Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Youtube

Viacom's Messy Relationship With YouTube and The Rise of Stephen Colbert 13

Posted by samzenpus
from the birth-of-the-nation dept.
Presto Vivace writes with this story about how Stephen Colbert became a YouTube Megastar. "Clips from The Colbert Report soon became a staple at YouTube, a startup that was making it easier for anyone and everyone to upload and watch home movies, video blogs, and technically-illicit-but-increasingly-vanilla clips of TV shows from the day before. And Colbert’s show was about to find itself at the center of a conflict between entertainment media and the web over online video that’s shaped the last decade. In fact, The Colbert Report has been defined as much by this back-and-forth between Hollywood and the web as by the cable news pundits it satirizes....A year after The Colbert Report premiere, Google acquired YouTube for $1.65 billion in stock. Five months later, Viacom sued YouTube and Google for copyright infringement, asking for $1 billion in damages. The value of these videos and their audiences were clear. The Colbert Report and “Stephen Colbert” are mentioned three times in Viacom’s complaint against YouTube, as much or more than any other show or artist."
The Internet

Cuba Says the Internet Now a Priority 64

Posted by samzenpus
from the lots-of-farmville-to-catch-up-on dept.
lpress writes Cuba first connected to the Internet in 1996 through a Sprint link funded by the US National Science Foundation. A year later the Cuban government decided to contain and control it. Now they say the Internet is a priority. If so, they need a long term plan, but they can get started with low cost interim measures. There is virtually no modern infrastructure on the island, but they could aggressively deploy satellite technology at little cost and, where phone lines could support it, install DSL equipment.
The Courts

Judge: It's OK For Cops To Create Fake Instagram Accounts 144

Posted by samzenpus
from the pay-no-attention-to-the-man-behind-the-ip-address dept.
An anonymous reader writes with a ruling that seems obvious in a case about police making a fake Instagram account. A federal judge in New Jersey has signed off on the practice of law enforcement using a fake Instagram account in order to become "friends" with a suspect — thus obtaining photos and other information that a person posts to their account. "No search warrant is required for the consensual sharing of this type of information," United States District Judge William Martini wrote in an opinion published last Tuesday. In other news, an undercover officer still doesn't need to tell you that he or she is a member of law enforcement if you ask.
Crime

Bitcoin Exec To Spend Two Years Behind Bars For Silk Road Transactions 51

Posted by samzenpus
from the end-of-the-road dept.
mrspoonsi writes Charlie Shrem, former Bitcoin Foundation board member and CEO of the now-defunct exchange BitInstant, has been sentenced to two years in prison for helping Silk Road users anonymously swap cash for digital currency. Silk Road, as you know, was the online marketplace infamous for hosting anonymous drug and gun sales that was busted by the FBI back in 2013. A version 2.0 went up shortly after that, but it suffered the same fate as its predecessor this November. Based on evidence gathered during the crackdown, Shrem agreed to partner with Robert M. Faiella to trade over $1 million in cash from buyers. Faiella was the one with direct contact to buyers, hiding behind the name BTCKing to post ads promoting his dollar-to-Bitcoin business on the marketplace.
Communications

Tor Network May Be Attacked, Says Project Leader 84

Posted by timothy
from the routing-around-the-routing-around dept.
Earthquake Retrofit writes The Register is reporting that the Tor Project has warned that its network – used to mask peoples' identities on the internet – may be knocked offline in the coming days. In a Tor blog post, project leader Roger 'arma' Dingledine said an unnamed group may seize Tor's directory authority servers before the end of next week. These servers distribute the official lists of relays in the network, which are the systems that route users' traffic around the world to obfuscate their internet connections' public IP addresses.
Medicine

How a 3D Printer Let a Dog Run For the First Time 25

Posted by timothy
from the dogs-have-been-running-since-forever dept.
Nerval's Lobster writes Ever since 3-D printing began to enter the mainstream, people have discussed the technology's potential for building prosthetic arms and legs for human beings. But what about doing the same for dogs? In one of those videos that ends up circulated endlessly on the Internet, a dog named Derby, born with a congenital deformity that deprived him of front paws, is outfitted with a pair of 3-D-printed prosthetics. With those "legs" in place, the dog can run for the first time, at a pretty good clip. Both the prosthetics and the video were produced by 3D Systems, which builds 3-D printers, and it seems likely that other 3-D-printing companies will explore the possibility of printing off parts for pets. And while the idea of a cyborg pooch is heartwarming, it will be interesting to see how 3D printers will continue to advance the realm of human prosthetics, which have become increasingly sophisticated over the past decade.
The Courts

All the Evidence the Government Will Present In the Silk Road Trial Is Online 46

Posted by Soulskill
from the defendant-knowingly-and-willfully-went-on-the-internets dept.
apexcp writes: In less than a month, one of the biggest trials of 2015 will begin in New York City. The full list of government evidence and defense objections found its way online recently, shedding light on both the prosecutor's courtroom strategy and the defense team's attempted rebuttals. Also important is what's not presented as evidence. There's not a single piece of forensic documentation about how the FBI originally found Silk Road servers, an act the defense has called "blatantly criminal."
Piracy

Anyone Can Now Launch Their Own Version of the Pirate Bay 79

Posted by Soulskill
from the we're-all-spartacus dept.
An anonymous reader writes: Not satisfied with merely launching The Old Pirate Bay, torrent site isoHunt today debuted The Open Bay, which lets anyone deploy their own version of The Pirate Bay online. This is achieved via a new six-step wizard, which the group says requires you to be somewhat tech-savvy and have "minimal knowledge of how the Internet and websites work." The Pirate Bay, the most popular file sharing website on the planet, went down last week following police raids on its data center in Sweden. As we've noted before, The Old Pirate Bay appears to be the best alternative at the moment, but since The Pirate Bay team doesn't know if it's coming back yet, there is still a huge hole left to be filled.
Security

Grinch Vulnerability Could Put a Hole In Your Linux Stocking 116

Posted by timothy
from the pretty-generic-description-there dept.
itwbennett writes In a blog post Tuesday, security service provider Alert Logic warned of a Linux vulnerability, named grinch after the well-known Dr. Seuss character, that could provide attackers with unfettered root access. The fundamental flaw resides in the Linux authorization system, which can inadvertently allow privilege escalation, granting a user full administrative access. Alert Logic warned that Grinch could be as severe as the Shellshock flaw that roiled the Internet in September. Update: 12/19 04:47 GMT by S : Reader deathcamaro points out that Red Hat and others say this is not a flaw at all, but expected behavior.
Security

Hackers Compromise ICANN, Access Zone File Data System 110

Posted by timothy
from the that-should-be-a-boss-level dept.
Trailrunner7 writes with this news from ThreatPost: Unknown hackers were able to compromise vital systems belonging to ICANN, the organization that manages the global top-level domain system, and had access to the system that manages the files with data on resolving specific domain names. The attack apparently took place in November and ICANN officials discovered it earlier this month. The intrusion started with a spear phishing campaign that targeted ICANN staffers and the email credentials of several staff members were compromised. The attackers then were able to gain access to the Centralized Zone Data System, the system that allows people to manage zone files. The zone files contain quite bit of valuable information, including domain names, the name server names associated with those domains and the IP addresses for the name servers. ICANN officials said they are notifying any users whose zone data might have been compromised." (Here's ICANN's public note on the compromise.)
Google

Google Proposes To Warn People About Non-SSL Web Sites 391

Posted by samzenpus
from the protect-ya-neck dept.
mrspoonsi writes The proposal was made by the Google developers working on the search firm's Chrome browser. The proposal to mark HTTP connections as non-secure was made in a message posted to the Chrome development website by Google engineers working on the firm's browser. If implemented, the developers wrote, the change would mean that a warning would pop-up when people visited a site that used only HTTP to notify them that such a connection "provides no data security". Currently only about 33% of websites use HTTPS, according to statistics gathered by the Trustworthy Internet Movement which monitors the way sites use more secure browsing technologies. In addition, since September Google has prioritised HTTPS sites in its search rankings.
Books

Book Review: Build Your Own Website: A Comic Guide to HTML, CSS, and WordPress 31

Posted by samzenpus
from the read-all-about-it dept.
MassDosage writes "At the the risk of exposing my age I remember building my first website using a rudimentary Unix text editor (Joe) and carefully handcrafting the Hypertext Markup Language (HTML) while directly logged on to the web server it was being served from. Back then Cascading Style Sheets (CSS) weren't even a glint in the eyes of their creators. A lot has changed and there's now a world of fancy WYSIWYG web page editors to choose from as well as Content Management Systems that allow you to create websites without looking at the underlying code at all. While this is all very useful and allows less technical people to create websites I still feel that having at least some knowledge of how everything works under the hood is empowering — especially in situations where you want to go beyond the limits placed on you by a certain tool. This is where Build Your Own Website: A comic guide to HTML, CSS and Wordpress comes into the picture. Its aim is to enable people new to web development to learn the subject by teaching the fundamentals of HTML and CSS first and only then describing how to use a Content Management System (CMS) — in this case Wordpress. While Wordpress might not be everyone's kettle of fish it's a good choice as an example of a modern CMS that is easily accessible and very popular. The concepts presented are simple enough that it should be easy enough for a reader to apply them to a different CMS should they want to. Read below for The rest of MassDosage's review.
Piracy

Sony Leaks Reveal Hollywood Is Trying To Break DNS 387

Posted by Soulskill
from the scorched-net-policy dept.
schwit1 sends this report from The Verge: Most anti-piracy tools take one of two paths: they either target the server that's sharing the files (pulling videos off YouTube or taking down sites like The Pirate Bay) or they make it harder to find (delisting offshore sites that share infringing content). But leaked documents reveal a frightening line of attack that's currently being considered by the MPAA: What if you simply erased any record that the site was there in the first place? To do that, the MPAA's lawyers would target the Domain Name System that directs traffic across the internet.

The tactic was first proposed as part of the Stop Online Piracy Act (SOPA) in 2011, but three years after the law failed in Congress, the MPAA has been looking for legal justification for the practice in existing law and working with ISPs like Comcast to examine how a system might work technically. If a takedown notice could blacklist a site from every available DNS provider, the URL would be effectively erased from the internet. No one's ever tried to issue a takedown notice like that, but this latest memo suggests the MPAA is looking into it as a potentially powerful new tool in the fight against piracy.
The Internet

A Domain Registrar Is Starting a Fiber ISP To Compete With Comcast 65

Posted by Soulskill
from the rise-of-the-micronetworks dept.
Jason Koebler writes: Tucows Inc., an internet company that's been around since the early 90s — it's generally known for being in the shareware business and for registering and selling premium domain names — announced that it's becoming an internet service provider. Tucows will offer fiber internet to customers in Charlottesville, Virginia — which is served by Comcast and CenturyLink — in early 2015 and eventually wants to expand to other markets all over the country. "Everyone who has built a well-run gigabit network has had demand exceeding their expectations," Elliot Noss, Tucows' CEO said. "We think there's space in the market for businesses like us and smaller."
Media

Webcast Funerals Growing More Popular 70

Posted by Soulskill
from the morbid-new-of-the-day dept.
HughPickens.com writes: Lex Berko reports in The Atlantic that although webcasting has been around since the mid-1990s, livestreamed funerals have only begun to go mainstream in the last few years. The National Funeral Directors Association has only this year introduced a new funeral webcasting license that permits funeral homes to legally webcast funerals that include copyrighted music. The webcast service's growing appeal is, by all accounts, a result of the increasing mobility of modern society. Remote participation is often the only option for those who live far away or have other barriers — financial, temporal, health-related — barring them from attending a funeral. "It's not designed to replace folks attending funerals," says Walker Posey. "A lot of folks just don't live where their family grew up and it's difficult to get back and forth."

But some funeral directors question if online funerals are helpful to the grieving process and eschew streaming funerals live because they do not want to replace a communal human experience with a solitary digital one. What happens if there's a technical problem with the webcast — will we grieve even more knowing we missed the service in person and online? Does webcasting bode well for the future of death acceptance, or does it only promote of our further alienation from that inevitable moment? "The physical dead body is proof of death, tangible evidence that the person we love is gone, and that we will someday be gone as well," says Caitlin Doughty, a death theorist and mortician. "To have death and mourning transferred online takes away that tangible proof. What is there to show us that death is real?"
Privacy

Snowden Leaks Prompt Internet Users Worldwide To Protect Their Data 53

Posted by Soulskill
from the for-differing-values-of-"protect" dept.
Lucas123 writes: A new international survey of internet users from 24 countries has found that more than 39% of them have taken steps to protect their data since Edward Snowden leaked the NSA's spying practices. The survey, conducted by the Center for International Governance Innovation, found that 43% of Internet users now avoid certain websites and applications and 39% change their passwords regularly. Security expert Bruce Schneier chastised the media for trying to downplay the numbers by saying "only" 39%" have taken action and "only 60%" have heard of Snowden. The news articles, "are completely misunderstanding the data," Schneier said, pointing out that by combining data on Internet penetration with data from the international survey, it works out to 706 million people who are now taking steps to protect their online data. Additionally, two-thirds (64%) of users indicated they are more concerned today about online privacy than they were a year ago. Another notable finding: 83% of users believe that affordable access to the Internet should be a basic human right.
Piracy

The Pirate Bay Responds To Raid 302

Posted by samzenpus
from the here-it-is dept.
An anonymous reader writes The Pirate Bay's crew have remained awfully quiet on the recent raid in public, but today Mr 10100100000 breaks the silence in order to get a message out to the world. In a nutshell, he says that they couldn't care less, are going to remain on hiatus, and a comeback is possible. In recent days mirrors of The Pirate Bay appeared online and many of these have now started to add new content as well. According to TPB this is a positive development, but people should be wary of scams. Mr 10100100000 says that they would open source the engine of the site, if the code "wouldn't be so s****y". In any case, they recommend people keeping the Kopimi spirit alive, as TPB is much more than some hardware stored in a dusty datacenter.
Canada

Govt Docs Reveal Canadian Telcos Promise Surveillance Ready Networks 74

Posted by samzenpus
from the we'll-do-it-for-you dept.
An anonymous reader writes "Michael Geist reports that Canadian telecom and Internet providers have tried to convince the government that they will voluntarily build surveillance capabilities into their networks. Hoping to avoid legislative requirements, the providers argue that "the telecommunications market will soon shift to a point where interception capability will simply become a standard component of available equipment, and that technical changes in the way communications actually travel on communications networks will make it even easier to intercept communications."
Censorship

9th Circuit Will Revisit "Innocence of Muslims" Takedown Order 158

Posted by timothy
from the aeshetics-and-obligations dept.
The Associated Press, as carried by ABC News, reports that "An 11-judge panel of the 9th U.S. Circuit Court of Appeals in Pasadena will hear arguments Monday by Google, which owns YouTube, disputing the court's decision to remove Innocence of Muslims from the popular video sharing service." At the heart of the earlier take-down order, which was the result of a 2-1 split from a 3-judge panel, is the assertion of copyright by actress Cindy Lee Garcia, who appeared in the film, but in a role considerably different from the one she thought she was playing. Google is supported in its appeal by an unusual alliance that includes filmmakers, Internet rivals such as Yahoo and prominent news media companies such as The New York Times that don't want the court to infringe on First Amendment rights. Garcia has support from the Screen Actors Guild and the American Federation of Musicians. If the court upholds the smaller panel's ruling, YouTube and other Internet companies could face takedown notices from others in minor video roles.
Privacy

How Identifiable Are You On the Web? 159

Posted by timothy
from the your-unique-aroma dept.
An anonymous reader writes How identifiable are you on the web? This updated browser fingerprinting tool implements the current state of the art in browser fingerprinting techniques(including canvas fingerprinting) to show you how unique your browser is on the web. Good food for thought when three-letter agencies talk about "mere metadata."

Klein bottle for rent -- inquire within.

Working...