Prosecutors say corrupt Silk Road agent has co-conspirators at large

Government alleges Shaun Bridges stole their bitcoins, too.

Details remain scarce regarding the second arrest of corrupt Silk Road investigator Shaun Bridges, but in a new court filing, prosecutors insist that the details remain under seal—in part, because they believe he has one or more co-conspirators.

Following the trial and conviction of Silk Road mastermind Ross Ulbricht, two federal agents, Carl Force and Shaun Bridges, were charged with stealing from the Silk Road even while they were investigating it.

Bridges used admin privileges, taken from an arrested Silk Road admin, to steal $800,000 worth of bitcoins from Silk Road drug dealers. He pled guilty last year, and in December was sentenced to nearly six years in prison.

Read 8 remaining paragraphs | Comments

CDC investigates 14 new reports of possible sexual transmission of Zika

The cases suggest infection route more common than expected.

©2009 Thomas van Ardenne (credit: Thomas van Ardenne)

The Centers for Disease Control and Prevention, along with state health departments, is investigating 14 new reports of possible sexual transmission of Zika in the US, the agency announced Tuesday.

All of the cases involve the possible transmission of the virus to a female who hadn’t traveled from a male sexual partner who had recently traveled to an area where Zika was spreading through mosquitoes. While sexual transmission of the virus has been previously reported, the number of newly suspected cases suggests that sexual transmission may be more common than health experts previously expected.

“We were surprised that there was this number,” Dr. Anne Schuchat, the deputy director at the Centers for Disease Control and Prevention, said in an interview with the New York Times. “If a number of them pan out, that’s much more than I was expecting.”

Read 3 remaining paragraphs | Comments

New molecular scissors cut out lingering HIV—maybe once and for all

Alongside current drugs, therapy shows potential to safely help nix infection.

For the approximately 37 million people worldwide who are infected with HIV (human immunodeficiency virus), the newest cocktails of anti-retroviral drugs have come a long way in beating back the retrovirus and keeping an infection in check. Still, those drugs are no cure. While the treatments snarl the viral assembly line and thwart new infectious particles from invading the body’s cells, HIV itself is still there, hunkered in the DNA of a patient’s genome until there’s an opportunity for a comeback—say, when a patient goes off their medication.

As long as there’s lingering HIV, patients must keep taking the drugs, which cause side-effects, make for high prescription bills, and raise the threat of drug resistance. At least, that's the case for now. In a new study, scientists reveal a possible way to literally hack those lurking viruses out of a person's DNA strands.

With a custom enzyme made through coerced evolution, researchers selectively and reliably sliced HIV sequences from a number of cell types: bacteria, human cell lines used in research, in cells collected from patients with HIV infections, and in “humanized” mice with HIV. Though the strategy is early in development—far from clinical use—the data so far points to an effective and safe way to help drug treatments completely finish off HIV infections. This is a “promising strategy for future clinical applications,” the authors report.

Read 9 remaining paragraphs | Comments

The LG G5 and Galaxy S7 won’t support Android 6.0’s adoptable storage

OEMs add expandable storage, but limit functionality to media only—no apps.

This is what the "Adoptable Storage" setup looks like in Android 6.0. Just replace "USB Drive" with "SD card."

With both the Galaxy S7 and LG G5 sporting expandable storage, and Google adding great SD support to Android 6.0, this year it seemed like storage enthusiasts would get everything they could ever want. Apparently that's not the case though, as both OEMs have shunned Google's new "Adoptable Storage" feature.

Android 6.0 Marshmallow added an adoptable storage feature, which allows you to format a microSD card as internal storage. Android will then merge the microSD card and internal storage into a single storage pool, allowing you to seamlessly install as many apps as you want, or load it with media. Samsung and LG don't appear to be a fans of the feature, though. Android Central tried the feature on G5 at MWC, and it didn't support adoptable storage, and when we asked Samsung about the feature, the company laid out its thoughts about the feature:

Samsung decided not to use the Android Marshmallow “adoptable storage” model. We believe that our users want a microSD card to transfer files between their phone and other devices (laptop, tablet, etc), especially the photos and videos they shoot with the camera.

With adoptable storage, first of all the card may be erased the first time it is inserted into the device. This behavior may be unexpected by many users and we don’t want our users to lose their files. Second, once Marshmallow starts using a card for adoptable storage, it cannot be read by other devices, so it loses this ability to be used for file transfer. Adoptable Storage is also primarily targeted towards emerging markets where devices with only 4-8GB of onboard storage are common. We think that our model of using microSD for mass storage is more in-line with our owner’s desires and expectations for how microSD should behave.

Before OEMs changed the feature, users could pick which mode they wanted the storage to be in and format it appropriately. There was both "Portable" mode, which treated an SD card like normal removable storage, and the new "Internal storage" mode. With "Internal" mode disabled for both devices, the SD cards will only be able to be used for media—no apps allowed.

Read 1 remaining paragraphs | Comments

The case for using iTunes, not iCloud, to back up your iPhone

Privacy is one argument, but it’s not the only one.

Enlarge (credit: Andrew Cunningham)

Since iOS 8 was released in September 2014, Apple has encrypted the local storage of all iPhones. That’s not news, but it’s become newly relevant since the company and the FBI started a very loud, very public fight about the data stored on a particular iPhone.

Privacy advocates have praised Apple’s commitment to full-device encryption by default, and after a false start last year, all new Android phones shipping with version 6.0 or higher should be encrypted by default as well. It’s an effective tool for keeping thieves from grabbing your data even if they can take your phone.

If you're looking for comprehensive privacy, including protection from law enforcement entities, there’s still a loophole here: iCloud. Apple encourages the use of this service on every iPhone, iPad, and iPod Touch that it sells, and when you do use the service, it backs up your device every time you plug it into its power adapter within range of a known Wi-Fi network. iCloud backups are comprehensive in a way that Android backups still aren’t, and if you’ve been following the San Bernardino case closely, you know that Apple’s own legal process guidelines (PDF) say that the company can hand iMessages, SMS/MMS messages, photos, app data, and voicemail over to law enforcement in the form of an iOS device backup (though some reports claim that Apple wants to strengthen the encryption on iCloud backups, removing the company's ability to hand the data over to law enforcement).

Read 10 remaining paragraphs | Comments

Tesla: GM wrote a bill in Indiana to stop us from selling cars in the state

Direct vehicle sales are being debated in Indianapolis.

If Indiana's bill passes, Tesla's store may become a showroom.

Tesla recently sent a letter to “Tesla Owners and Enthusiasts” living in the Indiana area asking for their help to defeat a piece of legislation introduced by state lawmakers that would prevent auto manufacturers from selling cars directly to their customers. Tesla has almost exclusively sold vehicles to customers through direct vehicle sales, and it says if the bill is signed into law it would revoke Tesla’s permission to sell vehicles from its existing storefront in Indianapolis.

The bill seeks to prohibit manufacturers from holding a dealer license after December 31, 2017. Tesla currently holds such a license, although it does not contract with a third-party dealer.

In its letter to its customers, Tesla urged them to contact their representatives and the senators on the Commerce and Technology Committee, which will hold a hearing on the bill on Thursday, February 25, to express their displeasure at the new bill. "Despite having a lawfully granted license to sell Tesla vehicles directly since 2014 at the Fashion Mall at Keystone; despite contributing over $42 million to the state through the purchase of parts and components from Indiana suppliers; and despite plans underway to construct a 26,000 square foot Tesla Service facility that will employ approximately a dozen Indiana residents and serve our customers, GM is pushing the Senate Committee to shut out Tesla,” Tesla wrote.

Read 7 remaining paragraphs | Comments

HoloLens leaks show a mixed reality video app, holo-Start menu, Bluetooth clicker

Next week, we should find out the date that developer units will start shipping.

The video introducing testers to Actiongram.

The $3,000 HoloLens developer units are due to arrive within the next few weeks, but it seems that a few of them have been in the hands of closed beta testers since January, and some information about the devices has leaked courtesy of Twitter user WalkingCat.

The leaked material includes lots of information about a new, not yet publicly demonstrated holographic app called Actiongram (codenamed Project Burbank). The beta testers have been given an early version of this app and are on the hook to create a bunch of videos over the next ten weeks that will presumably showcase the app itself and HoloLens in general. Actiongram is a mixed reality app that overlays videos and animations on the real world, enabling, for example, Deal With It sunglasses to drop down onto a real person's face, or an astronaut to bounce around on your sofa, or all sorts of other things.

The leaked materials include a handful of as yet unreleased pieces of HoloLens information. A video that's used to introduce the beta testers to the platform includes a look at the holographic iteration of the Windows Start menu. An accompanying document describes a Bluetooth clicker peripheral that can be used to interact with holograms—presumably a more convenient alternative to Microsoft's index finger "tap" gesture that has previously been used in demos—and also includes a screenshot of the holographic iteration of the Photos app used in Windows 10.

Read 1 remaining paragraphs | Comments

How do you listen to podcasts?

How do you listen to podcasts?

Podcasting has been around for more than a decade, but it’s really taken off in recent years with the success of shows like Serial, the launch of new podcast networks including Gimlet, Panoply, and Radiotopia, and many independent productions. I’ve been a fan of (some) podcasts for a long time, but I’ve been thinking a lot […]

How do you listen to podcasts? is a post from: Liliputing

How do you listen to podcasts?

Podcasting has been around for more than a decade, but it’s really taken off in recent years with the success of shows like Serial, the launch of new podcast networks including Gimlet, Panoply, and Radiotopia, and many independent productions. I’ve been a fan of (some) podcasts for a long time, but I’ve been thinking a lot […]

How do you listen to podcasts? is a post from: Liliputing

Fancy an Anti-Piracy Threat….To Your Dropbox Email Address?

Dutch anti-piracy outfit BREIN is stepping up its game when it comes to scaring would-be pirates. While people sharing files in public using BitTorrent are the group’s usual targets, BREIN has just sent scary emails to people who thought they were sharing eBooks privately using Dropbox.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

dropboxThere are many different ways that people are able to share files online and they broadly fall into two categories – public and private.

Public sharing is generally carried out using peer-to-peer networks such as BitTorrent. Anyone participating in a torrent swarm should be aware that unless they take precautions by using a VPN or proxy, their IP address is visible to all of the other people engaged in the same act.

Private sharing can also take many forms, from exchanging content via email to uploading and downloading content from invite-only servers, for example. While it has to be noted there are always weak leaks, this kind of sharing usually receives less interest from anti-piracy companies as it tends to be scattered and somewhat cost ineffective to police.

That being said, Dutch anti-piracy outfit BREIN has just managed to scare an unnamed number of pirates after they participated in a presumed-private sharing circle that utilized Dropbox for exchanging copyrighted content.

The story traces back to December 2015 when BREIN obtained an ex parte court order against a man they accused of being the administrator of a Dropbox account that was being used to distribute copyrighted eBooks.

It was alleged that the man was active on a number of Internet forums and on request granted fellow members with access to said account in order to download titles without paying. After a complaint from BREIN the court found this behavior unacceptable and ordered the man, in his absence, to cease his activities or face fines of 2,000 euros per day up to a maximum of 50,000 euros.

However, as previously reported, BREIN is now regularly striking private settlement deals with people it also targets in court. It’s not known if there was a financial arrangement in this particular case but quite clearly BREIN has been able to leverage its position to scare the individuals that had been downloading from the Dropbox account.

Since those downloading from the eBook-filled Dropbox folder were required to give up their email addresses to the person administering the account, they became vulnerable when BREIN discovered his identity. So, as part of the settlement deal, BREIN was then able to contact those individuals with a custom threat, direct to an email address they had previously considered private.

“BREIN has recently found that you are a user (or: Member) of the Dropbox account called ‘—‘, offered by ‘—‘. Your email address is visible to third parties and by BREIN for the purpose of sending you this email,” the email to the assumed pirates begins.

“Without permission of the copyright holders this account was used for sharing copies of eBooks, which is not lawful. The administrator was (as the owner and administrator) responsible for this and the judge has ruled that this person has infringed on the rights of the copyright holders BREIN represents.”

The Dropbox users are then informed that they too have almost certainly infringed copyright due to them downloading copyrighted content from an illegal source and they should therefore consider purchasing their content from legal sources in the future.

“BREIN received several positive responses to [these emails] and it also seems that the exchange of ebooks via the forums that BREIN found in its research has almost completely ceased,” the group said in a statement.

While there’s no suggestion that BREIN intends to take matters further, it seems clear that those sharing or obtaining copyrighted content even from a Dropbox account should be aware that if the person they’re downloading from caves in, their email address (at the very least) could be vulnerable to threats. If that email then correlates with other information available on the web, things certainly have the potential to escalate.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Researchers create super-efficient Wi-Fi

Passive Wi-Fi consumes 1/10,000th the power of conventional wireless networks.

A team of computer scientists and electrical engineers from the University of Washington has developed an extremely power-efficient version of Wi-Fi wireless networking technology that consumes 10,000 times less power than the current Wi-Fi components, allowing Wi-Fi networking to be built into a much wider range of devices. The team will present a paper (PDF) with the results of their research into what they have dubbed Passive Wi-Fi at the upcoming USENIX Symposium on Networked Systems Design and Implementation in March.

Passive Wi-Fi is, as the name suggests, partially passive—it takes in radio wave energy from an outside source and reflects that signal with its data added to it. Vamsi Talla, a UW electrical engineering doctoral student and co-author of the research, explained, "All the networking, heavy-lifting and power-consuming pieces are done by the one plugged-in device. The passive devices are only reflecting to generate the Wi-Fi packets, which is a really energy-efficient way to communicate."

The technology works much in the way Radio Frequency Identification (RFID) chips (and, more infamously, retroreflector bugs like the ones used by the Soviet Union to bug the US Embassy in Moscow) do—using a technique called backscatter communication.

Read 3 remaining paragraphs | Comments