US hunters shoot down Google fibre

Found on IT News on Monday, 20 September 2010
Browse Internet

Google has revealed that aerial fibre links to its data centre in Oregon were "regularly" shot down by hunters, forcing the company to put its cables underground.

"What people do for sport or because they're bored, they try to shoot at the insulators," Gill said.

"Every November when hunting season starts invariably we know that the fibre will be shot down, so much so that we are now building an underground path [for it]."

You may have state of the art data center, but there will always be a problem nobody thought of. Even if that problem are rednecks with guns.

Optus in court over 'supersonic' 64Kbps Broadband

Found on FreeAccess on Saturday, 18 September 2010
Browse Legal-Issues

Should a telecommunications company be able to advertise its Broadband as "supersonic" when its speeds could be as low as 64Kbps?

The problem with these plans is that while the usual speed is 100Mbps, if a customer goes over their download limit for the month their speed is slashed to just 64Kbps. The Australian Competition and Consumer Commission (ACCC) isn't happy about Optus' sensationalist claims, which it is sure breaches the Trade Practices Act.

A telco should only be allowed to advertise the minimum guranateed speed. So, if they get customers with 100MBit claims, then it should be 100MBit all day and night. If they do want caps too, then say so; but not in the tiny fineprint for which you need a microscope.

Intel Threatens to Sue Anyone Who Uses HDCP Crack

Found on Wired on Saturday, 18 September 2010
Browse Hardware

Intel threatened legal action Friday against anybody who uses its proprietary crypto key - leaked on the internet - to produce hardware that defeats the so-called HDCP technology that limits home recording of digital television and Blu-ray.

The anonymous release this week of the HDCP master key means black market hardware makers, perhaps in China, can now create hardware capable of defeating the copy protection scheme.

"Someone has used mathematics and computers to be able to work back to what the master key is"

It had to happen sooner or later. Yet the industry does not learn that copy protection won't really work and information wants to be free.

T-Mobile Censoring Text Messages

Found on Wired on Friday, 17 September 2010
Browse Censorship

A mobile-marketing company claimed Friday it would go out of business unless a federal judge orders T-Mobile to stop blocking its text-messaging service, the first case testing whether wireless providers can block text messages they don’t like.

EZ Texting claims T-Mobile blocked the company from sending text messages for all of its clients after learning that legalmarijuanadispensary.com, an EZ Texting client, was using its service to send texts about legal medical marijuana dispensaries in California.

So, a "marketing" company has problems getting messages advertising drugs to users who most likely did not opt-in. That sounds awfully similar to your everyday V1@gra spam which get filtered by e-mail providers all day long. Personally, I don't feel even a tiny bit sad if a marketing company goes out of business.

P2P defendants demand legal fees from Far Cry filmmaker

Found on Ars Technica on Thursday, 16 September 2010
Browse Legal-Issues

A group of defendants have hired several DC lawyers to file a joint motion demanding that the subpoenas in the case be quashed, that the defendants be dismissed from the litigation, and that Boll's production company cover their legal expenses.

The Omnibus Motion argues that the DC court has no personal jurisdiction over these particular defendants, since none of them live or work in DC-and neither do their ISPs.

Because the plaintiff's actions caused these Does to incur legal fees defending themselves in a distant court, "an award of attorneys' fees and costs in their favor is appropriate."

It might not even be an accident that the case has been filed in DC. Although defendants (correctly) claim that it's trivial to figure out which ISP is responsible for an IP and which court is most appropriate, the plaintiff might have hoped that, thanks to the absence of the defendants due to the distance, a default judgement in their favor would be granted.

Microsoft Exec Says 'Open' Means 'Incompetent'

Found on Techdirt on Wednesday, 15 September 2010
Browse Science

What's really ridiculous here is that the Microsoft exec in question, Hernan Rincon, president of Microsoft Latin America, seems to be making even more specious arguments than usual, claiming that "open" really is a way of saying "incompetent".

Open generally is the opposite of "masking" anything.

Microsoft itself supports open source (to a certain degree at least) and also has released source code. So, using Rincon's argument, he effectively calls Microsoft, his employer, incompetent. Now that's something I can live with.

Craigslist urged to shut erotic-services ads worldwide

Found on CNet News on Tuesday, 14 September 2010
Browse Internet

A hundred organizations fighting sex trafficking have joined the chorus of voices asking Craigslist to remove its erotic services section worldwide as the company has in the U.S.

The groups added that the few actions taken by Craigslist so far "do not measure up to the amount of daily harm being facilitated by Craigslist through the thousands of Erotic Services ads around the world each day."

Craigslist had resisted the public and political pressure at first, saying that it thoroughly screened each ad posted in the adult section.

Hooray for censorship. When a service does not violate current laws then there is no real reason to shut it down. It reminds one of China's efforts to "clean" the Internet.

Pentagon Buying Up All Copies Of A Book It's Not Happy About

Found on Techdirt on Monday, 13 September 2010
Browse Various

Even though the Army approved the book, the DIA says that it did not approve the book and that it has too much confidential information. In order to deal with that, the Pentagon has apparently agreed to buy up the 10,000 copies already printed in order to destroy them.

The author has already talked about lots of stuff in the book, and review copies of the original book had already been sent to many press outlets.

It looks like the Pentagon is still stuck in pre-Internet times. Not only travel news like this around the world instantly, it makes it also way easy to distribute content that otherwise would be censored. Not to mention such actions only draw lots of attention.

IP address-tracing software breached data protection law

Found on The Register on Sunday, 12 September 2010
Browse Legal-Issues

The Swiss Federal Court has ruled that software which identified the internet protocol (IP) address of unauthorised music uploaders broke data protection law.

The Court recognised the economic interest that copyright holders had in stopping the illegal sharing of material in which they had rights, but said that that interest did not justify what it called a significant intrusion into the privacy of each affected user.

You've got to love Switzerland.

A flood of phishing sites and how to avoid them

Found on CNet News on Saturday, 11 September 2010
Browse Internet

During a three-month study of its global malware database, Panda Security found on average 57,000 new Web sites created each week with the aim of exploiting a brand name in order to steal information that can be used to drain peoples' bank accounts.

While many people are duped by the fake e-mail messages and attachments, there are typically some obvious clues that the message is not legitimate. Usually there are egregious misspellings, poor grammar, and bad punctuation.

The best protection sits between your ears. If you use your brain a little while being online, phising and spam is fairly easy to identify.