By manishs from Slashdot's affinity-for-torrents department
For most people out there, The Pirate Bay has been their on and off go to source for torrents. The website this month celebrates its 13th anniversary. TorrentFreak spoke with several crew members of the "world's most resilient torrent site" this week. Here's an excerpt of the conversation:While they are not happy with the circumstances, they do say that the site has an important role to fulfil in the torrent community. "TPB is as important today as it was yesterday, and its role in being the galaxy's most resilient torrent site will continue for the foreseeable future," Spud17 says. "Sure, TPB has its flaws and glitches but it's still the go-to site for all our media needs, and I can see TPB still being around in 20 or 30 years time, even if the technology changes," she adds. Veteran TPB-crew member Xe agrees that TPB isn't perfect but points to the site's resilience as a crucial factor that's particularly important today. "TPB ain't perfect. There are plenty of things wrong with it, but it is simple, steadfast and true," Xe tells TorrentFreak. "So it's no real surprise that it is once more the destination of choice or that it has survived for so long in spite of the inevitable turnover of crew." And resilient it is. Thirteen years after the site came online, The Pirate Bay is the "King of Torrents" once again.Read Replies (0)
By manishs from Slashdot's right-or-not department
David Kravets, writing for Ars Technica: Reddit says it won't give Atlantic Records the IP address of a Reddit user who posted a link on the site of a single by Twenty One Pilots a week before the song's planned release. The song, "Heathens," was originally uploaded on June 15 to the file-sharing site Dropfile. That same day, the file landed on Reddit. According to a lawsuit (PDF) in New York State Supreme Court, the file was posted to the Twenty One Pilots subreddit with the title âoe[Leak] New Song -- 'Heathens'. The Poster submitted the link under the username "twentyoneheathens," according to Atlantic. Atlantic and its subsidiary label, Fueled by Ramen, want the IP address of the Reddit leaker. The company said the file fell victim to "widespread distribution" on the Internet, so the company released the single June 16, a week ahead of schedule; the label also said the early release hindered a planned rollout on Spotify, iTunes, and other platforms. Atlantic says the leaker must be an Atlantic employee who was contractually obligated not to leak the track, which is featured in the movie Suicide Squad that debuted earlier this month. Reddit, however, said that Atlantic "has failed to show that its claims are meritorious." Reddit claims Atlantic has embarked on "an impermissible fishing expedition."Read Replies (0)
By manishs from Slashdot's strategy-timeout department
Google is taking a strategy timeout on its high-speed-internet business. According to WSJ, the Google Fiber unit is -- including Los Angeles, Chicago, and Dallas -- after its initial rollouts proved time-consuming and expensive than anticipated -- is rethinking how to deliver internet connections in about a dozen metro areas (could be paywalled; alternate source). From a Fortune report: Turns out it is very expensive to run wires -- or in Google's case, fiber optic cables -- to each and every house that wants service. Known as the "last mile" problem, the high costs, in turn, make it difficult for companies to earn a solid rate of return on the installation investment. Google's effort, through its unit called Fiber that launched in 2010, is now seeking alternative means to connect to consumers homes or finding other people to pay the cost. Google has sought deals with municipalities and power companies to pay for the connections and is also exploring less expensive wireless technology. Meanwhile, Google has suspended efforts to add new cities such as San Jose, Calif., and Portland, Ore., using its prior strategy of stringing up cables to each customerâ(TM)s home.Read Replies (0)
By manishs from Slashdot's beyond-your-territory department
Motherboard is reporting that Australian authorities hacked Tor users in the United States as part of a child pornography investigation. The revelation comes through recently-filed US court documents. The incident underscores a trend where law enforcement around the world are increasingly pursuing targets overseas using hacking tools, raising legal questions around agencies' reach. From the report: In one case, Australian authorities remotely hacked a computer in Michigan to obtain the suspect's IP address. "The Love Zone" was a prolific dark web child abuse site, where users were instructed to upload material at least once a month to maintain access to the forum. By July 2014, the site had over 29,000 members, according to US court documents, constituting what the US Department of Justice described as a "technologically sophisticated conspiracy." In 2014, Queensland Police Service's Task Force Argos, a small, specialised unit focused on combating child exploitation crimes, identified the site's Australian administrator in part because of a localized greeting he signed messages with. The unit quietly took over his account, and for months ran the site in an undercover capacity, posing as its owner. Task Force Argos' logo includes a scorpion, and the tagline "Leave No Stone Unturned." Because The Love Zone was based on the dark web, users typically connected via the Tor network, masking their IP addresses even from the law enforcement agents who were secretly in control of the site. Task Force Argos could see what the users were viewing, and what pages they were visiting, but not where they were really connecting from.Read Replies (0)
By manishs from Slashdot's truth-is-out-there department
A new report by Television New Zealand in collaboration with The Intercept, based on leaks of former U.S. National Security Agency worker Edward Snowden has for the first time named a target of the NSA's controversial Prism program. The target was a middle-aged civil servant and pro-democracy activist named Tony Fullman. Fullman, who is originally from Fiji but has lived in New Zealand for decades, is an advocate for democracy in Fiji and a critic of Fijian prime minister Frank Bainimarama, who took power in a 2006 coup. From a Fortune report: According to The Intercept, the NSA in 2012 monitored Fullman's communications through the Prism program and passed on information to the New Zealand intelligence services. Around the same time, the New Zealand authorities raided Fullman's home and revoked his passport. The New Zealand intelligence services were not themselves allowed to spy on Fullman, who was a New Zealand citizen. However, as Snowden has repeatedly described, the agencies of many Anglophone countries spy on each other's behalf, in order to bypass their national legal restrictions. Fullman suggested in the article that people in the group may well have said violent things about Bainimarama, but this was just venting, not a plot. According to the report, they never suspected someone was listening into their communications. The NSA was said to be helping by analyzing Fullman's Facebook and Gmail activities. The 190 pages of intercepted documentation seen by The Intercept apparently didn't reveal evidence of a plot.Read Replies (0)
By EditorDavid from Slashdot's freedom-of-tweets department
Twitter complained of "inaccuracies in the details and unfair portrayals" in an article which described their service as "a honeypot for assholes." Buzzfeed interviewed 10 "high-level" former employees who detailed a company "Fenced in by an abiding commitment to free speech above all else and a unique product that makes moderation difficult and trolling almost effortless". An anonymous Slashdot reader summarizes their report:
Twitter's commitment to free speech can be traced to employees at Google's Blogger platform who all went on to work at Twitter. They'd successfully fought for a company policy that "We don't get involved in adjudicating whether something is libel or slander... We'll do it if we believe we are required to by law." One former Twitter employee says "The Blogger brain trust's thinking was set in stone by the time they became Twitter Inc."
Twitter was praised for providing an uncensored voice during 2009 elections in Iran and the Arab Spring, and fought the secrecy of a government subpoena for information on their WikiLeaks account. The former of head of news at Twitter says "The whole 'free speech wing of the free speech party' thing -- that's not a slogan. That's deeply, deeply embedded in the DNA of the company... [Twitter executives] understand that this toxicity can kill them, but how do you draw the line? Where do you draw the line? I would actually challenge anyone to identify a perfect solution. But it feels to a certain extent that it's led to paralysis.
While Twitter now says they are working on the problem, Buzzfeed argues this "maximalist approach to free speech was integral to Twitter's rise, but quickly created the conditions for abuse... Twitter has made an ideology out of protecting its most objectionable users. That ethos also made it a beacon for the internet's most vitriolic personalities, who take particular delight in abusing those who use Twitter for their jobs."Read Replies (0)
By EditorDavid from Slashdot's census-fail department
Slashdot reader River Tam explains the crash of Australia's online census site, citing the account of a security researcher who says IBM and the Australian Bureau of Statistics "were offered DDoS prevention services from their upstream provider...and said they didn't need it." From an article on CSO:
The ABS and IBM gambled on a plan to ask its upstream network provider to block traffic from outside Australia in the event that a denial-of-service attack was detected... Offshore traffic to the site was blocked in line with the plan, however, another attack, for which the ABS had no contingency to repel, was directed at it from within Australia. The attack crippled the firewall and the census site's operators opted to restart it and fall back to a secondary firewall. However, they forgot to check that it had the same configuration as the primary firewall. That crippled the census site.
In an unfortunate confluence of events, IBM's security warning systems started flagging some unusual activity, which indicated that information on the ABS servers was heading offshore. The site's operators, thinking the DDoS activity was a distraction, interpreted the alarms as a successful hack...these were little more than benign system logs and the technical staff monitoring the situation poorly understood it. Amid the confusion they naturally erred on the side of caution, [and] decided to pull the plug on the site...Read Replies (0)
By EditorDavid from Slashdot's taking-some-license department
An anonymous Slashdot reader quotes ITWire:
Linux kernel developer Christoph Hellwig has lost his case against virtualisation company VMware, which he had sued in March 2015 for violation of version 2 of the GNU General Public Licence... The case claimed that VMware had been using Hellwig's code right from 2007 and not releasing source code as required. The Linux kernel, which is released under the GNU GPL version 2, stipulates that anyone who distributes it has to provide source code for the same...
In its ruling, the court said that Hellwig had failed to prove which specific lines of code VMware had used, from among those over which he claimed ownership.
In a statement, Hellwig said he plans to appeal, adding that "The ruling concerned German evidence law; the Court did not rule on the merits of the case, i.e. the question whether or not VMware has to license the kernel of its product vSphere ESXi 5.5.0 under the terms of the GNU General Public License, version 2." The Software Freedom Conservancy has described the lawsuit as "the regretful but necessary next step in both Hellwig and Conservancy's ongoing effort to convince VMware to comply properly with the terms of the GPLv2, the license of Linux and many other Open Source and Free Software included in VMware's ESXi products."Read Replies (0)
By EditorDavid from Slashdot's I-see-you-are-writing-a-subroutine department
The National Science Foundation is developing a way to create working code using "automated program synthesis," a new technology called ExCAPE "that provides human operators with automated assistance.... By removing the need for would-be programmers to learn esoteric programming languages, the method has the potential to significantly expand the number of people engaged in programming in a variety of disciplines, from personalized education to robotics." Rajeev Alur, who leads a team of researchers from America's nine top computer science programs, says that currently software development "remains a tedious and error-prone activity."
Slashdot reader the_insult_dog writes:
While its lofty goals of broadly remaking the art of programming might not be realized, the research has already made some advances and resulted in several tools already in use in areas such as commercial software production and education...
For example, the NSF created a new tool (which they've recently patented) called NetEgg, which generates code for controlling software-defined networks, as well as Automata Tutor and AutoProf, which provide automated feedback to computer science students.Read Replies (0)