MySpace Bug Leaks 'Private' Teen Photos

Found on Wired on Thursday, 17 January 2008
Browse Internet

A backdoor in MySpace's architecture allows anyone who's interested to see the photographs of some users with private profiles -- including those under 16 -- despite assurances from MySpace that those pictures can only be seen by people on a user's friends list. Info about the backdoor has been circulating on message boards for months.

The flaw exposes MySpace users who set their profiles to "private" -- the default setting for users under 16 -- even though MySpace's account settings page tells users, "Only the people you select will be able to view your full profile and photos."

Beginning in October, commercial websites began springing up to perform the MySpace hack automatically, while earning a buck through online advertising. The sites all allow you to retrieve photos from private profiles merely by typing in the Friend ID of a targeted user.

Privacy? On Myspace? Welcome to the Internet.

Should AT&T police the Internet?

Found on CNet News on Wednesday, 16 January 2008
Browse Internet

A decade after the government said that AT&T and other service providers don't have to police their networks for pirated content, the telecommunications giant is voluntarily looking for ways to play traffic cop.

For the past several months, AT&T executives have said the company is testing technology to filter traffic on its network to look for copyrighted material that is being illegally distributed.

AT&T's plans would turn the nation's largest telephone company into a kind of network cop, a role that some say could turn dangerous for the company. For one, filtering packets to determine whether they contain copyrighted material raises privacy concerns.

AT&T argues that it must get involved in stopping the flow of pirated content because much of this content is shared using peer-to-peer protocols, which eats up valuable network bandwidth, slowing network connections for many of its customers.

Oh joy, I was just testing encrypted P2P solutions. But really, ISPs have no right to spy on their customers. Everytime they come up with the "online experience" reason to fight P2P. What they do is, in fact, degrade this experience for those users who use P2P. And the ISPs don't prohibit the usage of filesharing applications on their network; something they could easily add to the contracts. But they know that customers will leave them, and they don't want that. Istead, they call P2P the biggest evil on their networks and fight it while trying to keep users who want to share. What's next on their list? Crippling Youtube usage? Let's go back to acoustic coupler, ok?

VMware Acquisition to Strengthen Virtualization

Found on eWEEK on Tuesday, 15 January 2008
Browse Software

On Jan. 15, the Palo Alto, Calif., company announced that it would acquire Thinstall, a privately held company that specializes in application virtualization technology for PCs. The deal is expected to close by the end of the first quarter of this year.

"The addition of Thinstall to our desktop virtualization portfolio will help us to better deliver cost-effective and more flexible tools for quickly and securely provisioning desktops," said Jeff Jennings, vice president of desktop products and solutions at VMware, in a statement.

Thinstall, which is based in San Francisco, has about 600 customers in both the enterprise space and within government. Lambert believes that VMware will re-brand the Thinstall product line by the second half of this year, but that it will keep the company's partnership with LANDesk and BMC in place.

Thinstall is quite a neat piece of software. With a price tag of $5000 not really cheap, but impressive.

Trying To Take Down A Negative Movie Review

Found on Techdirt on Monday, 14 January 2008
Browse Legal-Issues

All too often, we're seeing the DMCA abused by people who aren't using it to takedown copyright infringing materials, but to shut down sites they don't like. The latest example involves some filmmakers and a movie review site. The review certainly was not particularly positive, leading to a rather random series of complaints and threats against its author.

It's difficult to see how a review of a movie can infringe on the copyrights of that movie unless it was showing the movie itself (which does not appear to be the case). It's worth pointing out that a DMCA takedown notice is only supposed to be for copyright infringing material, so including charges of libel and defamation in the takedown seem rather unnecessary. Even more amusingly, though, the takedown notice includes a bunch of random charges that aren't actually illegal, such as: "linking to other websites without any authorization to do so."

Some people are just amazing. Instead of living with the fact that his movie obviously totally sucked, he got on a little soap box. Of course, as mentioned in the article, this could be a try to make use of the Streisand effect. Still, it's somewhat hillarious. Oh, and if you think about watching "Forget About It": just forget about it.

MySpace Agrees to New Safety Measures

Found on Wired on Sunday, 13 January 2008
Browse Internet

Under mounting pressure from law enforcement and parents, MySpace agreed Monday to take steps to protect youngsters from online sexual predators and bullies, including searching for ways to better verify users' ages.

But Monday's announcement was short on specifics about how improvements would be carried out.

"Age verification requires that you have a database of kids and if you do, that database is available to hackers and anyone who can get into it."

MySpace said it was combing through sex offender registries to identify predators, who would then be kicked off the site. But sex offenders are unlikely to open an account under their real names, as are underage children.

"When people go on MySpace they lie about their age. Everyone lies about their age," the sixth-grader said. "You just put an age and a date and you just put it on there."

MySpace said it is in the process of creating a database where parents can submit children's e-mail addresses to prevent their children from setting up profiles.

Nice, I can already see the next headlines: "MySpace hacked. Children e-mail database stolen". Looks like some people have to learn the hard way about the Internet. All children are in a database and cannot lie about their age? Well fun, I'll lie about my country. Or about my name. Or I'll quickly get a new, free e-mail address. The same works for the predators too. To think that they will sign up with their real name and a possibly registered e-mail address is, well, naive. Besides, those 200 million accounts exist because people can sign up easily (and multiple times); if you have to go through a long verification (possibly involving snail mail), you'll think twice about it.

Researchers create beating heart in laboratory

Found on Physorg on Saturday, 12 January 2008
Browse Science

University of Minnesota researchers have created a beating heart in the laboratory. By using a process called whole organ decellularization, scientists from the University of Minnesota Center for Cardiovascular Repair grew functioning heart tissue by taking dead rat and pig hearts and reseeding them with a mixture of live cells.

Decellularization is the process of removing all of the cells from an organ – in this case an animal cadaver heart – leaving only the extracellular matrix, the framework between the cells, intact.

After successfully removing all of the cells from both rat and pig hearts, researchers injected them with a mixture of progenitor cells that came from neonatal or newborn rat hearts and placed the structure in a sterile setting in the lab to grow.

Four days after seeding the decellularized heart scaffolds with the heart cells, contractions were observed. Eight days later, the hearts were pumping.

Braaaiiinnnss.... err, wrong... Heaaarrtttssssss....

Decriminalize File Sharing

Found on Karl Sigfrid on Friday, 11 January 2008
Browse Filesharing

The Swedish Courts of Appeal questions whether banning citizens from the Internet would indeed reduce online file sharing. Despite several other countries having already taken similar action, none have had good results to show for it.

Decriminalizing all non-commercial file sharing and forcing the market to adapt is not just the best solution. It's the only solution, unless we want an ever more extensive control of what citizens do on the Internet.

The simple truth is that almost all communication channels on the Internet can be used to distribute copyrighted information. If you can use a service to send a message you can most likely use the same service to send an mp3-song. Those who want to prevent people from exchanging of copyrighted material must control all electronic communication between citizens.

In the late 1970s, the copyright industry wanted to prevent people from recording TV-shows with then-new Video Cassette Recorders. In 1998 the recording industry tried to get mp3 players banned.

I want to move to Sweden.

Sony BMG Will Allow Amazon to Sell Its Music

Found on Wired on Thursday, 10 January 2008
Browse Internet

Sony BMG made history Thursday by becoming the fourth and final major label to allow its music to be sold without digital rights management, issuing a announcement that Amazon.com's MP3 store would start carrying music from the label by the end of this month.

This day has been a long time coming. After consumers are able to buy music that plays on a wide variety of equipment, analysts expect the market for digital music and associated devices to expand.

Representatives for both Sony BMG and Amazon confirmed that the files will in fact contain watermarks. However, privacy advocates needn't be alarmed -- the reps also told me that the only information to be included in the watermarks is where they were purchased. In other words, if you mistakenly share the files over the internet, they will not be traceable to you, only to Amazon.

Quite a wonder after all their whining.

ID Tech May Mean an End to Anonymous Drinking

Found on Slashdot on Wednesday, 09 January 2008
Browse Various

If you visit a lot of bars and restaurants, you've likely crossed paths with drivers license scanners — machines that supposedly verify that your license is valid. In actuality, many of these scanners are designed to record your license information in addition to verifying them, and those that authenticate against a remote database are creating a record of when and where you buy alcohol.

Collecting our driver's license information is one thing, but collecting data about our personal drinking habits is not only a violation of, according to the ACLU representative quoted in the article, privacy and civil liberties, but this 'drinking record' could also create problems for people in civil and criminal lawsuits as proof of alcohol purchases in DUI cases or evidence of alcoholism in divorce lawsuits.

I never saw such a scanner; but then, the bartender and waitresses at the bar I go to know me pretty well. Possibly too well.

Is Network Solutions Snatching Domain Names?

Found on eWEEK on Tuesday, 08 January 2008
Browse Internet

Numerous reports confirm that Network Solutions, the well-known domain registry company, is automatically registering domain names when individuals search for a potential name using its site's search tools.

In a follow-up story at DomainNameNews, a reporter confirmed that after using the popular whois tool on the Network Solution site to search for a domain name, they then found that the site had been registered to a private registrant, but that the domain name was still available from Network Solutions.

eWEEK was also able to determine that simply searching for a domain name with Network Solutions' Whois utility was sufficient for Network Solutions to automatically register the name.

Other individuals have started automated scripts to flood Network Solutions with bogus domain name searches in an impromptu DDoS (distributed denial of service) attack. Others are protesting Network Solutions new policy to ICANN (Internet Corporation for Assigned Names and Numbers), the oversight organization for top-level domain name providers. At this time, ICANN has not replied to requests for its stand on Network Solutions' policies.

There's been a lot of rumour about providers of whois-tools who keep an eye on what people are looking for and register it. NetSols approach is rather aggressive and questionable.