RIAA May Get Its Wish: Pandora Leaning Towards Shutting Down

Found on Techdirt on Monday, 18 August 2008
Browse Various

Last year, we noted that the new webcasting royalty rates pushed through by the RIAA appeared designed specifically to kill internet radio. These royalties are different and much higher than things like traditional and satellite radio.

The RIAA knew exactly what it was doing in pushing these higher rates: it was killing off alternative routes to promoting non-RIAA music. The RIAA labels have always thrived off a very limited distribution and promotion channel.

The RIAA's spinoff, SoundExchange, gets to collect money on non-RIAA music as well. Oh yeah, it gets better too: if SoundExchange can't find the musicians to pay, it gets to keep the money. That's why it has a history of not looking very hard for musicians in order to pay them.

Webradios should just move to countries like Antigua. Or perhaps the Piratebay would like to start a radio.

Web radio is toast

Found on The Inquirer on Sunday, 17 August 2008
Browse Various

SoundExchange claims higher royalties for Internet radio because it says musicians deserve a bigger cut of Internet radio profits. But it strangely ignores the fact that if an Internet radio shuts then musicians will not get anything.

SoundExchange claims that it the Internet Radio stations fault that they have not tried to work out ways to make money out of playing the songs.

Now the radio station will have to pay royalties to SoundExchange even though the artist has not signed a contract with the organisation. Any cash SoundExchange collects will not go to the artist but will be saved up to give an RIAA executive a holiday somewhere hot with their secretary.

Funny, they blame web radios of being unable to make money from their listeners, something the music industry fails even worse at. Their incompetence at adapting to new business models to replace their outdated one is baffling. Instead, they try all sorts of legal fireworks to extort others. When stumpling over news like this one, I hope that filesharing will increase even more and more.

Tests chip away at passport security

Found on The Inquirer on Tuesday, 05 August 2008
Browse Various

Microchipped passports designed to have watertight security can actually be cloned in a matter of minutes.

A computer researcher was able to clone the chips on two British passports. They then implanted digital images of Osama bin Laden and a suicide bomber. The tampered chips were then passed as real by passport reader software used by the United Nations agency that sets standards for the e-passports.

These tests flag up several interesting and somewhat alarming points: They undermine claims that 3,000 blank passports stolen last week are useless as they can't be cloned, they also raise questions on the £4 billion spent by the government on ID cards which use the same technology.

It's a cat and mouse game, and terrorists will always win. Simply because a terrorist only needs to find a single weakness in any given system, while governments have to cover every hole, known or unknown. In the end, this would end up with total control and monitoring of every citizen, taking away privacy. And even then, the system will be vulnerable.

Unencrypted traveler data laptop disappears from airport

Found on The Register on Monday, 04 August 2008
Browse Various

In one of the more colossal security blunders in a long time, an unencrypted laptop containing sensitive information for 33,000 travelers has been reported stolen from San Francisco International Airport.

Officials with Transportation Security Administration say the laptop was discovered missing from a locked room more than a week ago, but unbelievably, they weren't warned until Sunday.

As if the lack of encryption and a tardy warning weren't enough, the company's CEO, Steven Brill, dismissed the incident as a simple burglary of a laptop. "For it to be more than that, the thief would have to hack into two different passwords - and even then would not get what identity thieves want most - a Social Security number and/or credit card information."

Oh wow, two passwords even. Let me guess, "12345" and "secret"?

Is Hushmail Still Safe?

Found on Slashdot on Saturday, 02 August 2008
Browse Various

For a long time, Hushmail was considered a very secure email provider until an affidavit (PDF) from a DEA agent in 2007 showed that they had handed over 12 CDs of possibly decrypted data to law enforcement. Now, Cryptome has posted that the Hushmail encryption program is no longer the same program for which Hushmail releases their source. Is Hushmail even safe to use anymore?

Well, if you entrust the encryption to a third party, you should expect nasty surprises. While it's true that Hushmail only handed over emails which they also had the keys for, it shows that encryption needs to be done as soon as possible. Don't trust some random company to do it for you; just trust yourself. That's also why you should always prefer open source encryption software; with closed source, you can't be sure that there are no backdoors, as unlikely as it may be.

Google: No such thing as complete privacy

Found on Cnet News on Wednesday, 30 July 2008
Browse Various

"Plaintiffs' privacy claims fail, among other reasons, because the view of a home from the driveway that can be seen by any visitor, delivery person, or telephone repairman is not private," the company said in response to the suit.

"Today's satellite-image technology means that...complete privacy does not exist," Google said in its response to the complaint.

Google also takes issue with the Borings' approach to the matter, though stopping short of accusing them of opportunistically trying to extract some money from a wealthy company.

Oh, now that's a nice argument: just because you a huge company means that nobody should be able to sue you because they just want your money. Sorry, it doesn't work this way. Also, complete privacy may not exist (especially thanks to Google et al), but this does not mean it's wrong to defend your privacy. It's true that people driving by can see your house, but taking and publishing pictures is an entirely different matter. What if Google let's you take a look at their holy search algorithms? They can be pretty sure you won't be able to remember them; but I bet they won't let you take pictures to post them online.

US nuke missile crew falls asleep on the job

Found on The Register on Saturday, 26 July 2008
Browse Various

In the latest cockup involving nuclear arms, three ballistic missile crew members fell asleep while in possession of classified launch codes used to launch nuclear attacks, the US Air Force says.

An Air Force spokesman said the members were waiting to return to the base "and they fell asleep."

Over the past year, the Air Force has committed other blunders. Last year, it mistakenly loaded nukes onto a B-52 that few across the US. The Air Force has also sent nuclear fuses to Taiwan.

Dark Helmet: So the combination is one, two, three, four, five. That's the stupidest combination I've ever heard in my life. That's the kinda thing an idiot would have on his luggage.

Missing 'spam king' kills self, family

Found on Denver Post on Thursday, 24 July 2008
Browse Various

Just four days after escaping a federal minimum-security work camp, "Spam King" Eddie Davidson shot his wife and child and wounded a teen-age girl before turning the gun on himself.

Media and prosecutors have dubbed Davidson "The Spam King" for years for his prolific anonymous e-mails selling a raft of products.

Davidson had pleaded guilty to tax evasion and falsifying information about the sender of e-mail pitches for low-cost, high risk stocks.

I just hope that reduces the amount of spam. It's somehow ironic: he spams millions of people for years, not giving a damn about their complains and wastes tens of thousands of working hours needed to get rid of his spam; but once he gets the bill, he breaks down. You'd think spammers have a thicker skin.

The Top Ten Myths in FBI History

Found on FBI on Thursday, 24 July 2008
Browse Various

For the past century, the FBI has been a vital player in American history, front and center in some of our country's most high-profile national security and criminal issues. Not surprisingly, some myths and misunderstandings about the Bureau have evolved over that time, in part because of the complex and sometimes sensitive nature of our work. We've picked out what we think are the top ten myths down through the years, leaving aside ones that are so fanciful that they don't deserve mention here.

Ok, now we all officially know that the FBI doesn't have Tesla's death-ray, isn't a prosecutor, does cooperate with others, has no X-Files and doesn't spy on American citizens. Now wait a second. Oh I get it, this list not about explaining myths, but about covering facts.

'No decision' on giant database

Found on BBV News on Saturday, 19 July 2008
Browse Various

No decision has been taken to create a huge database containing details of all phone calls, e-mails and internet use, security minister Lord West says.

Mr Thomas acknowledged that "targeted and duly authorised" interception of communications by terrorists and other suspects could be "invaluable".

Speculation that the government was considering collecting the information - including numbers dialled, websites visited and location of mobile phones being used - has increased because it has talked about "modifying procedures for acquiring communications data" in the Communications Data Bill.

Of course, play the terrorist card again to push your plans of a complete monitoring a la George Orwell forward. Like they could do something. Terrorists just need to use anonymous networks, or, way simpler and old-fashioned, letters. You can send letters with all your cunning attack plans to your comrades and the government will never know. But it's not about terrorists; that's the cover (it's easily exchangeable with pedophiles). The government wants to monitor you. It wants to follow every step, see everything you do.