recentpopularlog in

pierredv : arstechnica   72

Hack in the box: Hacking into companies with “warshipping” | Ars Technica
"For under $100, compact hardware can turn a shipped package into a horse for attacks."

"Using less than $100 worth of gear—including a Raspberry Pi Zero W, a small battery, and a cellular modem—the X-Force Red team assembled a mobile attack platform that fit neatly within a cardboard spacer dropped into a shipping box or embedded in objects such as a stuffed animal or plaque."
cybersecurity  vulnerability  cyber-spectrum  ArsTechnica 
august 2019 by pierredv
This wild, AI-generated film is the next step in “whole-movie puppetry” | Ars Technica Jun 2018
Via New Scientist, 5 Jan 2019, issue 3211

"Director Oscar Sharp and AI researcher Ross Goodwin, have returned with another AI-driven experiment that, on its face, looks decidedly worse. Blurry faces, computer-generated dialogue, and awkward scene changes fill out this year's Zone Out, a film created as an entry in the Sci-Fi-London 48-Hour Challenge—meaning, just like last time, it had to be produced in 48 hours and adhere to certain specific prompts.

That 48-hour limit is worth minding, because Sharp and Goodwin went one bigger this time: they let their AI system, which they call Benjamin, handle the film's entire production pipeline."
ArsTechnica  movies  AI 
may 2019 by pierredv
The radio navigation planes use to land safely is insecure and can be hacked | Ars Technica May 2019
Radios that sell for $600 can spoof signals planes use to find runways.

"Like many technologies built in earlier decades, the ILS was never designed to be secure from hacking. Radio signals, for instance, aren’t encrypted or authenticated. Instead, pilots simply assume that the tones their radio-based navigation systems receive on a runway’s publicly assigned frequency are legitimate signals broadcast by the airport operator. This lack of security hasn’t been much of a concern over the years, largely because the cost and difficulty of spoofing malicious radio signals made attacks infeasible.

Now, researchers have devised a low-cost hack that raises questions about the security of ILS, which is used at virtually every civilian airport throughout the industrialized world. Using a $600 software defined radio, the researchers can spoof airport signals in a way that causes a pilot’s navigation instruments to falsely indicate a plane is off course. "

"... all are careful to note that this kind of spoofing isn't likely to cause a plane to crash in most cases. ILS malfunctions are a known threat to aviation safety, and experienced pilots receive extensive training in how to react to them"
aviation  spoofing  cyber-spectrum  ArsTechnica  ILS 
may 2019 by pierredv
Why the US still won’t require SS7 fixes that could secure your phone | Ars Technica Apr 2019
"Yet decades later, SS7 and other components of the nation’s digital backbone remain flawed, leaving calls and texts vulnerable to interception and disruption. Instead of facing the challenges of our hyper-connected age, the FCC is stumbling, according to documents obtained by the Project On Government Oversight (POGO) and through extensive interviews with current and former agency employees. The agency is hampered by a lack of leadership on cybersecurity issues and a dearth of in-house technical expertise that all too often leaves it relying on security advice from the very companies it is supposed to oversee.

CSRIC is a prime example of this so-called “agency capture”—the group was set up to help supplement FCC expertise and craft meaningful rules for emerging technologies. But instead, the FCC’s reliance on security advice from industry representatives creates an inherent conflict of interest. The result is weakened regulation and enforcement that ultimately puts all Americans at risk, according to former agency staff."

"Emails from 2016 between working group members, obtained by POGO via a Freedom of Information Act request, show that the group dragged its feet on resolving SS7 security vulnerabilities despite urging from FCC officials to move quickly. The group also repeatedly ignored input from DHS technical experts.

The problem wasn’t figuring out a fix, however, according to David Simpson, a retired rear-admiral who led the FCC’s Public Safety and Homeland Security Bureau at the time. The group was quickly able to discern some best practices—primarily through using different filtering systems—that some major carriers had already deployed and that others could use to mitigate the risks associated with SS7."
SS7  telecoms  cybersecurity  ArsTechnica 
may 2019 by pierredv
AT&T’s “5G E” is actually slower than Verizon and T-Mobile 4G, study finds | Ars Technica
AT&T's "5G E" service is slightly slower than Verizon's and T-Mobile's advanced 4G LTE networks, a study by OpenSignal has found.

"AT&T's network name change may well trick consumers into thinking they're getting better service than a 4G operator, but they aren't. We already knew that 5G E has no technological advantage over LTE-Advanced, because they are the same thing with different names. But actual speed tests could reinforce that point."
ArsTechnica  AT&T  5G  hype 
march 2019 by pierredv
Scientists think they’ve solved one mystery of Easter Island’s statues | Ars Technica Mar 2019
"Lipo and Broadman meticulously mapped out where those fresh water sources were located all around the island, and wherever they found fresh water pockets along the coast, they also found ahu. (Fresh water also pools in craters on the island, forming lakes, but the archaeological evidence didn't support houses and villages in those areas.) They used a technique called quantitative spatial modeling to demonstrate that the pattern they observed was statistically sound, not just a matter of human perception."
ArsTechnica  archaeology  water  hydrology 
march 2019 by pierredv
Countrywide corruption breeds individual dishonesty, economists suggest | Ars Technica
Story ABOUT,
Intrinsic honesty and the prevalence of rule violations across societies
simon Gächter & Jonathan F. Schulz
Nature, volume 531, pages 496–499 (24 March 2016)

"Two economists at the University of Nottingham, Simon Gächter and Jonathan Schulz, have published an intriguing suggestion about the roots of dishonesty: they suggest that a corrupt social environment, rife with political corruption and tax evasion, can trickle down to the individual level and make people in such a country more likely to be dishonest in some contexts. Based on data gathering and behavioral experiments done in 23 countries, they found that people in more corrupt countries were more likely to cheat during an experiment."

"The question was why—do national tendencies push the population toward more or less honesty, or do individuals drive the national tendency?"

"Overall, there was a correlation between a country’s PRV level and the amount of money its citizens claimed, with people from low-honesty countries claiming more money. Other results backed up the finding, like more reports of rolling a six (probably honest, because this resulted in no payment) in high-honesty countries."

"Whatever direction the effect runs in, the correlations are robust. There's a link between dishonesty at the individual and national levels"
ArsTechnica  economics  dishonesty  lying  culture 
october 2018 by pierredv
A $225 GPS spoofer can send sat-nav-guided vehicles into oncoming traffic * | Ars Technica Jul 2018
Paper at

"A new proof-of-concept attack demonstrates how hackers could inconspicuously steer a targeted automobile to the wrong destination or, worse, endanger passengers by sending them down the wrong way of a one-way road. The attack starts with a $225 piece of hardware that’s planted in or underneath the targeted vehicle that spoofs the radio signals used by civilian GPS services. It then uses algorithms to plot a fake “ghost route” that mimics the turn-by-turn navigation directions contained in the original route. Depending on the hackers’ ultimate motivations, the attack can be used to divert an emergency vehicle or a specific passenger to an unintended location or to follow an unsafe route. The attack works best in urban areas the driver doesn’t know well, and it assumes hackers have a general idea of the vehicle’s intended destination."

"While the proof-of-concept attack is attention-grabbing, a variety of things significantly limit its effectiveness in the real world. "
1) "physical spoofer be in close proximity to the navigation device"
2) " works best when attackers have a general idea of the targeted vehicle’s intended destination"
#) "attacks aren’t nearly as successful in rural or suburban areas or against people who are familiar with the area in which they’re traveling"
ArsTechnica  GPS  spoofing  cybersecurity  navigation  spectrum-vulnerability  cyber-spectrum 
july 2018 by pierredv
Microsoft continues its quest to bring machine learning to every application | Ars Technica May 2018
We've been tracking Microsoft's work to bring its machine learning platform to more developers and more applications over the last several years. What started as narrowly focused, specialized services have grown into a wider range of features that are more capable and more flexible, while also being more approachable to developers who aren't experts in the field of machine learning.
ArsTechnica  Microsoft  ML 
may 2018 by pierredv
Satellite images from highly oblique angles are pretty mindblowing | Ars Technica April 2018
So Simmon began fiddling with some of Planet's satellites, including its 13 SkySats orbiting at 450km above the Earth's surface that have a resolution of 80cm per pixel. Instead of taking overhead images, Simmon began to capture images from highly oblique angles—as much as a 60- or 70-percent difference from directly overhead images.
ArsTechnica  Planet  EO  EarthObservation  images  imaging 
april 2018 by pierredv
SpaceX, Blue Origin have opened a “window of opportunity” for US Air Force | Ars Technica
"[Charles] Miller partnered with a number of Air Force officers at Air University and former Air Force officials to study the potential effects of lower-cost access to space on the US military."

"The key concept in the report is “ultra low-cost access to space” enabled by reusable launch vehicle technology. The report says the United States, through developments by SpaceX, Blue Origin, and other companies such as Vulcan Aerospace and Virgin Galactic, has a definitive edge over global competitors in this new area of rocket technology."
ArsTechnica  USAF  satellite  space  launch  NewSpace  SpaceX  BlueOrigin 
may 2017 by pierredv
Op-ed: I’m throwing in the towel on PGP, and I work in security | Ars Technica - Filipps Valsorda Dec 2016
“If you need to securely contact me... DM me asking for my Signal number.”
"If we meet in person and need to set up a secure channel, we will just exchange a secret passphrase to use with what's most appropriate: OTR, Pond, Ricochet."
"All in all, I should be the perfect user for PGP: competent, enthusiast, embedded in a similar community. But it just didn't work."
"A long-term key is as secure as the minimum common denominator of your security practices over its lifetime. It's the weak link."
PGP  privacy  cybersecurity  ArsTechnica  opinion  Signal  * 
december 2016 by pierredv
Linksys WRT routers won’t block open source firmware despite FCC rules | Ars Technica
"Linksys has been collaborating with chipmaker Marvell and the makers of OpenWrt to make sure its latest WRT routers can comply with the new rules without blocking open source firmware, company officials told Ars."
Linksys  WRT  DD-WRT  OSS  SDR  FCC  ArsTechnica 
september 2016 by pierredv
This machine catches stingrays: Pwnie Express demos cellular threat detector | Ars Technica Apri 2015
At the RSA Conference in San Francisco today, the network penetration testing and monitoring tool company Pwnie Express will demonstrate its newest creation: a sensor that detects rogue cellular network transceivers, including "Stingray" devices and other hardware used by law enforcement to surreptitiously monitor and track cell phones and users.
ArsTechnica  cellular  hacking  IMSI-catchers  Stingray 
august 2016 by pierredv
Bitcoin rival Ethereum fights for its survival after $50 million heist | Ars Technica
"Imagine a $50 million diamond heist that isn't investigated by any police body, and more than four days later, the broken vault that made the whole thing possible remains unfixed and suffers follow-on attacks by a group of marauding copycats. In essence, that's what's happening to an elite group of investors holding Bitcoin rival Ethereum, and the events threaten the very survival of the fledgling cryptocurrency."
"On Friday, thieves exploited a software bug that allowed them to transfer more than 3.6 million "ether"—the base unit of the Ethereum currency—out of The DAO's coffers. "
"Fork opponents say the entire appeal of Ethereum is its decentralized nature that by design is supposed to be immune to control by banks, governments, or other powerful groups.

"If you have a mechanism for generic blacklists, you will see 'blacklist subpoenas' very soon," Bitcoin observer Andreas Antonoopolous wrote on Twitter. "It's a power that will be abused.""
bitcoin  blockchain  Ethereum  ArsTechnica 
june 2016 by pierredv
Dronebuster will let you point and shoot command hacks at pesky drones | Ars Technica May 2016
"DroneDefender looks like some futuristic over-under, radio-frequency shotgun-grenade launcher. Targeted through a simple optical sight, the device has a range of about 400 meters. Battelle calls it a "directed RF energy weapon"—it sends out a jamming signal in the Industrial, Scientific and Medical (ISM) bands or global positioning bands in a 30-degree cone around the point of aim."
"A version of the Dronebuster is already in the hands of some federal government customers. That device uses broadband jamming like the DroneDefender. It has the advantage of being much smaller than the DroneDefender, ... Still, its jamming technology makes it illegal to use in the US."
"Pending FCC approval of the product, Dronebuster could soon be made more widely available to local agencies and other customers."
ArsTechnica  drones  UAV  jamming  Battelle 
may 2016 by pierredv
That time a patient’s heart procedure was interrupted by a virus scan | Ars Technica
"A heart patient undergoing a medical procedure earlier this year was put at risk when misconfigured antivirus software caused a crucial lab device to hang and require a reboot before doctors could continue.

The incident, described in an alert issued by the Food and Drug Administration, highlights the darker side of using computers and computer networks in mission-critical environments."
"While in theory AV may protect devices against attacks that exploit unpatched vulnerabilities, the protection often breaks down in practice. That's because federal certifications often bar the AV from receiving signature updates that allow it to detect new strains of malware."
ArsTechnica  cybersecurity  failure  vulnerability  antivirus 
may 2016 by pierredv
Asus lawsuit puts entire industry on notice over shoddy router security | Ars Technica
"On Tuesday, the US Federal Trade Commission settled charges that alleged the hardware manufacturer failed to protect consumers as required by federal law. The settlement resolves a complaint that said the 2014 mass compromise was the result of vulnerabilities that allowed attackers to remotely log in to routers and, depending on user configurations, change security settings or access files stored on connected devices. Under the agreement, Asus will maintain a comprehensive security program subject to independent audits for the next 20 years"
ArsTechnica  Asus  FTC  security  cybersecurity  Wi-Fi 
february 2016 by pierredv
Report: Robots, other advances will cost humans 5.1 million jobs by 2020 | Ars Technica Jan 2016
Report on "The Future of Jobs" report by WEF "advances in robotics, artificial intelligence, 3D printing, and other modern technologies are currently likely to lead to a net loss of 5.1 million jobs worldwide by the year 2020" "Anybody looking for more analysis on those subjects may be interested in Alec Ross's late-2015 book The Industries of the Future, which offers some interesting analysis on the ways robots may soon newly interact with typically human labor."
automation  employment  ArsTechnica 
february 2016 by pierredv
FCC: We aren’t banning DD-WRT on Wi-Fi routers | Ars Technica Nov 2015
"It's still possible for manufacturers to comply by preventing loading of any third-party firmware, but the new language could reduce the likelihood of that happening."
Wi-Fi  DD-WRT  SDR  ArsTechnica  FCC 
november 2015 by pierredv
How a group of neighbors created their own Internet service | Ars Technica
"There's actually a thriving global network of community wireless initiatives—many of whom stay in regular touch and swap information on recent software advances, promising hardware, and innovative business models," Sascha Meinrath, X-Lab founder and Penn State telecommunications professor, told Ars.
muni-wi-fi  ArsTechnica 
november 2015 by pierredv
Secret source code pronounces you guilty as charged | Ars Technica
"The results from a Pennsylvania company's TrueAllele DNA testing software have been used in roughly 200 criminal cases, from California to Florida, helping put murderers and rapists in prison. Criminal defense lawyers, however, want to know whether it's junk science. Defense attorneys have routinely asked, and have been denied, access to examine the software's 170,000 lines of source code in a bid to challenge the authenticity of its conclusions. The courts generally have agreed with Cybergenetics, the company behind TrueAllele, that an independent examination of the code is unwarranted, that the code is a proprietary trade secret, and disclosing it could destroy the company financially. A new challenge, pending before the California Supreme Court, concerns some of the company's latest conclusions"
DNA-testing  statistics  ArsTechnica 
october 2015 by pierredv
FCC: Open source router software is still legal—under certain conditions | Ars Technica
"Despite an FCC guidance to router manufacturers that seems to ban open source firmware such as DD-WRT and OpenWRT, FCC spokesperson Charles Meisch told Ars that there is in fact no such ban. But there are restrictions that in some cases could cause a manufacturer to decide to prevent the installation of third-party firmware. In fact, disabling the installation of third-party firmware by the user may be the easiest and most straightforward way for hardware makers to comply with the FCC's guidance."
FCC  opensource  routers  ArsTechnica 
september 2015 by pierredv
FCC accused of locking down Wi-Fi routers, but the truth is a bit murkier | Ars Technica Sep 2015
"FCC plan to prevent wireless interference could have unintended consequences." Summary of state of play halfway through the consultation period
ArsTechnica  FCC  Wi-Fi  SDR 
september 2015 by pierredv
MS researchers claim to crack encrypted database with old simple trick | Ars Technica
A team of Microsoft researchers led by Seny Kamara claims to have been successful at recovering a substantial amount of data from health records stored in CryptDB (PDF), a database technology that uses layers of encryption to allow users to search through encrypted data without exposing its contents.
ArsTechnica  encryption  privacy  de-anonymization  anonymity  Microsoft  MSR  SQL  CryptDB 
september 2015 by pierredv
New study: “cell phone sensitives” don’t exist | Ars Technica
"A new study (PDF) in Environmental Health Perspectives addresses claims that some individuals are sensitive to radio-frequency radiation (rf-emf), in this case to the area of the spectrum used by cell phones. Reading it gave me a strange sense of déjà vu, as the methodology of the study closely followed the approach used to explore similar claims in regards to WiFi radiation. In both studies, individuals who claimed to be sensitive were unable to accurately identify when they were being exposed to radiation." "A systematic review of 31 blind and double-blind provocation studies yielded no evidence that IEI-EMF individuals could detect the presence of rf-emf, and only seven studies indicated that exposure to rf-emf did affect health indices (Rubin et al. 2005). In two of these, however, the authors failed to replicate their own findings. Another four studies involved inappropriate use of statistics, while one reported improved mood in the active exposure condition."
ArsTechnica  woowoo  cellular  RF 
january 2015 by pierredv
49ers’ stadium Wi-Fi served 25,000 concurrent users, 2.13TB in all | Ars Technica
Quote: "We offloaded 2.13 terabytes during the event," 49ers VP of Technology Dan Williams told Mobile Sports Report. The newly built Levi's Stadium has 68,500 seats and more than a third of attendees used the Wi-Fi network simultaneously. "We peaked at 24,775 (roughly 38 percent of attendance) concurrent connections with an average of 16,862 (roughly 25 percent of attendance)," Williams said.
Wi-Fi  stadiums  sport  traffic  congestion  ArsTechnica 
august 2014 by pierredv
Danish government releases geographic data by way of 1:1 Minecraft map | Ars Technica
"But what can happen when a city—or even country—opens its data doors for a total Minecraft recreation? For an answer, take a look at Denmark. Really, go look at it. You can jump into Minecraft right now and virtually walk around the nation's shores, highways, and cities because the Danish Geodata Agency has launched a full 1:1 recreation."
ArsTechnica  mirror-worlds  simulation  mapping  Denmark  minecraft  maps 
july 2014 by pierredv
Supreme Court upends top patent court’s “burden of proof” rule | Ars Technica
"In patent disputes, it's the patent holder—not the accused infringer—who must always bear the burden of proof. That's true even when the parties had struck a licensing deal in the past, the US Supreme Court made clear in a ruling published today. The situation for licensees that wanted to challenge patents actually used to be much worse. Until 2007, someone who'd agreed to a patent license typically was not allowed to challenge the patents at all; if the patents were agreed to once, essentially, they were agreed to forever. The situation changed when the Supreme Court stepped in to override the Federal Circuit in the Medimmune v. Genentech case."
patents  SCOTUS  law  ArsTechnica  Medtronic 
january 2014 by pierredv
Google making the Web faster with protocol that reduces round trips | Ars Technica June 2013
"Roskind apparently goes by the title of "RTT Reduction Ranger" at Google, referring to "round trip time." Roskind wrote that round trip time, "which is ultimately bounded by the speed of light—is not decreasing, and will remain high on mobile networks for the foreseeable future." QUIC, he writes, "runs a stream multiplexing protocol over a new flavor of Transport Layer Security (TLS) on top of UDP instead of TCP. QUIC combines a carefully selected collection of techniques to reduce the number of round trips we need as we surf the Internet." An FAQ and an in-depth design document provide more information than most people would want to know about QUIC. Besides running multiplexed connections over UDP, QUIC was "designed to provide security protection equivalent to TLS/SSL, along with reduced connection and transport latency," the FAQ states."
networking  UDP  SPDY  QUIC  broadband  ArsTechnica  Google  internet  protocols  TCP 
july 2013 by pierredv
An open (of course) letter to my friend, the NSA | Ars Technica
Op-ed: Sorry, but it's really tough nowadays to hire a nonleaking hacker.
NSA  hacking  Millenials  ArsTechnica  satire 
june 2013 by pierredv
Into the depths of AT&T’s let-us-buy-T-Mobile astroturf campaign | Ars Technica
" In order to support its proposed T-Mobile buyout, AT&T has dug deep into its roster of supporters, going so far as to get local groups like the Shreveport-Bossier Rescue Mission to write letters of support to the federal government."
astroturf  lobbying  arstechnica  AT&T 
february 2013 by pierredv
Help! I’ve got Windows 8 and I miss my Start menu! | Ars Technica
"We take a look at some of the Start menu alternatives for Windows 8."
Windows8  tools  arstechnica 
january 2013 by pierredv
AT&T under fire for exempting microcell traffic from U-Verse data caps | Ars Technica
Public Knowledge is raising the alarm about AT&T's decision to exempt traffic generated by AT&T's wireless microcells from the data caps imposed on U-Verse broadband customers. PK's Michael Weinberg says that AT&T is "egregiously abusing data caps to give its own services advantages over competitors." A microcell is like a miniature cell phone tower that a user attaches to a home broadband connection to improve wireless reception. Like other mobile providers, AT&T offers microcells that improve wireless reception by routing phone traffic over the customer's home Internet connection. If a customer acquires a microcell from Sprint or Verizon and connects it to the AT&T U-Verse broadband connection in her home, any traffic generated by the device will count against the data caps that AT&T imposes on U-Verse customers.
att  AT&T  PublicKnowledge  small-cells  offload  cellular  Wi-Fi  netneutrality  arstechnica 
january 2013 by pierredv
Level 3 protests Verizon, AT&T "lock-up" data connection deals
"Since the FCC doesn't require the big telco and cable ISPs to lease out their lines at wholesale prices, CLECs like Level 3 buy voice/data interconnection from the incumbents at their "special access" rates. For over a decade, the regulation of these prices has been a source of huge regulatory combat—pitting Verizon and AT&T against smaller carriers Sprint, T-Mobile, Clearwire, and cbeyond, all of which belong to the No Chokepoints Coalition."
Level3  AT&T  Verizon  broadband  FCC  special-access  interconnection  arstechnica 
march 2012 by pierredv
Small wireless carriers: always stuck with crappy phones?
Discussion of band classes in 700 MHz, and the claim that AT&T is forcing manufacturers to build only devices for the lower B and C block. Claim by Good Faith Purchasers Alliance: "one of the largest carriers is believed to be issuing Requests for Proposals ('RFPs') that specify only equipment capable of operating only over Lower Band 700MHz Blocks B and C; and the other of the largest carriers is believed to be issuing RFPs specifying only Band Class 13, i.e., Upper Band 700MHz Block C. As a result, consumers and smaller carriers that acquired Lower Band 700MHz Block A spectrum are left without viable and widely useful equipment options."
700MHz  AT&T  interference  receivers  arstechnica  auctions  rules  FCC 
february 2012 by pierredv
Into the depths of AT&T;'s let-us-buy-T-Mobile astroturf campaign
"AT&T is legendary for laundering its public policy preferences through minority and social service groups that it supports financially in order to produce an apparent groundswell of support. We've written about it enough times not to be surprised by the practice anymore, but the Center for Public Integrity has just concluded an in-depth investigation of the practice that's well worth a look. In order to support its proposed T-Mobile buyout, AT&T has dug deep into its roster of supporters, going so far as to get local groups like the Shreveport-Bossier Rescue Mission to write letters of support to the federal government. "
lobbying  communications  ArsTechnica  AT&T 
october 2011 by pierredv
Anonymous speaks: the inside story of the HBGary hack
"One might think that such an esteemed organization would prove an insurmountable challenge for a bunch of disaffected kids to hack. World-renowned, government-recognized experts against Anonymous? HBGary should be able to take their efforts in stride." - NOT From page 3: "So what do we have in total? A Web application with SQL injection flaws and insecure passwords. Passwords that were badly chosen. Passwords that were reused. Servers that allowed password-based authentication. Systems that weren't patched. And an astonishing willingness to hand out credentials over e-mail, even when the person being asked for them should have realized something was up."
security  hacking  wikileaks  arstechnica  *  case-study 
february 2011 by pierredv
Algorithms take control of Wall Street
Dow Jones new service: "Lexicon has helped automate the process of reading the news, drawing insight from it, and using that information to buy or sell a stock." The story is more generally about algorithms in trading: "These sudden drops are now routine, and it's often impossible to determine what caused them. But most observers pin the blame on the legions of powerful, superfast trading algorithms—simple instructions that interact to create a market that is incomprehensible to the human mind and impossible to predict."
finance  computing  news  arstechnica 
january 2011 by pierredv
Buggy breathalyzer code reflects importance of source review - Ars Technica
"Court-ordered source code reviews of the software that is used to power a breathalyzer found bugs and significant technical deficiencies. The results raise serious questions about the reliability of such devices and demonstrate the clear need for source code review."
justice  programming  law  arstechnica 
may 2009 by pierredv
FTC: We'll "come calling" about deceptive DRM - Ars Technica, Nate Anderson Mar 2009
The DRM argument still drags on; I was hoping that it had gone away, but wishing don't make it so. "The Federal Trade Commission held its long-awaited Seattle conference on DRM. As expected, agreement was hard to come by, but the agency made clear that it has had enough of hidden DRM schemes and companies that pull the plug on authentication servers and leave the users who didn't pirate content with nothing."
DRM  copyright  ftc  arstechnica 
march 2009 by pierredv
Court rules smartcard hackers can publish exploit data
Dutch researchers hacked the NXP chip that runs in the Oyster and govt security sites - NXP failed to get injunctio to prevent publication Objection: victims can't update systems by October. Hah. Sign of hackability problems that'll just get more visible
security  hacking  research  technology  ArsTechnica 
july 2008 by pierredv
From Win32 to Cocoa: a Windows user's conversion to Mac OS X—Part II: Page 1
argument over who/where to charge - P2P is particularly gnarly, since content owners are offloading traffic
microsoft  programming  ArsTechnica 
april 2008 by pierredv
From Win32 to Cocoa: a Windows user's conversion to Mac OS X—Part II: Page 1
includes case study of classroom use, and pointers to other web services with more specialized functions
microsoft  programming  ArsTechnica 
march 2008 by pierredv
UK to ISPs: Crack down on piracy by April 2009... or else
If ISPs don't voluntarily implement some sort of antipiracy system by April 2009, the government will introduce its own legislation to make them do so. Example of bully pulpit trying to force voluntary action
ArsTechnica  piracy  policy  regulation 
february 2008 by pierredv

Copy this bookmark:

to read