By EditorDavid from Slashdot's anti-social-media department
An anonymous reader quotes this article from The Verge:
The systems that automatically enforce copyright laws on the internet may be expanding to block unfavorable speech. Reuters reports that Facebook, Google, and other companies are exploring automated removal of extremist content, and could be repurposing copyright takedown methods to identify and suppress it. It's unclear where the lines have been drawn, but the systems are likely targeted at radical messages on social networks from enemies of European powers and the United States. Leaders in the US and Europe have increasingly decried radical extremism on the internet and have attempted to enlist internet companies in a fight to suppress it.
Many of those companies have been receptive to the idea and already have procedures to block violent and hateful content. Neither Facebook and Google would confirm automation of these efforts to Reuters, which relied on two anonymous sources who are "familiar with the process"... The secret identification and automated blocking of extremist speech would raise new, serious questions about the cooperation of private corporations with censorious governmental interests.
Reuters calls it "a major step forward for internet companies that are eager to eradicate violent propaganda from their sites and are under pressure to do so from governments around the world as attacks by extremists proliferate, from Syria to Belgium and the United States." They also report that the move follows pressure from an anti-extremism group "founded by, among others, Frances Townsend, who advised former president George W. Bush on homeland security, and Mark Wallace, who was deputy campaign manager for the Bush 2004 re-election campaign."Read Replies (0)
By EditorDavid from Slashdot's I'll-be-seeing-you department
schwit1 quotes the MIT Technology Review: The FBI has access to nearly 412 million photos in its facial recognition system—perhaps including the one on your driver's license. But according to a new government watchdog report, the bureau doesn't know how error-prone the system is, or whether it enhances or hinders investigations.
Since 2011, the bureau has quietly been using this system to compare new images, such as those taken from surveillance cameras, against a large set of photos to look for a match. That set of existing images is not limited to the FBI's own database, which includes some 30 million photos. The bureau also has access to face recognition systems used by law enforcement agencies in 16 different states, and it can tap into databases from the Department of State and the Department of Defense. And it is in negotiations with 18 other states to be able to search their databases, too...
Adding to the privacy concerns is another finding in the GAO report: that the FBI has not properly determined how often its system makes errors and has not "taken steps to determine whether face recognition systems used by external partners, such as states and federal agencies, are sufficiently accurate" to support investigations.Read Replies (0)
By EditorDavid from Slashdot's pick-a-card,-any-card department
An anonymous reader writes: Michael Larabel at Phoronix has combined their new results from intensive Linux/Windows performance testing for popular games on Intel, AMD, and NVIDIA graphics cards, and at different resolutions. "This makes it easy to see the Linux vs. Windows performance overall or for games where the Linux ports are simply rubbish and performing like crap compared to the native Windows game." The games tested included Xonotic, Tomb Raider, Grid Autosport, Dota 2, Middle-earth: Shadow of Mordor, F1 2015, and Company of Heroes 2 -- and the results were surprising.
Xonotic v0.8 outperformed Windows with a NVIDIA card, but "The poor Xonotic performance on Linux with the Intel driver was one of the biggest surprises from yesterday's article. It's not anything we've seen with the other drivers." And while testing on the Source 2 engine revealed that Valve's Dota 2 "is a quality Linux port," most of the other results were disappointing -- regardless of the graphics card and driver. "Tomb Raider on Linux performs much worse than the Windows build regardless of your driver/graphics card... Shadow of Mordor's relative Linux performance is more decent than many other Linux games albeit still isn't running at the same speeds as the Windows games..."
The article concludes with a note of optimism. "Hopefully in due time with the next generation of games making use of Vulkan...we'll see better performance relative to Windows." Have Slashdot readers seen any performance issues while playing games on Linux?Read Replies (0)
By manishs from Slashdot's times-they-are-a-changin' department
An article on The Atlantic this week takes a stroll down the memory lane. It talks about phone services that people could call for knowing the time. The service, according to the article, was quite popular in 1980s. But many of them don't exist now. For instance, Verizon discontinued the line -- as well as its telephone weather service -- in 2011. But what's fascinating is that some of these services still exist, and are getting more traction than many of us would've imagined. From the article:"We get 3 million calls per year!" said Demetrios Matsakis, the chief scientist for time services at the Naval Observatory. "And there's an interesting sociology to it. They don't call as much on the weekend, and the absolute minimum time they call is Christmas. On big holidays, people don't care about the time. But we get a big flood of calls when we switch to Daylight [saving] time and back." As it turns out, people have been telephoning the time for generations. In the beginning, a telephone-based time service must have seemed like a natural extension of telegraph-based timekeeping -- but it would have been radical in its own way, too, because it represented a key shift to an on-demand service. In the 19th century, big railroad companies had used the telegraph to transmit the time to major railway stations. By the early 20th century, people could simply pick up the telephone and ask a human operator for the time.Read Replies (0)
By EditorDavid from Slashdot's billions-and-billions department
A seed-funded company named Axiom wants to build a private-sector outpost in orbit by launching a new module for the International Space Station, according to an article on Space News.
Once on the station, Axiom Space would use it for commercial purposes, ranging from research to tourism. [Former space station manager] Suffredini said that it would also be available for use by NASA when the company is not using it, helping the process of transitioning research done on the International Space Station to future private stations. Research hardware elsewhere in the station could eventually be moved to this module to allow its continued use after the station's retirement.
Slashdot reader MarkWhittington shares an article from Blasting News:
In the meantime, Nanoracks, a company that is already handling some of the logistics for the ISS, is proposing a commercial airlock for the ISS. The development of commercial space stations, as well as commercial spacecraft such as the SpaceX Dragon and the Boeing Starliner, constitutes NASA's long-term strategy of handing off low-Earth orbit to the private sector while it concentrates on deep space exploration.Read Replies (0)
By EditorDavid from Slashdot's RIP,-Chekov department
Anton Yelchin, who played Chekov in the new Star Trek movies, was killed Sunday when his own vehicle rolled backwards. Now Slashdot reader ripvlan writes:
It has recently emerged that his vehicle was a Jeep. As discussed on Slashdot previously consumers are having a hard time knowing if the vehicle is in "Park." A new class action lawsuit is gaining momentum... Also Maserati has a similar system and can join the class action.
In fact, Maserati "is recalling about 13,000 sedans that have the same sort of gear shifter that was used in the Jeep that killed Yelchin," according to CNN Money, and Chrysler Fiat had in fact already filed a recall notice with federal regulators in April for Yelchin's band of Jeep, "but owners had only received a warning and not an official recall notice at the time of Yelchin's death". The lawsuit claims Chrysler "fraudulently concealed and failed to remedy a gear shifter design defect affecting 811,000 vehicles and linked to driverless rollaway incidents," including 2014-2015 Jeep Grand Cherokees, 2012-2014 Chrysler 300s, and 2012-2014 Dodge Chargers.Read Replies (0)
By manishs from Slashdot's why-do-we-fall,-Mr.-Wayne? department
In the aftermath of the United Kingdom voting to leave the European Union, UK's technology industry is reassessing its position, with many of them considering moving to a continental location. According to reports, Samsung, LG, and Acer have noted that the UK leaving the EU will affect their operations. From a BBC report:As news of Brexit broke, tech firms including BT, TalkTalk and software firm Sage reported share price falls. [...] "I have concerns that the local market might slow down," said Drew Benvie, founder of London-based digital agency Battenhall. From a report on The Guardian:Britain's financial technology sector is particularly hard-hit, with the prospect of losing access to European markets an unappealing one. "Fintech" has long been one of the UK's most promising growth areas, in part due to London's position as the financial capital of Europe. [...] Not one of the 14 billion-dollar tech firms based in the UK the Guardian asked said leaving the EU would be good for their business.Toby Coppel, the co-founder of venture capital firm Mosaic, said: "The next entrepreneur who's 22 years old, graduating from a technical university in Germany may, instead of moving to London to do their Fintech startup, decide to go to Berlin instead. I think that's one of the biggest concerns I have about the trajectory of the London technical ecosystem."Read Replies (0)
By EditorDavid from Slashdot's 20-years-later department
By EditorDavid from Slashdot's this-is-Peppermint department
Softpedia reports on the newest version of Peppermint OS, "a lightweight, stable, elegant, and fast computer operating system based on GNU/Linux and Open Source technologies." An anonymous Slashdot reader quotes their report:
It's a bit earlier than expected, but the Peppermint OS 7 GNU/Linux distribution has been officially unveiled...based on the Ubuntu 16.04 LTS (Xenial Xerus) operating system [with] a lot of packages from the Ubuntu 16.04 LTS distro, which means that it will also be a long-term support release.... "Along with the shift to the 16.04 (Xenial) code base, Peppermint 7 continues our policy of choosing the best components from other desktop environments, wherever that may be, and integrating them into a cohesive whole with our own software," reads today's announcement.
"Team Peppermint" says they're switching to Firefox as their default browser for site-specific browser functionality (similar to Chrome's -app mode) after Google dropped their 32-bit version of Chrome and moved to PPAPI plugins "which effectively ends Flash support in 32-bit Chromium"... But you can also still choose Chrome or Chromium for site-specific browsing (and the OS comes in 32-bit and 64-bit editions).Read Replies (0)
By EditorDavid from Slashdot's hacking-coughs department
Slashdot reader Orome1 shares an article by Bitdefender's senior "e-threat analyst," warning about an increasing number of attacks on healthcare providers:
In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identity theft. This personal data often contains information regarding a patient's medical history, which could be used in targeted spear-phishing attacks...and hackers are able to access this data via network-connected medical devices, now standard in high-tech hospitals. This is opening up new possibilities for attackers to breach a hospital or a pharmaceutical company's perimeter defenses.
If a device is connected to the internet and left vulnerable to attack, an attacker could remotely connect to it and use it as gateways for attacking network security... The majority of healthcare organizations have often been shown to fail basic security practices, such as disabling concurrent login to multiple devices, enforcing strong authentication and even isolating critical devices and medical data storing servers from a direct internet connection.
The article suggests the possibility of attackers tampering with the equipment that dispenses prescription medications, in which case "it is likely that future cyber-attacks could lead to the loss of human life."Read Replies (0)
By EditorDavid from Slashdot's extra-extortions department
Kaspersky Lab is reporting that the last year saw a 500% increase in the number of users who encountered crypto ransomware.
Trailrunner7 shares an article from On The Wire:
Data compiled by Kaspersky researchers from the company's cloud network shows that from April 2015 to March 2016, the volume of crypto ransomware encountered by users leapt from 131,111 to 718,536. That's a massive increase, especially considering the fact that ransomware is a somewhat mature threat. It didn't just burst onto the scene a couple of years ago. Kaspersky's researchers said the spike in crypto ransomware can be attributed to a small group of variants. "Looking at the malware groups that were active in the period covered by this report, it appears that a rather short list of suspects is responsible for most of the trouble caused by crypto-ransomware..."
It's difficult to overstate how much of an effect the emergence of ransomware has had on consumers, enterprises, and the security industry itself. The FBI has been warning users about crypto ransomware for some time now, and has consistently advised victims not to pay any ransoms. Security researchers have been publishing decryption tools for specific ransomware variants and law enforcement agencies have had some success in taking down ransomware gangs.
Enterprise targets now account for 13% of ransomware attacks, with attackers typically charging tens of thousands of dollars, the article reports, and "Recent attacks on networks at the University of Calgary and Hollywood Presbyterian Medical Center have demonstrated the brutal effectiveness of this strategy."Read Replies (0)
By manishs from Slashdot's curious-case-of-Telegram department
Earlier this week, The Intercept evaluated the best instant messaging clients from the privacy standpoint. The list included Facebook's WhatsApp, Google's Allo, and Signal -- three apps that employ end-to-end encryption. One popular name that was missing from the list was Telegram. A report on Gizmodo sheds further light on the matter, adding that Telegram is riddled with a wide range of security issues, and "doesn't live up to its proclamations as a safe and secure messaging application." Citing many security experts, the report states:One major problem Telegram has is that it doesn't encrypt chats by default, something the FBI has advocated for. "There are many Telegram users who think they are communicating in an encrypted way, when they're not because they don't realize that they have to turn on an additional setting," Christopher Soghoian, Principal Technologist and Senior Policy Analyst at the American Civil Liberties Union, told Gizmodo. "Telegram has delivered everything that the government wants. Would I prefer that they used a method of encryption that followed industry best practices like WhatsApp and Signal? Certainly. But, if it's not turned on by default, it doesn't matter."The other issue that security experts have taken a note of is that Telegram employs its own encryption, which according to them, "is widely considered to be a fatal flaw when developing encrypted messaging apps." The report adds:"They use the MTproto protocol which is effectively homegrown and I've seen no proper proofs of its security," Alan Woodward, professor at the University of Surrey told Gizmodo. Woodward criticized Telegram for their lack of transparency regarding their home cooked encryption protocol. "At present we don't know enough to know if it's secure or insecure. That's the trouble with security by obscurity. It's usual for cryptographers to reveal the algorithms completely, but here we are in the dark. Unless you have considerable experience, you shouldn't write your own crypto. No one really understands why they did that."The list goes on and on.Read Replies (0)