sl4shd0rk writes "Remember when the ex-cable lobbyist Tom Wheeler was appointed to the FCC chair back in May of 2013? Turns out he's currently gunning for Internet Service Providers to be able to 'favor some traffic over other traffic.' It would set a dangerous precedent, considering the Open Internet Order in 2010 forbade such action if it fell under unreasonable discrimination. The bendy interpretation of the 2010 order is apparently aimed somewhat at Netflix, as Wheeler stated: 'Netflix might say, "I'll pay in order to make sure that my subscriber might receive the best possible transmission of this movie."'"
Catch up on stories from the past week (and beyond) at the Slashdot story archive
After winning the right to use the term perjury in regards to Warner Bros abuse of the DMCA takedown procedure, and successfully blocking the MPAA from using the term "piracy" at their trial, Hotfile settled out of court with the MPAA today (mere days before the trial was scheduled to begin). As part of the deal, they are dropping their countersuit against Warner Bros, paying $80 million, and halting all operations immediately. The Hotfile website has been replaced by an MPAA message. From Torrent Freak: "The settlement deal was rubber stamped by the U.S. District Court for the Southern District of Florida, ... The MPAA is happy with the outcome which it says will help to protect the rights of copyright holders on the Internet. 'This judgment by the court is another important step toward protecting an Internet that works for everyone,' MPAA boss Chris Dodd says."
jfruh writes "One of the most potent aspects of Anonymous is, well, its anonymity — but that isn't absolute. Eric Rosol was caught by federal authorities participating in a DDoS attack on a company owned by Koch Industry; for knocking a website offline for 15 minutes, Rosol got two years of probation and had to pay $183,000 in restitution (the amount Koch paid to a security consultant to protect its website ater the attack)." The worst part? From the article: "Eric J. Rosol, 38, is said to have admitted that on Feb. 28, 2011, he took part in a denial of service attack for about a minute on a Web page of Koch Industries..."
cagraham writes "Startup Swarm Mobile intends to help physical retailers counter online shopping habits by collecting data on their customer's actions. Swarm's platform integrates with store's Wifi networks in order to monitor what exactly customers are doing while shopping. In exchange for collecting analytics, shoppers get access to free internet. Swarm then send reports to the store owners, detailing how many customers checked prices online, or compared rival products on their phones. Their platform also allows stores to directly send discount codes or coupons to shopper's phones."
thomst writes "Robert Barnes of the Washington Post reports that the US Supreme Court has declined to hear petitions from Amazon.com and Overstock.com requesting that a decision by the New York State Supreme Court permitting that state's 2008 law requiring sales taxes be collected on Internet sales, even if the seller has no 'business presence' in New York. The New York Court of Appeals ruled that Amazon's relationship with third-party affiliates in the state that receive commissions for sending Web traffic its way satisfied the 'substantial nexus' necessary to force the company to collect taxes, and New York's Supreme Court had affirmed the ruling. The Federal high court's refusal to hear the petitions leaves the state law in effect, even though it appears to conflict with the Court's 1993 decision in Quill v. North Dakota."
mrspoonsi writes "Studies suggest red-haired women tend to choose the best passwords and men with bushy beards or unkempt hair, the worst. These studies also reveal that when it comes to passwords, women prefer length and men diversity. On the internet, the most popular colour is blue, at least when it comes to passwords. If you are wondering why, it is largely because so many popular websites and services (Facebook, Twitter and Google to name but three) use the colour in their logo. That has a subtle impact on the choices people make when signing up and picking a word or phrase to form a supposedly super-secret password. The number one conclusion from looking at that data — people are lousy at picking good passwords. 'You have to remember we are all human and we all make mistakes,' says Mr Thorsheim. In this sense, he says, a good password would be a phrase or combination of characters that has little or no connection to the person picking it. All too often, Mr Thorsheim adds, people use words or numbers intimately linked to them. They use birthdays, wedding days, the names of siblings or children or pets. They use their house number, street name or pick on a favourite pop star. This bias is most noticeable when it comes to the numbers people pick when told to choose a four digit pin. Analysis of their choices suggests that people drift towards a small subset of the 10,000 available. In some cases, up to 80% of choices come from just 100 different numbers."
An anonymous reader writes "Voice over IP (VoIP) provider Jajah has announced it will be shutting down on January 31, 2014. This means Jajah.com and Jajah Direct services will no longer be offered, and users will not be able to make any more calls. Existing Jajah users will be able to use their account normally until the kill date, but new registrations meanwhile are no longer being accepted. You can also apply for a refund of any balance remaining on your account prior to the service closing by submitting a request to customer support (processing time is 30 days)."
CowboyRobot writes "In November, Denmark-based Bitcoin Internet Payment System suffered a DDoS attack. Unfortunately for users of the company's free online wallets for storing bitcoins, the DDoS attack was merely a smokescreen for a digital heist that quickly drained numerous wallets, netting the attackers a reported 1,295 bitcoins — worth nearly $1 million — and leaving wallet users with little chance that they'd ever see their money again. Given the potential spoils from a successful online heist, related attacks are becoming more common. But not all bitcoin heists have been executed via hack attacks or malware. For example, a China-based bitcoin exchange called GBL launched in May. Almost 1,000 people used the service to deposit bitcoins worth about $4.1 million. But the exchange was revealed to be an elaborate scam after whoever launched the site shut it down on October 26 and absconded with the funds. The warnings are all the same: 'Don't trust any online wallet', 'Find alternative storage solutions as soon as possible', and 'You don't have to keep your Bitcoins online with someone else. You can store your Bitcoins yourself, encrypted and offline.'"
An anonymous reader writes "A week ago, Slashdot was asked, "How do you protect your privacy?" The question named many different ways privacy is difficult to secure these days, but almost all of the answers focused on encrypting internet traffic. But what can you do about your image being captured by friends and strangers' cameras (not to mention drones, police cameras, security cameras, etc.)? How about when your personal data is stored by banks and healthcare companies and their IT department sucks? Heck; off-the-shelf tech can see you through your walls. Airport security sniffs your skin. There are countless other ways info on you can be collected that has nothing to do with your internet hygiene. Forget the NSA; how do you protect your privacy from all these others? Can you?"
An anonymous reader writes "Until now, it was particularly difficult to obtain reliable figures on the results of the Android operating system in China. Indeed, there is no 'centralized app store' and most smartphones sold in the country do not use Google services, including activation. In fact, it is very difficult to know the actual results. The search engine Baidu has corrected this by publishing a report on trends in the mobile internet for the 3rd quarter 2013. It appears that there would be now 270 million active users of the Google platform in the country (more than 20% of the total population). Growth would, however, decrease with a small 13% against 55% for the same period last year but up 10% compared to Q2 2013."
vikingpower writes "In the ever-longer wake of the NSA scandal, much-respected Dutch newspaper NRC today reveals, in English, as mandated by the gravity of the occasion, that the Dutch secret service, the AIVD, hacks internet forums. And yes, that is gross misconduct against Dutch law. The service, whose headquarters are in Zoetermeer, did not yet comment upon the divulgence of the document from Edward Snowden's collection. Incensed Dutch parliamentarians are calling for an enquiry."
An anonymous reader writes "Here's an update to the earlier Slashdot story about KlearGear.com 'fining' a couple for a bad review left four years earlier on RipoffReport: Not only did KlearGear report this as a bad debt to credit reporting agencies, but KlearGear is hiding behind a DomainsByProxy domain name to making finding their real identities harder. Now Public Citizen is representing the couple and is going after KlearGear for $75,000. The TV station that broke this story, KUTV, now reports that RipoffReport will likely be on the couple's side. The BBB and TRUSTe say their logos were used by KlearGear.com without permission, and credit reporting agency Experian is also investigating."
Hugh Pickens DOT Com writes "David Talbot writes at MIT Technology review that engineers on the Internet Engineering Task Force (IETF), an informal organization of engineers that changes Internet code and operates by rough consensus, have asked the architects of Tor to consider turning the technology into an Internet standard. If widely adopted, such a standard would make it easy to include the technology in consumer and business products ranging from routers to apps and would allow far more people to browse the Web without being identified by anyone who might be spying on Internet traffic. The IETF is already working to make encryption standard in all web traffic. Stephen Farrell believes that forging Tor into a standard that interoperates with other parts of the Internet could be better than leaving Tor as a separate tool that requires people to take special action to implement. 'I think there are benefits that might flow in both directions,' says Farrell. 'I think other IETF participants could learn useful things about protocol design from the Tor people, who've faced interesting challenges that aren't often seen in practice. And the Tor people might well get interest and involvement from IETF folks who've got a lot of experience with large-scale systems.' Andrew Lewman, executive director of Tor, says the group is considering it. 'We're basically at the stage of 'Do we even want to go on a date together?' It's not clear we are going to do it, but it's worth exploring to see what is involved. It adds legitimacy, it adds validation of all the research we've done.'"
Not content with blacklisting certain kinds of pornography, writes an anonymous reader, according to this news from The Guardian, "The UK government is to order broadband companies to block extremist websites and empower a specialist unit to identify and report content deemed too dangerous for online publication. The crime and security minister, James Brokenshire, said on Wednesday that measures for censoring extremist content would be announced shortly. The initiative is likely to be controversial, with broadband companies already warning that freedom of speech could be compromised."
An anonymous reader writes "On Cyber Monday, millions of Americans will take to the Internet in search of the newest gadgets to bestow upon their loved ones. Most of these 'gifts' are trojan horses that will spy on their recipients, prevent them from doing what they want with their device, or maybe even block access to their favorite books or music. The Free Software Foundation is proud to introduce a map through this minefield: our 2013 Giving Guide. The Giving Guide features gifts that will not only make your recipients jump for joy; these gifts will also protect their freedom."
Daniel_Stuckey writes "Since Edward Snowden's disclosures about widespread NSA surveillance, Americans and people everywhere have been presented with a digital variation on an old analog threat: the erosion of freedoms and privacy in exchange, presumably, for safety and security. Bruce Schneier knows the debate well. He's an expert in cryptography and he wrote the book on computer security; Applied Cryptography is one of the field's basic resources, 'the book the NSA never wanted to be published,' raved Wired in 1994. He knows the evidence well too: lately he's been helping the Guardian and the journalist Glenn Greenwald review the documents they have gathered from Snowden, in order to help explain some of the agency's top secret and highly complex spying programs. To do that, Schneier has taken his careful digital privacy regime to a new level, relying on a laptop with an encrypted hard drive that he never connects to the internet. That couldn't prevent a pilfered laptop during, say, a 'black bag operation,' of course. 'I know that if some government really wanted to get my data, there'd be little I could do to stop them,' he says."
Rambo Tribble writes "Reuters is reporting that the trend toward online shopping is reducing the sales of impulse-purchase items, most notably candy and snacks often displayed at the checkout counter. As even grocery shopping shifts online, junk food producers are feeling the squeeze. From the article: 'Anthony Hopper, chief executive of advertising agency Lowe Open, said brands need to change how people buy chocolate, but acknowledges that it won't be easy. "If you're somebody who on average buys one bar of Cadbury Dairy Milk on impulse once a week, can I encourage you that it's actually better value to buy a pack of four when you're doing your next online shop? It's a long-term strategy," he said.'"
Gone are the days of boring bathroom mirrors that only reflect what's in front of them. What you really need is a bathroom mirror that gives stock quotes, displays the local weather, and tells you the temperature of the water you are about to use to wash your face. Seraku Corporation is now in the process of filling that burning need and has gotten a bunch of press attention by doing so. A cynic might wonder why people who absolutely, positively must have Internet access while they shave or perform other bathroom mirror duties don't just make a wall-mounted holder for their tablets next to their pre-Internet bathroom mirrors, but that would destroy the fun of having the display built directly into the mirror, along with sensors that detect hand gestures so you can control your mirror (no doubt by asking, "Who is the fairest of them all?") without touching it with your greasy fingers. Note that this is technically not a smart mirror but a smart washbasin with a mirror attached to it. Either way, it's not available for retail sale quite yet.
Barence writes "Anti-spam outfit Spamhaus has called on the UK government to fine those who are running Internet infrastructure that could be exploited by criminals. Those who leave open Domain Name Server resolvers vulnerable to attack should be fined, if they have previously received a warning, said chief information officer of Spamhaus, Richard Cox. When Spamhaus was hit by a massive distributed DDoS possibly the biggest ever recorded at more than 300Gbits/sec — open DNS resolvers were used to amplify the hit, which was aimed at one of the organization's upstream partners. 'Once they know it can be used for attacks and fraud, that should be an offense,' Cox said. 'You should be subject to something like a parking ticket... where the fine is greater than the cost of fixing it."
Hugh Pickens DOT Com writes, quoting USA Today "The NASDAQ has topped 4000 for the first time in 13 years, but much has changed since then. ... Tech investors in 2000 were right about the possibilities of the Internet and mobile computing. But they were dead wrong about which companies would be in the vanguard ... The recovery of the NASDAQ has been a complex tale of creative destruction, where old companies that once fueled the index have been pushed aside by new players. Back in 2000, Microsoft, Cisco Systems, Intel, Oracle, and Sun accounted for 8.9%, 8.5%, 7.1%, 3.6% and 2.6%, respectively, of the value of the NASDAQ composite. Today, companies that were just starting out or didn't even exist — think Google, Amazon, and Facebook — are in the top 10, accounting for 4.7%, 2.7% and 1.5% of NASDAQ's value. Microsoft, Cisco and Intel's weight has fallen sharply. Apple, which wasn't in the top 10 in 2000, is a behemoth at 7.9%. So is the NASDAQ enjoying a long overdue catch-up with the rest of the market, or is the broad market overpriced, with the NASDAQ being pulled along for the ride? 'The reality is that the only thing that's the same from Nasdaq 4000 in 1999 and Nasdaq 4000 in 2013,' says Doug Sandler, 'is the number 4000.'"