TPP Deal Puts BC's Privacy Laws in the Crosshairs

Found on The Tyee on Tuesday, 21 July 2015
Browse Legal-Issues

British Columbia's privacy laws are in the crosshairs of the nearly completed Trans-Pacific Partnership (TPP) agreement. If you're wondering what the heck data privacy protections have to do with trade, you're not alone.

The thing is, the TPP e-commerce chapter aims not only to free the movement of digital goods, such as software or downloadable music, but also to enshrine the rights of companies to freely move data -- including records of financial transactions, consumer behaviour, online communications and medical histories -- across borders.

While closed to ordinary citizens, the TPP is very open to influence from corporate special interests, whose lobbyists have special access as cleared advisors to negotiators. The U.S. lead negotiator on e-commerce, Robert Holleyman, is a former high-ranking industry lobbyist.

The lobbyists exactly know why everything surrounding the negotiations is top secret and has to be kept under control at all costs. Not even the politicians who talk about benefits know what is written down. If the agreements would indeed be that beneficial for the average citizen, it shouldn't be a problem to let them read it. After all, you don't sign a contract you have never read.

Online Cheating Site AshleyMadison Hacked

Found on Krebs On Security on Monday, 20 July 2015
Browse Internet

ALM Chief Executive Noel Biderman confirmed the hack, and said the company was “working diligently and feverishly” to take down ALM’s intellectual property. Indeed, in the short span of 30 minutes between that brief interview and the publication of this story, several of the Impact Team’s Web links were no longer responding.

“Avid Life Media has been instructed to take Ashley Madison and Established Men offline permanently in all forms, or we will release all customer records, including profiles with all the customers’ secret sexual fantasies and matching credit card transactions, real names and addresses, and employee documents and emails. The other websites may stay online.”

Why people would sign up with their real names makes one wonder. Better come up with a fake name and address, plus a throw-away email account instead because the promised privacy never existed in the first place.

Adobe Secures Flash, With Help From Google

Found on eWEEK on Sunday, 19 July 2015
Browse Software

Adobe is under tremendous pressure to do more to secure its Flash Player technology, which has been aggressively exploited in 2015.

However, the largest single source of Flash exploit discovery so far in July was not a zero-day exploit, but rather it was from Google's Project Zero security initiative. Adobe credited Google with the discovery of 20 CVEs in its APSB15-16 security bulletin. But as it turns out, Google didn't just report vulnerabilities in Flash; the company went a step further and is helping Adobe remediate the flaws and prevent them in the first place.

The best fix so far was to remove Flash completely.

Online pirates could face 10 years in jail

Found on BBC on Saturday, 18 July 2015
Browse Legal-Issues

The government said tougher sentences would act as a "significant deterrent".

Groups that represent the country's creative industry - particularly film and music - have been lobbying hard for this for some time.

They argue that a couple of years in jail just isn't a sufficient deterrent to prevent online piracy, and that the law is well out of date.

You can get less for raping someone; and as always, tougher sentences are the solution for lobbied politicans and the content industry. The only problem is it this does not really work that well: otherwise there would be no homicide in countries which still have the death sentence.

Lorain man who recorded teen boys after fatal crash charged with trespassing, police say

Found on Cleveland on Friday, 17 July 2015
Browse Various

A 41-year-old Lorain man who entered a car to record the aftermath of a fatal Monday morning car crash made no attempt to assist or contact police for help, police said.

Several bystanders rushed to the crash site in an attempt try to free the boys from the car after it caught fire. Pelton simply recorded the scene with a cellphone camera, police said.

He opened a back door and leaned in to film the boys and then walked around to the front door as he continued recording. At no time did he try to help either of the boys, the report said.

You help if you can; you just don't record other people dying instead of helping them. Or would you like to end up on Facebook, called an idiot while taking your last breath?

New Horizons: Images reveal ice mountains on Pluto

Found on BBC News on Thursday, 16 July 2015
Browse Astronomy

Pluto has mountains made of ice that are as high as those in the Rockies, images from the New Horizons probe reveal.

Mission scientist John Spencer told journalists that the first close-up image of Pluto's surface showed a terrain that had been resurfaced by some geological process - such as volcanism - within the last 100 million years.

A really impressive mission.

JPEG Looking To Add DRM To Images... Supposedly To Protect Images From Gov't Surveillance

Found on Techdirt on Wednesday, 15 July 2015
Browse Internet

"The JPEG committee investigates solutions to assure privacy and security when sharing photos on social networks, (stock) photography databases, etc. JPEG Privacy & Security will provide new functionality to JPEG encoded images such as ensuring privacy, maintaining data integrity, and protecting intellectual rights, while maintaining backwards and forward compatibility to existing JPEG legacy solutions."

What's interesting is that some are claiming this is based on this research paper that pitches such DRM for the purpose of protecting images from surveillance and such.

Sure future keyboards will come without the PrtScr button to stop image piracy.

Man Left Paralyzed After Police Filled Him with Bullet Holes for 8 Ounces of Weed

Found on Alternet on Tuesday, 14 July 2015
Browse Various

On April 16, as Betton played his XBOX, multiple armed men, dressed in militarized gear, busted down his door and swarmed his apartment. Upon seeing Betton, they began firing — and firing.

The agents found $970 in Betton’s pants. From his apartment, they seized 222 grams of pot, which is about 8 ounces.

State Law Enforcement Division’s investigation revealed that there was no evidence to support that Bretton ever fired a weapon.

Free to smoke in one state, a reason to be shot in another.

How the Biggest, Most Expensive Oil Spill in History Changed Nothing at All

Found on Vice on Monday, 13 July 2015
Browse Nature

Detachment plays a key part in how it came to be that the biggest oil spill in US history, despite incurring the largest environmental fine on the books—$18.7 billion, handed down last week—has done almost nothing to change the nation’s relationship to oil.

Call it the BP spill paradox: massive in size and cost, all but invisible in its impact beyond the Gulf. It ruined lives, destroyed ecosystems, and cost a fortune, but no new laws were enacted to prevent the same thing from happening again. The White House recently approved further offshore oil exploration in waters far more treacherous than the Gulf.

Of course nothing changes. The big corporations are running the show and they do not want a change. It's not only because of those corporations though: did you buy an electric car? Or use less plastic?

Giving Users Extra-Firewall Access For Sites Normally Blocked?

Found on Slashdot on Sunday, 12 July 2015
Browse Internet

My boss and I were having a discussion about our users accessing the internet. He wants the users to be able to log in to the firewall to be able to access external websites that they are normally blocked from accessing. They would get a 45-minute window to do this, and then if they need more time, they need to re-login.

This will seriously annoy users and have a negative impact on the workflow. If the systems require such a protection, the best solution would be to have one (of more) systems specifically for Internet access, isolated from the rest of the network (and with USB disabled so users cannot transfer files they have downloaded).