Firefox 5 released, arrives only three months after Firefox 4

Found on Ars Technica on Wednesday, 22 June 2011
Browse Software

Despite the significant challenge of increasing the Firefox release cadence, Mozilla has successfully delivered Firefox 5 to users a mere three months after the release of Firefox 4. The new version is unsurprisingly light on user-facing changes due to the shortened cycle, but has some decent improvements under the hood.

Aside from these minor user interface changes and new features, Firefox 5 brings a number of bugfixes and performance improvements that will improve the browsing experience.

The last one was 4.0.1, so we're bascially at 4.1.0 only. Of course, version numbers on steroids blow that out of proportion for the sake of "i haz a high version".

Police Illegally Trespass and Arrest Woman in Her Front Lawn

Found on Indymedia on Wednesday, 22 June 2011
Browse Legal-Issues

While the police were searching and detaining the driver of the car one of the officers noticed that my friend was recording the whole incident.

Then the officer ordered us both inside the house. The woman calmly noted that she had the right to be on her own property and the right to observe the police activity unobstructed. The officer commented that he thought she was "anti-police" and approached the woman stating "are you seriously not going to obey my order?"

As we approached the porch, the officer said, "I'm just going to arrest you" and came onto the property to arrest the woman. She was put into a police car and taken away at about 9:55pm.

It must feel good to abuse your power and harass the commoners. There should be a three strikes law for cops: those who are for obvious reasons unfit to do the job correctly get fired. This case would be the perfect first strike because of overreacting, ignoring laws, threatening and arresting someone without a cause.

Premier League joins group lobbying for web blocking

Found on Slightly Right of Centre on Tuesday, 21 June 2011
Browse Censorship

The group is attempting to influence public policy with a desperate-sounding and confused in places confidential submission to minister for the internets Ed Vaizey, who discussed the proposal at a meeting of stakeholders (including ISPs) last Wednesday.

The eight-page memo makes copious yet unsubstantiated reference to rights and freedoms, yet calls for a court-overseen blocking scheme "speedy enough to deal with urgent time sensitive material (such as live events)".

Does a "focus" on infringement actually include providing copyright-infringing content, or does this also include sites that link to copyrighted content? Techdirt recently reported archive.org and Vimeo were on Universal Music's list of "sites that support piracy".

It would be so nice to have an additional layer between the user and the ISPs, making it impossible for them to see what you are doing online. Basically something like Tor by default. Your ISP would only know that you are online, but not where you are or what you do.

Shaved bat wings show sensory hairs help manage flight

Found on Ars Technica on Monday, 20 June 2011
Browse Nature

Researchers have rediscovered a set of sensory hairs on the wings of bats, shown that they respond to light puffs of air, and found that getting rid of them alters the way bats fly.

Tracking experiments showed that the bats that lacked patches of hair tended to fly faster than usual and took wider turns, possibly as a result. The authors suggest that, in the absence of any sense of air flow, the bats think they're suffering the equivalent of a stall, and speed up to try to compensate.

Holy Shmoly Batman!

ICANN approves plan to vastly expand top-level domains

Found on Ars Technica on Sunday, 19 June 2011
Browse Internet

ICANN apparently recognized that there's a continued interest in expanding gTLDs, and set about creating a mechanism to handle requests as they come in, rather than to consider them in batches on an ad-hoc basis.

Still, the FAQ also makes it clear that grabbing a gTLD won't be an exercise in casual vanity. Simply getting your application processed will cost $185,000 and, should it be approved, you'll end up being responsible for managing it.

As if there aren't any more important problems to solve, like the tight control and abuse of .com domain names by the US government. ICANN should first become truly independant before thinking about how to squeeze more money out of the DNS system. Not to mention that soon there will be domains like pay.pal, e.bay, g.mail, face.book, master.card or visa.card; and all that after users finally learned to pay a little attention to the links they click.

Facebook readying launch of iPad app?

Found on CNet News on Saturday, 18 June 2011
Browse Internet

The social-networking giant plans to introduce a free app in the coming weeks that is designed and tailored especially for the tablet computer's touch-screen interface.

iPad users have been begging Facebook for an iPad-native app since Apple began selling the device in April 2010, and it's likely that both Facebook and Apple would benefit from such an app.

A social network that's ridiculously overrated releases an app for a device that's ridiculously overrated from a company that's ridiculously overrated. Privacy violations just got cubed.

Iran to put a monkey into space

Found on Physorg on Friday, 17 June 2011
Browse Science

Iran plans to send a live monkey into space in the summer, the country's top space official said after the launch of Rassad-1, state television reported on its website.

At the time, Fazeli touted the launch of a large animal into space as the first step towards sending a man into space, which Tehran says is scheduled for 2020.

Western powers fear that Iran's space agenda might be linked to developing a ballistic missile capability that could deliver nuclear warheads.

Good to see that Iran does not like Ahmadinejad anymore and plans to shoot him into space.

US reveals Stuxnet-style vuln in Chinese SCADA 'ware

Found on The Register on Thursday, 16 June 2011
Browse Software

The US Department of Homeland Security is warning of holes in Chinese infrastructure software which could leave factories and power stations vulnerable to hack attacks.

The software is mainly used in China but claims some customers in Europe, the Americas and Asia and Africa. There have been no known exploits of the vulnerability and attackers would need an intermediate level of skill to use it.

After watching China expanding it's market influence by questionable methods and hack attacks against dissidents, human rights activists and Fortune 100 companies, the DHS is actually surprised to find "bugs" in chinese software? Well hello Sherlock.

Man says he lost $500,000 in virtual currency heist

Found on The Register on Wednesday, 15 June 2011
Browse Internet

Rumors of the heist have been swirling since Monday, when a Bitcoin user named Allinvain claimed 25,000 Bitcoins, technically valued at close to $500,000, had mysteriously been transferred to an unknown user's account.

"Bitcoins technical details are complex cryptography and there's no way for us (as developers) to figure whether there was a real theft or not," Nils Schneider.

The true value of the loss "would be more like $300,000 and cause the price to drop to around $10. Also, at the time he acquired the coins they probably were worth only $1000 or less. So the loss is in terms of USD is more a theoretical value."

Bitcoin naturally still has its share of problems, some of which are design flaws. As pointed out before, having every user download the entire blockchain (which contains every transaction ever made) to verify it may be a key part in the validation of transactions in the p2p network, but it delays the first use by hours; not to mention the needed resources for the validation. You'll run into the same problem if you don't start the Bitcoin client for a longer time: it will download all blocks since the last run and validate them. What's even more of a issue is the lack of encrytion. Bitcoin tells users again and again to securely store the wallet (e.g. in a Truecrypt container) instead of having the wallet encrypted by default so that you cannot open it, or make a single transaction, without knowing the password. At times where users rely on passwords like 12345 it is almost a sin to assume they would set up Truecrypt. That all aside, the user in question did everything he could to get robbed: no encryption and keeping the wallet on an trojaned system even after he noticed it. The anonymity of Bitcoin is not to blame here, it's the user. It's like leaving a suitcase full of cash on your front lawn and then crying when someone takes it at night. There's no way to get the money back then either.

China increases Internet control, takes down hundreds of websites

Found on The Next Web on Tuesday, 14 June 2011
Browse Censorship

Under the new controls, more than 700 pornographic and copyright infringing websites have been shut down. Individuals have also been banned from registering domain names ending in .cn, which is now now limited to registered businesses in China.

"Not just film and video sites are affected. All websites owned by individuals will gradually exit the arena. All paths leading to a future have been blocked."

"They are basically improving their censorship mechanisms," she said.

Anybody surprised? No? Thought so. I seriously hope that's it only a matter of months or perhaps one or two years until large revolts start in China.