technology
What if you could not access YouTube, Facebook, Twitter, and Wikipedia? How would you feel if Google informed you that your connection had been reset during a search? What if Gmail was only periodically available, and Google Docs was completely unreachable?
These things happen almost every day in China. […] Most of these problems are caused by GFW (Great Firewall of China, also known as GFC), one of the most important building blocks in China’s comprehensive censorship system, and perhaps the most sophisticated Internet censorship system in the world. […] Using special techniques, it successfully blocks the majority of Chinese Internet users from accessing most of the Web sites or information that the government doesn’t like. […]
Over a decade of development, GFW has been deployed near the gateways of all Chinese domestic ISPs. With DPI (deep packet inspection) technology, GFW wiretaps all international links and inspects the traffic to detect any sensitive keywords going through the gateway. GFW depends mainly on three technologies to block “harmful” information: IP blocking, DNS (Domain Name System) injection, and TCP RST (Reset).
{ ACM | Continue reading }
photo { Florian Ruiz }
asia, technology | December 10th, 2012 7:44 pm
horror, kids, sex-oriented, technology | December 7th, 2012 3:00 pm
Check Point has revealed how a sophisticated malware attack was used to steal an estimated €36 million from over 30,000 customers of over 30 banks in Italy, Spain, Germany and Holland over summer this year.
The theft used malware to target the PCs and mobile devices of banking customers. The attack also took advantage of SMS messages used by banks as part of customers’ secure login and authentication process.
The attack worked by infecting victims’ PCs and mobiles with a modified version of the Zeus trojan. When victims attempted online bank transactions, the process was intercepted by the trojan.
Under the guise of upgrading the online banking software, victims were duped into giving additional information including their mobile phone number, infecting the mobile device. The mobile Trojan worked on both Blackberry and Android devices, giving attackers a wider reach.
{ Net Security | Continue reading }
Onity, the company whose locks protect 4 million or more hotel rooms around the world, has agreed to reimburse at least some fraction of its hotel customers for the cost of fixing a security flaw exposed in July.
{ Forbes | Continue reading }
Some cyberattacks over the past decade have briefly affected state strategic plans, but none has resulted in death or lasting damage. For example, the 2007 cyberattacks on Estonia by Russia shut down networks and government websites and disrupted commerce for a few days, but things swiftly went back to normal. The majority of cyberattacks worldwide have been minor: easily corrected annoyances such as website defacements or basic data theft — basically the least a state can do when challenged diplomatically.
Our research shows that although warnings about cyberwarfare have become more severe, the actual magnitude and pace of attacks do not match popular perception.
{ Foreign Affairs | Continue reading }
economics, spy & security, technology | December 7th, 2012 9:32 am
Verizon is arguing before the Court of Appeals for the D.C. Circuit that broadband providers have a right to decide what they transmit online. […] According to Verizon’s argument:
In performing these functions [providing the transmission of speech from Point A to Point B], broadband providers possess ‘editorial discretion.’
Just as a newspaper is entitled to decide which content to publish and where, broadband providers may feature some content over others.
In effect, Verizon claims that by transmitting bits – providing Internet access – it gains the rights of a newspaper like the Washington Post or the New York Times. This assertion has no basis in constitutional law, and in fact repudiates many positions taken by Verizon before Congress, courts and the FCC over the years.
[…]
“Verizon and its predecessors have argued exactly to the contrary time after time — including when they were fighting for open access to cable companies’ wires a decade ago and when they have claimed immunity from liability based on their status as a transmissions provider for the content they carry,” said Tyrone Brown, who served as an FCC Commissioner from 1977-1981.
{ Roosevelt Institute | Continue reading }
U.S., law, technology | December 6th, 2012 9:12 am
With everything from banking records and health data to contacts lists and photos available through our mobile phones, the ability to securely access this data is an increasingly important concern. That’s why many phone manufactures and data holders are keen on biometric security systems that reliably identify individuals.
The question of course is which biometric system to use. Face, fingerpint and iris recognition are all topics of intense research. But the most obvious choice for a mobile phone is surely voice identification. However, this approach has been plagued with problems.
For example, people’s voices can change dramatically when they are ill or in a hurry. What’s more, it’s relatively easy to record somebody’s voice during authentication and use that to break the system. So many groups have steered away from voice biometrics.
That could be set to change. Today, RC Johnson at the University of Colorado at Colorado Springs and a couple of pals lay out a new approach to voice biometrics which they say solves these problems. The new system provides secure authentication while also preserving the privacy of the user.
In the new system, users set up their accounts by recording a large number of words and phrases which are sent in encrypted form to a bank, for example. This forms a template that the bank uses to verify the user.
{ The Physics arXiv Blog | Continue reading }
spy & security, technology | December 5th, 2012 12:57 pm
social networks | December 4th, 2012 5:54 am
{ During the recent $550 million upgrade of the Empire State Building, Ms. Christy was asked whether she could help get more people up to the observation deck. She said she couldn’t get more people into a car but could move them up more quickly. So she increased the elevators’ speed by 20%, to 20 feet per second. Now the cars can rise 80 floors in about 48 seconds, 10 seconds faster than before. Ms. Christy strikes down one common myth—that “door close” buttons don’t work. Sometimes they do, sometimes they don’t, she says. It depends on the building’s owner. | WSJ | full story }
architecture, technology | December 4th, 2012 5:12 am
In a year or two, augmented reality (AR) headsets such as Google Glass may double up as a virtual dieting pill. New research from the University of Tokyo shows that a very simple AR trick can reduce the amount that you eat by 10% — and yes, the same trick, used in the inverse, can be used to increase food consumption by 15%, too.
The AR trick is very simple: By donning the glasses, the University of Tokyo’s special software “seamlessly” scales up the size of your food. […]
It has been shown time and time again that large plates and large servings encourage you to consume more. In one study, restaurant-goers ate more food when equipped with smaller forks; but at home, the opposite is true. In another study, it was shown that you eat more food if the color of your plate matches what you’re eating.
{ ExtremeTech | Continue reading }
food, drinks, restaurants, psychology, technology | November 21st, 2012 11:06 am
ideas, photogs, technology | November 18th, 2012 4:11 pm
The three most disruptive transitions in history were the introduction of humans, farming, and industry. If another transition lies ahead, a good guess for its source is artificial intelligence in the form of whole brain emulations, or “ems,” sometime in roughly a century.
{ Overcoming Bias | Continue reading }
A case can be made that the hypothesis that we are living in a computer simulation should be given a significant probability. The basic idea behind this so-called “Simulation argument” is that vast amounts of computing power may become available in the future, and that it could be used, among other things, to run large numbers of fine-grained simulations of past human civilizations. Under some not-too-implausible assumptions, the result can be that almost all minds like ours are simulated minds, and that we should therefore assign a significant probability to being such computer-emulated minds rather than the (subjectively indistinguishable) minds of originally evolved creatures. And if we are, we suffer the risk that the simulation may be shut down at any time.
{ Nick Bostrom | Continue reading | Related: Nick Bostrom, Are you living in a computer simulation?, 2003 }
photo { Matthew Pillsbury }
future, ideas, photogs, technology | November 17th, 2012 3:44 am
Foxconn, the maker of Apple’s iPhone and iPad, plans to rely more on robots for manufacturing over the coming years, allowing the company to invest more in research and development and save on labor costs. […]
Local Chinese media reported that Foxconn CEO Terry Gou had said the company plans on deploying 1 million robots over the next three years to complete routine assembly tasks. Foxconn currently uses 10,000 robots. […]
The Taiwan-based company has more than 1 million employees, the majority of which are located at facilities in mainland China. Foxconn is one of the world’s largest producers of electronics. Aside from Apple, the company also manufactures products for companies like HP, Sony and Nintendo.
{ IT World | Continue reading }
asia, economics, future, robots & ai | November 13th, 2012 11:51 am
Michael McAlpine’s shiny circuit doesn’t look like something you would stick in your mouth. It’s dashed with gold, has a coiled antenna and is glued to a stiff rectangle. But the antenna flexes, and the rectangle is actually silk, its stiffness melting away under water. And if you paste the device on your tooth, it could keep you healthy.
The electronic gizmo is designed to detect dangerous bacteria and send out warning signals, alerting its bearer to microbes slipping past the lips. Recently, McAlpine, of Princeton University, and his colleagues spotted a single E. coli bacterium skittering across the surface of the gadget’s sensor. The sensor also picked out ulcer-causing H. pylori amid the molecular medley of human saliva, the team reported earlier this year in Nature Communications.
At about the size of a standard postage stamp, the dental device is still too big to fit comfortably in a human mouth. “We had to use a cow tooth,” McAlpine says, describing test experiments. But his team plans to shrink the gadget so it can nestle against human enamel. McAlpine is convinced that one day, perhaps five to 10 years from now, everyone will wear some sort of electronic device. “It’s not just teeth,” he says. “People are going to be bionic.”
{ ScienceNews | Continue reading }
future, health, technology | November 7th, 2012 4:08 pm
The gap between professional race drivers and self-driven cars isn’t all that big, as a race at the Thunderhill Raceway in California proved yesterday. Although the human driver achieved victory against the self-driven Audi TTS in a head-to-head, he only managed to shave off a few seconds from the computer’s time.
{ Silicon Angle | Continue reading }
photo { Roger Minick }
motorpsycho, robots & ai | November 4th, 2012 8:26 am
A growing number of professionals are using social media to build a personal, public identity—a brand of their own—based on their work. Think of an accountant who writes a widely read blog about auditing, or a sales associate who has attracted a big following online by tweeting out his store’s latest deals.
Co-branded employees may exist largely below the radar now, but that’s changing fast, and employers need to start preparing for the ever-greater challenges they pose for managers, co-workers and companies. Their activities can either complement a company’s own brand image or clash with it. Companies that fail to make room for co-branded employees—or worse yet, embrace them without thinking through the implications—risk alienating or losing their best employees, or confusing or even burning their corporate brand.
Part of this change is generational. Younger employees show up on the job with an existing social-media presence, which they aren’t about to abandon—especially since they see their personal brands lasting longer than any single job or career.
{ WSJ | Continue reading }
photo { Anuschka Blommers & Niels Schumm }
economics, social networks | November 4th, 2012 8:22 am
U.S. cellphone carriers took a major step on Wednesday toward curbing the rising number of smartphone thefts with the introduction of databases that will block stolen phones from being used on domestic networks.
The initiative got its start earlier this year when the U.S. Federal Communications Commission and police chiefs from major cities asked the cellular carriers for assistance in battling the surging number of smartphone thefts. In New York, more than 40 percent of all robberies involve cellphones and in Washington, D.C., cellphone thefts accounted for 38 percent of all robberies in 2011.
With the introduction of the database, carriers will be able to block stolen handsets from being used on their networks. Until now, such blocking had targeted the SIM card, so unauthorized calls could not be made on stolen phones, but putting in a new SIM card meant the phone could still be used. That meant a stolen phone could be sold on the second-hand market.
The new database blocks the IMEI number, a unique identification number in the cellphone.
{ Network World | Continue reading }
photo { Garry Winogrand }
spy & security, technology | October 31st, 2012 3:59 pm
Since Apollo 17’s flight in 1972, no humans have been back to the moon, or gone anywhere beyond low Earth orbit. No one has traveled faster than the crew of Apollo 10. (Since the last flight of the supersonic Concorde in 2003, civilian travel has become slower.) Blithe optimism about technology’s powers has evaporated, too, as big problems that people had imagined technology would solve, such as hunger, poverty, malaria, climate change, cancer, and the diseases of old age, have come to seem intractably hard.
{ Technology Review | Continue reading }
economics, science, technology | October 31st, 2012 1:20 pm
The U.S. government is surreptitiously collecting the DNA of world leaders, and is reportedly protecting that of Barack Obama. Decoded, these genetic blueprints could provide compromising information. In the not-too-distant future, they may provide something more as well—the basis for the creation of personalized bioweapons that could take down a president and leave no trace.
{ Atlantic | Continue reading }
genes, spy & security, technology | October 31st, 2012 8:05 am
technology, transportation | October 31st, 2012 7:22 am
A worrying trend has emerged in which a writer’s success has come to be measured by the number of views and comments elicited by his or her writing. Those same writers have, in a matter of a few years, adopted a new publishing ethos in which they post their thoughts, opinions, and writings on the plethora of blogging sites currently available. The generation of bloggers, many of whom started out as newspaper writers and later moved to electronic publishing, didn’t stop there—they expanded their commenting activity to their personal Facebook pages. […]
Facebook users find themselves in the position of a superstar or a prophet, needing to utter profound statements and expecting the cheers of the crowd. As it becomes easier and easier for people to connect, this loop tragically kills conversations and exchanges them for the proclamations of ignorant judges who know nothing of the world but their own personal narratives and verdicts.
{ e-flux | Continue reading }
ideas, media, social networks | October 22nd, 2012 10:56 am
The sort of person who says “free speech” when they mean “I like doing creepy things to other people without their consent and you can’t stop me so fuck you ha ha ha ha” is pretty clearly a mouth-breathing asshole who in the larger moral landscape deserves a bat across the bridge of the nose and probably knows it. Which is why - unsurprisingly - so many of them choose to be anonymous and/or use pseudonyms on Reddit while they get their creep on.
{ John Scalzi/Gawker | Continue reading }
social networks | October 17th, 2012 3:01 pm