Movie Industry Wants Irish ISPs to Block Pirate Movie Streaming Portals

The Motion Picture Association is trying to have three popular streaming portals blocked by Irish Internet providers. In a new court case, the movie studios describe movie4k.to, primewire.ag and onwatchseries.to as massive copyright infringement hubs, with each offering thousands of infringing movies.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Pirate site blocking has been a topic of ongoing discussion throughout Europe, with The Pirate Bay as one of the main targets.

This is also true in Ireland where the notorious torrent site was first blocked in 2009 as part of a voluntary agreement between copyright holders and local ISP Eircom.

A few years later other major Internet providers were ordered to follow suit. The High Court in Ireland concluded that the Pirate Bay caused substantial harm to various rightsholders, and ordered several large ISPs to block the site on its networks.

Fast forward to today, and another range of blockades is looming on the horizon. The Motion Picture Association (MPA) has filed a case at the Commercial Court, hoping to block access to three popular streaming sites; movie4k.to, primewire.ag and onwatchseries.to.

Watchseries is the most popular of the three, according to the movie group, good for nearly two million visitors from Ireland last October. Primewire had 1.26 million Irish visitors in the same month, followed by Movie4k with 200,000 visitors.

Watchseries

RTE reports that the MPA’s fresh blocking demands are targeting a total of eight ISPs – Eir, Sky Ireland, Vodafone Ireland, Virgin Media Ireland, Three Ireland, Digiweb, Imagine Telecommunications and Magnet Networks.

Based on yesterday’s hearing it appears to be only a matter of time before the three sites will be blocked.

None of the ISPs have raised principle objections against a court determination in this case. That said, reports suggest that there are still a few finer details that have to be worked out, which could include issues regarding costs and the technical implementation.

If granted, the question remains whether any new blocks will be effective to limit the availability of pirated movies in Ireland. The three targeted sites are just the tip of the iceberg, and recent history has repeatedly shown that people quite easily switch to new sources.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Blizzard: Über World of Warcraft zum Overwatch-Extra

Mit Gold aus World of Warcraft lässt sich über den Umweg der Marken nun auch virtuelles Geld in Spielen wie Overwatch oder Hearthstone ausgeben. Ein paar Beschränkungen gibt es aber noch im Battle.net. (Blizzard, WoW)

Mit Gold aus World of Warcraft lässt sich über den Umweg der Marken nun auch virtuelles Geld in Spielen wie Overwatch oder Hearthstone ausgeben. Ein paar Beschränkungen gibt es aber noch im Battle.net. (Blizzard, WoW)

Protonmail: Die halbe Verschlüsselung

Protonmail bezeichnet sich als sicherster E-Mail-Dienst der Welt. In der Praxis zeigt sich, dass der Dienst zwar durchaus durchdacht ist, aber mangels vollständiger PGP-Kompatibilität eine Insellösung bleibt. Ein Praxistest von Hauke Gierow (Protonmail, Soziales Netz)

Protonmail bezeichnet sich als sicherster E-Mail-Dienst der Welt. In der Praxis zeigt sich, dass der Dienst zwar durchaus durchdacht ist, aber mangels vollständiger PGP-Kompatibilität eine Insellösung bleibt. Ein Praxistest von Hauke Gierow (Protonmail, Soziales Netz)

Ultra Accessory Connector: Apple erhöht die Flexibilität beim Kopfhöreranschluss

Apple gewährt Zubehörherstellern mehr Freiheiten. Ein weiterer Anschluss wurde in das Apple-Zubehör-Programm aufgenommen. Damit sind Kopfhörer möglich, die an Lightning- und USB-Typ-C-Anschlüssen funktionieren. Es muss nur das passende Kabel angeschlossen werden. (Apple, Nikon)

Apple gewährt Zubehörherstellern mehr Freiheiten. Ein weiterer Anschluss wurde in das Apple-Zubehör-Programm aufgenommen. Damit sind Kopfhörer möglich, die an Lightning- und USB-Typ-C-Anschlüssen funktionieren. Es muss nur das passende Kabel angeschlossen werden. (Apple, Nikon)

DIY-Thermocam V2: Student entwickelt preiswerte Open-Source-Wärmebildkamera

Als Bachelor-Arbeit hat Max Ritter eine Wärmebildkamera gebaut, die mit teuren kommerziellen Designs konkurrieren soll. Seine Entwicklung ist nicht nur preiswerter, sie steht auch unter einer Open-Source-Lizenz. (Arduino, CAD)

Als Bachelor-Arbeit hat Max Ritter eine Wärmebildkamera gebaut, die mit teuren kommerziellen Designs konkurrieren soll. Seine Entwicklung ist nicht nur preiswerter, sie steht auch unter einer Open-Source-Lizenz. (Arduino, CAD)

Rossignol Hero Master: Ski mit LED-Display zeigen in Echtzeit Sensordaten

Der Trend, Sportgeräte zu vernetzen, hat auch Ski erreicht: Die Rossignol Hero Master zeigen auf der Oberseite mit LEDs wichtige Daten während der Abfahrt an, die von Sensoren erfasst werden. (Sportspiel, Technologie)

Der Trend, Sportgeräte zu vernetzen, hat auch Ski erreicht: Die Rossignol Hero Master zeigen auf der Oberseite mit LEDs wichtige Daten während der Abfahrt an, die von Sensoren erfasst werden. (Sportspiel, Technologie)

Anova: Kickstarter-Startup für 250 Millionen US-Dollar verkauft

Anova heißt das Startup, das über Kickstarter 2014 einen Sous-vide-Kocher finanziert hat. Nun ist das Unternehmen, das weitere vernetze Produkte vorstellte, für 250 Millionen US-Dollar an den Küchenhersteller Electrolux verkauft worden. (Kickstarter, Startup)

Anova heißt das Startup, das über Kickstarter 2014 einen Sous-vide-Kocher finanziert hat. Nun ist das Unternehmen, das weitere vernetze Produkte vorstellte, für 250 Millionen US-Dollar an den Küchenhersteller Electrolux verkauft worden. (Kickstarter, Startup)

Former NSA contractor may have stolen 75% of TAO’s elite hacking tools

Prosecutors reportedly plan to charge Harold T. Martin with espionage.

On Monday, The Washington Post reported one of the most stunning breaches of security ever. A former NSA contractor, the paper said, stole more than 50 terabytes of highly sensitive data. According to one source, that includes more than 75 percent of the hacking tools belonging to the Tailored Access Operations. TAO is an elite hacking unit that develops and deploys some of the world's most sophisticated software exploits.

Attorneys representing Harold T. Martin III have previously portrayed the former NSA contractor as a patriot who took NSA materials home so that he could become better at his job. Meanwhile, investigators who have combed through his home in Glen Burnie, Maryland, remain concerned that he passed the weaponized hacking tools to enemies. The theft came to light during the investigation of a series of NSA-developed exploits that were mysteriously published online by a group calling itself Shadow Brokers.

Investigators have floated several theories. One holds that Martin directly provided the tools to the person or group responsible for the leak. An alternate theory is that the leakers obtained the software by hacking Martin. As reported in October, Martin was charged with felony theft of government property and unauthorized removal and retention of classified material. Monday's Washington Post article says that prosecutors will likely file charges of "violating the Espionage Act by 'willfully' retaining information that relates to the national defense, including classified data such as NSA hacking tools and operational plans against 'a known enemy' of the United States."

Read 2 remaining paragraphs | Comments

Refugee takes Facebook to court over being featured in “fake news”

Anas Modamani says Facebook should do more to stop misuse of his image.

Enlarge / Anas Modamani outside court today in Wurzburg, Germany. (credit: Getty Images)

Anas Modamani, a Syrian refugee living in Germany, went to court against Facebook today. He argued that the online giant didn't do enough to stop his image from being associated with bogus news stories about terrorism.

In 2015, Modamani snapped a selfie with German chancellor Angela Merkel when she visited the shelter where he was living in Berlin. At the time, he was excited. The photo ended up on on television and on the front pages of newspapers. The publicity led to him being taken in by a German foster family, he told Deutsche Welle.

"For the first five months, I thought it was a good luck charm," Modamani told CNN. "But now I think it's bad luck."

Read 8 remaining paragraphs | Comments

Dozens of popular iOS apps vulnerable to intercept of TLS-protected data

76 apps in Apple’s App Store still don’t use best practices to protect user data.

While developing a tool for evaluating mobile application security, researchers at Sudo Security Group Inc. found out something unexpected. Seventy-six popular applications in Apple's iOS App Store, they discovered, had implemented encrypted communications with their back-end services in such a way that user information could be intercepted by a man-in-the-middle attack. The applications could be fooled by a forged certificate sent back by a proxy, allowing their Transport Layer Security to be unencrypted and examined as it is passed over the Internet.

The discovery was initially the result of bulk analysis done by Sudo's verify.ly, a service that performs bulk static analysis of application binaries from Apple's App Store. Will Strafach, president of Sudo, verified the applications discovered by the system were vulnerable in the lab, using a network proxy configured with its own Secure Socket Layer certificate.

In the post about his findings being published today, Strafach wrote:

Read 9 remaining paragraphs | Comments