Police Seize Domains of Fifty ‘Pirate’ Newspaper and Magazine Sites

Italian authorities have seized 50 domains involved in the unlawful distribution of copyrighted content. The seizure, ordered by the Court of Rome, targeted sites that were offering free digital versions of dozens of national newspapers and magazines including Cosmopolitan and Vanity Fair.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

guardiaAnti-piracy operations come in all shapes and sizes but it’s movies, music and TV shows that grab the majority of the headlines. Games, software, and eBooks trail closely behind, but it’s rare that other types of digital print see enforcement action.

Italy, one of the most aggressive countries when it comes to sweeping anti-piracy actions, has just changed all that with one of the largest enforcement operations ever seen in the publishing niche.

Following an investigation carried by rightsholders and the Public Prosecutor of Rome, a total of 50 domains involved in the unlawful distribution of news and magazine content have been seized by the country’s Special Unit for Broadcasting and Publishing.

According to an announcement by the authorities, all of the sites have now gone dark after offering “vast quantities” of material originally published by major newspapers and periodicals including Cosmopolitan, Fashion Magazine, and Vanity Fair.

The operation, dubbed “Odyssey 2”, was carried out under the directives of the Special Command Units of the Guardia di Finanza, a militarized police force under the authority of the Minister of Economy and Finance.

Fulvio Sarzana, a lawyer with the Sarzana and Partners who specializes in Internet and copyright disputes, says that the sites were probably under the control of separate entities.

“The variety of sites and the diversity of hosting and domain registrations leads me to think that these are different cases,” Sarzana informs TorrentFreak.

“The methods vary but generally the digital kiosks work this way; someone buys the paper or digital versions of newspapers through a duly registered account and then makes them available on the website.”

Until now, Italy has employed the same “follow-the-money” approach used by authorities in other jurisdictions, whereby site owners are identified via payments made by advertisers and similar business partners. Now, however, it claims to have developed a ‘new’ “follow-the-hosting” approach, which allows it to identify site operators, even when they use Cloudflare to hide the location of their servers.

While details on the techniques used by the authorities are thin, uncloaking server locations in this way is nothing new and can be achieved when Cloudflare is ordered to do so by a competent court.

The sites in question, which were not named by the authorities, are said to have served millions of users with pirated content. This, to a background of national media groups losing a third of their turnover over the past five years.

Big anti-piracy operations to protect publishers are extremely rare but with their market closing in and ad revenues falling, more could certainly follow in the future.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Mac-Eingabegeräte: Twelve South Magicbridge vereint Tastatur und Trackpad

Twelve South hat mit dem Gehäuse Magicbridge eine Lösung vorgestellt, mit der die schnurlose Tastatur Apple Wireless Keyboard und das Magic Trackpad 2 miteinander verbunden werden können. Auch an Linkshänder ist gedacht worden. (Mac, Apple)

Twelve South hat mit dem Gehäuse Magicbridge eine Lösung vorgestellt, mit der die schnurlose Tastatur Apple Wireless Keyboard und das Magic Trackpad 2 miteinander verbunden werden können. Auch an Linkshänder ist gedacht worden. (Mac, Apple)

Logitech Spotlight: Mit einem Handschwung durch die Präsentation

Präsentieren wie mit einer Wii-Fernbedienung: Logitechs Spotlight soll durch Neigungssensoren und Software Präsentationen steuern können und bietet anpassbare Tasten und Makrofunktionen. Wir haben beim Testen des Presenters dadurch gleich weitere Anwendungsgebiete entdecken können. Ein Test von Oliver Nickel (Logitech, Eingabegerät)

Präsentieren wie mit einer Wii-Fernbedienung: Logitechs Spotlight soll durch Neigungssensoren und Software Präsentationen steuern können und bietet anpassbare Tasten und Makrofunktionen. Wir haben beim Testen des Presenters dadurch gleich weitere Anwendungsgebiete entdecken können. Ein Test von Oliver Nickel (Logitech, Eingabegerät)

Denuvo Game DRM On Shaky Ground, Defeated By Zombie Horde

The once inpenetrable Denuvo gaming DRM, or more precisely, the gaming anti-tampering system, appears to be on the verge of being useless as a new game gets cracked in record time.In just five days after release, new game ‘Resident Evil 7: Biohazard’ h…



The once inpenetrable Denuvo gaming DRM, or more precisely, the gaming anti-tampering system, appears to be on the verge of being useless as a new game gets cracked in record time.

In just five days after release, new game 'Resident Evil 7: Biohazard' has been uploaded to the usual piracy outlets, stripped of its Denuvo protection.

This marks a dramatic difference to when Denuvo first started getting noticed, when games that were usually pirated days after (or even before) release, remain uncracked. Some games from a few years ago, even to this day, remain protected by Denuvo.

This made Denuvo achieve legendary status among game publishers, and many signed up to license its code to use in their games in the hope of at the very least defeating zero day piracy.

This also made Denuvo a tempting target for game hackers, keen to crack the system and claim this much valued scalp. With intense effort aimed at targeting Denuvo, progress was being made, and slowly, one by one, Denuvo protected games started to get cracked, even if it took the better of five months to do so (by which time, game publishers were no longer too concerned about piracy).

Then, all of a sudden, a major development in cracking Denuvo seems to have occurred, and the puzzle platformer game 'Inside' was cracked in a record six weeks. Other Denuvo games, including 'Doom' and 'Mirror's Edge Catalyst', were soon cracked too.

Six weeks is still a long time for a new game, and keeping these early weeks piracy free is all that game publishers need most of the time. But the cracking of 'Resident Evil 7: Biohazard' changes the game completely, and the spectre of zero day releases is rearing its ugly head once again.

[via TorrentFreak]

Lexar: Speicherkarte mit CFast 2.0 und 512 GByte erreicht lesend 525 MByte/s

Lexar hat eine Speicherkarte nach dem Standard CFast 2.0 vorgestellt, die Daten mit 525 MByte/s lesen kann. Beim Schreiben ist sie nicht ganz so schnell. Dafür bringt sie bis zu 512 GByte Speicher mit sich. (CFast, Speichermedien)

Lexar hat eine Speicherkarte nach dem Standard CFast 2.0 vorgestellt, die Daten mit 525 MByte/s lesen kann. Beim Schreiben ist sie nicht ganz so schnell. Dafür bringt sie bis zu 512 GByte Speicher mit sich. (CFast, Speichermedien)

Kooperation: Daimler und Uber planen gemeinsame autonome Zukunft

Daimler will Uber in der Zukunft selbstfahrende Mercedes zur Verfügung stellen. Die Fahrzeuge dürften dann Taxidienste übernehmen. Uber erforscht jedoch auch selbst das autonome Fahren. (Autonomes Fahren, Technologie)

Daimler will Uber in der Zukunft selbstfahrende Mercedes zur Verfügung stellen. Die Fahrzeuge dürften dann Taxidienste übernehmen. Uber erforscht jedoch auch selbst das autonome Fahren. (Autonomes Fahren, Technologie)

Filmkritik Hidden Figures: Verneigung vor den Computern in Röcken

Hollywood-Filme über die Nasa-Historie müssen nicht immer von Männern in Raumanzügen handeln. Hidden Figures erzählt mit großartigen Darstellern und heiterer Leichtigkeit die nicht ganz so wahre Geschichte dreier Heldinnen, die mit Mut und Mathematik das Weltraumrennen zwischen Russland und den USA mitentschieden haben. Eine Rezension von Daniel Pook (Filmkritik, IBM)

Hollywood-Filme über die Nasa-Historie müssen nicht immer von Männern in Raumanzügen handeln. Hidden Figures erzählt mit großartigen Darstellern und heiterer Leichtigkeit die nicht ganz so wahre Geschichte dreier Heldinnen, die mit Mut und Mathematik das Weltraumrennen zwischen Russland und den USA mitentschieden haben. Eine Rezension von Daniel Pook (Filmkritik, IBM)

SpaceX takes a key step toward a reusable rocket launch

Launch of the used booster could come as early as March.

Enlarge / SpaceX completed a static fire test of a flown Falcon 9 booster at its McGregor, Texas, rocket development facility last week. (credit: SpaceX)

On Tuesday evening, SpaceX revealed that it has performed a critical static firing of one of its booster. Not just any booster though; this exact same booster launched a cargo spacecraft to the International Space Station last April. This is the Falcon 9 rocket the company plans to use for its first-ever re-flight of an orbital rocket stage.

SpaceX has previously disclosed that its customer for the launch will be Luxembourg-based satellite operator SES, which wants to launch its geostationary satellite SES-10. Although no launch date has been set for the flight, the successful firing of the used first stage, which occurred last week at the company's facilities in McGregor, Texas, lends credence to a potential March liftoff from Kennedy Space Center in Florida.

The innovative rocket company has now returned seven boosters to Earth, by land and sea, during the last 13 months. However, the promise of reusable rockets won't be fulfilled until launch vehicles can be swiftly refurbished and launched again. After all, the space shuttle was almost fully reusable, but the cost of restoring a flown shuttle to flight-ready status tallied in the hundreds of millions of dollars and took months, even under the best of circumstances.

Read 2 remaining paragraphs | Comments

Trump picks his Supreme Court nominee: Neil Gorsuch

Trump wants to fill Scalia’s seat with a former clerk of Justice Kennedy.

Enlarge / The Supreme Court Building in Washington, DC, is displayed on a camera monitor outside the building on January 31, 2017. (credit: Drew Angerer/Getty Images)

President Donald Trump announced that Judge Neil Gorsuch will be his nominee to be the next justice on the Supreme Court.

Gorsuch, who is 49 years old, currently sits on the US Court of Appeals for the 10th Circuit, based in Denver. He was nominated to that appeals court by President George W. Bush in 2006.

Trump said his selection process "may be the most transparent judicial selection process in history," since he provided a list of candidates during his campaign and pledged to make his selection from that list.

Read 8 remaining paragraphs | Comments

In not-too-distant future, brain hackers could steal your deepest secrets

Religious beliefs, political leanings, and medical conditions are up for grabs.

Enlarge / A simplified diagram of a compromised brain-connected interface system. (credit: Bonaci et al.)

OAKLAND, Calif.—In the beginning, people hacked phones. In the decades to follow, hackers turned to computers, smartphones, Internet-connected security cameras, and other so-called Internet of things devices. The next frontier may be your brain, which is a lot easier to hack than most people think.

At the Enigma security conference here on Tuesday, University of Washington researcher Tamara Bonaci described an experiment that demonstrated how a simple video game could be used to covertly harvest neural responses to periodically displayed subliminal images. While her game, dubbed Flappy Whale, measured subjects' reactions to relatively innocuous things, such as logos of fast food restaurants and cars, she said the same setup could be used to extract much more sensitive information, including a person's religious beliefs, political leanings, medical conditions, and prejudices.

"Electrical signals produced by our body might contain sensitive information about us that we might not be willing to share with the world," Bonaci told Ars immediately following her presentation. "On top of that, we may be giving that information away without even being aware of it."

Read 4 remaining paragraphs | Comments