the developments in music consumption
Archive for 2011/03/21
Iran appears to have developed a system for identifying computer users on a network designed to block surveillance, a member of the Tor Project saysPosted: 2011/03/21 in Education / Awareness, Filtering, Network Security, Privacy / Data Protection, Public Policy
TOR: Bug Doors In TOR’s SSL Layer
Anon explores and explains the link between Lamo the hacker and TOR exit node operator,and Assange’s Wikileaks: Anon comes to the conclusion that the TOR network is unsafe and not fit for its stated purpose, and has become the territory of hackers and an overt orgy of exhibitionism
This is a government blockage carefully designed to look like the problem is with Gmail
Each of the five plaintiffs allege that Netflix hangs onto customer information, such as credit card numbers and rental histories, long after subscribers cancel their membership. They claim this violates the Video Privacy Protection Act (VPPA).
A Berlin court has ruled, according to Deutsche Welle, that it’s legal for Google to take the street-level pictures, striking down a lawsuit brought on by a German woman who sued Google over Street View and cited privacy and property rights
A lawsuit filed last week in Texas by a group named Imperium Holdings claims that Apple along with Kyocera, LG, Motorola Mobility, Nokia, Research in Motion (RIM), and Sony-Ericsson are infringing on five patents related to the cameras and imaging equipment found in phones and other mobile devicesPosted: 2011/03/21 in Education / Awareness, Litigation
Microsoft on Monday filed a patent infringement lawsuit against Barnes & Noble and the manufacturers of its e-readersPosted: 2011/03/21 in Education / Awareness, Litigation
Microsoft throws down the gauntlet at Android tablets
NeuroFocus is touting the next frontier of advertising: Neuromarketing. And you thought something as mundane as Web cookies were creepyPosted: 2011/03/21 in Education / Awareness, New Business Models, Tech Evolution
Broadband Wherever has become the first UK operator to announce its launch of a new 10Mbps satellite service for rural homes and businesses (Tooway10mb).Posted: 2011/03/21 in Education / Awareness, New Business Models, Tech Evolution
Copyright is a government-sanctioned private monopoly that limits what people may do with things they have legitimately boughtPosted: 2011/03/21 in Copyright, Education / Awareness
says that having spare time is a luxury of the past
Dell is building data centers in as many as ten countries across the globe, including a facility in AustraliaPosted: 2011/03/21 in Education / Awareness, New Business Models, Tech Evolution
Soon there may be only once place to go for Americans who want to use their phone abroad: the monopoly GSM supplier will be AT&T WirelessPosted: 2011/03/21 in Education / Awareness
French privacy watchdogs have hit Google with its very first fine for allowing its Street View cars to snoop on citizens’ Wi-Fi dataPosted: 2011/03/21 in Education / Awareness, Google, Privacy / Data Protection, Public Policy
The search giant must pay a €100,000 (£87,114) fine for improperly gathering and storing data for its Street View application
Mod magician Shantanu Goel claims to have developed a code which allows a Kinect to be used to control a PS3. With it, he can control the XBM menu, start games and even play them with the motion-detecting Microsoft machinePosted: 2011/03/21 in Education / Awareness, Tech Evolution
A group of researchers think they can bring down the Internet by disrupting the BGP routing protocol using indirect meansPosted: 2011/03/21 in Education / Awareness, Network Security, Stats / reports
Games aimed at adults may not be a large part of the market, but they’re a big part of the market that sells.
This Dutch language article explains how phishing sites and botnets are being used to retrieve user names and passwords of ING Online Banking accounts. Usernames and passwords relating to the ING Online Banking accounts are all it takes to mislead the bank account verification schemes of PayPal and Click & Buy and use the latter services to purchase goods and essentially withdraw money without the need of any two-factor authentication security regime.