You are here

Site në gjuhë të huaj

Once Vehicles Are Connected To the Internet of Things, Who Guards Your Privacy?

Slashdot.org - Enj, 18/09/2014 - 10:00md
Lucas123 (935744) writes Carmakers already remotely collect data from their vehicles, unbeknownst to most drivers, but once connected via in-car routers or mobile devices to the Internet, and to roadway infrastructure and other vehicles around them, that information would be accessible by the government or other undesired entities. Location data, which is routinely collected by GPS providers and makers of telematics systems, is among the most sensitive pieces of information that can be collected, according to Nate Cardozo, an attorney with the Electronic Frontier Foundation. "Not having knowledge that a third party is collecting that data on us and with whom they are sharing that data with is extremely troubling," Cardozo said. in-vehicle diagnostics data could also be used by government agencies to track driver behavior. Nightmare scenarios could include traffic violations being issued without law enforcement officers on the scene or federal agencies having the ability to track your every move in a car. That there could be useful data in all that personally identifiable bits made me think of Peter Wayner's "Translucent Databases."

Read more of this story at Slashdot.








New Study Projects World Population of 11B by 2100

Slashdot.org - Enj, 18/09/2014 - 9:18md
vinces99 (2792707) writes Using modern statistical tools, a new study led by the University of Washington and the United Nations finds that world population is likely to keep growing throughout the 21st century. The number of people on Earth is likely to reach 11 billion by 2100, the study concludes, about 2 billion higher than widely cited previous estimates. The paper published online Sept. 18 in the journal Science includes the most up-to-date numbers for future world population, and describes a new method for creating such estimates. "The consensus over the past 20 years or so was that world population, which is currently around 7 billion, would go up to 9 billion and level off or probably decline," said corresponding author Adrian Raftery, a UW professor of statistics and of sociology. ... The paper explains the most recent United Nations population data released in July. This is the first U.N. population report to use modern statistics, known as Bayesian statistics, that combines all available information to generate better predictions. Most of the anticipated growth is in Africa, where population is projected to quadruple from around 1 billion today to 4 billion by the end of the century. The main reason is that birth rates in sub-Saharan Africa have not been going down as fast as had been expected. There is an 80 percent chance that the population in Africa at the end of the century will be between 3.5 billion and 5.1 billion people.

Read more of this story at Slashdot.








The 2014 Ig Nobel Prizes Will Be Awarded Tonight

Slashdot.org - Enj, 18/09/2014 - 8:36md
alphadogg (971356) writes At Harvard University's Sanders Theater this evening, a collection of the most off-the-wall, bizarre and lurid scientific efforts of the past year will be dubiously honored with an Ig Nobel Prize. The Ig Nobels are awarded annually by Improbable Research, an organization devoted to scientific education that publishes the Annals of Improbable Research magazine six times a year. Past honorees have included:*A study about homosexual necrophilia in ducks; Competitive analysis of breakfast cereal sogginess; The discovery that dung beetles can navigate using the Milky Way galaxy. The ceremony begins at 6 p.m. EST, and can be viewed online for free here.

Read more of this story at Slashdot.








Ask Slashdot: How To Pick Up Astronomy and Physics As an Adult?

Slashdot.org - Enj, 18/09/2014 - 7:40md
First time accepted submitter samalex01 (1290786) writes "I'm 38, married, two young kids, and I have a nice job in the IT industry, but since I was a kid I've had this deep love and passion for astronomy and astrophysics. This love and passion though never evolved into any formal education or anything beyond just a distant fascination as I got out of high school, into college, and started going through life on more of an IT career path. So my question, now that I'm 38 is there any hope that I could start learning more about astronomy or physics to make it more than just a hobby? I don't expect to be a Carl Sagan or Neil deGrasse Tyson, but I'd love to have enough knowledge in these subjects to research and experiment to the point where I could possibly start contributing back to the field. MIT Open Courseware has some online courses for free that cover these topics, but given I can only spend maybe 10 hours a week on this would it be a pointless venture? Not to mention my mind isn't as sharp now as it was 20 years ago when I graduated high school. Thanks for any advice or suggestions."

Read more of this story at Slashdot.








Apple Will No Longer Unlock Most iPhones, iPads For Police

Slashdot.org - Enj, 18/09/2014 - 6:59md
SternisheFan writes with this selection from a story at the Washington Post: Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user data. The move, announced with the publication of a new privacy policy tied to the release of Apple's latest mobile operating system, iOS 8, amounts to an engineering solution to a legal dilemma: Rather than comply with binding court orders, Apple has reworked its latest encryption in a way that makes it almost impossible for the company – or anyone else but the device's owner – to gain access to the vast troves of user data typically stored on smartphones or tablet computers. The key is the encryption that Apple mobile devices automatically put in place when a user selects a passcode, making it difficult for anyone who lacks that passcode to access the information within, including photos, e-mails, recordings or other documents. Apple once kept possession of encryption keys that unlocked devices for legally binding police requests, but will no longer do so for iOS8, it said in a new guide for law enforcement. "Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data," Apple said on its Web site. "So it's not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8."

Read more of this story at Slashdot.








Giselle Reis: Evince annotations: almost there

Planet GNOME - Enj, 18/09/2014 - 6:37md
The delay on drawing annotations was fixed and, together with some poppler patches by jaliste, we managed to get it working properly. Check it out:

There are still glitches here and there, but we are working on it so that the feature is available on evince's next release (fingers crossed!). After we get highlighting done, the other text markup annotations should be fairly straightforward.

Alice Is Killing Trolls But Patent Lawyers Will Strike Back

Slashdot.org - Enj, 18/09/2014 - 6:17md
snydeq writes The wheels of justice spin slowly, but they seem finally to be running software patents out of town, writes Simon Phipps in his analysis of how Alice Corp. v CLS Bank is becoming a landmark decision for patent cases in the U.S. 'In case after case, the Court of Appeals is using Alice to resolve patent appeals. In each case so far, the Court of Appeals has found the software patents in question to be invalid. ... As PatentlyO points out, the Alice effect is even reaching to lower courts, saving the Court of Appeals from having to strike down patent findings on appeal.' Although the patent industry broadly speaking sees the Alice verdict as a death knell for many existing patents, some expect Alice to turn software patents into 'draftsmen's art because as you and I have seen over the years, every time there's a court ruling it just means that you have to word the patent claims differently.'

Read more of this story at Slashdot.








An Open Source Pitfall? Mozilla Labs Closed, Quietly

Slashdot.org - Enj, 18/09/2014 - 5:35md
mikejuk writes with this excerpt: When Google Labs closed there was an outcry. How could an organization just pull the rug from under so many projects? At least Google announced what it was doing. Mozilla, it seems since there is no official record, just quietly tiptoes away — leaving the lights on since the Mozilla Labs Website is still accessible. It is accessible but when you start to explore the website you notice it is moribund with the last blog post being December 2013 with the penultimate one being September 2013. The fact that it is gone is confirmed by recent blog posts and by the redeployment of the people who used to run it. The projects that survived have been moved to their own websites. It isn't clear what has happened to the Hatchery -the incubator that invited new ideas from all and sundry. One of the big advantages of open source is the ease with which a project can be started. One of the big disadvantages of open source is the ease with which projects can be allowed to die — often without any clear cut time of death. It seems Mozilla applies this to groups and initiatives as much as projects. This isn't good. The same is true at companies that aren't open source centric, though, too, isn't it?

Read more of this story at Slashdot.








Snowden's Leaks Didn't Help Terrorists

Slashdot.org - Enj, 18/09/2014 - 4:53md
HughPickens.com writes The Interecept reports that contrary to lurid claims made by U.S. officials, a new independent analysis of Edward Snowden's revelations on NSA surveillance that examined the frequency of releases and updates of encryption software by jihadi groups has found no correlation in either measure to Snowden's leaks about the NSA's surveillance techniques. According to the report "well prior to Edward Snowden, online jihadists were already aware that law enforcement and intelligence agencies were attempting to monitor them (PDF)." In fact, concerns about terrorists' use of sophisticated encryption technology predates even 9/11. Earlier this month former NSA head Michael Hayden stated, "The changed communications practices and patterns of terrorist groups following the Snowden revelations have impacted our ability to track and monitor these groups", while Matthew Olsen of the National Counterterrorism Centre would add "Following the disclosure of the stolen NSA documents, terrorists are changing how they communicate to avoid surveillance." Snowden's critics have previously accused his actions of contributing from everything from the rise of ISIS to Russia's invasion of the Ukraine. "This most recent study is the most comprehensive repudiation of these charges to date," says Murtaza Hussain. "Contrary to lurid claims to the contrary, the facts demonstrate that terrorist organizations have not benefited from the NSA revelations, nor have they substantially altered their behavior in response to them."

Read more of this story at Slashdot.








US Military Aware Only Belatedly of Chinese Attacks Against Transport Contractors

Slashdot.org - Enj, 18/09/2014 - 4:28md
itwbennett writes The Senate Armed Service Committee released on Wednesday an unclassified version of a report (PDF) commissioned last year to investigate cyberattacks against contractors for the U.S. Transportation Command (TRANSCOM). The report alleges that the Chinese military successfully stole emails, documents, login credentials and more from contractors, but few of those incidents were ever reported to TRANSCOM. During a one-year period starting in June 2012, TRANSCOM contractors endured more than 50 intrusions, 20 of which were successful in planting malware. TRANSCOM learned of only two of the incidents. The FBI, however, was aware of 10 of the attacks.

Read more of this story at Slashdot.








Philip Withnall: Long live gnome-common? Macro deprecation

Planet GNOME - Enj, 18/09/2014 - 4:24md

gnome-common is shrinking, as we’ve decided to push as much of it as possible upstream. We have too many layers in our build systems, and adding an arbitrary dependency on gnome-common to pull in some macros once at configure time is not helpful — there are many cases where someone new has tried to build a module and failed with some weird autotools error about an undefined macro, purely because they didn’t have gnome-common installed.

So, for starters:

What does this mean for you, a module maintainer? Nothing, if you don’t want it to. gnome-common now contains copies of the autoconf-archive macros, and has compatibility wrappers for them.

In the long term, you should consider porting your build system to use the new, upstreamed macros. That means, for each macro:

  1. Downloading the macro to the m4/ directory in your project and adding it to git.
  2. Adding the macro to EXTRA_DIST in Makefile.am.
  3. Ensuring you have ACLOCAL_AMFLAGS = -I m4 ${ACLOCAL_FLAGS} in your top-level Makefile.am.
  4. Updating the macro invocation in configure.ac; just copy out the shim from gnome-common.m4 and tidy everything up.

Here’s an example change for GNOME_CODE_COVERAGE ? AX_CODE_COVERAGE in libgdata.

This is the beginning of a (probably) long road to deprecating a lot of gnome-common. Macros like GNOME_COMPILE_WARNINGS and GNOME_COMMON_INIT are next in the firing line — they do nothing GNOME-specific, and should be part of a wider set of reusable free software build macros, like the autoconf-archive. gnome-common’s support for legacy documentation systems (DocBook, anyone?) is also getting deprecated next cycle.

Comments? Get in touch with me or David King (amigadave). This work is the (long overdue) result of a bit of discussion we had at the Berlin DX hackfest in May.

Australian Police Arrest 15, Charge 2, For Alleged Islamic State Beheading Plot

Slashdot.org - Enj, 18/09/2014 - 4:06md
The Washington Post reports (building on a short AP report they're also carrying) that "[Australian] police have arrested 15 people allegedly linked to the Islamic State, some who plotted a public beheading." According to the Sydney Morning Herald, of the arrestees, only two have been charged. From the Washington Post story: “Police said the planned attack was to be “random.” The killers were to behead a victim and then drape the body in the black Islamic State flag, according to the Sydney Morning Herald. ... Direct exhortations were coming from an Australian who is apparently quite senior in [the Islamic State] to networks of support back in Australia to conduct demonstration killings here in this country,” Australian Prime Minister Tony Abbott said at a press conference, as the BBC reported. “So this is not just suspicion, this is intent and that’s why the police and security agencies decided to act in the way they have.”

Read more of this story at Slashdot.








London's Crime Hot Spots Predicted Using Mobile Phone Data

Slashdot.org - Enj, 18/09/2014 - 3:26md
KentuckyFC (1144503) writes A growing number of police forces around the world are using data on past crimes to predict the likelihood of crimes in the future. These predictions can be made more accurate by combining crime data with local demographic data about the local population. However, this data is time consuming and expensive to collect and so only updated rarely. Now a team of data experts have shown how combing crime data with data collected from mobile phones can make the prediction of future crimes even more accurate. The team used an anonymised dataset of O2 mobile phone users in the London metropolitan area during December 2012 and January 2013. They then used a small portion of the data to train a machine learning algorithm to find correlations between this and local crime statistics in the same period. Finally, they used the trained algorithm to predict future crime rates in the same areas. Without the mobile phone data, the predictions have an accuracy of 62 per cent. But the phone data increases this accuracy significantly to almost 70 per cent. What's more, the data is cheap to collect and can be gathered in more or less real time. Whether the general population would want their data used in this way is less clear but either way Minority Report-style policing is looking less far-fetched than when the film appeared in 2002.

Read more of this story at Slashdot.








Study Finds Link Between Artificial Sweeteners and Glucose Intolerance

Slashdot.org - Enj, 18/09/2014 - 2:45md
onproton (3434437) writes The journal Nature released a study today that reveals a link between the consumption of artificial sweeteners and the development of glucose intolerance [note: abstract online; paper itself is paywalled], a leading risk factor for the development of type 2 diabetes, citing a critical alteration of intestinal bacteria. Paradoxically, these non-caloric sweeteners, which can be up to 20,000 times sweeter than natural sugars, are often recommended to diabetes patients to control blood glucose levels. Sugar substitutes have come under additional fire lately from studies showing that eating artificially sweetened foods can lead to greater overall calorie consumption and even weight gain. While some, especially food industry officials, remain highly skeptical of such studies, more research still needs to be done to determine the actual risks these substances may pose to health.

Read more of this story at Slashdot.








IOCCC 2014 Now In Progress

Slashdot.org - Enj, 18/09/2014 - 2:26md
leob (154345) writes In case you haven't noticed yet, the 23rd International Obfuscated C Code Contest is now in progress. A pre-announcement was made on Twitter in the end of August; the online submission tool is now available until 2014-Oct-19 18:17:16 UTC.

Read more of this story at Slashdot.








FCC Chairman: Americans Shouldn't Subsidize Internet Service Under 10Mbps

Slashdot.org - Enj, 18/09/2014 - 2:04md
An anonymous reader writes On Wednesday at a hearing in front of the US House Committee on Small Business, FCC Chairman Tom Wheeler stated that for ISPs to be eligible for government broadband subsidies, they would have to deliver speeds of at least 10 Mbps. Said Wheeler: "What we are saying is we can't make the mistake of spending the people's money, which is what Universal Service is, to continue to subsidize something that's subpar." He further indicated that he would remedy the situation by the end of 2014. The broadband subsidies are collected through bill surcharges paid for by phone customers.

Read more of this story at Slashdot.








Jonathan McDowell: Automatic inline signing for mutt with RT

Planet Debian - Enj, 18/09/2014 - 12:00md

I spend a surprising amount of my time as part of keyring-maint telling people their requests are badly formed and asking them to fix them up so I can actually process them. The one that's hardest to fault anyone on is that we require requests to be inline PGP signed (i.e. the same sort of output as you get with "gpg --clearsign"). That's because RT does various pieces of unpacking[0] of MIME messages that mean that a PGP/MIME signatures that have passed through it are no longer verifiable. Daniel has pointed out that inline PGP is a bad idea and got as far as filing a request that RT handle PGP/MIME correctly (you need a login for that but there's a generic read-only one that's easy to figure out), but until that happens the requirement stands when dealing with Debian's RT instance. So today I finally added the following lines to my .muttrc rather than having to remember to switch Mutt to inline signing for this one special case:

send-hook . "unset pgp_autoinline; unset pgp_autosign" send-hook rt.debian.org "set pgp_autosign; set pgp_autoinline"

i.e. by default turn off auto inlined PGP signatures, but when emailing anything at rt.debian.org turn them on.

(Most of the other things I tell people to fix are covered by the replacing keys page; I advise anyone requesting a key replacement to read that page. There's even a helpful example request template at the bottom.)

[0] RT sticks a header on the plain text portion of the mail, rather than adding a new plain text part for the header if there are multiple parts (this is something Mailman handles better). It will also re-encode received mail into UTF-8 which I can understand, but Mutt will by default try to find an 8 bit encoding that can handle the mail, because that's more efficient, which tends to mean it picks latin1.

NASA Inspector General Lobs Big Rocks At Agency's Asteroid Hunting Program

Slashdot.org - Enj, 18/09/2014 - 11:27pd
coondoggie writes Lack of money, management structure and staff are hampering NASA's ability to effectively identify and track comets, meteorites and asteroids that might threaten Earth. The space agency's Inspector General, Paul Martin, issued a scathing report this week that said while NASA's Near Earth Object program has done substantial work in identifying the sometimes massive rocks hurtling around the planet it is substantially behind in its goal of cataloging 90% of those 140 meters in diameter by 2020, among other issues.

Read more of this story at Slashdot.








Qubes: The Open Source OS Built for Security

LinuxSecurity.com - Enj, 18/09/2014 - 11:18pd
LinuxSecurity.com: This is why she and her team built Qubes OS, a security-focused open source operating system based on Fedora that, in essence, assumes that bugs are everywhere. Instead of running one kernel, Qubes isolates all functions into separate virtual machines using the Xen hypervisor.

Encryption goof fixed in TorrentLocker file-locking malware

LinuxSecurity.com - Enj, 18/09/2014 - 11:13pd
LinuxSecurity.com: The developers of a type of malicious software that encrypts a computer's files and demands a ransom have fixed an error security experts said allowed files to be recovered without paying.

Faqet

Subscribe to AlbLinux agreguesi - Site në gjuhë të huaj