Agregador de canales de noticias

Cryptoparty BCN

El Binario - Dom, 25/01/2015 - 21:45

Las cryptoparties son talleres en los que se explican a los asistentes cómo instalar, configurar y utilizar herramientas básicas para navegar y usar Internet de una manera más responsable, sabiendo en qué riesgos podemos incurrir en cada momento y evaluando si los queremos asumir o no.

Estas herramientas suelen ser Thunderbird + enigmail + torbirdy, un cliente jabber + otr, VPN, Tor-Browser,… Es un sitio genial para iniciarse en un modo de vida que respete tu privacidad dentro de lo posible.

Los habitantes de Barcelona y alrededores estáis de suerte, este viernes dia 30 hay una Cryptoparty programada. Los datos son los siguientes.

  • Día: viernes 30 de enero de 2015

  • Hora: 16:15 a 20:30

  • Sitio: Citilab Cornellà; Pl. Can Suris s/n (Metro Conellà Centre o Tram Fontsanta/Fatjó)

  • Inscripcion: gratuïta però per limits d’aforament cal apuntar-vos-hi prèviament. Porteu l’entrada.

  • Formato: Taller BYOD (Bring Your Own Device – trae tu própio ordenador/móvil/tablet)

Es posible que el aforo esté completo, en su web no lo ponen por lo que vale la pena intentar coger sitio. Si no os fuése posible este viernes, estad atentas a su web, tienen sesiones pensadas aunque no están concretadas en día y hora.

Su web.

Categorías: Cultura libre [es]

Ed Felten: California Must Lead On Cybersecurity

Slashdot YourRightsOnline - Dom, 25/01/2015 - 19:49
An anonymous reader writes In a Sacramento Bee op-ed, (in)famous computer security researcher Ed Felten responds to the State of the Union cybersecurity proposal. He doesn't mince words: "The odds of clearing Congress: low. The odds of materially improving security: even lower. "What he suggests as an alternative, though, is a surprise. "California," he writes, "could blaze a trail for effective cybersecurity policy." He calls for the state government to protect critical infrastructure and sensitive data, relying on outside auditors and experts. It's an interesting idea. Even if it doesn't go anywhere, at least it's some fresh thinking in this area of backward policy. From Felten's essay: Critical infrastructure increasingly relies on industrial automation systems. And those systems are often vulnerable – they keep a default password, for instance, or are accessible from the public Internet. These are not subtle or sophisticated errors. Fixing them requires basic due diligence, not rocket science. Requiring the state’s critical infrastructure providers to undergo regular security audits would be straightforward and inexpensive – especially relative to the enormous risks. Areas of sensitive data are also low-hanging cyber fruit. In health care, education and finance, California already imposes security and privacy requirements that go beyond federal law. Those legal mandates, though, are mostly enforced through after-the-fact penalties. Much like critical infrastructure, sectors that rely upon sensitive data would benefit from periodic outside auditing. Of any state government's, California's policies also have the chance to help (or harm) the most people: nearly 39 million people, according to a 2014 U.S. Census estimate.

Read more of this story at Slashdot.








Categorías: Free Culture [en]

Links 25/1/2015: Android Wear 5.0, Tizen in Bangladesh

Techrights - Dom, 25/01/2015 - 18:47

Contents GNU/Linux
  • Desktop
    • Google makes it easier to run Linux on a Chromebook via a USB drive…sort of…

      I have to give Google a lot of credit here. I noted in my earlier post how Chromebooks were all over , but now Google has potentially added even more value to them with these changes. The ability to easily run a Linux distribution would certainly add even more appeal to Chromebooks, particularly given their low price compared to the cost of some Linux-based laptops sold by certain vendors.

    • Forums Have Matured

      In craigslist people actually suggest installing GNU/Linux to fix things in the computer forum. No longer are they shooed away to the Linux forum. Well, there are some rude people but they don’t seem to get their way. It’s seems GNU/Linux is much more accepted than five years ago.

    • Completely open source, high-end laptop gets closer to reality

      If you’ve wanted a laptop where all the software is free and open source (FOSS), you’ve usually had to settle for mediocre hardware. Even FOSS champion Richard Stallman is making do with a ThinkPad that’s several years old. At last, though, it looks like you won’t have to compromise your ideology for the sake of keeping up with the Joneses. Purism has successfully crowdfunded the Librem 15, a portable PC that combines modern parts (such as a 3.4GHz Core i7 and an optional 4K display) with software that’s accessible from head to toe. The operating system (a variant of Trisquel GNU/Linux), hardware drivers and included apps are all free and open — Purism is even trying to loosen up the BIOS and firmware.

  • Kernel Space
    • Adventures in Embedded UEFI with Intel Galileo

      At one of the Intel Technology Days conferences a while ago, Intel gave us a gift of a Galileo board, which is based on the Quark SoC, just before the general announcement. The promise of the Quark SoC was that it would be a fully open (down to the firmware) embedded system based on UEFI. When the board first came out, though, the UEFI code was missing (promised for later), so I put it on a shelf and forgot about it. Recently, the UEFI Security Subteam has been considering issues that impinge on embedded architectures (mostly arm) so having an actual working embedded development board could prove useful. This is the first part of the story of trying to turn the Galileo into an embedded reference platform for UEFI.

    • Linus Torvalds diversity gaffe brings out the best (and worst) of the open source world

      Diversity is going to characterize a lot of the conversations about technology in 2015. The arrow of history is pointing towards greater inclusiveness, and the participatory nature of the open-source world places it in an excellent position to lead the way. But there’s a lot of friction, and a lot of pushback. It’s really up to the community to decide what it wants to be — and who it wants to represent its ideals to the world.

    • Benchmarks
      • Intel Broadwell HD Graphics 5500: Windows 8.1 vs. Linux

        Linux graphics tests of Intel’s Broadwell hardware are finally here! Going back to November of 2013 is when Intel began putting out open-source Broadwell HD Graphics code. Since the initial Broadwell code drop, I’ve written dozens of articles to date covering the Linux kernel work, Mesa DRI OpenGL driver progress, Beignet OpenCL compute support, and other key Linux components work on Intel Broadwell support. A few days ago I received the Lenovo ThinkPad X1 Carbon with Core i7 Broadwell CPU to finally see how the Linux support has panned out for this next-generation line-up succeeding Haswell.

  • Applications
  • Desktop Environments/WMs
    • K Desktop Environment/KDE SC/Qt
      • Help test KDE Bomber game

        As Laurent mentioned we are moving some KDE games from kdelibs4-based to kf5-based for the next KDE Applications 15.04 relase.

  • Distributions
    • New Releases
      • 4MLinux 11.0 Allinone Edition FINAL released.

        The status of the 4MLinux 11.0 series has been changed to STABLE. Major changes in the core of the system, which now includes GNU C Library 2.20 and GNU Compiler Collection 4.9.2. The development of some of the 4MLinux editions has been dropped, but at the same time new 4MLinux spins have been announced. The most important one is 4MRescueKit, which has started its journey to become a lightweight alternative to other system rescue live CDs (there’s a detailed description on the 4MLinux Blog).

      • [IPCop Release]

        The latest stable IPCop version is 2.1.8, released on 2015-01-25.

      • IPFire 2.15 – Core Update 86 released

        This is the official release announcement of IPFire 2.15 – Core Update 86 which brings various security fixes across several packages. Hence we recommend installing this update as soon as possible and to execute a reboot afterwards.

      • Netrunner 14.1 OS Features a Different and Cool KDE Experience – Gallery

        Netrunner 14.1, a GNU/Linux distribution based on Kubuntu, featuring KDE as the default desktop environment, is now available for download and it comes with a number of important improvements.

    • Screenshots
    • Debian Family
  • Devices/Embedded
    • Phones
      • Tizen
        • Tizen Samsung Z1, made in India and soon to be available in Bangladesh

          As we have reported Samsung has been sending the parts for its Samsung Z1 SM-Z130H/DS to be assembled at its Noida plant in India, which has the capacity to produce over 4 million handsets per month. The Samsung Z1 was launched in India as the first Tizen based commercial handset at a competitive price of 5,700 INR.

      • Android
        • Signs of progress: One month with Android Wear 5.0

          We take a look at how Android Wear works, and even manage to break some stuff.
          Android Wear 5.0 came out last month—it was the third noteworthy update to the wearable OS, following versions 4.4W.1 and 4.4W.2. It’s not a significant enough update to merit its own standalone review, but it’s been a while since our last check-in with the platform. Plus, the launch of the Apple Watch is just a few months away at most.

        • Which Android device works with Now TV?

          If you want to explore the world of TV streaming you may be better off spending a little more on a budget Android tablet with an HDMI output, says Rick Maybury

        • Android 5.0.2 Lollipop to roll out for Samsung Galaxy Note 4
        • Cyanogen Wants to Wrestle Android Away From Google

          Cyanogen, the company behind the popular open source operating system and the OS of choice for last year’s OnePlus One, wants to be even more independent from the Google-based software that lies at its foundation. According to Cyanogen’s CEO, Kirt McMaster “We’re attempting to take Android away from Google.”

Free Software/Open Source
  • Your simple guide to Open Source technology

    What does this mean in practice? First and foremost, it means that unlike traditional software development that is done behind closed doors and with the windows barred and by a small team, Open Source software development by its nature has many eye balls on it all of the time. Anyone can submit bug fixes or improvements and this generally translates into fixes and improvements happening at a much faster rate. Security vulnerabilities and exploits are usually fixed quickly too, which is good for everyone.

  • LZHAM 1.0 Lossless Data Compression Codec Released

    Version 1.0 of LZHAM has been released, the lossless data compression codec spearheaded by Rich Geldreich, the former Valve developer involved in their Linux and OpenGL activities.

  • Web Browsers
    • Chrome
      • Linux Users Upset By Chromium’s Busted HiDPI Support

        While Chromium is usually quick to advance technology-wise and the Chrome/Chromium developers tend to be caring toward Linux, the support for HiDPI displays with the web-browser on Linux appears to be in bad shape.

  • Oracle/Java/LibreOffice
  • BSD
  • Project Releases
    • Rcpp 0.11.4

      A new release 0.11.4 of Rcpp is now on the CRAN network for GNU R, and an updated Debian package will be uploaded in due course.

      Rcpp has become the most popular way of enhancing GNU R with C++ code. As of today, 323 packages on CRAN depend on Rcpp for making analyses go faster and further; BioConductor adds another 41 packages, and casual searches on GitHub suggests dozens mores.

  • Openness/Sharing
    • Open Hardware
      • Build Your Own Open-Source SmartWatch

        If you’re not up for spending your money on one of the less advanced smart watch models, you may want to check out maker Jonathan Cook’s DIY Open-Source SmartWatch, part of which is 3D printed, something the prognosticators of future tech surely didn’t forecast. Cook shared instructions for making his SmartWatch on the webzine “Make:” and also on his own website, DoNothingBox. You can download the STL files on the DNB site, too. For around $125 or less you can make your own smart phone and you can customize it, something that you wouldn’t be able to do with a store-bought version.

Leftovers
  • Health/Nutrition
    • Harper’s Planned Military Splurge Comes At The Expense Of Health Care

      Ottawa’s deficit is soon to be turned into a surplus, which could be used for a number of important purposes. For instance, some such purpose is to help bring tax relief or to help make their unaffordable health care more affordable. However, Canada’s Prime Minister, Stephen Harper, has decided that instead of spending the surplus money on health care, this extra money will be used for military purposes. Even though Canadians would prefer that this additional money be funded towards their health care. This plan that Harper has laid out was not announced until he secured his majority to be elected as Prime Minister again. The plan will cut in half Canada’s rate of growth of federal health transfers to the provinces at an estimated amount of thirty-six billion dollars in over ten years. Thus, it will make Canadians pay more for their health care, when health care could instead be made affordable for all people regardless of their income status. This is true notwithstanding that the Canadian health care system is the second most expensive in the world. Considering all this, chances are that not every Canadian knows or even heard about Prime Minister Harper’s plan due to other irrelevant subjects clogging the media pipeline such as the new iPhone or another future royal baby.

  • Security
    • OpenSSL 1.0.2 Released

      OpenSSL 1.0.2 features Suite B support for TLS 1.2 / DTLS 1.2, support for DTLS 1.2, TLS automatic EC curve selection, TLS Brainpool support, ALPN support, CMS support for more ciphers, and a number of other changes.

    • OpenSSL 1.0.2 Branch Release notes

      The major changes and known issues for the 1.0.2 branch of the OpenSSL toolkit are summarised below. The contents reflect the current state of the NEWS file inside the git repository.

  • Defence/Police/Secrecy/Aggression
    • After Long Legal Fight, Inquest Is Set to Begin in Death of Putin Critic

      It has consumed more than eight years of maneuvering, obstruction and a widow’s dogged legal campaign, fought often on a shoestring. But finally, on Tuesday, a public inquiry is set to begin its quest for an answer to the question that has driven the whole process: Why did Alexander V. Litvinenko have to die?

    • Germany halts arms exports to Saudi Arabia

      Germany has decided to stop arms exports to Saudi Arabia because of “instability in the region,” German daily Bild reported on Sunday.

      Weapons orders from Saudi Arabia have either been “rejected, pure and simple,” or deferred for further consideration, the newspaper said, adding that the information has not been officially confirmed.

  • Transparency Reporting
    • Cyber questions for Obama’s AG nominee [attack on truth itself]

      Edward Snowden and perhaps co-conspirators in the conversion of 1.7 million classified government files for his use and that of his associates, or the media internationally, are also beyond the reach of the criminal law. Snowden remains in Russia and other infamous media figures associated with him, scattered around the globe. Wikileaks and Julian Assange have remained a menace to the United States over unauthorized disclosure of classified information also beyond the realm of a criminal prosecution. Ditto North Korea’s involvement with the Sony hacking incident.

      Worse is the chain of custody and control of stolen government property which is at best uncertain in the international cyber world. Last summer, FISA Court Judge Reggie Walton ruled that the NSA can’t keep metadata more than 5 years. However, no such injunction exists for Snowden, Assange, North Korea, the PLA, and the media in possession of stolen government information.

    • Google hands data to US Government in WikiLeaks espionage case

      Today, WikiLeaks’ lawyers have written to Google and the US Department of Justice concerning a serious violation of the privacy and journalistic rights of WikiLeaks’ staff. Investigations editor Sarah Harrison, Section Editor Joseph Farrell and senior journalist and spokesperson Kristinn Hrafnsson have received notice that Google had handed over all their emails and metadata to the United States government on the back of alleged ‘conspiracy’ and ‘espionage’ warrants carrying up to 45 years in prison.

    • Google provided Wikileaks journalists’ metadata in Julian Assange investigation

      Google secretly gave the emails of WikiLeaks journalists to the US government in response to an espionage investigation targeting Julian Assange, according to documents disclosed by the internet giant.

    • WikiLeaks demands answers after Google hands staff emails to US government

      Google took almost three years to disclose to the open information group WikiLeaks that it had handed over emails and other digital data belonging to three of its staffers to the US government, under a secret search warrant issued by a federal judge.

      WikiLeaks has written to Google’s executive chairman, Eric Schmidt, to protest that the search giant only revealed the warrants last month, having been served them in March 2012. In the letter, WikiLeaks says it is “astonished and disturbed” that Google waited more than two and a half years to notify its subscribers, potentially depriving them of their ability to protect their rights to “privacy, association and freedom from illegal searches”.

  • Environment/Energy/Wildlife
  • Finance
    • ‘It’s like a ghost town’: lights go out as foreign owners desert London homes

      Racine had everything a west London restaurant could ask for: beaming reviews, great cooking and an enviable location opposite the V&A on the Brompton Road. For 12 years it served immaculate French standards to discerning diners and from the outside it looked like an institution to last a century.

      But two weeks ago owner Henry Harris announced that Racine had moutarded its last lapin and would close. Qu’est-ce qui s’est passé?

      “It was inevitable. The site had become unsustainable,” says Harris. “A rent renewal was the catalyst, but the main cause was the shrinking residential population in what should be a saturated area. My original clients, who were 50 or 60 when we opened, were that bit older. Some of them couldn’t afford to eat out as often after the recession, but others saw what their houses were worth and decided to realise that asset. They were replaced by non-doms who didn’t live there. In some apartment blocks 20% were unoccupied – one in five of my potential client base. It makes a big difference. In the block behind the restaurant it even became easier to park. You never expect to hear that in Knightsbridge.”

    • London needs homes, not towers of ‘safe-deposit boxes’

      London is gloriously un-plannable and horribly unplanned. From the Romans to the Romanians, the immigrant tribes who now call themselves English have been drawn to our uniquely cosmopolitan capital. This heterogeneous cultural mixture may help to explain the lack of appetite for plan-led “improvements” or urban reshaping. There is no common cultural foundation upon which to create a formal grand plan.

      On my bedroom wall hangs an artist’s perspective of the plan Wren touted for the City after the Great Fire of 1666, fleshed out with buildings of classical design, looking like a beaux arts continental city. It is the first thing I see when I wake every morning andprovides a constant reminder of the dangers of “master-planning”. If Wren, or any other planner, had had their way London would have ended up like Paris, Bath or Milton Keynes – architecturally inspired, but difficult to adapt to changing and unforeseeable future needs. Paris is formally planned, lacking in cultural diversity and inward-looking – no one can become a Parisian. London is unplanned, culturally diverse and a world business centre – anyone can become a Londoner.

    • Syriza stood up to the money men – the UK left must do the same

      ‘When you study the successful experiences of transformative movements,” said Pablo Iglesias of Podemos, the new party of the Spanish left, “you realise that the key to success is to achieve a connection between the reality you have diagnosed and what the majority actually feels.”

  • PR/AstroTurf/Lobbying
    • When Calculus of Loss Doesn’t Add Up

      IF you start from the premise that every human life is of equal importance, then the judgments of news organizations will often be confounding.

      Because when it comes to coverage, some violent deaths — to misquote Orwell — are more equal than others.

      Such was the case earlier this month, when the Western news media, including The Times, was fixated on the attacks that left 17 victims and three gunmen dead in Paris. Coverage was wall to wall: In The Times, not a day went by, for 10 consecutive days, without at least one front-page story, usually two.

      Meanwhile, in a much more remote part of the world, the radical group Boko Haram had devastated the town of Baga in rural Nigeria. Early reports said that as many as 2,000 had been slain.

    • Ex-spies infiltrate Hollywood as espionage TV shows and movies multiply

      The place in Brooklyn looks like a CIA safehouse. Red brick office building with peeling metal awning. No sign. Inside, writers are plotting out the popular Cold War espionage show “The Americans” — one of an assortment of Hollywood spy and national security dramas being driven by ex-spies.

      The show’s creator and co-head writer, Joe Weisberg, is a former CIA officer who never fathomed that he would one day sit in an office with Soviet propaganda posters and a cutout figure of President Ronald Reagan, concocting television fiction.

    • Major Media Outlets Fail To Accurately Tell the Entire Story

      Brittany Maynard, a 29-year-old woman who was terminally ill decided to terminate her life on November 1, 2014. Maynard was diagnosed with brain cancer on January 1, 2014 and was told she still had some years left to live. When Maynard started getting more headaches that kept getting more severe over time, she went to get another check up and found out she had Glioblastoma multi forma which is the most severe type of brain cancer and only gave her about six months to live.

  • Censorship
    • Charlie Hebdo Chief on Censorship of Controversial Cartoons: ‘They Blur Our Democracy’

      Appearing on “Meet the Press” Sunday, Charlie Hebdo Editor-in-Chief Gerard Briard claimed media who censor his satirical magazine’s cartoons are part of the problem.

      “This cartoon is not just a little figure. It’s a symbol. It’s the symbol of freedom of speech, of freedom of religion, of democracy and secularism,” he told Chuck Todd. “When they refuse to publish this cartoon, when they blur it out, when they decline to publish it, they blur out democracy, secularism, freedom of religion and they insult the [citizenry].”

    • Military censorship is serving Likud

      UN observers on Sunday noticed two drones crossing the border from Israel into Syria, and shortly afterward saw columns of smoke rising from the Syrian side of the Golan Heights. It turned out those drones had attacked a convoy, killing Hezbollah commanders and fighters and a general from Iran’s Revolutionary Guard.

      Israel took responsibility via messages conveyed by semiofficial sources — government mouthpiece Israel Hayom, which praised the “precise and surprising action by our forces,” and a half-apology by a “security source” for the killing of the Iranian officer, delivered to a foreign media outlet.

    • Sky to censor customers’ broadband by default

      Sky will censor the internet connections of its 5.3 million broadband customers, unless they specifically choose to switch off the company’s Broadband Shield. The company, like all of Britain’s major broadband providers, has been offering the network-level content filters as an optional extra to customers since last year.

    • Sky Is The Limit For Pornography

      Internet provider TalkTalk is to block pornographic sites, leaving BT and Virgin as the only major internet service providers not to have filters for adult material turned on by default. UK Internet giant blocks porn by default to protect children, but IT security firms warn the move could create a new set of problems…

    • Freedom of speech campaigners claim automatic porn blocking ‘censorship by default’

      Freedom of speech campaigners and independent internet firms have issued a stark warning that the automatic blocking of pornographic websites is “censorship by default” and constitutes a “blunt tool” for dealing with inappropriate content.

      On Tuesday it was revealed that Sky had become the first major internet service provider (ISP) to start automatically blocking pornographic websites by default.

      The move, which has been condemned as a danger to freedom of expression by campaigners, was prompted by pressure from Prime Minister David Cameron for ISPs to make online filtering mandatory, saying that it was the best way to protect children online.

      According to Sky its customers will see a message reminding them to make a choice about filtering when they visit a page deemed unsuitable for children under the age of 13. At this point they can choice to accept the current setting or turn the filter off to visit the page.

    • Censorship is more dangerous than offence

      Twelve people were shot allegedly because of a picture of Mohammed. Much of the horror and outrage that we have since seen in the media comes from the horrific nature of the shooting. Yet much can also be attributed to the idea that just because people disagree with you, they can silence you – that just because you have spoken freely and offended somebody, your voice can be taken away. Vast crowds have come together – including more than a million in Paris, to condemn this assault on one of the most hard-won and treasured values in our society.

    • Self-censorship is biggest threat to free speech in Japan
    • Instagram Admits Pube Censorship Was a Mistake; Women’s Bodies Continue to Confound Them
    • Instagram pubic hair ‘censorship’ ignites sexism row
    • China blocks VPN services that skirt online censorship amid wider crackdown
    • China blocks VPN services that skirt online censorship
    • Guantanamo’s Detainee Library Won’t Carry a Guantanamo Detainee’s Acclaimed New Book

      A Guantanamo detainee who just published a critically acclaimed book about his life in captivity won’t get the opportunity to see his own book. Nor will 121 of the detainee’s fellow inmates.

      Guantanamo spokesman Captain Tom Gresback told VICE News that “at this time” the detainee library has no intention of purchasing Mohamedou Ould Slahi’s memoir Guantanamo Diary, which cracked Amazon’s top 100.

    • Air Force Maj. Gen. Attempts to Prevent Officers from Communicating with Congress

      Some in Congress are calling for an investigation into an Air Force major general who reportedly attempted to prevent officers from communicating with Congress and told them they are committing treason by doing so, according to the Air Force Times.

    • Censorship at the highest ranks of the U.S. military and the growing divide between the military and civilians
    • Inspector general rips TSA over redaction of JFK airport audit

      The Transportation Security Administration abused its authority to classify information as too sensitive for release when it blocked sections of a recent audit report from being published, according to the agency’s independent watchdog.

      Department of Homeland Security Inspector General John Roth protested TSA’s actions on Friday, saying in a statement that he suspects that agency officials wanted to “conceal negative information.”

    • V&A in row over self-censorship after Muhammad image is taken down

      The Victoria and Albert museum has attempted to conceal its ownership of a devotional image of the prophet Muhammad, citing security concerns, in what is part of a wider pattern of apparent self-censorship by British institutions that scholars fear could undermine public understanding of Islamic art and the diversity of Muslim traditions.

    • V&A removes depiction of Prophet Mohamed from website amid ‘severe security alert’

      The Victoria & Albert museum has removed a depiction of the Prophet Mohamed from its website amid security concerns just three weeks after the Charlie Hebdo attacks.

      The gallery mistakenly claimed not to have had any depictions of the prophet in its collection following the violence by extremists in Paris earlier this month.

      But after a US expert drew attention to a poster with an Iranian artist’s view of the prophet in the V&A’s collection it was quickly removed.

  • Privacy
    • Even When Sharing Top Billing with Edward Snowden, the NSA Is Unrepentant

      The only testy moment came during the question period, when a student forced the issue with DeLong and asked him whether he thought the public debate triggered by Edward Snowden’s whistleblowing had social merit. As DeLong responded, “With regard to Snowden, all I will say is that we need to let the wheels of justice turn in his case.”

    • Who Can Control N.S.A. Surveillance?

      Since Edward Snowden revealed the extent of the N.S.A.’s activities in the summer of 2013, there have been a number of official reports on the troubled relationship between surveillance and privacy—one from the President’s Review Group, two from the Privacy and Civil Liberties Oversight Board, and another, last week, from the National Academy of Sciences. In August, 2013, the Office of the Director of National Intelligence started a Tumblr, on which they’ve posted many interesting and useful documents, including redacted orders from the secret Foreign Intelligence Surveillance Court (FISA).

    • NIST pledges transparency in NSA dealings over crypto standards
    • Kim Dotcom’s NSA-Dodging MegaChat is HERE And It Wants To DESTROY Skype

      Kim Dotcom is BACK and he’s got a new Skype-killing tool for the masses. Ladies and gentlemen, meet Mega Chat

    • ‘Anti-NSA’ messaging service MegaChat debuts in beta version

      Registered Mega users can try the platform for free at mega.

    • Shut it Down: Utah Bill Would Turn Off Water to NSA Data Center

      A bill filed in the Utah state house yesterday would deny critical resources – like water – to the massive NSA data center there should it pass.

    • Indiana Action Alert: Help Stop NSA Spying, Support SB458
    • Utah Bill Would Turn Off Water to NSA Data Center

      House Bill 150 (HB150), introduced by Rep. Marc Roberts, would require that the water being supplied to the NSA’s data center in Bluffdale be shut off as soon as the city’s $3 million bond is paid off.

    • Netherlands not the NSA’s lapdog: Interior Minister

      The Dutch intelligence services AIVD and MIVD are not the whipping boys of the American intelligence community, in particular the NSA, states the Dutch Minister of Interior, Ronald Plasterk. The statement is a response to an accusation made by former NSA employee and US whistleblower Edward Snowden, who said Dutch intelligence services walk on an American leash and are “extremely docile.”

    • China to look at Apple products, fears NSA tampering

      China is concerned about the potential for NSA backdoors in Apple devices. To address that possibility, the Chinese government plans to scan products when they are imported. Apple has agreed to let China look at a device’s security, as Apple CEO Tim Cook has reportedly been more than willing to accommodate the Chinese government.

    • China will screen all Apple products for NSA backdoor

      Apple has agreed to accept the Chinese government’s demands to run network safety evaluations on all Apple products before they can be imported into the country.

    • The Many Problems with the DEA’s Bulk Phone Records Collection Program

      Think mass surveillance is just the wheelhouse of agencies like the NSA? Think again. One of the biggest concerns to come from the revelations about the NSA’s bulk collection of the phone records of millions of innocent Americans was that law enforcement agencies might be doing the same thing. It turns out this concern was valid, as last week the government let slip for the first time that the Drug Enforcement Agency (DEA) had also been collecting the phone records of Americans in bulk since the 1990s.

    • Gormley: Nothing to fear but all those fearful things

      More terrifying than hackers, and only slightly less terrifying than terrorists, are investigative journalists.

    • Congressman Submits Bill To Prevent Police and Spy Agency From Tracking Americans Via Phone Locations

      The location function on smartphones is surprisingly strong. Having the ability to track an individual’s location via a pocket-sized is a tempting tool for police and other agencies, but a new bill from Congress could change that.

    • DOJ Pays $134,000 To Settle Case Of DEA Agents Impersonating A Woman On Facebook

      Back in the fall, we wrote about how the DEA impersonated a woman on Facebook, even posting photographs of her young children (which they had taken off of her phone), in order to try to track down drug dealers. The woman, Sondra Arquiett, had dated a guy who was convicted of drug dealing, and had herself been charged with letting her boyfriend store some drugs in her apartment, leading to a sentence of probation. DEA agent Timothy Sinnegen then took the photos off of her phone, set up a fake Facebook page pretending to be Arquiett and tried to “friend” people she knew, in trying to track down other drug dealers. Arquiett was totally unaware of this until a friend brought it up, leading her to sue the DEA.

    • How the CIA made Google

      Inside the secret network behind mass surveillance, endless war, and Skynet

    • Former Head of GCHQ Warns Of ‘Ethically Worse’ Kinds Of Spying If Unbreakable Encryption Is Allowed

      That’s remarkable for its implied threat: if you don’t let us ban or backdoor strong encryption, we’re going to start breaking into your homes. And it’s striking that Omand regards eavesdropping on all the Internet traffic flowing in to and out of the UK, or collecting thousands of sexually-explicit webcam pictures, as less reprehensible than a tightly-targeted operation against a few suspects. His framing also implies that he thinks those pesky civil liberties groups will protest more about the latter than the former. In fact, what defenders of privacy and liberty generally want is simply a proportionate response with judicial oversight — something that is straightforward with targeted “close access” work, but impossible with the blanket surveillance currently employed.

    • ​Web encryption leads to ‘unethical’ spy practices – ex-GCHQ chief

      The increased use of encryption technologies, particularly in everyday services such as email, will lead spy agencies to commit “ethically worse” behavior, such as hacking individual computers, a former GCHQ boss has warned.

      Speaking at the London School of Economics (LSE), Sir David Omand said increasingly secure encryption technologies, which currently allow users to message and email in private, mean agencies are unable to intercept mail, and could be forced into more direct spying methods, report the Bureau of Investigative Journalism.

    • UK government sneaks surveillance laws inside Counter Terrorism bill

      The UK government has been trying to impose new surveillance laws on the internet at large, but for the past four years privacy activists have thwarted attempts by Labour and the Conservatives.

      In a recent push, the government secretly added 18-pages to the Counter-Terrorism and Security Bill (CTSB), including a mirror image of the Communications Data Bill, rejected in 2012 for the potential of national surveillance on every person.

    • GOP faces Patriot Act choice

      Critics of the spy agency were quick to question Boehner’s take on the Capitol plot.

  • Civil Rights
    • The Jindal-Hate Group Relationship You Won’t Hear About This Weekend

      Louisiana Governor and GOP presidential hopeful Bobby Jindal is the keynote speaker for a rally funded and organized by an anti-LGBT group that has blamed gay people for causing the Holocaust and advocated imprisoning homosexuals. So why isn’t his appearance garnering national media attention?

    • Standing Up for Secularism

      In Saudi Arabia this week, doctors advised that the next phase of the punishment of liberal blogger Raif Badawi be postponed until he has healed from the first. Badawi has been sentenced to ten years in prison, and 1,000 lashes, for openly advocating secularism on his blog “Free Saudi Liberals.” Badawi has received only 50 of those lashes so far, and it has already put his life in danger.

    • High court protects federal whistleblowers in case that had broad implications

      Winning a Supreme Court case can be like winning a championship football game without cheating.

      It’s exciting and thrilling, but Robert MacLean said he isn’t planning on visiting Disneyland anytime soon.

    • Supreme Court Rules in Favor of Federal Air Marshal Whistleblower & Upholds Whistleblower Law

      “Federal air marshal whistleblower Robert MacLean’s 7-2 victory means that, after defending his rights for more than eight years, he will have a chance to achieve justice. The only issue left is whether MacLean was reasonable to believe that the government’s decision to remove air marshals from targeted flights endangered the public, since the Department of Homeland Security had planned to go AWOL in the face of a more ambitious rerun of 9/11.”

    • Supreme Court: Feds can’t fire whistleblowers for preserving public safety

      In the 7-2 decision in DHS v. MacLean, the court ruled that Robert MacLean, a former federal air marshal, shouldn’t have been fired from the Department of Homeland Security for revealing that marshals were being pulled from flights in 2003. Due to budget concerns, for nearly two months the law enforcement agents were kept off flights deemed high-risk targets for terrorist attacks.

    • Justices Rule Dismissal of Air Marshal Unlawful

      The Supreme Court ruled on Wednesday in favor of a fired air marshal, saying he was covered by a federal law protecting whistle-blowers.

      Chief Justice John G. Roberts Jr., writing for the majority in the 7-to-2 decision, said that the ruling might create security problems by entrusting the confidentiality of sensitive security information to “the idiosyncratic judgment” of each of the Transportation Security Administration’s employees, but that Congress could address the issue by amending the law. The president could also prohibit disclosure of the information by executive order.

    • High court sides with whistle-blowing ex-air marshal

      Robert MacLean was an air marshal on commercial flights whose job was to protect passengers and crew from terrorism. When the government reduced overnight flights to save money, MacLean took his objection to supervisors who took no action. So he leaked the information to the media out of concern for passenger safety.

    • In Victory for Gov’t Whistleblowers, Supreme Court Sides with Fired TSA Air Marshal Who Spoke Out
    • BBG’s Andrew Lack ‘should be fired from his job’ – WikiLeaks spokesperson

      Comparing RT to a terrorist organization is “absurd” and “shameful” for a person in a position like BBG’s Andrew Lack, WikiLeaks spokesperson Kristinn Hrafnsson told RT, adding that its “understandable” given how WikiLeaks was treated.

      Hrafnsson was refereeing to comments made earlier this week by the CEO of the Broadcasting Board of Governors, Andy Lack.

    • Introducing Mrs. Merlin: To Prosecute Jeffrey Sterling, CIA Exposed an Asset

      The government engaged in a great deal of security theater during the Jeffrey Sterling trial, most notably by having some CIA witnesses — including ones whose identities weren’t, technically, secret — testify behind a big office divider so the general public couldn’t see the witness.

      But along the way, the government revealed a great number of secrets, including a number of secrets about how its counterproliferation programs work.

      Perhaps most ironically, in a trial aiming to convict Jeffrey Sterling for revealing that the Russian scientist referred to as Merlin during the trial was a CIA asset, the government revealed that Merlin’s wife was also an asset.

    • David Hicks: US government agrees former Guantanamo Bay detainee is innocent, lawyer says

      The United States has agreed that former Guantanamo Bay detainee, Australian David Hicks, is innocent, his lawyer has said.

      Mr Hicks pleaded guilty in 2007 to providing “material support for terrorism” but his legal team claimed that he did so under duress and filed an appeal last year.

      Mr Hicks’s lawyer was confident his name was set to be cleared after the change of position by the US government.

    • Kippa-wearing Swedish reporter assaulted in Malmo

      A Swedish reporter who walked around Malmo while wearing a kippa to test attitudes toward Jews was hit and cursed at by passersby before he fled for fear of serious violence.

    • New Utah Law Instructs Cops To Seize Uninsured Vehicles

      Does the government really even need excuses to seize the assets of its citizens, especially for relatively minor crimes? Apparently it does, at least according to the state of Utah.

  • Intellectual Monopolies
    • Copyrights
      • Why We Still Can’t Really Put Anything In The Public Domain… And Why That Needs To Change

        More than five years ago, we wrote about just how difficult it was to actually put something into the public domain legally. For years, we’ve said that all of our Techdirt posts (where we have the right to do so) are subject to a public domain dedication, but there’s nothing specifically in the law that says how or if you can really put something into the public domain. While you can make a public domain dedication or (more recently) use the Creative Commons CC0 tool to do so, there’s no clear way within the law to actually declare something in the public domain. Instead, the public domain declarations are really more of a promise not to make use of the exclusionary rights provided under copyright.

      • Zombie Pirate Bay Tracker Fuels Chinese DDoS Attacks

        On November 2009 The Pirate Bay announced that it would shut down its tracker for good.

        Trackers were outdated according to the site’s owners. Instead, they encouraged BitTorrent users to rely on DHT, PEX and other trackerless technologies.

        Despite the fact that the tracker is no longer functional, many old and some new torrents still include the tracker.thepiratebay.org announce address.

        While the tracker hasn’t responded to these calls for five years, for some server admins it has now risen from the dead.

Categorías: Free Culture [en]

SpaceX, US Air Force Settle Spy Sat Dispute

Slashdot YourRightsOnline - Dom, 25/01/2015 - 18:47
hypnosec writes The US Air Force and private space flight company SpaceX have settled their dispute involving the military's expendable rocket program, thereby paving the way for SpaceX to join the spy satellite launch program known as Evolved Expendable Launch Vehicle (EELV). The settlement opens doors for SpaceX to compete with United Launch Alliance (ULA) for launch of spy satellites. ULA is a joint Boeing-Lockheed venture – the only private player to have received clearance for launching black ops satellites.

Read more of this story at Slashdot.








Categorías: Free Culture [en]

Protegido: Caso Pujol – Un combate amañado Primer round

La EX - Dom, 25/01/2015 - 17:06

Este contenido está protegido por contraseña. Para verlo introduce tu contraseña a continuación:

Contraseña:

Categorías: Cultura libre [es]

Lo mejor de la semana en TICbeat (19 a 25 de enero de 2015)

ReadWriteWeb España - Dom, 25/01/2015 - 17:00

La presentación de Windows 10 y su propuesta para experimentar la realidad virtual (Hololens), la llegada de Whatsapp al escritorio, la multimillonaria inyección de Google en SpaceX y la entrada en la producción de cine por Amazon han sido algunas de las novedades más destacadas en esta semana del 19 al 25 de enero de 2015.

 

Windows 10, el sistema llamado a unificar PC, ‘smartphones’ y tabletas

Microsoft tenía ante sí una tarea de por sí complicada pero a la vez ilusionante: mostrar un nuevo sistema operativo –Windows 10– capaz de hacer olvidar por completo al fallido Windows 8 y que consiguiera devolver a los de Redmond los buenos resultados de ventas y crítica que lograron con versiones como Windows 7 o Windows XP. Para ello, los de Satya Nadella establecieron una hoja de ruta muy ambiciosa: crear un OS absolutamente interoperable en los distintos dispositivos que se usan hoy en día (tabletas, smartphones y PC) y con un diseño que aunara usabilidad con los aspectos visuales por los que se apostó en Windows 8. Y he aquí Windows 10, la gran apuesta de Microsoft con la que abordará el mercado a lo largo de 2015 y que ha sido presentado en Redmond esta semana. Leer más

 

Todo lo que necesitas saber sobre WhatsApp Web

Se terminó la espera. La versión web de WhatsApp que muchos anhelaban y se venía rumoreando desde hacía tiempo, especialmente en el último par de meses, ya es una realidad. Veámos cómo funciona, qué permite hacer y cuáles son sus carencias (que las hay, y más de las que nos esperábamos). Leer más

 

SpaceX, valorada en 12.000 millones de dólares tras la inyección de Google

Después de muchos rumores finalmente se confirmó la inyección de mil millones de dólares procedentes de Google y Fidelity en SpaceX, que ya ocupa el cuarto puesto de la clasificación que el diario estadounidense Wall Street Journal elabora de empresas valoradas en más de mil millones de dólares. En concreto, con una valoración de 12.000 millones, una cifra que, de acuerdo con el rotativo sitúa a la compañía, dedicada a la exploración espacial, por delante de startups tan populares como Dropbox, Snapchat y Airbnb. Xiaomi, Uber y Palantir todavía la adelantan. Leer más

 

2014, el año del consumo de vídeo multidispositivo en España

El vuelco que la sociedad española ha dado en su nivel de adopción de las tecnologías de la información y, en concreto, de conectividad a Internet ha sido puesto de manifiesto una vez más en el estudio anual que edita Telefónica, y que recoge datos de otros informes, llamado “La Sociedad de la Información en España”. En el informe, que cumple su XV edición, se describe a una sociedad, la española, que es “la más ‘conectada’ de Europa” pues 8 de cada 10 móviles son smartphones y el 78% de los internautas son usuarios intensivos de la Red. Leer más

 

Facebook permitirá denunciar bulos, timos y falsas noticias

Las redes sociales pueden ejercer en ocasiones de explosiva vía de contagio y propagación de fraudes, bulos y noticias falsas. Algunas plataformas buscan remedios para ello; la última ha sido Facebook, que ha anunciado que de aquí en adelante permitirá a los usuarios que etiqueten publicaciones como falsas. Leer más

 

Tendencias de inversión en ‘startups’ tecnológicas en España este 2015

¿Cómo evolucionará en España el mundo del capital riesgo ligado al ámbito tecnológico y a la economía digital este año 2015 que acaba de arrancar? ¿Qué tendencias veremos? Inversores y expertos destacados del ecosistema emprendedor nacional aportan luz al respecto. Leer más

 

El Internet de las cosas se convertirá en uno de los riesgos de 2015, según los expertos

El conflicto interestatal, los fenómenos meteorológicos extremos y la política deficiente de los gobiernos encabezan la lista de los diez riesgos pronosticados por los autores del informe del Foro Económico Mundial para este año. Mantenidos en la lista desde la edición pasada, las no tan afortunadas predicciones en materia de medio ambiente y economía hacen sitio a nuevos aspirantes al título de principales peligros a nivel global y los dos están relacionados con el desarrollo de las tecnologías emergentes: el fraude de datos electrónicos y los ciberataques. Leer más

 

  BBVA pone la mira en bitcoin e invierte en Coinbase

Las entidades financieras empiezan a ver que sí, que el auge de la criptomoneda bitcoin va en serio o, al menos, no quieren quedarse fuera del incipiente mercado que se está creando en torno a la nueva divisa digital. Muestra de ello es la reciente inversión realizada por BBVA Ventures, el brazo de capital riesgo de BBVA, en la startup Coinbase, fundada hace dos años en San Francisco y cuyos promotores han logrado posicionar su solución como el mayor monedero virtual de bitcoins del mundo para los consumidores, además de brindar a los comerciantes una plataforma para que integren el pago en esta criptomoneda de forma segura. Leer más

 

‘123456’ y ‘password’, las peores contraseñas por tercer año consecutivo

Si son las más frecuentes, serán, también, las más fáciles de deducir o de descubrir. Y, por tanto, las menos seguras. A ese silogismo se enfrenta, cada año, la compañía de aplicaciones móviles SplashData, que acaba de volver a publicar su ranking anual de las peores contraseñas para servicios y aplicaciones tecnológicas. Y, en los primeros puestos, las cosas no han cambiado. “123456” sigue siendo la clave más utilizada por los usuarios según los datos de SplashData, y “password”, la segunda en la lista, al igual que en 2013. En 2012 ambas ocupaban también los dos primeros puestos, pero con el orden actual invertido. Leer más

 

Amazon también producirá películas de cine

Amazon, el gigante de Internet, va a por todas en el mundo de la imagen. Su último anuncio: la producción de películas originales para ser proyectadas en cines y, poco tiempo después, en su plataforma de streaming Prime Instant Video. La iniciativa, llamada Amazon Original Movies y liderada por su división Amazon Studios, que ya produce series (una de ellas, Transparent, premiada recientemente en los Globos de Oro) y cómics, comienza este 2015, según revela Roy Price, vicepresidente de esta división de la compañía, que añade que el objetivo será “crear cerca de doce películas al año comenzando la producción a finales de este”. Leer más




Categorías: Cultura libre [es]

Cristalizar lenguajes formales en el espacio físico

Derecho de Internet - Dom, 25/01/2015 - 15:56
AdjuntoTamaño 2015-01-25_cristalizar-lenguajes-formales-en-el-espacio-fisico.pdf96.34 KB

Con ocasión de la exposición Sistema Operativo del artista Daniel García Andújar, que se celebra los días 21 de enero a 4 de mayo de 2015 en el Museo Centro Nacional de Arte Reina Sofía, me invitaron a escribir un artículo en el catálogo de la exposición.

El tema que trato es la generación de mundos a través de lenguajes formales. Dicho artículo pueden descargarlo en el enlace más abajo y comienza así:

Cuando nació la tecnología de la escritura, solidificando fonemas o ideas en grafemas, sus consecuencias políticas fueron imprevisibles. Asimismo, cuando la imprenta, confluencia de la madurez de las tecnologías de la escritura, madera, tinta, papel y metalurgia, comenzó su andadura, tampoco fue posible prever la sucesión de eventos de Reforma, Contrarreforma, Ilustración, Revolución y surgimiento del Estado liberal, nacidos al amparo de estados de opinión provocados por el hecho de realizar y distribuir múltiples copias de un mismo texto.


En la antigüedad la tecnología de la escritura se utilizó como herramienta de pacificación de conflictos entre diferentes clases sociales. La fijación del nomos en un texto escrito se convertía en un instrumento que permitía disminuir la arbitrariedad en la aplicación de la ley. Bien fuera la escritura un fármaco de la memoria, bien un simple recordatorio, poner la ley por escrito le daba una fijeza de la que la norma oral carece. Con la exposición pública de este texto se practicaba una techné que intentaba evitar la aplicación del derecho del más fuerte. Siglos después, la solidificación de la ley expuesta públicamente se convirtió en eje estructural del Estado de Derecho ya que es la garantía de la seguridad jurídica. No cabe la existencia de normas secretas y el nacimiento de los boletines oficiales donde se publican las leyes no fue una casualidad jurídica, sino que responde a una honda exigencia política sobre la que se asientan los derechos fundamentales. Por otra parte, la difusión que se realiza mediante la imprenta de las ideas de la Reforma protestante tiene como consecuencia la aparición de la libertad de conciencia que, una vez secularizada, opera como libertad de expresión desde donde comienzan a forjarse los demás derechos humanos.


En lo político, la tecnología de la escritura no se limitó a la creación de derechos subjetivos de la más alta jerarquía, sino que también operó en la generación de los agentes intervinientes y su institucionalización. Por una parte, los agentes institucionales políticos son definidos por escrito incorporándose su diseño en las partes orgánicas de las constituciones que funcionan como norma suprema de los Estados liberales: el Estado se escribe, constituyendo la escritura la tecnología estructural del Estado liberal. Y, por otra parte, a partir de los siglos XII y XIII comienzan a aparecer asociaciones de mercaderes que derivan en el nacimiento de las sociedades mercantiles modernas, imposibles de concebir sin la tecnología de registro escrito, en este caso, del sistema de partida doble contable. Su importancia política en el mundo actual no puede ponerse en duda, hablándose incluso de soberanías difusas cuyos titulares son las corporaciones.

Puede seguir la lectura del artículo descargando el archivo en el enlace más abajo.

Etiquetas:
Categorías: Cultura libre [es]

Seminario20. Acciones micropolíticas.

Derecho de Internet - Dom, 25/01/2015 - 15:26

Bajo la iniciativa de José Muelas, Decano del Ilustre Colegio de Abogados de Cartagena, celebramos el 20 de noviembre de 2014 en la sede del Consejo General de la Abogacía Española una jornada sobre activismo en redes sociales. Esta fue mi intervención.

Pueden encontrar todas las intervenciones en la página del encuentro.

Etiquetas:
Categorías: Cultura libre [es]

Fark's Drew Curtis Running For Governor of Kentucky

Slashdot YourRightsOnline - Dom, 25/01/2015 - 14:06
New submitter AlCapwn writes [Fark founder] Drew Curtis announced on Friday that he will be running for governor of Kentucky. "We have a theory that we're about to see a huge change in how elections and politics work. Across the country, we have seen regular citizens stepping up and challenging the status quo built by political parties and career politicians. They have been getting closer and closer to victory and, here in Kentucky, we believe we have a chance to win and break the political party stronghold for good."

Read more of this story at Slashdot.








Categorías: Free Culture [en]

Ocho trucos para hacer que tu ordenador o portátil vaya más rápido

ReadWriteWeb España - Dom, 25/01/2015 - 14:00

Que una persona golpee desesperadamente su ordenador o portátil para tratar de que vaya más rápido o no se colapse a las primeras de cambio se ha convertido, desgraciadamente, en una escena demasiado coloquial en muchas oficinas y hogares. Y es que, en cuanto pasan unos cuantos meses de la compra de nuestro equipo, su rendimiento suele comenzar a descender vertiginosamente, una tendencia que se acrecienta de forma exponencial conforme van pasando los años.

Sin embargo, con un correcto mantenimiento de nuestro equipo y siguiendo una serie de sencillos consejos podremos conseguir que nuestro ordenador o portátil mantenga sus buenas prestaciones durante más tiempo. Con los siguientes ocho consejos podrás conseguir que tu dispositivo siga funcionándote rápidamente y sin fallos:

Desinstala programas innecesarios o que ya no utilices

A lo largo de la vida de un ordenador tendemos a acumular cientos de programas, muchos de los cuales sólo hemos necesitado en una o dos ocasiones e incluso otros que ni sabíamos que estaban instalados (bien porque son software basura que se ha ejecutado en paralelo a otro que hayamos descargado, bien porque venía incluido de serie con el PC).

Aunque no estén en ejecución, todos esos programas ralentizan nuestro disco duro y además pueden abrir procesos secundarios que consuman recursos de la memoria RAM sin aportar nada a cambio. Por ello es conveniente revisar qué software tenemos instalado y desintalar todos aquellos que no nos sean útiles. Para hacerlo en Windows tan sólo tendrás que entrar en tu ‘Panel de Control’ y pinchar en ‘Agregar o quitar programas’. Revisa toda la lista y selecciona ‘desinstalar o quitar’ cuando quieras eliminar alguno.

Optimiza el inicio de Windows prohibiendo que se ejecuten tareas secundarias

¿No te has dado cuenta que Windows tarda en cargar mucho más tiempo ahora que cuando compraste tu equipo? Si tenemos en cuenta que el sistema operativo sigue siendo el mismo (salvando la memoria extra que puedan consumir las actualizaciones que haya instaladas), ese tiempo extra que nos desespera es causado por las numerosas tareas que se ejecutan simultáneamente al iniciar nuestro PC.

Así es: muchos programas añaden automáticamente procesos al inicio del sistema operativo para que luego, al acceder a sus servicios, estos se ejecuten más rápidamente. Sin embargo, la proliferación de este tipo de procesos ralentiza (y mucho) el arranque de nuestro ordenador. Por ello, deberemos analizar cuáles de estas tareas necesitamos que arranquen junto a Windows y cuáles no necesitamos. Para poder ver la lista completa de estos procesos podemos hacerlo desde el propio ‘Panel de Control’ de nuestro PC o emplear programas específicos como Soluto o TuneUp, que además nos permitirán saber exactamente cuánta RAM consume cada uno de ellos.

Elimina los archivos temporales de Windows

Imagina una vivienda en la que vives durante más de 30 años. En todo ese tiempo, habrás acumulado cientos de objetos innecesarios que en su momento te hicieron gracia o te eran útiles pero que, si hicieras una limpieza general, los tirarías de inmediato a la basura.

Pues lo mismo sucede en el caso de tu ordenador o portátil: Windows almacena miles de archivos temporales que en algún momento hemos necesitado pero que ya no tienen ninguna función y podemos eliminar sin ningún problema, ahorrando no sólo espacio sino también mucho tiempo que tardaría nuestro equipo en revisar todos esos datos.

La carpeta que guarda estos archivos suele estar localizada en la unidad de disco duro en que tengamos instalado nuestro SO, normalmente a través de la ruta ‘C:/Windows/Temp’. En el caso de que nuestro PC sea usado por más de un usuario, cada uno de ellos tendrá su propia carpeta de datos temporales, accesible a través de ‘C:/Usuarios/’NAME’/AppData/Local/Temp’. Todos ellos pueden ser eliminados sin pestañear ni un segundo.

Si este paso se te atraganta o prefieres contar con un “socio” que te eche una mano en esta tarea, siempre puedes instalar algún programa que te ayude a borrar todos los archivos innecesarios de tu ordenador o portátil, como ‘CCleaner’.

Desactiva opciones visuales que consuman muchos recursos

Desde Windows Vista al recién presentado Windows 10, el aspecto visual de las ventanas y las animaciones que se ejecutan al cambiar de una tarea a otra son espectaculares y se han convertido en una auténtica seña de identidad de las nuevas versiones de este sistema operativo… pero a costa de consumir más recursos de nuestros PC.

En el caso de que nuestro ordenador o portátil vaya más lento que de costumbre, uno de los trucos más eficaces e inmediatos es desactivar todos estos efectos y volver al tema básico de Windows. Tan sólo deberás hacer click con el botón derecho de tu ratón en el ‘Escritorio’, seleccionar ‘Personalizar’ y luego elegir el tema básico. El cambio será inmediato.

Desfragmenta periódicamente el disco duro

Es la clave más ardua pero una de las más necesarias para garantizar el correcto funcionamiento de nuestro disco duro. Y es que desfragmentar nuestro disco nos ayuda a que todos los archivos se ordenen correctamente en la superficie de la unidad, se eliminan datos inconexos y se reduce el tiempo que nuestro equipo necesitar para leer, escribir y acceder a los datos que almacenamos.

Windows trae consigo una herramienta para desfragmentar nuestros discos duros, a la que se puede acceder desde el ‘Menú Inicio/Programas/Accesorios/Herramientas del Sistema/Desfragmentador de Disco’. Asegúrate de cerrar todos los programas antes de ejecutar este servicio, que durará un par de horas, en función de la capacidad de tus unidades.

Apuesta por antivirus más ligeros

No vamos a recomendarte que desinstales tus antivirus pero sí que analices cuántos recursos consumen. Así, las soluciones de seguridad más completas y avanzadas del mercado suelen ser también las que más memoria RAM consumen a través de varios procesos que se ejecutan en segundo plano y que pueden hacer que nuestro ordenador tarde más en abrir cualquier otro programa.

Por eso, conviene plantearse otras alternativas de antivirus y firewalls más ligeros (incluso herramienta en la nube, que no requieren instalación alguna) y que, aunque renunciando a la máxima protección, permitan que nuestro ordenador recupere la viveza de antaño.

Internet: un gran lastre de rendimiento

Hoy en día, no se comprende un ordenador sin un explorador de Internet. Ya sea Internet Explorer, Google Chrome o Mozilla Firefox, tosos los navegadores almacenan archivos temporales de las páginas que hemos visitado, cookies e historial. Todo ello se traduce en datos que ocupan espacio y hacen que nuestro explorador tarde más en abrirse. A su vez, los complementos y extensiones pueden sernos muy útiles, pero también requieren de memoria RAM adicional para poderse cargar.

En la zona de configuración de cada uno de los navegadores con que contemos podremos eliminar todos estos archivos, así como desactivar las extensiones y complementos o configurar cuántos datos queremos que recoja nuestro explorador.

Si nada de lo anterior funciona, cambia la memoria RAM

Llevando a cabo todos los trucos anteriores seguramente habrás conseguido que tu ordenador o portátil vaya un poco más rápido. Pero si, por el contrario, no has experimentado una mejora sustancial, puede que la solución pase por ampliar tu memoria RAM. Es en estas unidades en las que los programas depositan los datos que requieren de un acceso más rápido para ejecutarse. Por ello, cuanta más memoria RAM tengamos en nuestro equipo, mayor velocidad experimentaremos en nuestro día a día.




Categorías: Cultura libre [es]

Why PP-GR is not running for the elections

Pirate Times - Dom, 25/01/2015 - 13:19
Snap elections that are taking place in Greece on Sunday, 25 January 2015, find the Pirate Party out of the election battle. The initiative of the Greek Pirates to form a political “Trojan Horse” had not come to fruition. After a marathon of negotiating efforts with other parties that lasted for months, the expectations for the formation of a grand coalition proved unsuccessful.  We contacted Thanasis Gounaris, Chairman of the Board of the Pirate Party of Greece to explain how we reached at this point.  Pirate Times: What is the reason why PP-GR will not run for the elections?   Thanasis Gounaris: “There is not just one reason but many. As you know the Pirate Party of Greece had started a negotiating effort to create a grand coalition of parties that stay permanently outside Parliament because of the election threshold of 3% .The initiative to form a political “Trojan Horse” finally failed and this is a key reason why we are not running in the elections. Moreover, by focusing all of our resources in the effort to create the “Trojan Horse” we lack the attention of the possibility of our  running autonomously in the elections. Unfortunately our financial situation does not allow us to ensure our participation in elections and one thing that I truly regret is the disappointment to our voters that exceed 50,000 people. Personally I feel that our influence is bigger than 1%. In the end, it was our fault that we, for tactical reasons, allowed the non-disclosure of the whole project from our side. The Pirate Party insisted on a press conference with representatives of all parties and we proposed the idea to visit the President of the State to deliver a protest resolution on the exclusion of small parties from representation in parliament due to 3% hurdle and a call for the immediate introduction of proportional representation in elections. The representatives of other parties insisted the talks remain secret to maintain the unanimity with which the coalition was working, we didn’t veto. There are discussions about the possibility of our participation in the second round of elections, which is very likely to happen, but we still have not done anything except for planning on paper. We will wait for the results of the elections on Sunday and accordingly we will make our moves. We have received some suggestions and we are now working on various scenarios.” Pirate Times:Why did the attempt to create the “Trojan Horse” fail?   Thanasis Gounaris: “From the beginning we knew the risks undertaken by starting discussions with parties from the traditional political landscape “left-center-right” that have their differences. So we suggested to agree in 2-3 principles that have to do with the electoral threshold. But it was not accepted and so we began a marathon of negotiations on joint positions, we had a “manifesto” but it was just before the announcement of elections and in the meantime we had lost valuable time. We remind you that the parties that participated in the initial phase of the “Trojan horse” represented 17% of the votes of the electorate, a very high percentage. We had (26?) meetings and at the end we were only 3-4 (?) Parties without any will to continue. There were many  undermining quarrels and disagreements staged by the central authority, aimed at eliminating the “Trojan horse”, as eventually happened. But we won the recognition by all parties and movements involved, in the way we communicate, work and cooperate. All the parties congratulated the Greeks Pirates for the organization and found the “Trojan Horse” project “genius”.”
  Pirate Times:What would you recommend to PP-GR voters to do in this election? Thanasis Gounaris: “I can only tell you what PP-GR has already declared in a press release. Vote according to your conscience and take part in the voting!”   Part of the press release of PP-GR in which it explained the reasons of non running for the elections (you can find the whole press release in Greek here) : …After seven months, although the Pirate Party of Greece began procedures and discussions with other democratic parties to form an electoral coalition, it did not succeed. We informed our fellow citizens that the Pirate Party of Greece will not participate in these elections mainly for economic reasons. From our side and driven by our principles for more democracy we tried to form a single electoral cooperation with the sole purpose of entering the Parliament, negotiating with other parties that got less than 3%, in a single, simple, non-ideological, cooperation. The talks began in July 2014 and until the last moment we tried to bring this project to fruition. Unfortunately for everyone, the uncooperative attitude prevented us from being able to achieve this goal in its simplest form. We believe that although it was not possible, all those involved in the process, got experience from it. We believe that the next time a similar effort will happen it will demonstrate the political maturity and responsibility to have more democracy and more parties in the parliament, that prohibited by the undemocratic limit of 3%.  For these elections, as for all, we strongly urge everyone to vote according to their conscience and not abstinence. However, our work does not stop here. We believe that just because of the fragile or even the non-existent relations of the political forces in our country, soon the elctions will be followed by a second round (runoff), in which we intend to be present with our positions and proposals. For this purpose we have started a self-financing process and invite all our members and friends to help and make it possible, the autonomous electoral running of the Greek Pirates…” If you want to donate PP-GR you can check the donation page  Featured image: CC BY-SA PPGR

Categorías: Free Culture [en]

Why We Still Can't Really Put Anything In the Public Domain

Slashdot YourRightsOnline - Dom, 25/01/2015 - 13:12
Press2ToContinue writes While you can make a public domain dedication or (more recently) use the Creative Commons CC0 tool to do so, there's no clear way within the law to actually declare something in the public domain. Instead, the public domain declarations are really more of a promise not to make use of the exclusionary rights provided under copyright. On the "public domain day" of Copyright Week, Public Knowledge has pointed out that it's time that it became much easier to put things into the public domain. Specifically, the PK post highlights that thanks to the way copyright termination works, even someone who puts their works into the public domain could pull them back out of the public domain after 35 years.

Read more of this story at Slashdot.








Categorías: Free Culture [en]

La apuesta por la realidad virtual de las compañías tecnológicas

ReadWriteWeb España - Dom, 25/01/2015 - 12:00

La realidad virtual (y la realidad aumentada) constituye uno de los grandes retos tecnológicos de la próxima década, y las grandes compañías tecnológicas ya han empezado a tomar posiciones en este campo.

Facebook: Oculus Rift

Proyecto iniciado por un joven emprendedor llamado Palmer Luckey que tras convertirse en empresa (Oculus VR) y arrasar en su campaña de crowdfunding (recaudando una cantidad 1000 veces mayor que la meta marcada) terminó siendo comprada por Facebook para llevar la tecnología de realidad virtual de los videojuegos a las comunicaciones y la educación. Oculus Rift son unas gafas de realidad virtual, semejantes a un casco, que nos proporcionan un amplio campo de visión, permitiéndonos ver imágenes proyectadas por un display y con baja latencia.

En septiembre de 2014, Oculus VR presentó el prototipo de su nuevo dispositivo de realidad virtual: Crescent Bay.

Sony: Project Morpheus

Project Morpheus es el nombre del prototipo para desarrolladores que Sony presentó hace casi un año, como antesala de un dispositivo de realidad virtual que pretende lanzar al mercado para su uso conjunto con la videoconsola de la compañía, la PlayStation 4 (y los periféricos Dualshock 4 y PlayStation Camera).

El dispositivo presentado en la Game Developers Conference, resultado de 3 años de desarrollo, cuenta con una pantalla de 1080p de resolución, campo de visión superior a 90 grados, acelerómetro, giroscopio y tecnología de audio 3D.

Samsung: VR Gear

El fabricante surcoreano entró en el mercado de la realidad virtual con este dispositivo presentado en la feria IFA 2014 a principios de septiembre de 2014. Difiere de otros gadgets de la competencia en el hecho de usar como pantalla una phablet (la Samsung Note 4) que se insertaría en el frontal del dispositivo y actuaría como batería del mismo.

Aunque más barato que Oculus Rift, la imposibilidad de usarlo con otros terminales diferentes del Note 4, y la carencia casi absoluta de apps y contenidos específicos, no convierten al VR Gear en una compra recomendable.

Google: Google Glass

Las gafas inteligentes de del departamento de I+D de Google (Google X) levantaron pasiones en los primeros meses tras su presentación, sólo para ver cómo el hype se desinflaba cuando quedó claro que no terminaban de despegar. Lo cierto es que Google parece poco preocupada por ello: han recogido un feedback valiosísimo, por lo que ahora toca replegarse al laboratorio y desarrollar la próxima versión.

Ciertamente, las Google Glass se diferencian bastante de los dispositivos anteriores: no ofrecen realidad virtual (que sustituye a la física y nos desconecta de ella) sino realidad aumentada (que se superpone a la física, complementándola y conectándonos más con la misma).

Microsoft: HoloLens

Microsoft presentó al mercado sus HoloLens al mismo tiempo que Windows 10, y nos ofrecerá así el que constituye el último invitado en sumarse al campo de la realidad virtual/aumentada. Durante un tiempo se habló de la posibilidad de que pudiera tratarse de la respuesta al Project Morpheus de Sony, cumpliendo en Xbox el papel que aquel dispositivo cumple para PlayStation, pero lo cierto es que no sólo está dirigido a un campo más amplio que los meros videojuegos, sino que supone una apuesta intermedia entre el Oculus Rift y las Google Glass: un dispositivo poco adecuado para salir a la calle y que nos ofrece un campo amplio de visión (como el primero), pero en el que los hologramas se superponen a la realidad física permitiéndonos jugar o modelar en 3D con los elementos de nuestro salón.




Categorías: Cultura libre [es]

The Year Ahead In Internet Governance: Of Competing Institutions, IANA Transition, And A New Crypto War

IP-Watch - Dom, 25/01/2015 - 11:51
For many years Electronic Frontier Foundation Policy Analyst Jeremy Malcolm has been predicting the next year would be the pivotal year for the UN-led Internet Governance Forum (IGF). With the NetMundial Initiative being constructed these coming months and governments having not yet agreed to prolong the IGF mandate, the decade-old forum might be challenged to either move or become just one of many internet governance conference venues. And while some hope the future oversight over the internet’s underlying IANA function could become an experiment in shared global governance, others point out that more and more of the interesting questions of internet politics are decided elsewhere: national governments, trade negotiators, big data giants and cyberdominance strategists.
Categorías: Free Culture [en]

Joomla y Prestashop imitan a WordPress ofreciendo alojamiento gratis

ReadWriteWeb España - Dom, 25/01/2015 - 09:00

Joomla, uno de los CMS open source más usados del mundo, anunció hace unos días el lanzamiento de su nuevo servicio lanzado en colaboración con el proveedor de hosting Siteground: Joomla.com, en el que los usuarios podrán crear gratuitamente sitios web basados en su gestor, movimiento con el que esperan aumentar la popularidad de éste e incrementar sustancialmente su base de usuarios.

Como reconocen desde Open Source Matters Inc (la empresa desarrolladora de Joomla) en la nota de prensa, “el público objetivo de este nuevo servicio son los usuarios que actualmente optan por otras soluciones alternativas de construcción de sitios web que se pueden alojar gratuitamente. El nuevo servicio no sólo elimina el coste del alojamiento de la construcción de un sitio web, sino que también hace más sencillo empezar a usarlo. Lanzar un sitio web en Joomla.com sólo requiere unos pocos clics”. La Presidenta de Open Source Matters, Sarah Watz, afirmaba estar “muy emocionada porque el nuevo servicio Joomla.com hace al CMS Joomla! una opción más accesible que nunca”. Por su parte, Lilyana Yakimova, Marketing Manager de SiteGround.com, añadía que se sienten “muy orgullosos de ser socios de Joomla en este proyecto. Ha sido una manera fantástica para nosotros de devolver a la comunidad con aquello en lo que somos mejores: nuestra experiencia en alojar sitios web”.

Joomla.com sigue los pasos de WordPress.com

Este movimiento nos remite claramente a la estrategia seguida por Automattic para consolidar la fama de su propio CMS (WordPress, el software más usado en este campo desde hace años) desde que lanzó, hace ahora casi 10 años, el sitio WordPress.com. Éste al igual que Joomla.com, permite crear sitios web gratuitos alojados en subdominio, y proporciona a sus usuarios un pack limitado de extensiones y plantillas propias que no vienen incluidas por defecto en los paquetes de software originales (destinados a webs autoinstalables y que podemos encontrar en WordPress.org y Joomla.org, respectivamente).

Esta plataforma de Joomla no será, obviamente, la mejor opción para aquellos usuarios que buscan crear un sitio web avanzado con su código personalizado y su propia selección de plantillas y extensiones desde el principio (del mismo modo que ocurre con su equivalente en WordPress), pero sí será una opción para una amplia masa de usuarios que buscan opciones más sencillas.

Prestashop también se suma a la tendencia

Casi al mismo tiempo que Joomla anunciaba este nuevo servicio, los desarrolladores del CMS para e-commerce Prestashop anunciaban -tras varios meses de pruebas- Prestashop Cloud, otra opción de alojamiento gratuito en los servidores de la propia compañía. Su fundador, Bruno Leveque declaraba confiar en que este nuevo servicio permita a las PYMES crear tiendas online de una forma más fácil y rápida, y sin necesidad de invertir grandes cantidades de dinero, puesto que nace también como un servicio gratuito (el modelo de negocio pasaría, así, por la venta de add-ons y módulos).

Nota: Si quieres probar la versión autoinstalada de Prestashop, hace un tiempo publicamos un tutorial de instalación en TICbeat.

Imagen | Joomla.com




Categorías: Cultura libre [es]

CBC Radio Interview – The Digital Economy: Capitalism 2.0?

Don Tapscott - Dom, 25/01/2015 - 07:22

Don Tapscott was interviewed by Spark, Canada’s tech, trends, and fresh ideas show on CBC Radio.

Categorías: Free Culture [en]

3 consejos para escribir mejores titulares y aumentar tu tráfico web

ReadWriteWeb España - Dom, 25/01/2015 - 07:00

“De media, el titular se lee cinco veces más que el cuerpo del texto, así que cuando haya escrito el título ya habrá gastado 80 céntimos de un dólar”

La frase anterior se la debemos al mítico publicista David Ogilvy. Dado que murió en 1999, resulta obvio que no hablaba de las redes sociales ni de Buzzfeed, aunque el comportamiento detectado entre los internautas apunta a que ese principio sigue vigente. Y por eso resulta fundamental acertar en la redacción de los titulares de nuestras webs. Pero… ¿qué condiciones debe cumplir un buen titular? Sin ánimo de exhaustividad, te señalamos algunas:

Incluye cifras

Los titulares con listas numeradas llegan a tener cantidades notables de clics… los webmasters lo saben, y por eso veremos bastantes de estos titulares todos los días en las redes sociales y lectores de feeds. Esto se debe, por un lado, a que los números ejercen una incomprensible atracción sobre nuestro cerebro (y más aún si son impares, pues son percibidos como ‘más auténticos’), sobre la que aún debaten los especialistas.

Pero hay más explicaciones disponibles: la presencia de un número en el titular proporciona al lector una expectativa factible sobre qué se va a encontrar al hacer clic, al menos en lo que se refiere a la estructura del texto.

¿Qué aporta esta estructura?

Las listas numeradas se traducen, frecuentemente, en una organización lógica de la información del artículo, dotándolo de ‘escaneabilidad’ y agilizando su lectura.

Es concreto

En un ambiente de infoxicación constante como el que sufrimos actualmente, un titular difuso o excesivamente genérico tiene pocas papeletas para triunfar a la hora de competir por la atención de los internautas. Así, incluso cuando intentamos jugar la baza de estrategias basadas en la curiosidad, debemos intentar no dejar demasiadas preguntas rondando la cabeza del lector. Tomemos el ejemplo de este titular:

“Aumenta tu lista de suscriptores con este efectivo método”

No está mal, la verdad, pero… ¿suscriptores a un blog, o hablamos de otra cosa? Efectivo, sí… ¿pero cuánto tarda en llevarse a cabo? ¿en cuánto aumentará la lista de suscriptores? ¿Es una reflexión teórica, o remite a algún caso real previo? Veamos esto en su lugar:

“Cómo usé un sorteo para conseguir 3.491 nuevos suscriptores para mi blog en 1 semana”

Pon ambos titulares uno al lado del otro… ¿cuál resulta más atractivo?

Destaca los beneficios

Por supuesto, si el ejemplo anterior funciona no es sólo por ser específico. Ni siquiera por incluir números. Es porque te transmite el mensaje de que lo que vas a leer te resultará útil porque puede aportarte un beneficio (muchos suscriptores nuevos en una semana).

Un ejemplo rápido:

“Aprende ahora los trucos de 5 grandes redactores de titulares”

Números. Concreción. ¿Bien, no? Probemos otro:

“5 leyendas de la redacción de titulares te enseñarán a aumentar tus ventas”

De este modo, transmitimos un beneficio claro: “aumentar tus ventas”. Pero podemos apostar también por otro enfoque:

“¿Tus titulares te hacen perder ventas? 5 leyendas del copywriting te enseñan a evitarlo”

Así transmitimos el mismo beneficio con similar claridad, pero añadimos dos elementos extras: la sensación de urgencia (“Estás perdiendo ventas. Ahora mismo.“) y la implicación del lector mediante una pregunta relacionada con sus propias circunstancias.

Si dudas cuál de los dos últimos titulares podría ser mejor, usa ambos y compruébalo en tiempo real: es fácil si recurres a las pruebas A/B.

Imagen | Steven Ritzer




Categorías: Cultura libre [es]

Portal de Transparencia en la Administración Local: ¿realidad o brindis al sol?

Asociación de Internautas - Dom, 25/01/2015 - 06:19
Decepción es la palabra que mejor define la acogida del Portal de Transparencia que con tanto autobombo lanzara el Gobierno a principios de diciembre. Con apenas 500.000 datos disponibles, el portal carecía de funcionalidades tan básicas como la posibilidad de exportar datos o realizar búsquedas avanzadas en base al término exacto, una herramienta que cualquier motor de búsqueda básico incluye.
Categorías: Cultura libre [es]

Lanzan Peerio, una suite de cifrado fácil

ReadWriteWeb España - Dom, 25/01/2015 - 05:00

Nadim Kobeissi nació en Líbano hace 24 años. Es un activista contra la censura y la vigilancia de la Red conocido, sobre todo, por haber desarrollado el cliente open source de chat encriptado Cryptocat, pero también por el software de encriptación y compartición de archivos miniLock.

Pero ahora Kobeissi ha querido ir un paso más allá y anunciar en lanzamiento de Peerio, que define como “suite de productividad de cifrado”, con la intención de ayudar a usuarios individuales y organizaciones a cifrarlo todo, desde archivos alojados en la nube a mensajes instantáneos. Este servicio, disponible para Windows, Mac y como una extensión para el navegador Google Chrome, se asemeja a un GMail minimalista con funciones extraídas de servicios de almacenamiento en la nube (como Google Drive o Dropbox) y la mensajería instantánea. Pero, a diferencia de GMail, Peerio permite que toda las comunicaciones que establezcamos a través de este software permanezcan encriptadas de extremo a extremo, sin poder ser descifradas por nadie (ni por el propio servidor).

Nadim Kobeissi lo explica así: “Todo lo que comunicas o compartes desde Peerio está protegido por tecnología punta de cifrado, pero es tan fácil de usar como GMail: no necesitas ni aprender a usarlo [...] Peerio trae la criptografía donde está con gente”. Espera, con este enfoque, atraer a dos tipos de usuarios:

  • Los usuarios de Gmail, Dropbox y software de colaboración como Slack e Hipchat lo verán como una alternativa mucho más segura que su pack de herramientas 2.0 habitual, con el que poder mantener a curiosos indeseados fuera de sus comunicaciones y archivos.
  • Por su parte, los usuarios más concienciados en temas de ciberseguridad, posiblemente aficionados a aplicaciones vetustas como PGP, verán a Peerio como una alternativa 2.0 y simplificada de su software habitual, que además les permite comunicarse con gente ajena a su pequeño círculo de especialistas. En palabras de Kobeissi, su objetivo al desarrollar la aplicación era identificar cada posible uso de PGP e implementarla en una aplicación web.

Como cualquier nueva aplicación de cifrado, Peerio debe ser usada con precaución (recordemos que ya en su momento, la popular Cryptocat fue duramente criticada por un agujero de seguridad detectado en 2013). En todo caso, el código de Peerio (por cierto, parcialmente basado en el de Minilock) ha sido ya auditado por la firma germana de seguridad Cure53, que no detectó ningún error en el sistema de cifrados. Según Mario Heiderich, de Cure53, “hay un gran salto desde Cryptocat hasta lo que ahora es Peerio… tuvimos una impresión positiva en este caso [...]“.

Por otra parte, Peerio es sólo una más de las aplicaciones de cifrado que han sido lanzadas en los últimos años para llegar al público más inexperto: desde Signal para iPhone o RedPhone para Android, hasta al inminente plugin de PGP para Gmail End-to-End que Google pretende lanzar a lo largo de este año. Todos estos ejemplos de software están destinados a cifrar comunicaciones del día a día como correos electrónicos, llamadas y mensajes de texto.

Imagen | Peerio




Categorías: Cultura libre [es]

Páginas