Slashdot Deals: Deal of the Day - 6 month subscription of Pandora One at 46% off. ×

The Tamagochi Singularity Made Real: Infinite Tamagochi Living On the Internet ( 38

szczys writes: Everyone loves Tamagochi, the little electronic keychains spawned in the '90s that let you raise digital pets. Some time ago, XKCD made a quip about an internet-based matrix of thousands of these digital entities. That quip is now a reality thanks to elite hardware hacker Jeroen Domburg (aka Sprite_TM). In his recent talk called "The Tamagochi Singularity" at the Hackaday SuperConference he revealed that he had built an infinite network of virtual Tamagochi by implementing the original hardware as a virtual machine. This included developing AI to keep them happy, and developing a protocol to emulate their IR interactions. But he went even further, hacking an original keychain to use wirelessly as a console which can look in on any of the virtual Tamagochi living on his underground network. This full-stack process is unparalleled in just about every facet: complexity, speed of implementation, awesome factor, and will surely spark legions of other Tamagochi Matrices.

UK Mobile Operator Could Block Ads At Network Level ( 82

Mickeycaskill writes: UK network operator EE says it is investigating the possibility of blocking adverts at a network level, allowing customers to limit the types and frequency of adverts they see in browsers and applications. The move is likely to concern digital publishers, many of whom rely on advertising revenue to fund their content. Ad blockers have become more popular in recent times, with many users employing them to save battery life, consume less data and protect against malvertising attacks. EE CEO Olaf Swantee said, "We think it’s important that, over time, customers start to be offered more choice and control over the level and intensity of ads on mobile. For EE, this is not about ad blocking, but about starting an important debate around customer choice, controls and the level of ads customers receive. This is an important debate that needs to happen soon."
The Internet

One Family Suffering Through Years-Long Trolling Campaign ( 213

blottsie writes: Since 2010, the Straters have been under assault from an online campaign of ever-increasing harassment — prank deliveries, smear attacks, high-profile hacks, and threats of violence against schools and law enforcement officials in their name — and it's slowly torn them apart. Masterminding it all is a teenage Lizard Squad hacker from Finland, at war with their son, Blair, over a seemingly minor dispute. "When the family started getting notices about their utilities being disconnected, they realized things were escalating out of control. Utility provider Commonwealth Edison once called the house to iron out the details about a request to have the power turned off after a supposed move. Something similar happened with their trash service. On Halloween 2013, Comcast shut off their cable and Internet service."
Electronic Frontier Foundation

Judge Wipes Out Safe Harbor Provision In DMCA, Makes Cox Accomplice of Piracy ( 191

SysKoll writes: The DMCA is well-known for giving exorbitant powers to copyright holders, such as taking down a page or a whole web site without a court order. Media companies buy services from vendors like Rightscorp, a shake-down outfit that issues thousands of robot-generated take-down notices and issues threats against ISPs and sites ignoring them. Cox, like a lot of ISPs, is inundated with abusive take-down notices, in particular from Rightscorp. Now, BMG Rights Management and Round Hill Music are suing Cox for refusing to shut off the Internet access of subscribers that Rightscorp accused of downloading music via BitTorrent. Cox argues that as an ISP, they benefit from the Safe Harbor provision that shields access providers from subscribers' misbehavior. Not so, says U.S. District Judge Liam O'Grady. The judge sided with the media companies ahead of trial, saying Cox should have terminated the repeat offenders accused by Rightscorp. Cox's response is quite entertaining for a legal document (PDF): its description of Rightscorp includes the terms "shady," "shake-down," and "pay no attention to the facts." O'Grady also derided the Electronic Frontier Foundation's attempt to file an amicus brief supporting Cox, calling them hysterical crybabies.

Yahoo Denies Ad-blocking Users Access To Email ( 290

JoeyRox writes: Yahoo is running an A/B test that blocks access to Yahoo email if the site detects that the user is running an Ad Blocker. Yahoo says that this a trial rather than a new policy, effecting only a "small number" of users. Those lucky users are greeted with a message that reads "Please disable Ad Blocker to continue using Yahoo Mail." Regarding the legality of the move, "Yahoo is well within its rights to do so," said Ansel Halliburton an attorney at Kronenberger Rosenfeld who specializes in Internet law.

Patreon Users Threatened By Ashley Madison Scammers ( 73

itwbennett writes: "Over the last few days, the group responsible for extortion attempts and death threats against Ashley Madison users has turned to a new set of targets – Patreon users," writes CSO's Steve Ragan. A message sent from the same account used in previous campaigns by the scammers demands a payment of 1 BTC or else the Patreon user will have their personal information exposed. "The [Bitcoin] wallet being used by the group has barely collected anything," says Ragan, "suggesting that after their massive push towards Ashley Madison users, people have stopped falling for their scams."

What the Sony Hack Looked Like To Employees ( 50

An anonymous reader writes: The cyber attack on Sony was one of the highest profile hacks in the past several years. Slate tracked down two dozen people who worked there at the time, and asked them what it was like on the inside while it was happening. Quoting: "The telephone directory vanished. Voicemail was offline. Computers became bricks. Internet access on the lot was shuttered. The cafeteria went cash-only. Contracts—and the templates those contracts were based on—disappeared. Sony's online database of stock footage was unsearchable. It was near impossible for Sony to communicate directly with its employees—much less ex-employees, who were also gravely affected by the hack—to inform them of what was even happening and what to do about it. 'It was like moving back into an earlier time,' one employee says." Some employees had their workloads doubled, some had nothing to do. While the hack brought the company together at the beginning, it eventually descended into recriminations and lawsuits.

How Anonymous' War With Isis Is Actually Harming Counter-Terrorism ( 385

retroworks writes: According to a recent tweet from the #OpParis account, Anonymous are delivering on their threat to hack Isis, and are now flooding all pro-Isis hastags with the grandfather of all 2007 memes — Rick Astley's "Never Gonna Give You Up" music video. Whenever a targeted Isis account tries to spread a message, the topic will instead be flooded with countless videos of Rick Astley circa 1987. Not all are praising Anonymous methods, however. While Metro UK reports that the attacks have been successful, finding and shutting down 5,500 Twitter accounts, the article also indicates that professional security agencies have seen sources they monitor shut down. Rick Astley drowns out intelligence as well as recruitment.

CIOs Spend a Third of Their Time On Security ( 107

StewBeans writes: Much has been discussed about the potential security risks of an Internet of Things future in which billions of devices and machines are all talking to each other automatically. But the IoT market is exploding at a breakneck pace, leaving all companies scrambling to figure out the security piece of the puzzle now, before it's too late. In fact, some experts believe this issue will be what separates the winners from the losers, as security concerns either stop companies from getting into the IoT market, or delay existing IoT projects and leave the door open to swifter competition. That's likely why, according to CIO Magazine's annual survey, CIOs are spending a third of their time on security. Adam Dennison from CIO said, "If IT leaders want to embrace the sexy, new technologies they are hearing about today—the SMAC stack, third platform, Internet of Things, etc—security is going to be upfront and at the center of the discussion."
The Internet

New Anti-Piracy Law In Australia Already Being Abused ( 73

Gumbercules!! writes: A small Australian ISP has received a demand that it block access to an overseas website or face legal action in the Federal Court, in a case in which a building company is demanding the ISP block access to an overseas site with a similar name. This case is being seen as a test case, potentially opening the way for companies and aggregated customers to use the new anti-piracy laws to block access to companies or their competition. The ISP in question has obviously been selected because they're very small and have limited financial capacity to fight a legal case.
United Kingdom

UK's Gigaclear Launches 5 Gbps Fiber Broadband Service ( 91

An anonymous reader writes: Broadband service provider Gigaclear announced it will offer 5 Gbps internet service beginning next year. Most homes would be hard-pressed to consume data at this rate today, but these speeds will become necessary when over-the-top television services like Netflix and HBO GO become commonplace, television pixel densities grow to 8K (7680p X 4320p) at 60 to 120 fps, and the IoT connects every other home device to the internet. “We’re offering customers the chance to access absolutely phenomenal broadband speeds,” Gigaclear CEO Matthew Hare said in an official announcement. “To be clear, this is a premium service that gives the fastest Internet speeds in the country to those of our customers who want the best connection that they can get.”
The Internet

US Rep. Joe Barton Has a Plan To Stop Terrorists: Shut Down Websites ( 275

Earthquake Retrofit writes: In an FCC oversight hearing, U.S. Representative Joe Barton (R-TX) asked Chairman Tom Wheeler if it's possible to shut down websites used by ISIS and other terrorist groups. He said, "Isn't there something we can do under existing law to shut those Internet sites down, and I know they pop up like weeds, but once they do pop up, shut them down and then turn those Internet addresses over to the appropriate law enforcement agencies to try to track them down? I would think that even in an open society, when there is a clear threat, they've declared war against us, our way of life, they've threatened to attack this very city our capital is in, that we could do something about the Internet and social media side of the equation." Wheeler pointed out that the legal definition of "lawful intercept" did not support such actions, but added that Congress could expand the law to validate the concept. Meanwhile, the Senate Intelligence Committee is exploring the idea of using the recent terror attacks in France as ammunition to force tech companies away from end-to-end encryption. "Lawmakers said it was time to intensify discussions over what technology companies such as Apple and Google could do to help unscramble key information on devices such as iPhones and apps like WhatsApp, where suspected terrorists have communicated."

Anonymous Takes Down Thousands of ISIS-Related Twitter Accounts In a Day ( 318

BarbaraHudson writes: Softpedia is reporting that Anonymous, along with social media users, have identified several thousand Twitter accounts allegedly linked to ISIS members. "Besides scanning for ISIS Twitter accounts themselves, the hacking group has also opened access to the [takedown operation] site to those interested. Anyone who comes across ISIS social media accounts can easily search the database and report any new terrorists and supporters. The website is called #opIceISIS [slow right now, but it does load] and will index ISIS members based on their real name, location, picture, Twitter, Facebook, and YouTube accounts." Anonymous crowdsourcing their operations... welcome to the brave new world, ISIS. An article at The Independent reminds everyone that this information has not been independently confirmed, and that Anonymous is certainly capable of misidentifying people. It's also worth exploring the question of why Twitter hasn't already disabled these accounts, and why intelligence agencies haven't done anything about them, if they're so easy to find.
The Internet

Fire Takes Azerbaijan Offline ( 57

judgecorp writes: On Monday, 90 percent of Azerbaijan lost Internet access, due to a fire at one data center in Baku, the capital of the former Soviet Republic. Cables caught fire at the Delta Telecom facility, and international providers including NTT and Telecom Italia all lost service for nearly eight hours. Some interesting snippets: Azerbaijan is a former Soviet republic that has seen rapid development thanks to its rich oil and gas reserves. The country has been running several projects aimed at modernizing its communications infrastructure, including participation in Trans-Eurasian Information Highway (TASIM). ... At about 16:10 on Monday, consumers, businesses and government agencies across Azerbaijan suddenly lost their connections to the Internet. Banks couldn’t make domestic money transfers, and even Point-of-Sale terminals were not working. ... Interestingly, no international traffic flowing though Azerbaijan was affected by the outage. “Transmission channels to Georgia, Iran, and the Middle East were working at full capacity,” Iltimas Mammadov, the minister of communications, told AzerNews.

NYT Quietly Pulls Article Blaming Encryption In Paris Attacks 259 writes: Inside Sources reports that the NY Times has quietly pulled a story from its website alleging the attackers used encrypted technology. The original piece, which has since been removed, can be found on the Internet Archive. It stated, "The attackers are believed to have communicated using encryption technology, according to European officials who had been briefed on the investigation but were not authorized to speak publicly. It was not clear whether the encryption was part of widely used communications tools, like WhatsApp, which the authorities have a hard time monitoring, or something more elaborate. Intelligence officials have been pressing for more leeway to counter the growing use of encryption."

A link to the NY Times article now redirects readers to a separate, general article on the attacks, which does not contain the word "encrypt." The Times later posted a second article citing an anonymous "European counterterrorism official" who was quoted saying authorities' "working assumption is that these guys were very security aware," but clarified officials "offered no evidence."

Snowden Says It's Your Duty To Use an Ad Blocker (for Security) 342

AmiMoJo writes: In a long interview about reclaiming your privacy online, ex-NSA whistleblower Edward Snowden states that it's not just a good idea to use ad blocking software, it's your duty: "Everybody should be running adblock software, if only from a safety perspective. We've seen internet providers like Comcast, AT&T, or whoever it is, insert their own ads into your plaintext http connections. As long as service providers are serving ads with active content that require the use of JavaScript to display, that have some kind of active content like Flash embedded in it, anything that can be a vector for attack in your web browser — you should be actively trying to block these. Because if the service provider is not working to protect the sanctity of the relationship between reader and publisher, you have not just a right but a duty to take every effort to protect yourself in response." Other recommendations include encrypting your hard drive and using Tor to keep your internet use private.
United Kingdom

UK PM Wants To Speed Up Controversial Internet Bill After Paris Attacks ( 167

An anonymous reader writes: Less than three days after the attacks in Paris, UK prime minister David Cameron has suggested that the process of review for the controversial Draft Investigatory Powers Bill should be accelerated. The controversial proposal, which would require British ISPs to retain a subset of a user's internet history for a year and in effect outlaw zero-knowledge encryption in the UK, was intended for parliamentary review and ratification by the end of 2016, but at the weekend ex-terrorist watchdog Lord Carlile was in the vanguard of demands to speed the bill into law by the end of this year, implicitly criticizing ex-NSA whistleblower Edward Snowden for having 'shown terrorists ways to hide their electronic footprints'.

Pandora To Buy Rdio Assets For $75M In Cash ( 20

An anonymous reader writes: Pandora is acquiring music subscription service Rdio for $75 million in cash. "The transaction is contingent upon Rdio seeking protection in the United States Bankruptcy Court for the Northern District of California. Upon approval of the proposed transaction by the bankruptcy court, Rdio will be winding down the Rdio-branded service in all markets," Pandora said in a statement. TechCrunch reports: "That was fast: just as soon as it was reported that Pandora was in talks to buy Rdio, the two sides have confirmed that an acquisition is indeed taking place. Pandora has acquired "key assets" from Rdio for $75 million, the company has just announced. But as part of it, the Rdio service as we know it is tanking: the streaming service is shutting down and Rdio is filing for bankruptcy."
The Internet

After Paris, ISIS Moves Propaganda Machine To Darknet ( 184

itwbennett writes: Over the weekend, researcher Scot Terban came across the new website of Al-Hayat Media Center, the media division of Daesh (aka ISIS/ISIL), in a post on Shamikh forum (a known jihadi bulletin board), 'someone had posted the new address and instructions for reaching it,' writes CSO's Steve Ragan. The website hosts the usual anti-Western iconography, as well as songs (Nasheeds) and poems for mujahids in various locations. Terban has mirrored the website and its files; he says he plans to publish more details in the coming days. 'Over the years, there have been several claims made that Daesh had propaganda and recruitment hubs on the Darknet, but no one has ever published proof of those claims or explored how the propaganda machine operates in public,' says Ragan.