Record Label Demands From Amazon

Found on Techcrunch on Friday, 29 April 2011
Browse Internet

Dominating the discussions is the labels concern that personal cloud services will exacerbate piracy and erode their business even further.

All songs without a proof of purchase would be assumed to be unauthorized and not accepted into the system.

Sony wants loading to happen from only one computer. Each locker owner would have to designate a single location from which they could upload songs. Users could load music from either their laptop or desktop or office computer but not all three.

Locker owners would only be able to download their music files a single time if they claimed they were lost. All future downloads would be forbidden.

What WMG would like to see happen is that a central locker authority would administer all locker assignments.

I can only say it again and again: I want to see those big useless labels vanish sooner than later. Their broken and greedy business model does not work anymore and it's about time that they go down and leave it up to the artists to interact with their fans. It's a simple principle: remove the middle man.

Facebook shoots, ignores questions; account lock-out attack works

Found on Ars Technica on Thursday, 28 April 2011
Browse Internet

Got enemies on Facebook? Facebook is so eager to protect copyright that the mere accusation of copyright infringement is enough to get an account locked.

Prior to the account lockout, we had received no notices of infringement or warnings. Truly, we awoke to find that Facebook had summoned a judge, jury, and executioner and carried out its swift brand of McJustice all without bothering to let us know that there was even a problem.

That's what one gets for relying on a single service. Invest a little time and keep track of your friends, and keep backups. So even if Facebook shuts you down for no reason, you still have your contacts offline; and yes, emailing is still a way to communicate.

The Problem of Issuing Certs For Unqualified Names

Found on Threadpost on Tuesday, 05 April 2011
Browse Internet

One interesting result of this work is that the folks at the Electronic Frontier Foundation have discovered that there are tens of thousands of legitimate certificates issued by CAs for unqualified names such as "localhost" or "Exchange," a practice that could simplify some forms of man-in-the-middle attacks.

"In the Observatory we have discovered many examples of CA-signed certificates unqualified domain names. In fact, the most common unqualified name is 'localhost', which always refers to your own computer! It simply makes no sense for a public CA to sign a certificate for this private name."

It's pretty simple: when your CA is listed as trusted in all the major browsers, you have a license to print money. You don't have to deliver any physical goods, you just have to tell others that "this is safe, because I say so". You can create a certificate providing the same level of security, but browsers will warn users because they don't trust you. It's all about trust: and that can be gone very fast.

Surge in Satanism sparks rise in demand for exorcists

Found on The Telegraph on Saturday, 02 April 2011
Browse Internet

"The internet makes it much easier than in the past to find information about Satanism," said Carlo Climati, a member of the university who specialises in the dangers posed to young people by Satanism.

While the number of genuine cases of possession by the Devil remained relatively small, "we must be on guard because occult and Satanist practices are spreading a great deal, in part with the help of the internet and new technologies that make it easier to access these rituals," he said.

At least they did not call for a ban of the Internet. I guess that's because aside from being a source for satanism for disgruntled believers, priests also find in it a source for little boys.

McAfee's website full of security holes, researcher says

Found on Network World on Sunday, 27 March 2011
Browse Internet

The McAfee.com website is full of security mistakes that could lead to cross-site scripting and other attacks, researchers said in a post on the Full Disclosure site on Monday.

This isn't just embarrassing, but also somewhat discrediting for McAfee, which markets a McAfee Secure service to enterprises for their customer-facing websites.

When, as of March 27, YGN found the flaws "to be unfixed completely," YGN publicly disclosed them.

For a security company, such problems are devastating. If they cannot keep their own website secure, how are customers supposed to believe that they will do a good job at finding problems on theirs?

Tripoli blast as coalition action goes on

Found on BBC News on Saturday, 19 March 2011
Browse Internet

The Pentagon expects to hand over control of allied military operations in Libya "in a matter of days", either to a UK-France coalition or to Nato, US Defence Secretary Robert Gates says.

In a statement from the Pentagon on Sunday, US Vice Adm William Gortney said coalition raids were "judged to have been very effective" and no new Libyan air activity had been reported.

Other Arab countries are also preparing to join the campaign against Col Gaddafi, Vice Adm Gortley said, adding that those governments would make their own announcements in due course.

We will see how things work out. "A matter of days" was also a key-phrase when the US invaded Iraq.

Signalling dissent

Found on The Economist on Friday, 18 March 2011
Browse Internet

With a tin can, some copper wire and a few dollars' worth of nuts, bolts and other hardware, a do-it-yourselfer can build a makeshift directional antenna. A mobile phone, souped-up with such an antenna, can talk to a network tower that is dozens of kilometres beyond its normal range (about 5km, or 3 miles).

Some activists brought laptops to places like Tahrir Square in Cairo to collect, via short-range wireless links, demonstrators' video recordings and other electronic messages. These activists then broadcast the material to the outside world using range-extending antennae.

Directional antennae, unlike the omnidirectional sort, transmit on a narrow beam. This makes it hard for eavesdroppers to notice a signal is there.

Censorship will never work. Sure, the government can try and block quite a bit of information, but the interesting parts still make it through.

The NYT paywall arrives

Found on Felix Salmon on Wednesday, 16 March 2011
Browse Internet

The website is free, so long as you read fewer than 20 items per month, and so are the apps, so long as you confine yourself to the "Top News" section. You can also read articles for free by going in through a side door.

If you want to read the NYT on both your smartphone and your iPad, you'll need to buy both digital subscriptions separately, and pay an eye-popping $35 every four weeks. That's $455 a year.

If you want to use the NYT's iPad app, you're marginally better off subscribing to the print newspaper on Sundays and throwing it away unread.

There must have been a whole bunch of clueless people at work. So you get some free stories per month, but how are they planning to monitor how much you've read? By logging my IP? I'm on DHCP, oops. By placing a cookie? My browser blocks them, oops. Plus, if you consider a static IP being personal information, then you suddenly enter the realms of privacy laws.

Twitter Supports HTTPS Encryption to Bolster Security

Found on eWEEK on Tuesday, 15 March 2011
Browse Internet

Users now have the option to choose the application security setting to always use HTTPS when accessing Twitter.com.

Twitter's latest security move comes after the Federal Trade Commission finalized the settlement with the microblogging site to establish a rigorous information security policy to protect user accounts.

1. Enable the most obvious security only under pressure
2. Call it a huge improvement
3. ???
4. Profit

Google Lets Users Blacklist Sites From Search Results

Found on Wired on Wednesday, 09 March 2011
Browse Internet

Google is giving users the ability to block sites that annoy them from ever showing up again in their search results, via a new link next to search results.

"In addition, while we're not currently using the domains people block as a signal in ranking, we'll look at the data and see whether it would be useful as we continue to evaluate and improve our search results in the future."

It's surprising that Google hasn't introduced this already years ago. It's a simple, buf efficient concept: let humans sort out the spam. On the other hand, Google most likely makes a nice profit from Adsense on spam sites too.