become too desktop-friendly. The change the greybeards objected to most was the decision to replace sysvinit init with systemd, a move felt to betray core Unix principles of user choice and keeping bloat to a bare minimum. Supporters of init freedom also dispute assertions that systemd is in all ways superior to sysvinit init, arguing that Debian ignored viable alternatives like sinit, openrc, runit, s6 and shepherd. All are therefore included in Devuan. Devuan.org now features an "init freedom" logo with the tagline, "watching your first step. Their home page now links to the download site for Devuan Jessie 1.0 Beta2, promising an OS that "avoids entanglement".

Read More...
posted 7 days ago on slashdot
An anonymous reader quotes ComputerWorld: Two researchers claim to have found a way to bypass the activation lock feature in iOS that's supposed to prevent anyone from using an iPhone or iPad marked as lost by its owner... One of the few things allowed from the activation lock screen is connecting the device to a Wi-Fi network, including manually configuring one. [Security researcher] Hemanth had the idea of trying to crash the service that enforces the lock screen by entering very long strings of characters in the WPA2-Enterprise username and password fields. The researcher claims that, after awhile, the screen froze, and he used the iPad smart cover sold by Apple to put the tablet to sleep and then reopen it... "After 20-25 seconds the Add Wifi Connection screen crashed to the iPad home screen, thereby bypassing the so-called Find My iPhone Activation Lock," he said in a blog post. There's also a five-minute video on YouTube which purports to show a newer version of the same attack.

Read More...
posted 7 days ago on slashdot
Long-Time Slashdot reader sconeu is finally replacing his 10-year-old Toshiba Satellite laptop, and needs suggestions on the best current laptops for running Linux. I'm looking to run some flavor of Linux (probably KDE-based UI, but not mandatory) while using a VM to run Windows 7 (for stuff needed for work). For me personally, battery life and weight are more important than raw power. I'm not going to be running games on this. I've been considering an XPS 13 Developer Edition, or something from System76, ZaReason or Emperor Linux. What laptop do you use? Do you have any suggestions? It's your chance to share useful information, recommendations, and your own experiences with various brands of laptop. So leave your best answers in the comments. What's the best Linux Laptop?

Read More...
posted 7 days ago on slashdot
An anonymous reader quotes the Washington Post: Congressional negotiators on Wednesday approved an initiative to track and combat foreign propaganda amid growing concerns that Russian efforts to spread "fake news" and disinformation threaten U.S. national security. The measure, part of the National Defense Authorization Act approved by a conference committee, calls on the State Department to lead government-wide efforts to identify propaganda and counter its effects. The authorization is for $160 million over two years... The Senate Intelligence Committee, meanwhile, has approved language in the fiscal year 2017 intelligence authorization bill calling for new executive branch efforts to combat what it characterized as "active measures" by Russia to manipulate people and governments through front groups, covert broadcasting or "media manipulation." "There is definitely bipartisan concern about the Russian government engaging in covert influence activities of this nature," Sen. Ron Wyden, D-Ore., a member of the Senate Intelligence Committee, said in a statement. "If you read section 501 of this year's intelligence authorization bill, it directs the President to set up an interagency committee to 'counter active measures by Russia to exert covert influence over peoples and governments.'" Several senators on the intelligence committee also asked President Obama to declassify any information relating to the Russian government and the U.S. election.

Read More...
posted 7 days ago on slashdot
"The brain's basic computational algorithm is organized by power-of-two-based logic," reports Sci-News, citing a neuroscientist at Augusta University's Medical College. hackingbear writes: He and his colleagues from the U.S. and China have documented the algorithm at work in seven different brain regions involved with basics like food and fear in mice and hamsters. "Intelligence is really about dealing with uncertainty and infinite possibilities," he said. "It appears to be enabled when a group of similar neurons form a variety of cliques to handle each basic like recognizing food, shelter, friends and foes. Groups of cliques then cluster into functional connectivity motifs to handle every possibility in each of these basics. The more complex the thought, the more cliques join in."

Read More...
posted 7 days ago on slashdot
An anonymous reader writes: Congress has passed a law protecting the right of U.S. consumers to post negative online reviews without fear of retaliation from companies. The bipartisan Consumer Review Fairness Act was passed by unanimous consent in the US Senate, a Senate Commerce Committee announcement said. The bill, introduced in 2014, was already approved by the House of Representatives and now awaits President Obama's signature. The Consumer Review Fairness Act -- full text available here -- voids any provision in a form contract that prohibits or restricts customers from posting reviews about the goods, services, or conduct of the company providing the product or service. It also voids provisions that impose penalties or fees on customers for posting online reviews as well as those that require customers to give up the intellectual property rights related to such reviews.

Read More...
posted 7 days ago on slashdot
An anonymous reader writes: This week saw the first proof of concept for Node.js API (or NAPI for short), "making module maintainers' lives easier by defining a stable module API that is independent from changes in [Google's JavaScript engine] V8 and allowing modules to run against newer versions of Node.js without recompilation." Their announcement cites both the efforts of the Node.js API working group and of ChakraCore, the core part of the Chakra Javascript engine that powers Microsoft Edge. And there was also a second announcement -- that the Node.js build system "will start producing nightly node-chakracore builds, enabling Node.js to be used with the ChakraCore JavaScript engine. "These initial efforts are stepping stones to make Node.js VM-neutral, which would allow more opportunities for Node.js in IoT and mobile use cases as well as a variety of different systems." One IBM runtime developer called it "a concrete step toward the strategic end goal of VM neutrality," and the Node.js Foundation believes that the API will ultimately result in "more modules to choose from, and more stability with modules without the need to continually upgrade."

Read More...
posted 7 days ago on slashdot
An anonymous reader writes: The organization team for a regional Drupal event apologized Thursday for distributing copies of Playboy to attendees. The magazines were distributed in welcome bags, according to a statement from the organizers of DrupalCamp Munich, and "were provided by Burda, a major German publisher, who also provided other technical magazines as part of their sponsorship. These magazines were approved for inclusion by the camp organizers. "At the time, we thought it would be a good idea, as playboy.de was one of the first major Drupal 8 websites ever released. Upon reflection, this wasn't the best idea, and the magazines have been removed... It was a decision made in poor taste, and we regret it. The inclusion of the magazine had attracted criticism on Twitter from both male and female developers, with one writing sarcastically, "Dunno about you, but I only read playboy.de for the Drupal code."

Read More...