agregador de noticias

Two Years of Data On What Military Equipment the Pentagon Gave To Local Police

Slashdot YourRightsOnline - 16 Agosto, 2014 - 23:06
v3rgEz writes: Wondering how the St. Louis County Police ended up armed with surplus military gear, and what equipment other departments have? A FOIA request at MuckRock has turned up every item given to local law enforcement under the Pentagon's 1022 program, the mechanism by which local law enforcement can apply for surplus or used military gear.

Read more of this story at Slashdot.








Categorías: Free Culture [en]

Two Years of Data On What Military Equipment the Pentagon Gave To Local Police

Slashdot YourRightsOnline - 16 Agosto, 2014 - 23:06
v3rgEz writes: Wondering how the St. Louis County Police ended up armed with surplus military gear, and what equipment other departments have? A FOIA request at MuckRock has turned up every item given to local law enforcement under the Pentagon's 1022 program, the mechanism by which local law enforcement can apply for surplus or used military gear.

Read more of this story at Slashdot.








Categorías: Free Culture [en]

Two Years of Data On What Military Equipment the Pentagon Gave To Local Police

Slashdot YourRightsOnline - 16 Agosto, 2014 - 23:06
v3rgEz writes: Wondering how the St. Louis County Police ended up armed with surplus military gear, and what equipment other departments have? A FOIA request at MuckRock has turned up every item given to local law enforcement under the Pentagon's 1022 program, the mechanism by which local law enforcement can apply for surplus or used military gear.

Read more of this story at Slashdot.








Categorías: Free Culture [en]

Two Years of Data On What Military Equipment the Pentagon Gave To Local Police

Slashdot YourRightsOnline - 16 Agosto, 2014 - 23:06
v3rgEz writes: Wondering how the St. Louis County Police ended up armed with surplus military gear, and what equipment other departments have? A FOIA request at MuckRock has turned up every item given to local law enforcement under the Pentagon's 1022 program, the mechanism by which local law enforcement can apply for surplus or used military gear.

Read more of this story at Slashdot.








Categorías: Free Culture [en]

Two Years of Data On What Military Equipment the Pentagon Gave To Local Police

Slashdot YourRightsOnline - 16 Agosto, 2014 - 23:06
v3rgEz writes: Wondering how the St. Louis County Police ended up armed with surplus military gear, and what equipment other departments have? A FOIA request at MuckRock has turned up every item given to local law enforcement under the Pentagon's 1022 program, the mechanism by which local law enforcement can apply for surplus or used military gear.

Read more of this story at Slashdot.








Categorías: Free Culture [en]

Two Years of Data On What Military Equipment the Pentagon Gave To Local Police

Slashdot YourRightsOnline - 16 Agosto, 2014 - 23:06
v3rgEz writes: Wondering how the St. Louis County Police ended up armed with surplus military gear, and what equipment other departments have? A FOIA request at MuckRock has turned up every item given to local law enforcement under the Pentagon's 1022 program, the mechanism by which local law enforcement can apply for surplus or used military gear.

Read more of this story at Slashdot.








Categorías: Free Culture [en]

Two Years of Data On What Military Equipment the Pentagon Gave To Local Police

Slashdot YourRightsOnline - 16 Agosto, 2014 - 23:06
v3rgEz writes: Wondering how the St. Louis County Police ended up armed with surplus military gear, and what equipment other departments have? A FOIA request at MuckRock has turned up every item given to local law enforcement under the Pentagon's 1022 program, the mechanism by which local law enforcement can apply for surplus or used military gear.

Read more of this story at Slashdot.








Categorías: Free Culture [en]

Bitcoin is not what you think it is: Anatomy of a Money-Like Informational Commodity

P2P Foundation - 16 Agosto, 2014 - 22:54

There is a lot to look forward to but it is also important to be realistic about the ramifications of Bitcoin. It is not a jack-of-all-trades nor a panacea for all the worlds’ ills. It may solve some issues in niche areas, but it likely cannot do the vast majority of the tasks that its passionate supporters claim it can.

Extremely serious and well-researched treatment of Bitcoin and its isssues.

* Book: Anatomy of a Money-like Informational Commodity. A study of Bitcoin. Tim Swanson.

Tim Swanson:

“The purpose of this manuscript is to continue the dialogue on issues that are increasingly important to the direction of cryptoprotocols, specifically Bitcoin, and decentralized applications in the near future.

This book is divided into three sections. The first third describes the current state of software and hardware development. The middle portion reflects on the economic conditions within the Bitcoin network as well as user adoption. The last third covers alternative platforms and legal considerations that could impact the on-boarding of users onto the Bitcoin network. ”

“Today Bitcoin (the network and the token) is primarily used for goods and services that existing systems such as credit cards and fiat money have limited accessibility for. Yet it is important to distinguish between what a bitcoin (the token) is and is not. As explored below in length, bitcoins do not create value, they merely store it. In contrast, entrepreneurs and companies create value. They do this by selling securitized equity (stocks) in exchange for capital, whereupon they reinvest this towards additional utility creation. As it lacks equity, governance or any formal or informal method of feedback, Bitcoin – a static, fragile institution – is not a company which in turn creates public goods problems.

Other areas this report covers include the cost of maintaining the network. The transaction processing equipment (miners) have no cost advantage over existing value transaction infrastructure, rather Bitcoin’s initial competitive advantage was decentralizing trust and obscuring identities – both of which are progressively compromised. Acquiring and maintaining hashing machines, electricity and bandwidth have real costs – and nothing inherent to the Bitcoin transactional process gives it a significant cost advantage over existing electronic payment systems. Rather, as noted below, the relatively higher costs of doing business (the cost structure) of incumbent platforms and other non-decentralized systems is typically related towards compliance costs which Bitcoin-related enterprises are increasingly having to shoulder. BitLicenses, for example, add additional financial requirements to companies in this space and incidentally could in fact insulate Bitcoin from alternative competitive protocols and ledgers whom lack the capital resources to compete, thereby ceding it monopoly-like status.

A number of other issues are also covered including the impact these types of decentralized systems may have on the legal profession and consequently numerous lawyers have been consulted to provide their insights into how this type of disruption may occur.

These challenges in turn may explain the wide chasm between interest in Bitcoin and meager adoption rates. In many ways this dearth of adoption is tautological: decentralized networks will only be used by users who need decentralization. Bitcoin, the network, like any transportation network will be used by people who need to use it because it satiates certain needs and not necessarily used by people that early adopters want or wish used it.

Consequently, Bitcoin solves some needs, but it is not a Swiss Army knife pain killer with innumerable feature-based check-boxes; it has real limitations that are detailed in each chapter below.

Despite the skepticism and critical analysis of this ecosystem, there are numerous bright spots that are highlighted along the way including portions of the community who look beyond zero-sum activities – beyond day trading or gambling – some of whom are genuinely trying to and likely will create wealth generating businesses.

There is a lot to look forward to but it is also important to be realistic about the ramifications of Bitcoin.

It is not a jack-of-all-trades nor a panacea for all the worlds’ ills. It may solve some issues in niche areas, but it likely cannot do the vast majority of the tasks that its passionate supporters claim it can. In fact, it is being shoe-horned into areas it is not competitive. And this is not for a lack of trying. It is largely due to the underlying microeconomic attributes, incentives and costs within the network itself, many of which were not apparent until the past year or two.”

Categorías: Free Culture [en]

Explaining to STM That There Are Not 100 Kinds of "Open".

Question Copyright - 16 Agosto, 2014 - 18:07

Question Copyright recently signed on to an open letter to the International Association of Scientific, Technical and Medical Publishers (STM), calling on them to withdraw the counterproductive model licenses they have been promoting for use in publishing research articles.  (STM has written a response, but unfortunately it does not seriously address the very real issues raised in the original letter.)

To understand the problem with STM's model licenses, you need to understand the problem of "license proliferation".  License proliferation is the phenomenon of institutions coming up with their own slightly different -- or sometimes significantly different -- copyright licenses, each with its own idiosyncratic terminology and conditions.  The problem with this is that if everyone distributes work under a custom license, no one can really re-use or redistribute anyone's works in practice (even when redistribution is the licensor's explicit goal), because it takes too much time to read and evaluate all those different licenses.  Furthermore,  such licenses are often not compatible with each other, which makes remixing difficult or impossible.

Creative Commons came along and basically solved this problem years ago.  They offer a very small set of easily comprehensible, professionally drafted licenses, several of which are genuine Free Culture licenses and entirely suitable for scholarly publishing.  STM should just recommend that research articles be published under those licenses.  There is no need for this new set of model licenses -- that just creates a problem for everyone.  Creative Commons already solved this; STM should not help unsolve it.

The original letter (which has 77 signatories and counting) explains this very well:

The Association of Scientific, Technical and Medical Publishers has recently released a set of model licenses for research articles. In their current formulation, these licenses would limit the use, reuse and exploitation of research. They would make it difficult, confusing or impossible to combine these research outputs with other public resources and sources of knowledge to the benefit of both science and society. There are many issues with these licenses, but the most important is that they are not compatible with any of the globally used Creative Commons licenses. For this reason, we call on the STM Association to withdraw them and commit to working within the Creative Commons framework.

Think of the Creative Commons licenses as an immune response to the disease of current U.S. and international copyright laws.  Those laws are maximally restrictive by default, and lead, as diseases often do, to very bad consequences.  By using Creative Commons licenses, particularly the fully-freedom-compatible ones, you can ensure that you and your works are never part of the problem: you will not transmit the disease to others.

If the CC licenses are an immune response, then STM's suggestion that different, special licenses are somehow necessary for scholarly publishing is an allergic response.  Like many allergic responses, if it continues unchecked, it can grow to be as bad as the original disease.

Tags: 
Categorías: Free Culture [en]

¿Se repetirá la historia de FarmVille con Candy Crush Saga?

ReadWriteWeb España - 16 Agosto, 2014 - 15:00

El reinado de Candy Crush Saga en el campo de los videojuegos para Facebook y dispositivos móviles empezó menos de un año después de su lanzamiento en abril de 2012 (en 11 meses había superado a FarmVille 2 como juego más popular en Facebook), y ha sido claro e inapelable hasta fechas recientes, consiguiendo ser número uno en Google Play y la App Store, así como disfrutando de 150 millones de usuarios únicos mensuales y 54 millones de usuarios diarios. Pero como todos los imperios, el del juego de los caramelos parece haber empezado a dejar atrás su popularidad y estar iniciado un “esperado declive”, en palabras de sus desarrolladores. El problema es que el declive puede ser aún más rápido de lo esperado.

Hace poco, Hope Cochran, la directora financiera de King Digital Entertainment (la empresa propietaria del juego) reconocía en una entrevista para la BBC que esperaban una disminución del éxito de Candy Crush, pero que también preveían una larga trayectoria posterior para el videojuego. Sin embargo, King Digital acaba de anunciar una revisión a la baja de los beneficios previstos para este 2014 (de los 2.550 – 2.650 millones de dólares USA a los 2.250 – 2.350 millones) a raíz del descenso de usuarios de su juego estrella que se tradujo en datos de beneficios para el segundo cuatrimestre 14 millones por debajo de lo esperado. Esta revisión ya ha provocado un descenso del 23% del valor de sus acciones, situándose en 14 dólares en la Bolsa de New York en la que cotiza desde que en marzo de este mismo año protagonizara el peor debut del año. Ahora, sus acciones han perdido ya un 38% de su valor en menos de cinco meses.

En estas circunstancias, es lógico que los inversores puedan estar alarmados: el 78% de los ingresos de la compañía dependen de un juego cuya trayectoria apunta paralelismos con anteriores éxitos del sector como Farmville y Angry Birds. Además, Candy Crush cuenta con una exitosa y reciente competencia: desde ‘Cascade’ (un juego muy similar desarrollado por Big Fish Games, que se ha propuesto que los usuarios “renuncien a aplastar caramelos”) hasta ‘Kim Kardashian: Hollywood’ o ’2048′ (mencionados como competencia directa -y más barata- por un negativo informe sobre King Digital publicado por el Deutsche Bank y del que se ha hecho eco el Business Insider). Según dicho informe de la entidad financiera germana, el descenso de los ingresos de Candy Crush Saga se debe que los usuarios que va ganando el juego se encuentran mayoritariamente fuera de las fronteras de EEUU, desplazándose a zonas de menor monetización, lo que ha llevado a la caída de un 12% de los usuarios de pago (de los 11,9 millones del primer cuatrimestre a los 10,4 del segundo).

Pero no todo es negativo: durante los seis primeros meses del año, King Digital obtuvo un beneficio neto de 292,3 millones de dólares (lo que supone un 63,8% más), mientras que su cifra de negocio se incrementó un 81,5%, hasta los 1.200,3 millones. Además, la compañía anuncia para finales de este año un “juego hermano” del Candy Crush, que podría ayudar a “dar longevidad al título original”.

Imagen | m01229 via photopin cc




Categorías: Cultura libre [es]

Want Some International Pirates at Your Next Event?

Pirate Times - 16 Agosto, 2014 - 14:38

Pirate Parties are constantly organising different events – general assemblies, camps, conferences, campaigns and sometimes even parties. Having plenty of social interaction is essential to a fully functional political party, and something which gives events an extra-special touch is the presence of Pirates from other countries.

On the bottom right-hand side of our website, you can see any upcoming events in the Pirate world over the next few weeks. For example, at the time of writing this article you can see a summer party to be held by the Luxembourg Pirates on August 23rd. They want and expect Pirates from all over Europe to join them in an enjoyable late summer social event:

After a year’s hard work in 2 electoral campaigns we want to say thanks to our members, friends and sympathizers who supported us. Therefore we have the pleasure to invite you to our summer party. On this occasion we are also doing the official opening of our party headquarter.
The celebration takes place the 23rd August 14:00 at the #PPLU HQ - more information

Getting your event featured on the PPI calendar, as well as the Pirate Times site, is quite easy. Go to the Pirate Parties International’s calendar login, register and you can start adding your events with text and a link to the event’s website.

Next time you create an event (be it international, national or local) why not create an English description and invite some international pirates to give it some extra flair.

Featured image: CC-BY-SA Daniel Gruber Piratenpartei Mittelfranken

 

Categorías: Free Culture [en]

Python, el más popular entre las Universidades de EUA

Usemos Linux - 16 Agosto, 2014 - 14:21

De Python hemos hablado mucho aquí ya. No es un secreto que para muchos es uno de los idiomas a tener en cuanta a la hora de desarrollar, es fuerte, poderoso, con una curva de aprendizaje no muy compleja y lo que (a mi opinión) lo hace más atractivo que otros, es 100% multiplataforma.

Se puede programar en Python para Mac, Linux, Windows, Android … vamos, es una pasada, solo debemos tener instalado el intérprete en el ordenador del cliente y listo, nuestro código funcionará a lo máximo, con algunos pequeños ajustes.

Aquí les traigo una noticia que circula por la red y que he tomado de humanOS:

Recientemente Philip Guo, profesor asistente de Ciencias de la Computación en la Universidad de Rochester (universidad privada localizada en Nueva York) y miembro de la ACM, realizó un estudio en el que demostraba que Python es actualmente el lenguaje más popular para la enseñanza  en cursos introductorios de ciencias de la computación mejor calificado en los departamentos estadounidenses.

En concreto, ocho de los 10 departamentos de CS (80%), y 27 del top de 39 (69%), enseñan Python en cursos introductorios CS0 y CS1. Entre ellas están el MIT, Austin-Texas, California-Berkeley, Columbia o Virginia Tech. Eso sí, entre las 12 que no también hay importantes como Stanford o Harvard. Esto hace que Python sea el lenguaje más utilizado en estas prestigiosas instituciones por encima de Java, Matlab (el principal lenguaje científico) y el binomio C/C++. Curiosamente … lenguajes tan populares como Javascript o PHP no son muy usados en estos menesteres introductorios, aunque no deja de tener su lógica dado lo caóticos que pueden llegar a resultar.

En segundo lugar se situa Java (22 de las 39 universidades, en algunas escuelas hay un enfoque híbrido y utilizan más de un lenguaje), en tercero MATLAB muy utilizado para introducir a los científicos e ingenieros a la programación, a los que siguen en nivel de uso C y C++ que dominaban este apartado hace una decada.

Java sin lugar a dudas ha reinado en el 1er puesto en los últimos años, dado que en la última década la telefonía celular ha crecido de forma increíble, los teléfonos se hacen más inteligentes y por ello, tienen más usos y admiten más aplicaciones… como estas aplicaciones se programan en Java, eh ahí el motivo de por qué Java ha sido rey tanto tiempo. No obstante, esto podría cambiar en próximos años (si no lo ha hecho ya).

The post Python, el más popular entre las Universidades de EUA appeared first on Desde Linux.

Categorías: Cultura libre [es]

Open Badges blog: Pearson to Issue Badges for Adobe Certified Associate Certification Program

Planet Drumbeat - 16 Agosto, 2014 - 13:01
Pearson to Issue Badges for Adobe Certified Associate Certification Program:

You may have seen this exciting announcement from Pearson earlier in the week, but just in case you missed it - we’re happy to share the news with you!

Pearson, the world’s leading learning company, is issuing badges for the Adobe Certified Associate (ACA) certification program via its badge platform, Acclaim. Badges will now be available to candidates who earn ACA certification for the Adobe Creative Cloud or Creative Suite 6. 

"ACA candidates excel in the digital media world and appreciate having proof of their skills in a format that can be managed and shared online," said Melissa Jones, world wide education program manager for Adobe. “By representing the ACA certification as a badge through Acclaim, we empower our students to take credit for and manage their achievements digitally.”

Jarin Schmidt, product lead for Acclaim added, “Acclaim badges help lower the cost of credential verification and enable ACA candidates to share their accomplishments in a verified fashion across the online destinations most relevant to them.” We’re proud to see such industry leadership from Pearson and Adobe, and hope others follow suit in these badgeriffic endeavors!

To read more, click here.

Categorías: Free Culture [en]

Windows 9, cada vez más cerca

ReadWriteWeb España - 16 Agosto, 2014 - 12:00

Windows 8 ha resultado ser, en cierta forma, un producto fallido. En gran parte, porque su intento de unificar la interfaz en todos los dispositivos (de PC´s a smartphones), no fue bien recibido por los usuarios de computadoras personales, que vieron cómo les arrebataban el menú de inicio que había distinguido a Windows desde su primera versión en los tiempos de MS-DOS. Tampoco vio con buenos ojos que las aplicaciones Metro funcionaran a pantalla completa, impidiendo visualizar la barra de tareas. En definitiva, el problema era que la dinámica de uso de Windows había cambiado en exceso, y no necesariamente para mejor. Pero de igual manera que el último fracaso relativo de Microsoft (Windows Vista) se tradujo en una rápida reacción de la compañía para desarrollar Windows 7, las lecciones aprendidas con Windows 8 pueden ayudar a que Windows 9 sea un gran sistema operativo.

Retorno del menú Inicio e integración de plataformas

Las filtraciones parecen indicar que la nueva pantalla de inicio de Metro desaparecerá para volver al clásico Escritorio con menú de inicio, aunque éste vaya a ser una versión vitaminada que integre, junto a los elementos clásicos del mismo, una versión reducida de la pantalla de inicio de W8, con accesos a las aplicaciones Metro activas. Esto, claro, no se aplicará ya a todos los dispositivos: las computadoras portátiles o de sobremesa contarán aplicarán esta vuelta a los orígenes, al contrario que los dispositivos móviles (smartphones y tabletas)… mientras que en los dispositivos híbridos la configuración activa dependerá del hecho de que está conectado o no.

Pero si en lo estético se renuncia a esa convergencia entre dispositivos, a nivel interno ésta se consolida, pues Windows Phone y Windows RT desaparecerán para dejar paso a una única plataforma de desarrollo de Windows (aunque después puedan comercializarse por separada, cada cual con sus particularidades). Esto supone una victoria clara de Microsoft frente a Apple y Canonical, pues se adelantará a la también buscada integración Mac OS / iOS y Ubuntu / Ubuntu Phone.

Cortana da el salto al escritorio

Según ZDNet, Microsoft tiene la intención de incorporar a Windows 9 el asistente digital que Microsoft desarrolló para hacer frente a Google Now y al Siri de Apple: Cortana, que ya funciona en los móviles con Windows 8.1. En computadoras cambiará su aspecto, puesto que ocupará sólo un 25 % de la pantalla del equipo, en lugar de la totalidad de la misma. Al igual que en los móviles, Cortana vendrá preinstalada, pero será una aplicación independiente del sistema operativo.

Rumores de gratuidad

Todo parece indicar que Microsoft buscará incentivar a los usuarios de las versiones anteriores de Windows (de XP a W7) para que se animen a actualizar y poner al día sus equipos. Para la empresa de Redmond, es un problema grave que W8 y W8.1 tengan, en conjunto, la mitad de cuota de mercado que una versión carente de soporte como Windows XP. Es por ello que los usuarios de aquellas versiones podrían disponer de actualizaciones gratuitas a Windows 9.

¿Cuándo llega Windows 9?

De nuevo según ZDNet, a finales del próximo mes de septiembre podremos descargar una versión de prueba (una ‘technology preview‘ dirigida a desarrolladores para adaptar su software a las características del nuevo sistema. Aquellos que la instalen deberán aceptar que las actualizaciones sean automáticas: Microsoft parece apostar así por pequeñas y frecuentes actualizaciones automáticas transparentes para el usuario, en lugar de por los grandes paquetes de actualizaciones.

La versión definitiva estaría así lista para la primavera de 2015 (se habla, concretamente, del mes de abril).




Categorías: Cultura libre [es]

Agua helada para los CEO de las principales tecnológicas americanas por una causa solidaria

Asociación de Internautas - 16 Agosto, 2014 - 11:36
En plena canícula en el hemisferio norte, que con esto del cambio climático el calor se deja notar con fuerza, algunos CEO de las principales empresas tecnológicas norteamericanas han decidido aceptar el Ice Bucket Challenge, en un gesto de solidaridad para llamar la atención y solicitar fondos para una rara enfermedad: la esclerosis lateral amiotrófica, o enfermedad de Lou Gehrin, la misma que padece el físico Stephen Hawking.

<
Categorías: Cultura libre [es]

From (inter)objective Big Data to (inter)subjective Deep Data

P2P Foundation - 16 Agosto, 2014 - 10:22

The real problem of big data is that we are increasingly outsourcing our capacity to sense and think to algorithms programmed into machines. While this seems very convenient and cool at first and offers access to services that many of us want, it also raises a question about who actually owns big data, about the rights of individuals and citizens to own their personal data and to exercise choices regarding its use.

Excerpted from Otto Scharmer:

“While big data has certainly opened up a whole new range of possibilities, I would like to suggest a distinction between surface big data and deep data. Surface data is just data about others: what others do and say. That is what almost all current big data is composed of.

Deep data is used to make people and communities see themselves. Deep data functions like a mirror: it makes you see yourself–both as an individual and as a community. Over the past twenty years of my professional life I have been helping teams and organizations go through processes of profound innovation and transformative change across sectors and cultures. The one thing that I have learned from all these projects is that the key to transformative change is to make the system see itself. That’s why deep data matters. It matters to the future of our institutions, our societies, and our planet.

But what happens today with big data often is the opposite: big data is used to manipulate our behavior, to bombard us with commercials that we never asked for. Surface big data is used to outsource human thinking to algorithms, to reduce our level of awareness inside old patterns of habitual thought. Deep data, if developed and cultivated in the right way, could help us to enhance the level of awareness and consciousness and to change the system by shifting the consciousness of stakeholders in that system from ego-system awareness(awareness of my own silo) to eco-system awareness (awareness of the whole).

On a societal level, what types of deep data infrastructures might facilitate this bending of the beam of observation back onto the observer on the level of entire eco-systems?

For example, today we use GDP to measure economic progress. GDP is an excellent measure of surface data. But what would the equivalent deep data tool be for measuring real economic progress in a community? I believe that it would include a new indicator system that is grounded in real outcomes (like life expectancy), and in the wellbeing of individuals and their communities (like quality of life). Last year we–the Presencing Institute, with the GIZ Global Leadership Academy (German Ministry for Development Cooperation) and the Gross National Happiness Centre in Bhutan– launched the Global Wellbeing Lab, The lab links leaders from government, business, and civil society around the world who are working to pioneer new indicators and deep data tools that help communities and eco-systems begin to see themselves.

Where are you seeing the seeds of such new indicactor systems or deep data tools today? What can be learned from these first living examples? What would deep data mean for your self? What are the sources of well-being and happiness in your own life and work and what metrics could help you to see yourself in a more meaningful way? How can we co-pioneer theshift from big data to deep data in society today?”

Categorías: Free Culture [en]

Knocking Down the Great Firewall of China

Slashdot YourRightsOnline - 16 Agosto, 2014 - 09:28
New submitter Nocturrne writes: The FOSS project Lantern is having great success in unblocking the internet for many users in oppressive regimes, like China and Iran. Much like Tor and BitTorrent, Lantern is using peer-to-peer networking to overcome firewalls, but with the additional security of a trusted network of friends. "If you download Lantern in an uncensored region, you can connect with someone in a censored region, who can then access whatever content they want through you. What makes the system so unique is that it operates on the basis of trust. ... Through a process called consistent routing, the amount of information any single Lantern user can learn about other users is limited to a small subset, making infiltration significantly more difficult." The network of peers is growing, but we need more friends in uncensored countries to join us.

Read more of this story at Slashdot.








Categorías: Free Culture [en]

Leaked Documents: GCHQ Made Port-Scanning Entire Countries a Standard Spy Tool

Slashdot YourRightsOnline - 16 Agosto, 2014 - 08:21
Advocatus Diaboli writes with this excerpt from Heise: Since the early days of TCP, port scanning has been used by computer saboteurs to locate vulnerable systems. In a new set of top secret documents seen by Heise, it is revealed that in 2009, the British spy agency GCHQ made port scans a "standard tool" to be applied against entire nations. Twenty-seven countries are listed as targets of the HACIENDA program in the presentation, which comes with a promotional offer: readers desiring to do reconnaissance against another country need simply send an e-mail. Also from the article: The list of targeted services includes ubiquitous public services such as HTTP and FTP, as well as common administrative protocols such as SSH (Secure SHell protocol – used for remote access to systems) and SNMP (Simple Network Management Protocol – used for network administration) (Figure 4). Given that in the meantime, port scanning tools like Zmap have been developed which allow anyone to do comprehensive scans, it is not the technology used that is shocking, but rather the gargantuan scale and pervasiveness of the operation.

Read more of this story at Slashdot.








Categorías: Free Culture [en]

Leaked Documents: GCHQ Made Port-Scanning Entire Countries a Standard Spy Tool

Slashdot YourRightsOnline - 16 Agosto, 2014 - 08:21
Advocatus Diaboli writes with this excerpt from Heise: Since the early days of TCP, port scanning has been used by computer saboteurs to locate vulnerable systems. In a new set of top secret documents seen by Heise, it is revealed that in 2009, the British spy agency GCHQ made port scans a "standard tool" to be applied against entire nations. Twenty-seven countries are listed as targets of the HACIENDA program in the presentation, which comes with a promotional offer: readers desiring to do reconnaissance against another country need simply send an e-mail. Also from the article: The list of targeted services includes ubiquitous public services such as HTTP and FTP, as well as common administrative protocols such as SSH (Secure SHell protocol – used for remote access to systems) and SNMP (Simple Network Management Protocol – used for network administration) (Figure 4). Given that in the meantime, port scanning tools like Zmap have been developed which allow anyone to do comprehensive scans, it is not the technology used that is shocking, but rather the gargantuan scale and pervasiveness of the operation.

Read more of this story at Slashdot.








Categorías: Free Culture [en]

Leaked Documents: GCHQ Made Port-Scanning Entire Countries a Standard Spy Tool

Slashdot YourRightsOnline - 16 Agosto, 2014 - 08:21
Advocatus Diaboli writes with this excerpt from Heise: Since the early days of TCP, port scanning has been used by computer saboteurs to locate vulnerable systems. In a new set of top secret documents seen by Heise, it is revealed that in 2009, the British spy agency GCHQ made port scans a "standard tool" to be applied against entire nations. Twenty-seven countries are listed as targets of the HACIENDA program in the presentation, which comes with a promotional offer: readers desiring to do reconnaissance against another country need simply send an e-mail. Also from the article: The list of targeted services includes ubiquitous public services such as HTTP and FTP, as well as common administrative protocols such as SSH (Secure SHell protocol – used for remote access to systems) and SNMP (Simple Network Management Protocol – used for network administration) (Figure 4). Given that in the meantime, port scanning tools like Zmap have been developed which allow anyone to do comprehensive scans, it is not the technology used that is shocking, but rather the gargantuan scale and pervasiveness of the operation.

Read more of this story at Slashdot.








Categorías: Free Culture [en]
Distribuir contenido