subskrybent kanałów informacyjnych

ICANN Postpones Amazon Domain Decision, Crusade Continues Between Amazon Nations and Amazon Inc.

CircleID - Śro, 2019-03-13 00:22

ICANN on Monday extended the deadline to April for Amazon basin nations to reach a deal with the tech giant Amazon Inc in their seven-year battle over the .amazon domain name. Reuters reports: "[ICANN] meeting this week in Kobe, Japan, decided to put off a decision that was expected to favor use of the domain by the world's largest online retailer. Amazon basin countries Brazil, Bolivia, Peru, Ecuador, Colombia, Venezuela, Guyana and Suriname have fought the domain request since it was made in 2012, arguing that the name refers to their geographic region and thus belongs to them."

Amazon nations remain "firmly opposed" to Amazon Inc gaining exclusive control of the domain name, says Brazil's foreign ministry. He adds: "Brazil and its seven Amazon partners will continue to negotiate in good faith with Amazon.com to try to reach a 'mutually acceptable solution' to the domain dispute."

Supporting .Amazon domain strengthens global internet cooperation, says Christian Dawson of i2Coalition: "Though we should all be sympathetic to the position of the governments of Brazil and Peru, we should also be impressed with the extensive efforts that Amazon has undertaken in order to assuage as many of those concerns as possible. They have made formal signed commitments to not use the TLDs in a confusing manner. They have promised to support future gTLD applications to represent the region using the geographic terms of the regions, including .AMAZONIA, .AMAZONICA or .AMAZONAS. They also offered to reserve for the relevant governments certain domain names that could cause confusion or touch on national sensitivities.

Follow CircleID on Twitter

More under: Domain Names, ICANN, Internet Governance, New TLDs

Windows 10 Could Automatically Uninstall Buggy Windows Updates

Slashdot - Wto, 2019-03-12 23:50
Microsoft is reportedly working on a new functionality that will automatically remove botched updates from Windows 10 to fix startup issues and other bugs preventing the PC from booting. "The support document was quietly published a couple of hours ago and for some reasons, Microsoft has also blocked the search engines from crawling or indexing the page," reports Windows Latest. "In the document, Microsoft explains that Windows may automatically install updates in order to keep your device secure and smooth." From the report: Due to various reasons, including software and driver compatibility issues, Windows Updates are vulnerable to mistakes and hardware errors. In some cases, Windows Update may fail to install. After installing a recent update, if your PC experience startup failures and automatic recovery attempts are unsuccessful, Windows may try to resolve the failure by uninstalling recently installed updates. In this case, users may receive a notification with the following message: "We removed some recently installed updates to recover your device from a startup failure." Microsoft says that Windows will also automatically block the problematic updates from installing automatically for the next 30 days. During these 30 days, Microsoft and its partners will investigate the failure and attempt to fix the issues. When the issues are fixed, Windows will again try to install the updates. Users still have the freedom to reinstall the updates. If you believe that the update should not be removed, you can manually reinstall the driver or quality updates which were uninstalled earlier.

Read more of this story at Slashdot.

Portland City Council May Ask FCC To Investigate Health Risks of 5G Networks

Slashdot - Wto, 2019-03-12 23:12
An anonymous reader quotes a report from Inverse: Fearing unknown health risks, members of the City Council in Portland, Oregon, will vote Wednesday to oppose the rollout of 5G wireless networks. In a proposed resolution, Mayor Ted Wheeler, along with Commissioners Chloe Eudaly and Amanda Fritz, write that there's evidence suggesting wireless networks can cause health problems -- including cancer. They express concern that the Federal Communications Commission has not conducted enough research to demonstrate that 5G networks are safe, while at the same time prohibiting state and local governments from passing their own regulations on telecommunications technology. And while Wheeler, Eudaly, and Fritz are correct about the FCC's power to dictate how state and local governments manage wireless networks, the connection between 5G networks and cancer is a lot more complicated than they say it is. "There is evidence to suggest that exposure to radio frequency emissions generated by wireless technologies could contribute to adverse health conditions such as cancer," reads the proposed resolution. This evidence comes from a large-scale study conducted by the National Toxicology Program (NTP), a division of the US Department of Health and Human Services. The final results of this study, published in November 2018, showed a strong association between the type of radiation used for mobile phone signals and certain types of cancerous tumors in lab rats. But that's where the situation gets tough. The NTP study, which took place over 10 years and involved exposing more than 7,000 rats and mice to radio-frequency radiation, focused on signals used by wireless technology under the 2G and 3G standards. It's nearly impossible to say whether these results will apply to 5G hardware. "Since the available research doesn't address 5G, the Portland City Council's resolution demands that the FCC embark on another such research project to assess the health effects of 5G," reports Inverse. "Presumably, it would take just as long to conduct another study on the hypothesized connection between 5G and cancer, but by that time, the industry will almost certainly have moved on to 6G -- or 7G."

Read more of this story at Slashdot.

Researchers Find Critical Backdoor In Swiss Online Voting System

Slashdot - Wto, 2019-03-12 22:35
An international group of researchers who have been examining the source code for an internet voting system that Switzerland plans to roll out this year have found a critical flaw in the code that would allow someone to alter votes without detection. New submitter eatmorekix shares a report: The cryptographic backdoor exists in a part of the system that is supposed to verify that all of the ballots and votes counted in an election are the same ones that voters cast. But the flaw could allow someone to swap out all of the legitimate ballots and replace them with fraudulent ones, all without detection. "The vulnerability is astonishing," said Matthew Green, who teaches cryptography at Johns Hopkins University and did not do the research but read the researchers' report. "In normal elections, there is no single person who could undetectably defraud the entire election. But in this system they built, there is a party who could do that." The researchers provided their findings last week to Swiss Post, the country's national postal service, which developed the system with the Barcelona-based company Scytl. Swiss Post said in a statement the researchers provided Motherboard and that the Swiss Post plans to publish online on Tuesday, that the researchers were correct in their findings and that it had asked Scytl to fix the issue. It also downplayed the vulnerability, however, saying that to exploit it, an attacker would need control over Swiss Postâ(TM)s secured IT infrastructure "as well as help from several insiders with specialist knowledge of Swiss Post or the cantons."

Read more of this story at Slashdot.

Fast-Growth Chickens Produce New Industry Woe: 'Spaghetti Meat'

Slashdot - Wto, 2019-03-12 21:50
An anonymous reader shares a report: Chicken companies spent decades breeding birds to grow rapidly and develop large breast muscles. Now the industry is spending hundreds of millions of dollars to deal with the consequences ranging from squishy fillets known as "spaghetti meat," because they pull apart easily, to leathery ones known as "woody breast." [Editor's note: the link may be paywalled; alternative source.] The abnormalities pose no food safety risk, researchers and industry officials say. They are suspected side effects of genetic selection that now allows meat companies to raise a 6.3-pound bird in 47 days, roughly twice as fast as 50 years ago, according to the National Chicken Council. That efficiency drive has helped U.S. meat giants such as Tyson Foods, Pilgrim's Pride, Perdue Farms and Sanderson Farms produce a record 42 billion pounds of chicken nuggets, tenders and other products in 2018. Now, it's adding an estimated $200 million or more in annual industry expenses to identify and divert breast fillets that are too tough, too squishy or too striped with bands of white tissue to sell in restaurants or grocery stores, according to researchers at the University of Arkansas.

Read more of this story at Slashdot.

Intel CPU Shortages To Worsen in Q2 2019: Research

Slashdot - Wto, 2019-03-12 21:12
Shortages of Intel's CPUs are expected to worsen in the second quarter compared to the first as demand for Chromebooks, which are mostly equipped with Intel's entry-level processors, enters the high period, according to Digitimes Research. From the report: Digitimes Research expects Intel CPUs' supply gap to shrink to 2-3% in the first quarter with Core i3 taking over Core i5 as the series hit hardest by shortages. The shortages started in August 2018 with major brands including Hewlett-Packard (HP), Dell and Lenovo all experiencing supply gaps of over 5% at their worst moment. Although most market watchers originally believed that the shortages would gradually ease after vendors completed their inventory preparations for the year-end holidays, the supply gap in the fourth quarter of 2018 still stayed at the same level as that in the third as HP launched a second wave of CPU inventory buildup during the last quarter of the year, prompting other vendors to follow suit. Taiwan-based vendors were underprepared and saw their supply gaps expand from a single digit percentage previously to over 10% in the fourth quarter. With all the impacts, the notebook market continued suffering a 4-5% supply gap in the fourth quarter of 2018.

Read more of this story at Slashdot.

Boeing To Make Key Change in 737 MAX Cockpit Software

Slashdot - Wto, 2019-03-12 20:33
Boeing is making an extensive change to the flight-control system in the 737 MAX aircraft implicated in October's Lion Air crash in Indonesia, going beyond what many industry officials familiar with the discussions had anticipated. From a report: The change was in the works before a second plane of the same make crashed in Africa last weekend -- and comes as world-wide unease about the 737 MAX's safety grows. The change would mark a major shift from how Boeing originally designed a stall-prevention feature in the aircraft, which were first delivered to airlines in 2017. U.S. aviation regulators are expected to mandate the change by the end of April. Boeing publicly released details about the planned 737 MAX software update late Monday [Editor's note: the link may be paywalled; alternative source]. A company spokesman confirmed the update would use multiple sensors, or data feeds, in MAX's stall-prevention system -- instead of the current reliance on a single sensor. The change was prompted by preliminary results from the Indonesian crash investigation indicating that erroneous data from a single sensor, which measures the angle of the plane's nose, caused the stall-prevention system to misfire. Then, a series of events put the aircraft into a dangerous dive.

Read more of this story at Slashdot.

The Pace of Domain Growth Has Slowed Considerably, Reports CENTR

CircleID - Wto, 2019-03-12 20:01

The global Top-Level Domain market is currently estimated at 348 million domains across all recorded TLDs. Although the overall domain count has continued to grow in all regions and types, the Council of European National Top-Level Domain Registries (CENTR) reports that the pace of growth has slowed considerably. "As of January 2019, it has seen its lowest recorded year-on-year rate of 3.7%."

"While domain count and growth are not the only measurement of market health, they can provide an indication of general uptake and interest in domain names. At present, the indication is a continued slow-down. This may be explained by multiple factors, such as a market saturation, alter- native online presence choices (e.g. social media) or even a concentra- tion of market share to fewer TLDs."

Follow CircleID on Twitter

More under: Domain Names, New TLDs

Actresses, Business Leaders, and Other Wealthy Parents Charged in Massive College Admissions Scandal

Slashdot - Wto, 2019-03-12 19:45
Federal prosecutors charged dozens of people on Tuesday in a major college admission scandal that involved wealthy parents, including Hollywood celebrities and prominent business leaders, paying bribes to get their children into elite American universities. From a report: Federal officials have charged dozens of well-heeled parents, including actresses Felicity Huffman and Lori Loughlin, in what the Justice Department says was a multimillion-dollar scheme to cheat college admissions standards. The parents allegedly paid a consultant who then fabricated academic and athletic credentials and arranged bribes to help get their children into prestigious universities. "We're talking about deception and fraud -- fake test scores, fake credentials, fake photographs, bribed college officials," said Andrew Lelling, the U.S. attorney for the District of Massachusetts. Lelling said 33 parents "paid enormous sums" to ensure their children got into schools such as Stanford and Yale, sending money to entities controlled by a man named William Rick Singer in return for falsifying records and obtaining false scores on important tests such as the SAT and ACT. Describing how Singer worked to present his clients' children as elite athletes, Lelling said, "In many instances, Singer helped parents take staged photographs of their children engaged in particular sports. Other times, Singer and his associates used stock photos that they pulled off the Internet -- sometimes Photoshopping the face of the child onto the picture of the athlete" and submitting it to desirable schools.

Read more of this story at Slashdot.

Amazon's Alexa has 80,000 Apps -- and No Runaway Hit

Slashdot - Wto, 2019-03-12 19:05
Amazon's Echo-branded smart speakers have attracted millions of fans with their ability to play music and respond to queries spoken from across the room. But almost four years after inviting outside developers to write apps for Alexa, Amazon's voice system has yet to offer a transformative new experience. From a report: Surveys show most people use their smart speakers to listen to tunes or make relatively simple requests -- "Alexa, set a timer for 30 minutes" -- while more complicated tasks prompt them to give up and reach for their smartphone. Developers had less trouble creating hits for previous generations of technology. Think Angry Birds or Pokemon Go on the iPhone, or, decades ago, spreadsheets on the first Windows computers. Amazon counts some 80,000 "skills" -- its name for apps -- in its marketplace. It seems impressive, but at this point in their development, Apple's App Store and the Google Play Store each boasted more than 550,000 applications and minted fortunes for many successful developers. "This platform is almost four years old, and you can't point me to one single killer app," says Mark Einhorn, who created a well-reviewed Alexa game that lets users operate a simulated lemonade stand and is one of 10 developers interviewed for this story.

Read more of this story at Slashdot.

How to Track Online Malevolent Identities in the Act

CircleID - Wto, 2019-03-12 18:52

Want to be a cybersleuth and track down hackers?

It may sound ambitious considering that malevolent entities are extremely clever, and tracing them requires certain skills that may not be easy to build for the typical computer user.

But then again, the best defense is offense. And learning the basics of sniffing out cybercriminals may not only be necessary nowadays, it has become essential for survival on the Web. So where can you begin?

Place Honeypots

Hackers take great care to cover their tracks. So, it's important to catch them with their hand in the cookie jar. You can do so by setting up a bait — called a honeypot — to lure them out. It can take the form of a spammable domain or an easily hackable virtual machine which can appear as legitimate targets.

Once attacked, honeypots help you observe what intruders do to the system, know the tricks that they employ to infect devices, and subsequently find ways to counter them. Such forensic evidence enables law enforcers to track unsolicited access and then locate and catch perpetrators.

Reverse-Engineering Malware

Let's say that despite all the precautions, malware still succeeded in infiltrating your company's system. Instead of losing sleep, you can use the infection to understand how the malicious program operates and what it's been engineered to do, such as what vulnerabilities it's been designed to exploit.

This process is called reverse engineering. It involves disassembling the program to be able to analyze and retrieve valuable information on how it is used or when it was created. It is extremely helpful in finding substantial evidence such as encryption keys or other digital footprints that can lead investigators to the cybercriminals.

Leverage WHOIS Information

When a complaint is received over a dangerous website, the first step in the investigation is to identify the operator of the suspect domain.

This can be done by querying the domain name registry where the site has been registered. A whois database download service, for example, enables users to retrieve the WHOIS data that contains the name, location, and contact details of domain registrants. With this information in hand, security teams can report the matter to law enforcement agents who can then track down malicious operators and apprehend them on the spot.

Inspect Files' Metadata

Once in possession of files and devices from a suspicious entity, you can analyze the evidence that is saved in them and discover crucial details that can be followed back to the source.

Word, Excel, or PowerPoint files, for example, contain relevant information, called metadata, that can blow a hacker's cover. They include the name of the person that created the file, the organization, the computer, and the local hard drive or network server where the document was saved.

It is also important to analyze the grammar used in comments that are embedded in the software code. Socio-cultural references, nicknames, language, and even the use of emojis — all can reveal clues on the nationalities of the criminals or their geographical location.

Go On with Tracerouting

One of the best ways to catch perpetrators is by identifying their IP addresses. However, they usually hide these IPs by spoofing or by bouncing communications from different locations. Luckily, no matter how shrewd and clever these individuals may be, malicious addresses can still be identified through an approach called tracerouting.

The technique works by showing the hostnames of all the devices within the range of your computer and a target machine. More often than not, the last machine's hostname address belongs to the hacker's Internet Service Provider. With the ISP known, investigators can then pinpoint the geographical location and the areas where the culprit is probably situated.

* * *

Every time you venture online, you're exposed to malevolent entities that can harm your system and disrupt business operations. Knowing how to trace the source of an attack can stop it in its tracks and prevent the intervention from happening again.

Written by Jonathan Zhang, Founder and CEO of Threat Intelligence Platform

Follow CircleID on Twitter

More under: Cybersecurity, Malware, Spam, Whois

Putting Cyber Threats Into Perspective

CircleID - Wto, 2019-03-12 18:37

As society uses more digital technologies we are increasingly also faced with its problems.

Most of us will have some horror stories to tell about using computers, smartphones, and the internet. But this hasn't stopped us from using the technology more and more. I believe that most people would say that their lives would be worse without technology — in developed countries but equally in the developing world, where mobile phones and the internet have revolutionised the lives of hundreds of millions of individual people, resulting in great personal benefits involving, for example, employment, business, education (information) and healthcare.

And, while there are certainly also downsides, with hacks, identity theft, populism, cyberbullying, cybercrime and so on, the positives of ICT still far outweigh the negatives. Yet in recent years cybersecurity has achieved political importance that greatly exceeds its actual threat.

Despite the various and ongoing cyber threats the world seems to function quite well; and, as my colleague Andrew Odlyzko in his recent paper Cyber security is not (very) important argues, there have been many other security threats that are having a far greater impact on us than all the cyber threats combined. Think of the recent tsunamis, earthquakes, floods, epidemics, financial collapse (2008), 9/11 and so on. What about the massive damage done by guns in America or the hundreds of thousands of car casualties around the world every year? We seem to treat that as acceptable collateral damage.

In many of these cases, there is little political will to address the underlying issues like climate change, inequality and oligarchy, environmental degradation, gun control and so on.

Interestingly, many of those disasters do have some predictability and, if we wanted to, we could do much more about them. But that would require far more political attention around those more serious issues, and most politicians shy away from this. Cybersecurity seems to be an easier target.

If we look at history, we see that the collapse of societies has far more to do with those environmental issues than with technology. That is not to say that we should ignore cybersecurity. Of course not. But looking back on the last few decades cybersecurity has followed the same growth patterns as technology, and there is no reason to believe that this is going to change. We seem to be able to manage the cyber threats in the same way we can deal with other social problems such as crimes like theft and robbery, and so there is no overwhelming need to over-emphasise cyber threats.

As Andrew puts it, with all other social imperfections, we will never be able to get absolute cybersecurity. And, yes, there will be technological disasters, but it is unlikely that they will ever be on the scale of all the other disasters that humanity is facing.

So let's put this into perspective; and I would argue let's concentrate on how to address those far more dangerous developments, such as climate change, and how to look at ways ICT technology can assist humanity in finding solutions for this.

Amazingly it is here that government policies are moving backward, with relatively fewer funds being made available for innovation, research and development, education, e-health and so on.

There is also an important psychological element in cybercrime. Cyber breaches are widely reported but we must realise that vote rigging, gerrymandering and vote stacking, carried out in far more traditional ways, have a much greater impact on election outcomes than the influence of cybercrime.

Another example here is that, while many financial databases have been hacked and millions of credit cards have been captured, relatively little damage has been done, as banks have sophisticated ICT systems in place that can detect fraudulent transactions. Yet the financial damage of greedy banks nearly brought economies down in 2008.

Nevertheless, my greatest worry is still the Big Brother effect of cybersurveillance. It has the potential to further undermine our already weakening democratic structures. This has nothing to do with cybersecurity — in fact, cybersecurity can't be used to solve this problem. And, despite the fact that the issue is now being far more seriously investigated by law-makers and regulators, especially in Europe and Australia, the major issue continues to be the lack of political will to address these issues.

The ICT world with all its 'goods and bads' reflects our messy society and it is that same society that has led us to where we are now. And in many cases, our progress has been based on muddling on, with the occasional starburst.

While there are certainly many worrying signs in society today it remains our responsibility not to charge blindly in the same direction as some of our forebears did, which led to the collapse of many previous civilisations. We are now in a far better position to understand what causes those collapses and we are capable of innovation and diversifying to avoid disaster. And we — the people in the ICT industry — are in the privileged position of being able to assist societies by creating the right tools to further prosperity for all.

Written by Paul Budde, Managing Director of Paul Budde Communication

Follow CircleID on Twitter

More under: Cyberattack, Cybercrime, Cybersecurity, Internet Governance, Policy & Regulation

Microsoft Will Now Pester Windows 7 Users To Upgrade To Windows 10 With Pop-ups

Slashdot - Wto, 2019-03-12 18:27
Mark Wilson writes: Anyone who is still using Windows 7 doesn't have much longer until the operating system is no longer supported by Microsoft. Come January 14, 2020 only those enterprise customers who are willing to pay for Extended Security Updates will receive any kind of support. Microsoft has already done a lot to encourage Windows 7 diehards to make the move to Windows 10, and now it is stepping things up a gear. Throughout 2019, the company will show pop-up notifications in Windows 7 about making the switch to the latest version of Windows.

Read more of this story at Slashdot.

Chrome's Lite Pages Speed Up HTTPS Webpages on Slow Connections

Slashdot - Wto, 2019-03-12 17:45
An anonymous reader shares a report: Frustrated by web pages that never seem to load properly? Well, Google hopes to make them a thing of the past. Today, the company announced that Chrome on Android's Data Saver, a feature that automatically improves page loading using "built-in optimizations" and dedicated servers -- speeding them up by a factor of two and reducing data usage by up to 90 percent -- now supports encrypted HTTPS webpages. Previously, it only worked with unencrypted HTTP content. The latest stable version of Chrome on Android indicates in the URL bar when a lightweight version of a web page -- a Lite page -- is being displayed. Tapping the indicator shows additional information and provides an option to load the original version of the page. Google says that Chrome will automatically disable Lite pages on a per-site basis when it detects that "users frequently opt to load the original page."

Read more of this story at Slashdot.

Node.js and JS Foundations Are Merging To Form OpenJS

Slashdot - Wto, 2019-03-12 17:07
The Linux Foundation today unveiled several major collaborative partnerships as it looks to cement the development of various open source projects that power much of the web. From a report: First off, the Node.js Foundation and the JS Foundation, which the Linux Foundation launched in 2016, are merging to form the OpenJS Foundation. The merger between the two chief organizations that focus on JavaScript comes six months after they publicly began to explore such a possibility with their communities. The OpenJS Foundation will focus on hosting and funding activities that support the growth of JavaScript and web technologies, the Linux Foundation said in a press release. The OpenJS Foundation consists of 29 open source JavaScript projects including jQuery, Node.js, Appium, Dojo, and webpack. The merger is supported by 30 corporate and end user members including Google, Microsoft, IBM, PayPal, GoDaddy, and Joyent that recognize the "interconnected nature of the JavaScript ecosystem, and the importance of providing a neutral home for projects which represent significant shared value," the Linux Foundation said in a prepared statement. Also in the report: The Linux Foundation has created CHIPS Alliance, a project that aims to host and curate open source code relevant to design of chips that power mobile, IoT, and other consumer electronic devices; and the Continuous Delivery Foundation, which aims to serve as a platform for vendors, developers, and users to frequently engage and share insights and best practices to spur the development of open source projects. It also announced that the GraphQL Foundation is collaborating with Joint Development Foundation to encourage "contributions, stewardship, and a shared investment from a broad group in vendor-neutral events, documentation, tools, and support for the data query language."

Read more of this story at Slashdot.

Microsoft is Preparing To Test Android App-Mirroring on Windows 10

Slashdot - Wto, 2019-03-12 16:28
Microsoft showed off the ability to mirror applications running on an Android phone to a Windows 10 PC last fall. Windows Insiders could begin testing this feature as soon as this week. From a report: MSPoweruser reports that the Android app-mirroring feature initially will be available on certain Android phones running Android 7.0 or greater, specifically the Samsung Galaxy S8, S8+, S9 and S9+. Supported Windows 10 PCs need to have the "Bluetooth radio supports Low Energy Peripheral Role" on their systems in order to get the app-mirroring feature to work. Users will need to have Microsoft's Your Phone app installed for the feature to work. Only Windows Insiders running the latest test builds on certain devices will be able to test app-mirroring at first.The app-mirroring feature potentially could be available to Insiders as soon as this week.

Read more of this story at Slashdot.

Firefox Send Lets You Share 1GB Files With No Strings Attached

Slashdot - Wto, 2019-03-12 15:40
In 2017, Mozilla experimented with a service that let you transfer 1GB files by sharing a web address with the recipient. Firefox Send is now out of testing and boasts a magnified 2.5GB file-size limit if you log into your Firefox account. From a report: Firefox Send is handy for those moments when you need to share video, audio or photo files that can be too big to squeeze into an email attachment. [...] Firefox Send, which will also be available as an Android app, illustrates one of Mozilla's efforts to diversify beyond the Firefox browser. Mozilla touts Firefox Send as focusing on privacy and uses encryption to protect files. Firefox Send files are available for up to seven days and can be password-protected. You can also limit the number of times they're downloaded.

Read more of this story at Slashdot.

Tim Berners-Lee Says World Wide Web Must Emerge From 'Adolescence'

Slashdot - Wto, 2019-03-12 15:01
The fraying World Wide Web needs to rediscover its strengths and grow into maturity, its designer Tim Berners-Lee said on Monday, marking the 30th anniversary of the collaborative software project his supervisor initially dubbed "vague but exciting." From a report: Speaking to reporters at CERN, the physics research center outside Geneva where he invented the web, Berners-Lee said users of the web had found it "not so pretty" recently. "They are all stepping back, suddenly horrified after the Trump and Brexit elections, realizing that this web thing that they thought was that cool is actually not necessarily serving humanity very well," he said. "It seems we don't finish reeling from one privacy disaster before moving onto the next one," he added, citing concerns about whether social networks were supporting democracy. People who had grown up taking the internet's neutrality for granted now found that the administration of U.S. President Donald Trump had "rolled that back."

Read more of this story at Slashdot.

Microsoft Asks Users To Call Windows 10 Devs About ALT+TAB Feature

Slashdot - Wto, 2019-03-12 14:00
An anonymous reader quotes a report from Bleeping Computer: Microsoft has started to display notifications in the Windows 10 Action Center asking users to have a phone call with Microsoft developers and provide direct feedback about the ALT+TAB feature in Windows. While using a Windows 10 Insider build today, I was shown a Feedback Hub notification stating that "Microsoft wants to hear your opinions! To set up a phone call with Windows engineers, go to: http://www.aka.ms/alttab." This link then redirects to a web page at https://ux.microsoft.com/?AltTab. It is not known if this is only being shown to Windows Insiders users at this time. When users visit this link they will be shown a Microsoft User Research page stating that a Windows 10 product team is looking to "understand our customer needs" and would like to have an anonymous 5-10 minute phone call with the user. In this particular case, the phone call will be with Microsoft engineers to discuss how users use the ALT+TAB feature to switch between apps. Microsoft states they are performing these calls in order to get a better understanding of how a feature is being used while they are in development. According to the web site, Windows engineers will be available on 3/11/2019 between 11:15 AM and 1:00 PM PST and on 3/12/2019 between 9:30 AM and 11:30 AM PST to schedule a call. The page goes on to say that users can expect a 5-10 minute call, but that it could last longer if there is more to discuss. They also state that the calls are not being recorded, are anonymous, and the content of the call will not be stored.

Read more of this story at Slashdot.

US Tells Germany To Stop Using Huawei Equipment Or Lose Some Intelligence Access

Slashdot - Wto, 2019-03-12 11:00
The Wall Street Journal is reporting that the United States has told Germany to drop Huawei from its future plans or risk losing access to some U.S. intelligence. The U.S. says the Chinese company's equipment could be used for espionage -- a concern that Huawei says is unfounded. "The Trump administration has been pressing allies to end their relationships with Huawei, but Germany, moving ahead with its plans, has not moved to ban the company from its networks," reports The Verge. From the report: According to the Journal, a letter sent from the U.S. Ambassador to Germany warns the country that the U.S. will stop sharing some secrets if it allows Huawei to work on its next-generation 5G infrastructure. The letter, according to the Journal, argues that network security can't be effectively managed by audits of equipment or software. While the U.S. plans to continue sharing intelligence with Germany regardless, the Journal reports, officials plan to curtail the scope of that information if Huawei equipment is used in German infrastructure.

Read more of this story at Slashdot.

Subskrybuj zawartość