An anonymous reader writes About a week ago, the Federal Communications Commission (FCC) asked for Verizon's justification on its policy of throttling users who pay for unlimited data usage. "I know of no past Commission statement that would treat 'as reasonable network management' a decision to slow traffic to a user who has paid, after all, for 'unlimited' service," the FCC wrote. In its response, Verizon has indicated that its throttling policy is meant to provide users with an incentive to limit their data usage. The company explained that "a small percentage of the customers on these [unlimited] plans use disproportionately large amounts of data, and, unlike subscribers on usage-based plans, they have no incentive not to do so during times of unusually high demand....our practice is a measured and fair step to ensure that this small group of customers do not disadvantage all others."
bobbied (2522392) writes Apparently Edward Snowden is not alone. CNN is reporting that recent leaked documents published by The Intercept (a website that has been publishing Snowden's leaked documents) could not have been leaked by Snowden because they didn't exist prior to his fleeing the USA and he couldn't possibly have accessed them. Authorities are said to be looking for a new leaker.
The EFF is only today able to release details of an attempt by the government to alter the historical record in the case brought by the EFF against the NSA in Jewel v. NSA. "On June 6, the court held a long hearing in Jewel in a crowded, open courtroom, widely covered by the press. We were even on the local TV news on two stations. At the end, the Judge ordered both sides to request a transcript since he ordered us to do additional briefing. But when it was over, the government secretly, and surprisingly sought permission to "remove" classified information from the transcript, and even indicated that it wanted to do so secretly, so the public could never even know that they had done so." As you'd expect of the EFF, they fought back with vigorous objections, and in the end the government did not get its way, instead deciding that it hadn't given away any classified information after all.
"The transcript of a court proceeding is the historical record of that event, what will exist and inform the public long after the persons involved are gone. The government's attempt to change this history was unprecedented. We could find no example of where a court had granted such a remedy or even where such a request had been made. This was another example of the government's attempt to shroud in secrecy both its own actions, as well as the challenges to those actions. We are pleased that the record of this attempt is now public. But should the situation recur, we will fight it as hard as we did this time."
An anonymous reader writes Laptop Mag battery tested the leading phones on all four major U.S. carriers and found that the same models on T-Mobile typically last 1 to 3 hours longer on a charge. This trend is not new, but has continued for over 3 years of testing.
The article says While we don’t know for certain why T-Mobile phones last longer on a charge, there are some strong possibilities. T-Mobile’s network could be more efficient at sending and receiving data because of the bands it uses, or maybe there are far fewer customers on its LTE network, easing the strain. Another possibility is that T-Mobile tends to pre-load less bloatware on its flagship devices relative to the other carriers.
AT&T is firmly in second place in the battery life findings presented, with Verizon and Sprint jockeying for last of the four carriers measured. It woud be interesting to see a similar test battery for phones in marginal reception areas; searching for service seems to deplete my battery faster than talking does.
Advocatus Diaboli (1627651) writes For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement's knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system. The approach has borne fruit—over a dozen alleged users of Tor-based child porn sites are now headed for trial as a result. But it's also engendering controversy, with charges that the Justice Department has glossed over the bulk-hacking technique when describing it to judges, while concealing its use from defendants.
Cludge (981852) writes with a snippet from the BBC: "And rich they will be: With The Big Bang Theory commissioned until 2017, the show's three biggest names, Jim Parsons (Sheldon), Johnny Galecki (Leonard) and Kaley Cuoco (Penny) are guaranteed to earn $72m (£42.6m) each over the next three seasons. Unsurprisingly, the cost of producing the sitcom has spiraled." I wonder what that works out per line?
njnnja (2833511) writes In an incredibly misguided attempt to reduce the quantity of bad reviews (such as these), the Union Street Guest House, a hotel about 2 hours outside of New York City, had instituted a policy to charge groups such as wedding parties $500 for each bad review posted online. The policy has been removed from their webpage but the wayback machine has archived the policy. "If you have booked the Inn for a wedding or other type of event anywhere in the region and given us a deposit of any kind for guests to stay at USGH there will be a $500 fine that will be deducted from your deposit for every negative review of USGH placed on any internet site by anyone in your party and/or attending your wedding or event If you stay here to attend a wedding anywhere in the area and leave us a negative review on any internet site you agree to a $500. fine for each negative review."
Today's interview guest is literally a household name: If you look at the shelves in nearly any programmer's house, developer shop or hackerspace, you'll probably see a stretch of books from O'Reilly Media (or O'Reilly & Associates, depending on how old the books are). Tim O'Reilly started out publishing a few technical manuals in the late '70s, branching from there into well-received technical reference and instructional books, notably ones covering open source languages and operating systems (how many people learned to install and run a new OS from Matt Walsh's Running Linux?), but neither Tim O'Reilly nor the company has gotten stuck in one place for long. As a publisher, he was early to make electronic editions available, in step with the increasing capabilities of electronic readers. Make Magazine (later spun off as part of Maker Media, which also produces Maker Faires around the world) started as an O'Reilly project; the company's conferences like OSCON, Fluent, and this year's Solid are just as much a manifestation of O'Reilly's proclivity for spreading knowledge as the books are, and those are only part of the picture, being joined with seminars, video presentations, and more. Tim O'Reilly is often hailed as a futurist and an activist (he was an early proponent of 3-D printing and hardware hacking, and a loud voice for patent reform) and he's got his eye on trends from global (how the Internet functions) to more personal -- like ways that physical goods can be produced, customized, and networked. So please go ahead and ask O'Reilly about what it's been like to be a publisher of paper books in an ever-more electronic world, as well as a visionary in the world of DIY and fabrication, or anything else on your mind. As usual, ask as many questions as you'd like, but please, one per post.
sciencehabit (1205606) writes "Yoshiki Sasai, a noted stem cell scientist at the RIKEN Center for Developmental Biology (CDB) in Kobe, Japan, who co-authored two controversial and later retracted papers that reported a simple way of reprogramming mature cells, was confirmed dead this morning, an apparent suicide. Local media reported he was found hanging from a stairway railing in the RIKEN complex in Kobe. Sasai was rushed to a nearby hospital but efforts to revive him were unsuccessful. He reportedly left a suicide note, but it has not been made public."
Wikipedia says,
"Ushahidi, Inc. is a non-profit software company that develops free and open-source software (LGPL) for information collection, visualization, and interactive mapping. Ushahidi (Swahili for 'testimony' or 'witness') created a website in the aftermath of Kenya's disputed 2007 presidential election (see 2007–2008 Kenyan crisis) that collected eyewitness reports of violence reported by email and text message and placed them on a Google Maps map." Ushahidi has also been used to map some of the BP oil spill damage in Louisiana and many other events both positive and negative around the globe. This is a mature project, headquarted in Kenya, that recently spun out the BRCK, a "go anywhere, do anything, self-powered, mobile WiFi device," which looks like it would be useful in bringing Internet connectivity to places where the electricity supply is unreliable. || According to Ushahidi, today's interviewee, Rob Baker, "is responsible for overseeing company deliverables and is a lead on communications strategies. Previously, with a 10-year background in software development and with his field experience for aid programs, Rob was a lead for Ushahidi deployments around the world, primarily working in East Africa, the Middle East, and the Caribbean. He’s spoken at the United Nations, World Bank, government, hackathons, and at technical conferences." (Alternate Video Link)
SSG Booraem (2553474) writes I've recently been hired to a IT supervisor position at a local college. My boss wants me to find some technology conferences that I'd like to attend and submit them to her. Since I've worked in IT for 18 years but usually done scut work, I don't have any ideas. I'd appreciate suggestions with personal experiences.
About six weeks ago, a hole in Paypal's two factor authentication and their mobile client was discovered. hypnosec (2231454) wrote in with news of another trivial way to bypass Paypal's two-factor authentication. A bug in a feature for eBay integration allows passing a GET parameter to completely bypass two-factor authentication, and you don't even need to be coming from eBay to use it. You still need the password, but additional protection is lost. From the article: eBay, in conjunction with Paypal, provide a service as to where you can link your eBay account to your Paypal account, and when you sell something on eBay, the fees automatically come out of your Paypal account. ... When you are redirected to the login page, the URL contains "=_integrated-registration." ... Once you're actually logged in, a cookie is set with your details, and you're redirected to a page to confirm the details of the process. And this is where the exploit lays. Now just load http://www.paypal.com/ , and you are logged in, and don't need to re-enter your login.
So, the actual bug itself is that the "=_integrated-registration" function does not check for a 2FA code, despite logging you into Paypal.
You could repeat the process using the same "=_integrated-registration" page unlimited times.
Despite a failed attempt to have charges dismissed, the alleged Silk Road operator Ross Ulbricht's lawyer has filed a new motion to have evidence dismissed, citing recent court rulings in an argument that the Silk Road related searches were overly broad. From the article:
Dratel [Ulbricht's lawyer] argues in his 102-page motion filed last Friday that "the government conducted a series of 14 searches and seizures of various physical devices containing electronically stored information ('ESI'), and of ESI itself from Internet providers and other sources. Some of the ESI was obtained via search warrant, but other ESI was obtained via court order, and still other ESI was obtained without benefit of any warrant at all." ...
The defense lawyer argues that even the searches for which the government had a warrant were overbroad and based on evidence that may have been obtained illegally. The attorney writes: " As set forth ante, all of the searches and seizures conducted pursuant to warrants and/or orders were based on the initial ability of the government to locate the Silk Road Servers, obtain the ESI on them, and perform extensive forensic analysis of that ESI. Thus, all subsequent searches and seizures are invalid if that initial locating the Silk Road Servers, obtaining their ESI, and gaining real-time continued access to those servers, was accomplished unlawfully."