By EditorDavid from Slashdot's very-classic-games department
Meeple Like Us is a group of gaming academics, developers, hobbyists and enthusiasts with a keen interest in board games, tabletop games, video games, and all things in-between, co-founded by long-time Slashdot reader drakkos. Today he reminds us that accessibility "has become an increasingly visible part of video game development."
It's even become something of a selling point for many games, with Naughty Dog's focus on the accessibility of Uncharted 4 gaining it pages and pages of enthusiastic support across the industry. Tabletop games, despite being much older an entertainment format, lag behind video games in many respects.
Meeple Like Us has for the last year been working hard to identify the accessibility issues in tabletop gaming, and is currently recruiting for volunteers for a working group aimed at developing v1.0 of the Tabletop Accessibility Guidellines.Read Replies (0)
By EditorDavid from Slashdot's unlike-Theresa-May department
The civil liberties committee of the European Parliament has released a draft proposal "in direct contrast to the increasingly loud voices around the world to introduce regulations or weaken encryption," according to an anonymous Slashdot reader. Tom's Hardware reports:
The draft recommends a regulation that will enforce end-to-end encryption on all communications to protect European Union citizens' fundamental privacy rights. The committee also recommended a ban on backdoors. Article 7 of the E.U.'s Charter of Fundamental Rights says that E.U. citizens have a right to personal privacy, as well as privacy in their family life and at home. According to the EP committee, the privacy of communications between individuals is also an important dimension of this right...
We've lately seen some EU member states push for increased surveillance and even backdoors in encrypted communications, so there seems to be some conflict here between what the European Parliament institutional bodies may want and what some member states do. However, if this proposal for the new Regulation on Privacy and Electronic Communications passes, it should significantly increase the privacy of E.U. citizens' communications, and it won't be so easy to roll back the changes to add backdoors in the future.
Security researcher Lukasz Olejnik says "the fact that policy is seriously considering these kind of aspects is unprecedented."Read Replies (0)
By EditorDavid from Slashdot's thinking-differently department
The executive director of Repair.org says Apple has "decided to be nicer to consumers in order to stop them from demanding their right to repair," according to Motherboard. Slashdot reader Jason Koebler shared this article:
It's increasingly looking like Apple can no longer ignore the repair insurgency that's been brewing: The right to repair movement is winning, and Apple's behavior is changing. In the last few months, Apple has made political, design, and customer service decisions that suggest the right to repair movement is having a real impact on the company's operations...
Apple has repeatedly made small concessions to its customers on the issues that Repair.org and the larger repair community have decided to highlight. The question is whether these concessions are going to be enough to satiate customers who want their devices to be easily repairable and upgradable, and whether the right to repair movement can convince those people to continue demanding fair treatment.
The article notes that at least 12 U.S. states are still considering "fair repair" laws, which would force Apple to sell replacement parts to both independent repair shops and the general public.Read Replies (0)
By EditorDavid from Slashdot's Debian-debuts department
The Debian Project has been liveblogging today's release of Debian 9 (Stretch) using the Twitter hashtag #releasingstretch. Some of the announcements:
The oldstable suite (wheezy) has now been renamed to oldoldstableDebian jessie now been renamed to oldstable!The Debian stretch suites have now been renamed to stable!The draft debian-devel-announce post is ready, archive docs are being cleaned up
This release is named after that purple octopus in Toy Story 3, and more tantalizing tidbits of information keep appearing on Debian's micronews site:
At least 1436 people and 18 teams contributed to Debian in 2017Stretch has 25,357 source packages with 9,808,465 source filesThere were 13 different themes proposed to be the official Debian stretch theme Debian Stretch ships with the free mathematical software SageMath, you can install it with aptDuring the stretch development, 101 contributors became Debian Developers, and 94 more become Debian MaintainersDebian Stretch will ship with the first release of the Debian Astro Pure Blend [for astronomers] Debian Popularity Contest gathers anonymous statistics about Debian packages usage from about 195,000 reportsRead Replies (0)
By EditorDavid from Slashdot's end-times-for-end-user-license-agreements department
mikeatTB shares an article from TechRepublic:
Software engineers have largely failed at security. Even with the move toward more agile development and DevOps, vulnerabilities continue to take off... Things have been this way for decades, but the status quo might soon be rocked as software takes an increasingly starring role in an expanding range of products whose failure could result in bodily harm and even death. Anything less than such a threat might not be able to budge software engineers into taking greater security precautions. While agile and DevOps are belatedly taking on the problems of creating secure software, the original Agile Manifesto did not acknowledge the threat of vulnerabilities as a problem, but focused on "working software [as] the primary measure of progress..."
"People are doing exactly what they are being incentivized to do," says Joshua Corman, director of the Cyber Statecraft Initiative for the Atlantic Council and a founder of the Rugged Manifesto, a riff on the original Agile Manifesto with a skew toward security. "There is no software liability and there is no standard of care or 'building code' for software, so as a result, there are security holes in your [products] that are allowing attackers to compromise you over and over." Instead, almost every software program comes with a disclaimer to dodge liability for issues caused by the software. End-User License Agreements (EULAs) have been the primary way that software makers have escaped liability for vulnerabilities for the past three decades. Experts see that changing, however.
The article suggests incentives for security should be built into the development process -- with one security professional warning that in the future, "legal precedent will likely result in companies absorbing the risk of open source code."Read Replies (0)
By EditorDavid from Slashdot's real-world-problems department
An anonymous reader quotes Bloomberg:
Demand for digital coins is soaring in Venezuela amid an escalating political crisis that has protesters demanding that President Nicolas Maduro step down. Inflation has spiraled to the triple digits, debasing the bolivar and depleting savings, while citizens struggle to find everything from food to medicine on store shelves. "If you're going to be in something volatile, you might as well be in something that's volatile and rising than volatile and falling," says Ryan Taylor, chief executive officer of crypto currency Dash Core, the third-largest digital coin by number of transactions... Bitcoin trading volume in Venezuela jumped to $1.3 million this week, about double the amount that changed hands two months ago, according to LocalBitcoins.com...
Venezuela's currency has become nearly worthless in the black market, where it takes more than 6,000 bolivars to buy $1, while bitcoin surged 53 percent in the past month alone. But it's not just about shielding against the falling bolivar, as some Venezuelans are using crypto currencies to buy and sell everyday goods and services, according to Jorge Farias, the CEO of Cryptobuyer.Read Replies (0)
By EditorDavid from Slashdot's filtering-on-demand department
Last December VidAngel fought three Hollywood studios in court for the right to stream filtered versions of movies. Now fogez reports that "they have come up with a new tactic in their attempts to bring filtering choice into the streaming media equation. Instead of leveraging the legal loophole that landed them in court, VidAngel is now going to insert themselves as a filtering proxy for services like Netflix and Amazon." From the Hollywood Reporter:
Its new $7.99 per month service piggybacks on users' streaming accounts. Customers log into the VidAngel app, link it to their other accounts and then filter out the language, nudity and violence in that content to their heart's desire... "Out of the gate we'll be supporting Netflix and Amazon and HBO through Amazon channels," says Harmon, adding that Hulu, iTunes and Vudu will follow... Harmon says it remains to be seen if the studios will fight VidAngel's new platform, but his biggest concern is how Amazon and Netflix will respond. He says his company has reached out to the streamers, and he hopes they'll raise any concerns through conversation instead of litigation... "VidAngel's philosophy is very libertarian," he says. "Let directors create what they want, and let viewers watch how they want in their own home. That kind of philosophy respects the views of both parties." The original submission describes the conflict as a "freedom of choice versus Hollywood."Read Replies (0)
By EditorDavid from Slashdot's Alto-from-Palo-Alto department
An anonymous reader quotes Ars Technica:
Charles Thacker, one of the lead hardware designers on the Xerox Alto, the first modern personal computer, died of a brief illness on Monday. He was 74. The Alto, which was released in 1973 but was never a commercial success, was an incredibly influential machine... Thomas Haigh, a computer historian and professor at the University of Wisconsin, Milwaukee, wrote in an email to Ars, "Alto is the direct ancestor of today's personal computers. It provided the model: GUI, windows, high-resolution screen, Ethernet, mouse, etc. that the computer industry spent the next 15 years catching up to. Of course others like Alan Kay and Butler Lampson spent years evolving the software side of the platform, but without Thacker's creation of what was, by the standards of the early 1970s, an amazingly powerful personal hardware platform, none of that other work would have been possible."
In 1999 Thacker also designed the hardware for Microsoft's Tablet PC, "which was first conceived of by his PARC colleague Alan Kay during the early 1970s," according to the article. "I've found over my career that it's been very difficult to predict the future," Thacker said in a guest lecture in 2013. "People who tried to do it generally wind up being wrong."Read Replies (0)
By EditorDavid from Slashdot's warring-on-terror department
An anonymous reader quotes the New York Times:
It has been more than a year since the Pentagon announced that it was opening a new line of combat against the Islamic State, directing Cyber Command, then six years old, to mount computer-network attacks... "In general, there was some sense of disappointment in the overall ability for cyberoperations to land a major blow against ISIS," or the Islamic State, said Joshua Geltzer, who was the senior director for counterterrorism at the National Security Council until March. "This is just much harder in practice than people think..."
Even one of the rare successes against the Islamic State belongs at least in part to Israel, which was America's partner in the attacks against Iran's nuclear facilities. Top Israeli cyberoperators penetrated a small cell of extremist bombmakers in Syria months ago, the officials said. That was how the United States learned that the terrorist group was working to make explosives that fooled airport X-ray machines and other screening by looking exactly like batteries for laptop computers... The information helped prompt a ban in March on large electronic devices in carry-on luggage on flights from 10 airports in eight Muslim-majority countries to the United States and Britain.
Citing military officials, the Times also reports that "locking Islamic State propaganda specialists out of their accounts -- or using the coordinates of their phones and computers to target them for a drone attack -- is now standard operating procedure."Read Replies (0)