Through this simple mechanism, an alleged victim can either have the abusive information removed or discover the identity of the harasser.
Archive for 2011/09/19
We need a new legislative approach. The absolute immunity enjoyed by online service providers needs to be qualified. At the request of a user, service providers should be required to give anonymous posters a firm choice: agree to reveal who they are (to accept responsibility for their posts in their own names) or their posts will be taken downPosted: 2011/09/19 in Education / Awareness
Piracy isn’t talked about a lot, but it has quietly grown into a major problem for many developers. It’s more of an issue in Android because its open nature and loose authentication tools allow pirates to rip off and distribute paid appsPosted: 2011/09/19 in Education / Awareness, Illegal File Sharing
Canadian Telecom Regulator: Rogers Communications must come up with a scheme to avoid the “misclassification” of interactive game traffic, so that its network management system won’t shape and slow World of Warcraft, Starcraft 2, and other popular gamesPosted: 2011/09/19 in Bandwidth Management, Education / Awareness, Public Policy
Cole Stryker’s new book on 4chan and Anonymous, called Epic Win for Anonymous, was only published on September 1—but the death threats, pizza deliveries, and magazine subscriptions are already rolling inPosted: 2011/09/19 in Education / Awareness
“I don’t think they’re ever going to be a serious force in terms of political activism—they’re just too conflicted in what they want to accomplish.”
Hundreds of Go Daddy sites were compromised to point towards a site hosting malware last weekend. The mass hack of around 445 sites involved the injection of hostile code into the .htaccess files of the sitesPosted: 2011/09/19 in Education / Awareness, Privacy / Data Protection
Go Daddy quickly removed the hostile code before working with its customers to take back full control of the sites, which were reportedly compromised by a password hack.
Reed Hastings, Co-Founder and CEO, Netflix: When Netflix is evolving rapidly, I need to be extra-communicative. This is the key thing I got wrong. In hindsight, I slid into arrogance based upon past successPosted: 2011/09/19 in Education / Awareness, New Business Models
We have done very well for a long time by steadily improving our service, without doing much CEO communication. Inside Netflix I say, “Actions speak louder than words,” and we should just keep improving our service.
But now I see that given the huge changes we have been recently making, I should have personally given a full justification to our members of why we are separating DVD and streaming, and charging for both. It wouldn’t have changed the price increase, but it would have been the right thing to do.
So here is what we are doing and why:
When Google chairman Eric Schmidt heads to Washington this week to testify before Congress, political theater will follow himPosted: 2011/09/19 in Education / Awareness, Google, Public Policy
Netflix has decided to split its DVD delivery and streaming services into two separate sites – Netflix proper will continue to handle the streaming, and the DVDs will be handled by a new site called QwiksterPosted: 2011/09/19 in Education / Awareness, New Business Models, Tech Evolution
TalkTalk CEO Dido Harding welcomes UK change of strategy on internet piracy which appears to shift the costly and complicated burden of tackling “illegal” internet copyright infringement away from ISPs and on to content providersPosted: 2011/09/19 in Education / Awareness, Illegal File Sharing, New Business Models, Public Policy
Dutch Data Protection Agency warns online advertisers: opt-out Do Not Track Me register may not be sufficient and could be in conflict with EU data protection regulationPosted: 2011/09/19 in Education / Awareness, Privacy / Data Protection, Public Policy
An Italian researcher has uncovered at least a dozen security flaws in software used in utilities and other critical infrastructure systems, prompting security advisories from the U.S. governmentPosted: 2011/09/19 in Cybercrime, Education / Awareness, Stats / reports
FOIA fanatic public transport card hacker Brenno de Winter publishes previously confidential list of known cyberattacks on Dutch government organizationsPosted: 2011/09/19 in Cybercrime, Education / Awareness, Stats / reports
Dutch language list:
Dutch language news article:
Japan’s defense industry hit by its first cyber attack – its submarine, missile and nuclear power plant component factories had been the targetPosted: 2011/09/19 in Cybercrime, Education / Awareness, Network Security, Privacy / Data Protection, Public Policy
Dutch language news article:
Media reports have called this movement “Marxist,” “Guerrilla” and have claimed that the protestors are inspired by the Arab Spring. However, anyone moving through the crowd and listening to their conversations wouldn’t come to that conclusion
For the first time in history a Pirate Party has managed to enter a state parliament. With an estimated 9 percent of the total vote the Pirate Party exceeded the 5% floor needed to enter the Berlin parliament with several seats.