A rare, destructive hurricane is coming to Florida today

How Irma’s pressure explains that viral video showing no water in the Bahamas?

Enlarge / European model forecast position for Irma on Sunday evening, and future track. (credit: Weather Bell/Ars Technica)

Hurricane Irma made landfall on Sunday morning along the Florida Keys, with sustained winds of 130 mph. Although Irma has weakened some, this is still a rare and powerful storm that will have devastating effects on parts of the Florida peninsula, and will disrupt the entire state for days.

Irma's forecast track is pretty well locked in, as the storm should essentially cruise up the western coast of the state—with the center remaining just on or off shore—before moving into the Florida panhandle, Georgia, and Alabama before dying over the southeastern United States. Winds, storm surge, and inland rain are all major threats for Florida.

Low pressure

When you watch television coverage of hurricanes, wind speeds get all of the attention. But for scientists, the key determinant of hurricane intensity is central pressure—the extent to which a storm’s center is lower than the Earth’s normal sea-level pressure of 1013.25 millibars.

Read 8 remaining paragraphs | Comments

Startup buzzkill: California bans drone delivery services of legalized pot

California Bureau of Cannabis Control just says “no” to autonomous delivery of marijuana.

Enlarge / Don't expect this method of package delivery to show up at your front door anytime soon. (credit: Getty /Aurich)

A new Gold Rush is upon us in the Golden State of California.

But this latest wave concerns us with nuggets of a different sort: marijuana. California voters have legalized it, and now state regulators are adopting distribution rules and a plethora of weed-related laws ahead of a January 1 deadline to begin issuing retail licenses.

Make no mistake, from a purely business standpoint, the legalization of marijuana in California, home to Silicon Valley and the nation's largest economy, will sooner rather than later equate to a gold mine of opportunity for startups and established businesses. That economic boom includes everything from agriculture, real estate, banking, software, to security, paraphernalia, and you name it.

Read 6 remaining paragraphs | Comments

No, Google Drive is Definitely Not The New Pirate Bay

This week, citing a crackdown on torrent sites, numerous articles declared Google Drive and similar cloud storage services to be “The New Pirate Bay”. While such platforms can indeed facilitate the distribution of content, there should be no illusion that they offer anything like the decentralization and corporate detachment offered by BitTorrent-based sharing.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Running close to two decades old, the world of true mainstream file-sharing is less of a mystery to the general public than it’s ever been.

Most people now understand the concept of shifting files from one place to another, and a significant majority will be aware of the opportunities to do so with infringing content.

Unsurprisingly, this is a major thorn in the side of rightsholders all over the world, who have been scrambling since the turn of the century in a considerable effort to stem the tide. The results of their work have varied, with some sectors hit harder than others.

One area that has taken a bit of a battering recently involves the dominant peer-to-peer platforms reliant on underlying BitTorrent transfers. Several large-scale sites have shut down recently, not least KickassTorrents, Torrentz, and ExtraTorrent, raising questions of what bad news may arrive next for inhabitants of Torrent Land.

Of course, like any other Internet-related activity, sharing has continued to evolve over the years, with streaming and cloud-hosting now a major hit with consumers. In the main, sites which skirt the borders of legality have been the major hosting and streaming players over the years, but more recently it’s become clear that even the most legitimate companies can become unwittingly involved in the piracy scene.

As reported here on TF back in 2014 and again several times this year (1,2,3), cloud-hosting services operated by Google, including Google Drive, are being used to store and distribute pirate content.

That news was echoed again this week, with a report on Gadgets360 reiterating that Google Drive is still being used for movie piracy. What followed were a string of follow up reports, some of which declared Google’s service to be ‘The New Pirate Bay.’

No. Just no.

While it’s always tempting for publications to squeeze a reference to The Pirate Bay into a piracy article due to the site’s popularity, it’s particularly out of place in this comparison. In no way, shape, or form can a centralized store of data like Google Drive ever replace the underlying technology of sites like The Pirate Bay.

While the casual pirate might love the idea of streaming a movie with a couple of clicks to a browser of his or her choice, the weakness of the cloud system cannot be understated. To begin with, anything hosted by Google is vulnerable to immediate takedown on demand, usually within a matter of hours.

“Google Drive has a variety of piracy counter-measures in place,” a spokesperson told Mashable this week, “and we are continuously working to improve our protections to prevent piracy across all of our products.”

When will we ever hear anything like that from The Pirate Bay? Answer: When hell freezes over. But it’s not just compliance with takedown requests that make Google Drive-hosted files vulnerable.

At the point Google Drive responds to a takedown request, it takes down the actual file. On the other hand, even if Pirate Bay responded to notices (which it doesn’t), it would be unable to do anything about the sharing going on underneath. Removing a torrent file or magnet link from TPB does nothing to negatively affect the decentralized swarm of people sharing files among themselves. Those files stay intact and sharing continues, no matter what happens to the links above.

Importantly, people sharing using BitTorrent do so without any need for central servers – the whole process is decentralized as long as a user can lay his or her hands on a torrent file or magnet link. Those using Google Drive, however, rely on a totally centralized system, where not only is Google king, but it can and will stop the entire party after receiving a few lines of text from a rightsholder.

There is a very good reason why sites like The Pirate Bay have been around for close to 15 years while platforms such as Megaupload, Hotfile, Rapidshare, and similar platforms have all met their makers. File-hosting platforms are expensive-to-run warehouses full of files, each of which brings direct liability for their hosts, once they’re made aware that those files are infringing. These days the choice is clear – take the files down or get brought down, it’s as simple as that.

The Pirate Bay, on the other hand, is nothing more than a treasure map (albeit a valuable one) that points the way to content spread all around the globe in the most decentralized way possible. There are no files to delete, no content to disappear. Comparing a vulnerable Google Drive to this kind of robust system couldn’t be further from the mark.

That being said, this is the way things are going. The cloud, it seems, is here to stay in all its forms. Everyone has access to it and uploading content is easier – much easier – than uploading it to a BitTorrent network. A Google Drive upload is simplicity itself for anyone with a mouse and a file; the same cannot be said about The Pirate Bay.

For this reason alone, platforms like Google Drive and the many dozens of others offering a similar service will continue to become havens for pirated content, until the next big round of legislative change. At the moment, each piece of content has to be removed individually but in the future, it’s possible that pre-emptive filters will kill uploads of pirated content before they see the light of day.

When this comes to pass, millions of people will understand why Google Drive, with its bots checking every file upload for alleged infringement, is not The Pirate Bay. At this point, if people have left it too long, it might be too late to reinvigorate BitTorrent networks to their former glory.

People will try to rebuild them, of course, but realizing why they shouldn’t have been left behind at all is probably the best protection.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Kreditrating: Equifax’ Krisenreaktion ist ein Desaster

Auch nach der Bekanntgabe des Hacks läuft es nicht gut für den Finanzdienstleister Equifax: Ein Formular zur Prüfung gibt zufällige Ergebnisse aus, außerdem sorgen AGB-Klauseln für Aufregung. Mehrere Experten qualifizierten die Krisenreaktion daher als “nutzlos” und als “Dumpster Fire”. (Security, Sicherheitslücke)

Auch nach der Bekanntgabe des Hacks läuft es nicht gut für den Finanzdienstleister Equifax: Ein Formular zur Prüfung gibt zufällige Ergebnisse aus, außerdem sorgen AGB-Klauseln für Aufregung. Mehrere Experten qualifizierten die Krisenreaktion daher als "nutzlos" und als "Dumpster Fire". (Security, Sicherheitslücke)

Best Buy: US-Handelskette verbannt Kaspersky-Software aus Regalen

Die Vorwürfe gegen den russischen Antivirusproduzenten Kaspersky in den USA nehmen groteske Züge an: Die Handelskette Best Buy stoppt den Verkauf der Produkte, eine Senatorin will Kaspersky sogar von allen Rechnern der Bundesverwaltung entfernen lassen. (Security, Virenscanner)

Die Vorwürfe gegen den russischen Antivirusproduzenten Kaspersky in den USA nehmen groteske Züge an: Die Handelskette Best Buy stoppt den Verkauf der Produkte, eine Senatorin will Kaspersky sogar von allen Rechnern der Bundesverwaltung entfernen lassen. (Security, Virenscanner)

The Things Pirates Do To Hinder Anti-Piracy Investigations

Aside from distributing content or having a successful website, most pirates want to stay a step ahead of authorities and companies dedicated to their demise. In a new report detailing the role social media plays in spreading unlicensed content, anti-piracy outfit FACT reveals the key things pirates do to hinder their investigations.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Dedicated Internet pirates dealing in fresh content or operating at any significant scale can be pretty sure that rightsholders and their anti-piracy colleagues are interested in their activities at some level.

With this in mind, most pirates these days are aware of things they can do to enhance their security, with products like VPNs often get discussed on the consumer side.

This week, in a report detailing the challenges social media poses to intellectual property rights, UK anti-piracy outfit Federation Against Copyright Theft published a list of techniques deployed by pirates that hinder their investigations.

Fake/hidden website registration details

“Website registration details are often fake or hidden, which provides no further links to the person controlling the domain and its illegal activities,” the group reveals.

Protected WHOIS records are nothing new and can sometimes be uncloaked by a determined adversary via court procedures. However, in the early stages of an investigation, open records provide leads that can be extremely useful in building an early picture about who might be involved in the operation of a website.

Having them hidden is a definite plus for pirate site operators, especially when the underlying details are also fake, which is particularly common practice. And, with companies like Peter Sunde’s Njalla entering the market, hiding registrations is easier than ever.

Overseas servers

“Investigating servers located offshore cause some specific problems for FACT’s law-enforcement partners. In order to complete a full investigation into an offshore server, a law-enforcement agency must liaise with its counterpart in the country where the server is located. The difficulties of obtaining evidence from other countries are well known,” FACT notes.

While FACT no doubt corresponds with entities overseas, the anti-piracy outfit has a history of targeting UK citizens who are reportedly infringing copyright. It regularly involves UK police in its investigations (FACT itself employs former police officers) but jurisdiction is necessarily limited to the UK.

It is possible to get overseas law enforcement entities involved to seize a server, for example, but they have to be convinced of the need to do so by the police, which isn’t easy and is usually reserved for more serious cases. The bottom line is that by placing a server a long way away from a pirate’s home territory, things can be made much more difficult for local investigators.

Torrent websites and DMCA compliance

“Some torrent website operators who maintain a high DMCA compliance rate will often use this to try to appease the law, while continuing to provide infringing links,” FACT says.

This is an interesting one. Under law in both the United States and Europe, service providers are required to remove infringing content from their systems when they are notified of its existence by a rightsholder or its agent. Not doing so can render them liable, if the content is indeed infringing.

What FACT appears to be saying is that sites that comply with the law, by removing infringing content when asked to, become more difficult targets for legal action. It sounds very obvious but the underlying suggestion is that compliance on the surface is used as a protective mechanism. No example sites are mentioned but the strategy has clearly hindered FACT.

Current legislation too vague to remove infringing live sports streams

“Current legislation is insufficient to effectively tackle the issue of websites illegally offering coverage of live sports events. Section 512 (c) of the Digital Millennium Copyright Act (DMCA) states that: upon notification of claimed infringement, the service provider should ‘respond expeditiously’ to remove or disable access to the copyright-infringing material. Most live sports events are under two hours long, so such non-specific timeframes for required action are inadequate,” FACT complains.

Since government reports like these can take a long time to prepare, it appears that FACT and its partners may have already found a solution to this particular problem. Major FACT client the Premier League now has a High Court injunction in place which allows it to block infringing streams on a real-time basis. It doesn’t remove the content at its source, but it still renders it largely inaccessible in the UK.

Nevertheless, FACT calls for takedowns to be actioned more swiftly, noting that “the law needs to reflect this narrow timeframe with a specified required response period for websites offering such live feeds.”

Camming content directly from cinema screen to the cloud

“Recent advancements in technology have made this a viable option to ‘cammers’ to avoid detection. Attempts to curtail and delete illicitly recorded film footage may become increasingly difficult with the emergence of streaming apps that automatically upload recorded video to cloud services,” FACT reports.

Over the years, FACT has been involved in numerous operations to hinder those who record movies with cameras in theaters and then upload them to the Internet. Once the perpetrator has exited the theater, FACT has effectively lost the battle, but the possibility that a live upload can now take place is certainly an interesting proposition.

“While enforcing officers may delete the footage held on the device, the footage has potentially already been stored remotely on a cloud system,” FACT warns.

Equally, this could also prove a problem for those seeking to secure evidence. With a cloud upload, the person doing the recording could safely delete the footage from the local device. That could be an obstacle to proving that an offense had even been committed when a suspect is confronted in situ.

Virtual currencies

“There is great potential in virtual currencies for money launderers and illicit traders. Government and law enforcement have raised concerns on how virtual currencies can be sent anonymously, leaving little or no trail for regulators or law-enforcement agencies,” FACT writes.

For many years, pirates of all kinds have relied on systems like PayPal, Mastercard, and Visa, to shift money around. However, these payment systems are now more difficult to deploy on pirate services and are more easily traced, even when operators manage to squeeze them through the gaps.

The same cannot be said of bitcoin and similar currencies that are gaining in popularity all the time. They are harder to use, of course, but there’s little doubt accessibility issues will be innovated out of the equation at some point. Once that happens, these currencies will be a force to be reckoned with.

The UK government’s Share and Share Alike report, which examines the challenges social media poses to intellectual property rights, can be downloaded here (pdf)

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

As Irma approaches nuclear plants in Florida, lessons from Andrew resonate

Advance warning favors preparedness, but 1992 hurricane still ran up $90 million bill.

Enlarge / The Energy Information Administration’s “Energy Disruption's Map” as of Saturday morning. You can check out the interactive map at www.eia.gov/special/disruptions. (credit: Energy Information Administration)

In advance of Hurricane Irma, officials from Florida Power and Light (FPL) announced on Thursday that the utility would start shutting down the state’s only two nuclear power plants—Turkey Point, just south of Miami, and St. Lucie, north of West Palm Beach—as a safety measure.

The Turkey Point plant seems to be closest to the hurricane’s probable path according to the latest models. It has two reactors, each capable of 693 megawatts of output while operational. The plant was built in 1972, so Irma won’t be its first Category 5 hurricane. In 1992, the eye of Hurricane Andrew passed right over Turkey Point.

At the time, Turkey Point didn’t sustain any structural damage to its most sensitive facilities, despite facing sustained winds up to 145 miles per hour and gusts as strong as 175mph. The Miami Herald writes that Turkey Point’s nuclear reactors “are encased in six feet of steel-reinforced concrete and sit 20 feet above sea level.” According to a Nuclear Regulatory Commission (NRC) report published in 1993, damage to the “safety-related systems” at Turkey Point during Hurricane Andrew was limited to “minor water intrusion and some damage to insulation and paint.” No radioactive release occurred, either.

Read 10 remaining paragraphs | Comments

Key questions about Hurricane Irma on Saturday

The storm remains an extremely dangerous hurricane for parts of Florida.

Enlarge / 5am ET official forecast track for Hurricane Irma. (credit: National Hurricane Center)

As of Saturday morning, Hurricane Irma is moving westward, with its center just inland over the northern coast of Cuba. It is nearing the western periphery of a ridge of high pressure, which should force it into a northwest turn soon. Although the forecast models have been struggling with precisely when this turn is likely to occur, we have pretty high confidence it will turn west-northwest today, and then northwest tonight. The Florida Keys will be hit very hard later today and Sunday.

The more westward track over Cuba has weakened the storm’s maximum winds to 130mph, and additional weakening is possible before Irma moves back into the Straits of Florida later today or tonight. This movement will also keep the center of Irma away from the greater Miami area, sparing the heavily populated southeastern coast of Florida from the worst effects of winds and storm surge. Hurricane force wind gusts are still likely, but they will probably not cause widespread damage in Miami.

With that said, Irma remains an extremely dangerous hurricane for parts of Florida, and it should restrengthen tonight and Sunday in the waters between Cuba and Florida. Here are some of the key questions that meteorologists are considering regarding the storm today; the answers will ultimately determine where its most devastating effects occur.

Read 8 remaining paragraphs | Comments

Moto X4 Android One smartphone leaked (coming to Project Fi?)

Motorola recently unveiled the Moto X4, a smartphone with upper middle range specs including a Qualcomm Snapdragon 630 processor, a 5.2 inch full HD display, a 3,000 mAh battery, IP68 water resistance, and at least 3GB of RAM and 32GB of storage. It also has a 16MP front camera, 12MP and 8MP rear cameras, and the phone […]

Moto X4 Android One smartphone leaked (coming to Project Fi?) is a post from: Liliputing

Motorola recently unveiled the Moto X4, a smartphone with upper middle range specs including a Qualcomm Snapdragon 630 processor, a 5.2 inch full HD display, a 3,000 mAh battery, IP68 water resistance, and at least 3GB of RAM and 32GB of storage. It also has a 16MP front camera, 12MP and 8MP rear cameras, and the phone […]

Moto X4 Android One smartphone leaked (coming to Project Fi?) is a post from: Liliputing