Feed aggregator

iFixit tears new iPhones apart, finds they’re pretty easy to fix

Ars Technica - Fri, 19/09/2014 - 16:23
The iPhone 6 Plus, exploded. iFixit

When you want to know more about the stuff inside your phone without actually taking it apart, you can count on iFixit to make the sacrifice for you. Late last night, the site began (and eventually completed) its teardowns of the new iPhone 6 and iPhone 6 Plus, revealing slightly more detailed information about the insides of both devices, as well as how difficult to repair they'll be if you happen to break them.

Like the iPhone 5 and 5S, the first step toward dismantling an iPhone 6 is to remove a pair of Pentalobe screws flanking the Lightning port, then lifting up the screen with a suction cup. The TouchID button on the 5S relied on a cable routed between the display and the bottom of the phone, and would-be repairers had to be careful not to sever this while taking the phone apart. Both iPhone 6 models integrate this cable into the display assembly, removing one more potential point of failure.

Once opened, both phones prove to be substantially similar—the 6 Plus has a larger 2915mAh battery, while the 6 has an 1810mAh version, but this is the chief difference. Both phones include a Qualcomm MDM9625M LTE modem and WTR1625L transceiver, which collectively provide faster 150Mbps LTE speeds and wider support for different LTE bands (an additional WFR1620 chip provides carrier aggregation). The Apple A8 SoC is (still) paired with 1GB of RAM. The expected NFC, Wi-Fi, and M8 motion coprocessor, along with other power management and touch controller chips, are all present and accounted for.

Read 1 remaining paragraphs | Comments

Royal Observatory announces the winners of its 2013 photography contest

Ars Technica - Fri, 19/09/2014 - 16:00
The overall winner, this photo of the aurora was taken in Iceland, land of the unpronounceable geography. In this case, you're looking at the Jökulsarlon lagoon, located in Vatnajökull National Park. © James Woodend/Royal Observatory, Greenwich

CN.dart.call("xrailTop", {sz:"300x250", kws:["top"], collapse: true});
Each year, the UK's Royal Observatory in Greenwich runs an Astronomy Photographer of the Year contest. Yesterday, the Observatory announced the winners of its 2013 version, the winners of which will be on display, making it worth a visit if you're anywhere near London. We've brought you some of the winners of microscopy contests in the past; this gives us the chance to feature things at the opposite end of the scale, from planets to galaxies.

Just like the microscopy images, all of them can tell us something about the natural world. Details of images can reveal information about topics that run from orbital mechanics to the behavior of supernovae. But they're a great reminder that something can be both informative and stunningly beautiful. For many people, it was the beauty of the natural world that first inspired them to ask questions about it and set them off on the road that led to a career in science.

Entries are being accepted for the 2014 contest up until late February this year, so if you've got a scope and something compelling, get to work!

Read 1 remaining paragraphs | Comments

Patent troll gives up, can’t defend “matchmaking” patent under new law

Ars Technica - Fri, 19/09/2014 - 14:00

A patent troll called Lumen View Technology got stopped in its tracks last year after it sued Santa Barbara-based startup FindTheBest, then asked the company for a quick $50,000 settlement. It lost its case, and has now said it won't even bother appealing.

Instead of settling to avoid a costly lawsuit, as several other small companies had, FindTheBest responded with a pledge to fight the patent all the way and also slapped Lumen View with a civil RICO lawsuit.

The counter-attack caused Lumen View's patent to be dismantled in short order, when the judge in the case ruled that it was nothing more than a computerized twist on an ancient idea. The patent delineated a process of having parties input preference data, and then an automated process of determining a good match. "Matchmakers have been doing this for millennia," wrote US District Judge Denise Cote in her order invalidating the patent.

Read 6 remaining paragraphs | Comments

Friction Isn’t Always What You Think It Is

Wired - Fri, 19/09/2014 - 13:52

It’s perhaps the second week of your introductory physics course. Your instructor starts talking about friction and writes the following two formulas on the board. Then there is probably some sort of lecture like this: Friction is a contact force when two surfaces interact. The second equation is the kinetic frictional force that is used […]

The post Friction Isn’t Always What You Think It Is appeared first on WIRED.








Sony's Google Glass rival will go on sale by the end of March

OS news - Fri, 19/09/2014 - 13:28
With all the hype and interest in wearables these past few months, you'd think more companies would be looking to compete with Google's Glass headset, but up until now that hasn't really been the case. Sony teased an alternative to Google's gear in the form of a SmartEyeglass prototype first shown off at CES 2014, which aims to be as versatile as Glass while bettering it in some respects as well. The rather awkward-looking SmartEyeglass is peppered with sensors - there's an accelerometer, gyroscope, electronic compass, ambient light sensor, and a 3-megapixel camera - and comes with a wire connecting it to an external battery pack equipped with an extra touch sensor and microphone. If Apple's iPhone Mini won't make you look enough like a dork, there's always this thing.

How to Ditch Android and Join the Apple Side

Wired - Fri, 19/09/2014 - 11:31

Now that Apple’s got its bigger, better iPhone 6 and 6 Plus, we suspect oodles of big-screen Android aficionados may defect to iOS. Here are some tips for making the transition easier.

The post How to Ditch Android and Join the Apple Side appeared first on WIRED.








The Best iOS 8 Keyboards for Every Kind of Typist

Wired - Fri, 19/09/2014 - 11:31

Apple's iOS 8 finally gives iPhone users the ability to choose their own touchscreen keyboards. We've compiled a list of the best ones so far.

The post The Best iOS 8 Keyboards for Every Kind of Typist appeared first on WIRED.








When the Biomedical Industry Can’t Prioritize Diseases, Private Money Can Save Lives​

Wired - Fri, 19/09/2014 - 11:31

My daughter was six when she was diagnosed with type 1 diabetes. Like others parents confronted with such life-altering news, I threw myself into learning everything about the condition. What I found was that this autoimmune disease has no cure, requires relentless glucose and insulin monitoring and can quickly lead to serious health complications—even death—if […]

The post When the Biomedical Industry Can’t Prioritize Diseases, Private Money Can Save Lives​ appeared first on WIRED.








Daniel Pocock: reSIProcate migration from SVN to Git completed

Planet Debian - Fri, 19/09/2014 - 07:47

This week, the reSIProcate project completed the move from SVN to Git.

With many people using the SIP stack in both open source and commercial projects, the migration was carefully planned and tested over an extended period of time. Hopefully some of the experience from this migration can help other projects too.

Previous SVN committers were tracked down using my script for matching emails to Github accounts. This also allowed us to see their recent commits on other projects and see how they want their name and email address represented when their previous commits in SVN were mapped to Git commits.

For about a year, the sync2git script had been run hourly from cron to maintain an official mirror of the project in Github. This allowed people to test it and it also allowed us to start using some Github features like travis-CI.org before officially moving to Git.

At the cut-over, the SVN directories were made read-only, sync2git was run one last time and then people were advised they could commit in Git.

Documentation has also been created to help people get started quickly sharing patches as Github pull requests if they haven't used this facility before.

Paul Tagliamonte: Docker PostgreSQL Foreign Data Wrapper

Planet Debian - Fri, 19/09/2014 - 02:49

For the tl;dr: Docker FDW is a thing. Star it, hack it, try it out. File bugs, be happy. If you want to see what it's like to read, there's some example SQL down below.

This post was edited on Sep 21st to add information about the DELETE and INSERT operators

The question is first, what the heck is a PostgreSQL Foreign Data Wrapper? PostgreSQL Foreign Data Wrappers are plugins that allow C libraries to provide an adaptor for PostgreSQL to talk to an external database.

Some folks have used this to wrap stuff like MongoDB, which I always found to be hilarous (and an epic hack).

Enter Multicorn

During my time at PyGotham, I saw a talk from Wes Chow about something called Multicorn. He was showing off some really neat plugins, such as the git revision history of CPython, and parsed logfiles from some stuff over at Chartbeat. This basically blew my mind.

If you're interested in some of these, there are a bunch in the Multicorn VCS repo, such as the gitfdw example.

All throughout the talk I was coming up with all sorts of things that I wanted to do -- this whole library is basically exactly what I've been dreaming about for years. I've always wanted to provide a SQL-like interface into querying API data, joining data cross-API using common crosswalks, such as using Capitol Words to query for Legislators, and use the bioguide ids to JOIN against the congress api to get their Twitter account names.

My first shot was to Multicorn the new Open Civic Data API I was working on, chuckled and put it aside as a really awesome hack.

Enter Docker

It wasn't until tianon connected the dots for me and suggested a Docker FDW did I get really excited. Cue a few hours of hacking, and I'm proud to say -- here's Docker FDW.

This lets us ask all sorts of really interesting questions out of the API, and might even help folks writing webapps avoid adding too much Docker-aware logic. Abstractions can be fun!

Setting it up The only stumbling block you might find (at least on Debian and Ubuntu) is that you'll need a Multicorn `.deb`. It's currently undergoing an official Debianization from the Postgres team, but in the meantime I put the source and binary up on my people.debian.org. Feel free to use that while the Debian PostgreSQL team prepares the upload to unstable.

I'm going to assume you have a working Multicorn, PostgreSQL and Docker setup (including adding the postgres user to the docker group)

So, now let's pop open a psql session. Create a database (I called mine dockerfdw, but it can be anything), and let's create some tables.

Before we create the tables, we need to let PostgreSQL know where our objects are. This takes a name for the server, and the Python importable path to our FDW.

CREATE SERVER docker_containers FOREIGN DATA WRAPPER multicorn options ( wrapper 'dockerfdw.wrappers.containers.ContainerFdw'); CREATE SERVER docker_image FOREIGN DATA WRAPPER multicorn options ( wrapper 'dockerfdw.wrappers.images.ImageFdw');

Now that we have the server in place, we can tell PostgreSQL to create a table backed by the FDW by creating a foreign table. I won't go too much into the syntax here, but you might also note that we pass in some options - these are passed to the constructor of the FDW, letting us set stuff like the Docker host.

CREATE foreign table docker_containers ( "id" TEXT, "image" TEXT, "name" TEXT, "names" TEXT[], "privileged" BOOLEAN, "ip" TEXT, "bridge" TEXT, "running" BOOLEAN, "pid" INT, "exit_code" INT, "command" TEXT[] ) server docker_containers options ( host 'unix:///run/docker.sock' ); CREATE foreign table docker_images ( "id" TEXT, "architecture" TEXT, "author" TEXT, "comment" TEXT, "parent" TEXT, "tags" TEXT[] ) server docker_image options ( host 'unix:///run/docker.sock' );

And, now that we have tables in place, we can try to learn something about the Docker containers. Let's start with something fun - a join from containers to images, showing all image tag names, the container names and the ip of the container (if it has one!).

SELECT docker_containers.ip, docker_containers.names, docker_images.tags FROM docker_containers RIGHT JOIN docker_images ON docker_containers.image=docker_images.id; ip | names | tags -------------+-----------------------------+----------------------------------------- | | {ruby:latest} | | {paultag/vcs-mirror:latest} | {/de-openstates-to-ocd} | {sunlightlabs/scrapers-us-state:latest} | {/ny-openstates-to-ocd} | {sunlightlabs/scrapers-us-state:latest} | {/ar-openstates-to-ocd} | {sunlightlabs/scrapers-us-state:latest} 172.17.0.47 | {/ms-openstates-to-ocd} | {sunlightlabs/scrapers-us-state:latest} 172.17.0.46 | {/nc-openstates-to-ocd} | {sunlightlabs/scrapers-us-state:latest} | {/ia-openstates-to-ocd} | {sunlightlabs/scrapers-us-state:latest} | {/az-openstates-to-ocd} | {sunlightlabs/scrapers-us-state:latest} | {/oh-openstates-to-ocd} | {sunlightlabs/scrapers-us-state:latest} | {/va-openstates-to-ocd} | {sunlightlabs/scrapers-us-state:latest} 172.17.0.41 | {/wa-openstates-to-ocd} | {sunlightlabs/scrapers-us-state:latest} | {/jovial_poincare} | {<none>:<none>} | {/jolly_goldstine} | {<none>:<none>} | {/cranky_torvalds} | {<none>:<none>} | {/backstabbing_wilson} | {<none>:<none>} | {/desperate_hoover} | {<none>:<none>} | {/backstabbing_ardinghelli} | {<none>:<none>} | {/cocky_feynman} | {<none>:<none>} | | {paultag/postgres:latest} | | {debian:testing} | | {paultag/crank:latest} | | {<none>:<none>} | | {<none>:<none>} | {/stupefied_fermat} | {hackerschool/doorbot:latest} | {/focused_euclid} | {debian:unstable} | {/focused_babbage} | {debian:unstable} | {/clever_torvalds} | {debian:unstable} | {/stoic_tesla} | {debian:unstable} | {/evil_torvalds} | {debian:unstable} | {/foo} | {debian:unstable} (31 rows)

OK, let's see if we can bring this to the next level now. I finally got around to implementing INSERT and DELETE operations, which turned out to be pretty simple to do. Check this out:

DELETE FROM docker_containers; DELETE 1

This will do a stop + kill after a 10 second hang behind the scenes. It's actually a lot of fun to spawn up a container and terminate it from PostgreSQL.

INSERT INTO docker_containers (name, image) VALUES ('hello', 'debian:unstable') RETURNING id; id ------------------------------------------------------------------ 0a903dcf5ae10ee1923064e25ab0f46e0debd513f54860beb44b2a187643ff05 INSERT 0 1 (1 row)

Spawning containers works too - this is still very immature and not super practical, but I figure while I'm showing off, I might as well go all the way.

SELECT ip FROM docker_containers WHERE id='0a903dcf5ae10ee1923064e25ab0f46e0debd513f54860beb44b2a187643ff05'; ip ------------- 172.17.0.12 (1 row)

Success! This is just a taste of what's to come, so please feel free to hack on Docker FDW, tweet me @paultag, file bugs / feature requests. It's currently a bit of a hack, and it's something that I think has long-term potential after some work goes into making sure that this is a rock solid interface to the Docker API.

Giant MQ-4C Triton surveillance drone flies across the United States

Ars Technica - Fri, 19/09/2014 - 00:45
Kelly Schindler/US Navy

This morning, a giant Navy surveillance drone landed at Patuxent River base in Maryland after flying over the Gulf of Mexico and the American Southwest from an airfield owned by Northrup Grumman in Palmdale, California. The test flight represented the first cross-country flight for the MQ-4C Triton drone after 15 previous test flights.

The drone flew 3,290 nautical miles over 11 hours, a Navy press release said. “Operators navigated the aircraft up the Atlantic Coast and Chesapeake Bay at altitudes in excess of 50,000 feet to ensure there were no conflicts with civilian air traffic,” the release noted.

The drone is just the first piece in what the Navy calls Broad Area Maritime Surveillance, or BAMS. The MQ-4C Triton will be used to keep tabs on a wide area using “radar, infrared sensors and advanced cameras to provide full-motion video and photographs to the military,” according to The Washington Post. Eventually, a network of these drones could be deployed to fly around the world and provide 24-hour, 7-day-a-week coverage of a given area.

Read 3 remaining paragraphs | Comments

Jaldhar Vyas: Scotland: Vote A DINNAE KEN

Planet Debian - Fri, 19/09/2014 - 00:39

From the crack journalists at CNN.

Interesting fact: anyone who wore a kilt at debconf is allowed to vote in the referendum.

Home Depot estimates data on 56 million cards stolen by cybercriminals

Ars Technica - Fri, 19/09/2014 - 00:20

The cybercriminals that compromised Home Depot's network and installed malware on the home-supply company's point-of-sale systems likely stole information on 56 million payment cards, the company stated on Thursday.

In the first details revealed in its investigation of the breach, the company said the malicious software that compromised those payment systems had been custom-built to avoid triggering security software. The breach included stores in the United States and Canada and appears to have compromised transactions that occurred between April and September 2014.

"To protect customer data until the malware was eliminated, any terminals identified with malware were taken out of service, and the company quickly put in place other security enhancements," Home Depot said in its statement. "The hacker's method of entry has been closed off, the malware has been eliminated from the company's systems, and the company has rolled out enhanced encryption of payment data to all US stores."

Read 6 remaining paragraphs | Comments

13 Principles Week of Action: The World Needs More Whistleblowers

EFF Breaking News - Fri, 19/09/2014 - 00:09

This is a guest post from Sana Saleem, Advisory Board Member, Courage Foundation. If you have comments on this post, you can contact Sana on Twitter.

In the week leading up the first year aniversary of the 13 Necessary and Proportionate Principles, EFF and the coalition behind the 13 Principles will be conducting a Week of Action explaining some of the key guiding principles for surveillance law reform. Every day, we'll take on a different part of the principles, exploring what’s at stake and what we need to do to bring intelligence agencies and the police back under the rule of law. You can read the complete set of posts at: https://necessaryandproportionate.org/anniversary. Let's send a message to Member States at the United Nations and wherever else folks are tackling surveillance law reform: surveillance law can no longer ignore our human rights. Follow our discussion on twitter with the hashtag: #privacyisaright

The World Needs More Whistleblowers

During the Stockholm Internet Forum this year, a State Department representative was quick to flaunt reforms put in place by the US Government to ‘counter US mass surveillance programmes.’ However, he was unwilling to respond when faced with the simple question “If you are willing to reform laws and mend things, why not honor the man who triggered it, why not bring Edward Snowden home?”

Too often, whistleblowers aren’t valued for the reforms they instigate. Even as government worldwide are considering new ways to limit mass surveillance, there is scant discussion about the need to honor and protect whisteblowers.

The world needs more whistleblowers because those in positions of power are often expert as hiding corruption from the public. People with integrity and a desire for truth and justice within the political system are often our best hope for bringing light to this corruption.

But as much of the world’s press extensively reports on Wikileaks and the Snowden revelations, we must not dismiss the trepidation that comes with reporting the truth and exposing misuse of power. This trepidation will not dissipate unless there is a collective effort to protect and defend whistleblowers, and reform laws that allow for prosecuting them.

There’s also the pressing need to keep using the information provided by whistleblowers to push for necessary reforms and protections. Today is Day 4 of the ‘Necessary and Proportionate’ week of action. The EFF and the coalition behind the 13 Principles are calling on governments to ensure surveillance law reform is guided by key principles. Today we focus on principle 4: the ‘Integrity of Communications and Systems, Safeguards Against Illegitimate Access, Protection on Whistleblowers, and Right to An Effective Remedy’.

What is meant by the ‘Integrity of Communications and Systems’ in practice? The NSA, or any other government for that matter, should not be able to compel service providers or hardware or software vendors to build surveillance or backdoors into their systems. These companies also should not collect or retain particular information purely for state surveillance purposes.

We now have confirmation that governments are going above and beyond compelling companies to build backdoors into their services. In an article posted on The Intercept this week journalist, documentary maker and Intercept co-founder Laura Poitras documents how the NSA is tapping into Germany’s largest telecommunications providers by accessing the passwords of the system administrators. This revelation was greeted with both shock and deep anger by the telco engineers. Governments need to go beyond merely not forcing companies to comply with backdoor requests, they must put an immediate stop to the accessing whole systems covertly. This point addresses the second element of principle 4, when state authorities illegitimately access personal data.

There is no possibility of protecting against this when it’s happening behind the backs of service providers and hardware and software vendors. This leaves the onus on governments, who, in democratic societies, are accountable to their citizens. The third part of this is an onus on government to protect their whistleblowers. The Obama administration, in what the Nieman Reports has labeled the “Big Chill”, is operating amid unprecedented secrecy—while attacking journalists trying to tell the public what they need to know

Former New York Times executive editor Jill Abramson:

Several reporters who have covered national security in Washington for decades tell me that the environment has never been tougher or information harder to dislodge,"

Abramson said

"One Times reporter told me the environment in Washington has never been more hostile to reporting."

Protection of whistleblowers is critically important for the protection of a just society. But it’s not just whistleblowers under attack: it is also increasingly difficult to advocate for whistleblowers given the government and the media’s treatment of those who seek to protect whistleblowers.

The Courage Foundation was set up to provide legal and policy support for those who have made a decision to stand up to the abuse of power, risk their career and, in some cases, family life, so that our liberties are protected. It is for this reason that the need to provide stronger protections for whistleblowers, in such a difficult climate, is incredibly important.

Finally, what happens when the state conducts illegal and warrantless surveillance against its citizens? Snowden’s revelations have revealed state intrusion into the lives of hundreds of millions of Americans and citizens around the world, without proof for suspicion. Does the legal system allow us to challenge such surveillance in court? If it does, what would happen to the US government if they were found guilty of illegally surveilling you or me? The Necessary and Proportionate principles argue for civil and criminal penalties imposed on any party responsible for illegal electronic surveillance and those affected by surveillance must have access to legal mechanisms necessary for effective redress.

Tomorrow is Friday, day 5, in which the EFF and its supporters around the world will call on governments to improve safeguards for International Cooperation and Extraterritorial Application of Human Rights Law. The Courage Foundation stands beside the EFF’s campaign and calls on all rights groups and activists seeking to preserve an Internet free from surveillance to support this campaign.

It was little over a year ago when Edward Snowden performed an act of remarkable conscience. Snowden’s actions have empowered a generation of us to stand up to abuses and to do the right thing, even when it’s not convenient. With the increasing power and resources of state surveillance programs, the world is in dire need of more whistleblowers to continue this fight.

Related Issues: InternationalSurveillance and Human Rights
Share this:   ||  Join EFF

California program asks citizens to trade violent games for ice cream

Ars Technica - Thu, 18/09/2014 - 23:45

While many jurisdictions have tried (and failed) to put legal barriers in place to prevent children from buying or playing violent video games, Calfornia's Marin County is taking a different tack, asking families to voluntarily trade in their violent video games for ice cream and raffle tickets.

The Marin Independent Journal has a report on the county's efforts for Domestic Violence Awareness Month, which include weekly opportunities to trade in violent video games or toy guns. Participants will be provided with ice cream from the local Ben & Jerry's affiliate, according to the report, and parents of those participating will be entered in a raffle for further prizes.

The toy and game drive is being spearheaded by District Attorney Ed Berberian and the Center for Domestic Peace, who teamed up to host a firearm buyback program that took in over 850 weapons two years ago. Why move from collecting real guns to collecting fake guns and games that feature fake guns?

Read 3 remaining paragraphs | Comments

After Apple, Google also makes encryption default in Android L

OS news - Thu, 18/09/2014 - 23:28
Two good pieces of news today. Both Apple and Google have announced that the most recent versions of their mobile operating systems will encrypt user data by default. Google: The next generation of Google's Android operating system, due for release next month, will encrypt data by default for the first time, the company said Thursday, raising yet another barrier to police gaining access to the troves of personal data typically kept on smartphones. Android has offered optional encryption on some devices since 2011, but security experts say few users have known how to turn on the feature. Now Google is designing the activation procedures for new Android devices so that encryption happens automatically; only somebody who enters a device's password will be able to see the pictures, videos and communications stored on those smartphones. And Apple: Rather than comply with binding court orders, Apple has reworked its latest encryption in a way that prevents the company - or anyone but the device's owner - from gaining access to the vast troves of user data typically stored on smartphones or tablet computers. The key is the encryption that Apple mobile devices automatically put in place when a user selects a passcode, making it difficult for anyone who lacks that passcode to access the information within, including photos, e-mails and recordings.

Android L will have device encryption on by default

Ars Technica - Thu, 18/09/2014 - 23:20
Google's cutesy video on law enforcement requests.

The Washington Post is reporting that Google will finally step up security efforts on Android and enable device encryption by default. The Post has quoted company spokeswoman Niki Christoff as saying “As part of our next Android release, encryption will be enabled by default out of the box, so you won't even have to think about turning it on.”

That "next Android release" should be Android L, which is currently out as a developer preview and is expected to be released before the end of the year.

The move should bring Android up to parity with iOS. Apple recently announced enhanced encryption for iOS 8, which Apple says makes it impossible for the company to decrypt a device, even for law enforcement. While Android's encryption was optional, it seems to work in a similar way, with Christoff saying "For over three years Android has offered encryption, and keys are not stored off of the device, so they cannot be shared with law enforcement."

Read 3 remaining paragraphs | Comments

EFF to Defend Student Bitcoin Developers in Court

EFF Breaking News - Thu, 18/09/2014 - 23:15
New Jersey Prosecutors Issue Flawed Subpoena for Tidbit Source Code

Newark, NJ - Electronic Frontier Foundation (EFF) Staff Attorney Hanni Fakhoury will appear before a New Jersey Superior Court judge on Monday, Sept. 22 to oppose a subpoena issued to MIT students over their prize-winning Bitcoin mining program, Tidbit.

Tidbit was designed to serve as an alternative to viewing online advertising by allowing website users to help mine Bitcoins for the site they're visiting instead. It was developed in late 2013 by Jeremy Rubin and fellow classmates at MIT for the Node Knockout Hackathon, where the program ultimately won an award for innovation. The creators never made the program fully functional, serving only as a "proof of concept."

In December 2013, the New Jersey Division of Consumer Affairs issued a subpoena to Rubin, requesting he turn over Tidbit's past and current source code, as well as other documents and agreements with any third parties. It also issued 27 formal written questions requesting additional documents and ordering Rubin to turn over information such as the names and identities of all Bitcoin wallet addresses associated with Tidbit, a list of all websites running Tidbit's code, and the name of anybody whose computer mined for Bitcoins through the use of Tidbit.

EFF represents Rubin and Tidbit in opposing the unjustifiably broad subpoena. In court, Fakhoury will argue three points:

- The State of New Jersey's attempts to target out-of-state activity is unconstitutional.

- New Jersey has no jurisdiction over Rubin or Tidbit.

- If the subpoena is upheld, Rubin and Tidbit must receive immunity. Otherwise, the court would be forcing Rubin and Tidbit to testify against themselves in violation of the Fifth Amendment to the U.S. Constitution and New Jersey state law.

"While the state certainly has a right to investigate consumer fraud, threatening out of state college students with subpoenas isn't the way to do it," Fakhoury said. "The students have disbanded their award-winning project. As MIT students and faculty have warned, the fear that any state can issue broad subpoenas to any student anywhere in the country will have a chilling effect on campus technological innovation beyond Tidbit."

What: Motion Hearing in Rubin v. New Jersey

Who: Hanni Fakhoury, EFF Staff Attorney

Date: Monday, Sept. 22

Time: 1:30 p.m. ET

Location: Courtroom of the Honorable Gary Furnari

Essex County Historic Court House, Courtroom 211

470 Martin Luther King Jr. Blvd., Newark, NJ 07102

For the motion: https://www.eff.org/files/2014/02/03/rubin_v._nj_brief.pdf

Contacts:

Hanni Fakhoury
   Staff Attorney
   Electronic Frontier Foundation
   hanni@eff.org


Share this:   ||  Join EFF

Rape victim’s lawsuit shows the limits of website immunity law

Ars Technica - Thu, 18/09/2014 - 23:05
US Court of Appeals for the 9th Circuit, Pasadena courthouse. --Mark--

In general, websites aren't responsible for the things their users do or post. That's because of a landmark federal Internet law, known as Section 230 of the Communications Decency Act.

The law allows sites like Yelp, Craigslist, and YouTube to host loads of user-produced content, while directing most lawsuits over that content toward the users, not the websites.

However, an appeals court ruling yesterday may join the small batch of precedents that set out the murky limits of CDA Section 230. A three-judge panel of the US Court of Appeals for the 9th Circuit has allowed (PDF) an alleged rape victim to sue ModelMayhem.com, a site she says was used by her attackers.

Read 13 remaining paragraphs | Comments

Teen with lymphatic malformations has profile photo deleted by Facebook

Ars Technica - Thu, 18/09/2014 - 22:45
"I am what I am, and I look like me, not everyone else."

On Tuesday, Norwegian news site VG reported that a 16-year-old boy found his newest Facebook profile photo deleted automatically by the site, but not for containing offensive content or misrepresenting himself. Embret Henock Haldammen, a high school student in Kristiansand, Norway, had posted his latest school portrait weeks earlier, only to receive a notice stating that "the profile picture violated Facebook's policies."

Without receiving a response clarifying what those policies were, Haldammen came to the conclusion that the image was deleted because of his face's lymphatic malformations, which he's had since birth.

"We're used to people pointing, looking, and laughing at him," Haldammen's father said to Norwegian news site Fædrelandsvennen (translated by Google). "But that Facebook acts as a youth, and not a company, is appalling." The reports also include a photo of Haldammen posing with a former Norwegian Prime Minister, which he had used as a profile photo in the past with no incident.

Read 5 remaining paragraphs | Comments

Syndicate content