Gigafactory-Probleme: Verzögerungen beim Tesla Model 3 dauern an

Ausgerechnet die Akkus für das Model 3 von Tesla sind ein Hindernis, die Produktion des Elektroautos zu beschleunigen. Darüber hinaus könnte es ein Qualitätsproblem bei den bereits ausgelieferten Akkus geben. (Tesla Model 3, Technologie)

Ausgerechnet die Akkus für das Model 3 von Tesla sind ein Hindernis, die Produktion des Elektroautos zu beschleunigen. Darüber hinaus könnte es ein Qualitätsproblem bei den bereits ausgelieferten Akkus geben. (Tesla Model 3, Technologie)

Anwaltspostfach: Die unnötige Ende-zu-Mitte-Verschlüsselung von BeA

Beim besonderen elektronischen Anwaltspostfach wird angeblich eine Ende-zu-Ende-Verschlüsselung eingesetzt – dabei sind die privaten Schlüssel nicht in der Hand der Nutzer, sondern in einem Hardware Security Module gespeichert. Wir erklären, wie es bes…

Beim besonderen elektronischen Anwaltspostfach wird angeblich eine Ende-zu-Ende-Verschlüsselung eingesetzt - dabei sind die privaten Schlüssel nicht in der Hand der Nutzer, sondern in einem Hardware Security Module gespeichert. Wir erklären, wie es besser gehen würde. Von Hanno Böck (BeA, Verschlüsselung)

Blu-ray, Ultra HD Blu-ray sales stats for the week ending January 6, 2018

The results and analysis for DVD, Blu-ray and Ultra HD Blu-ray sales for the week ending January 6, 2018 are in. The first week of 2018 is pretty light on releases, although the sole new release in the top 20 ended up being the top seller for the week….



The results and analysis for DVD, Blu-ray and Ultra HD Blu-ray sales for the week ending January 6, 2018 are in. The first week of 2018 is pretty light on releases, although the sole new release in the top 20 ended up being the top seller for the week. Find out which movie did that in our weekly DVD,Blu-ray and Ultra HD Blu-ray sales stats and analysis feature.

Acer Chrome OS tablet breaks cover at Bett 2018 show

Chromebooks have been around for nearly a decade, and over the past few years we’ve also started to see convertible models with touchscreen displays and 360-degree hinges that let you use a Chromebook in tablet mode. But you know what we haven&#8…

Chromebooks have been around for nearly a decade, and over the past few years we’ve also started to see convertible models with touchscreen displays and 360-degree hinges that let you use a Chromebook in tablet mode. But you know what we haven’t seen? A straight-up Chrome OS tablet. It looks like that’s going to change […]

Acer Chrome OS tablet breaks cover at Bett 2018 show is a post from: Liliputing

Vulnerable industrial controls directly connected to Internet? Why not?

Even some devices with patches available are connected to the naked Internet.

(credit: Siemens)

Yesterday, Siemens issued an update to a year-old product vulnerability warning for its SIMATIC S7-300 and S7-400 families of programmable logic controllers (PLCs)—industrial control systems used to remotely monitor and operate manufacturing equipment. The alert, originally issued in December of 2016, was updated on Wednesday to include another version of the S7-400 line. The Department of Homeland Security pushed out an alert through the Industrial Control Systems Computer Emergency Response Team (ICS-CERT) today. The systems in both device families are vulnerable to remote attacks that could allow someone to obtain login credentials to the system or reset it into a "defect" mode, shutting down the controller—essentially executing a denial-of-service attack on whatever equipment it is attached to.

You might not think that factory industrial controls would be directly accessible from the Internet. But a quick survey of devices open on the network port mentioned in the advisory (TCP port 102) using the Shodan search engine revealed over 1,000 Siemens devices directly accessible on the Internet (plus a certain number of honeypots set up to detect attacks).

Many of the devices are vulnerable based on Siemens' alerts and do not have the firmware updates required to mitigate the threat. The only good news, as security researcher Kevin Beaumont said in an exchange with Ars on Twitter, is that "I've seen no evidence of anybody trying to wipe them, etc., yet."

Read 8 remaining paragraphs | Comments

Xiaomi Mi Notebook Air updated with 8th-gen Intel Core chips

Xiaomi is updating its 13.3 inch Mi Notebook Air thin and light laptop with new models sporting 8th-gen Intel Core processors. The new model still weighs just 2.9 pounds and still measures just about 0.6 inches thick. But now it packs a quad-core proce…

Xiaomi is updating its 13.3 inch Mi Notebook Air thin and light laptop with new models sporting 8th-gen Intel Core processors. The new model still weighs just 2.9 pounds and still measures just about 0.6 inches thick. But now it packs a quad-core processor and improved cooling. Prices are expected to start at about $850 […]

Xiaomi Mi Notebook Air updated with 8th-gen Intel Core chips is a post from: Liliputing

Apple prepares macOS users for discontinuation of 32-bit app support

High Sierra will be the last version to support 32-bit “without compromises.”

Enlarge / The iMac Pro. (credit: Samuel Axon)

At last year's Worlwide Developer's Conference (WWDC), Apple announced to Mac app developers that macOS High Sierra "will be the last macOS release to support 32-bit apps without compromise." Now, in the macOS High Sierra 10.13.4 beta, Apple is notifying users of the impending change, too.

In the beta release notes, Apple says:

To prepare for a future release of macOS in which 32-bit software will no longer run without compromise, starting in macOS High Sierra 10.13.4, a user is notified on the launch of an app that depends on 32-bit software. The alert appears only once per app.

When users attempt to launch a 32-bit app in 10.13.4, it will still launch, but it will do so with a warning message notifying the user that the app will eventually not be compatible with the operating system unless it is updated. This follows the same approach that Apple took with iOS, which completed its sunset of 32-bit app support with iOS 11 last fall.

Read 6 remaining paragraphs | Comments

Sleep no more: Threads is coming to Blu-ray

It’s a film that everyone should see—once.

Enlarge / It's grim up north. (credit: BBC)

If life feels a little too joyful, if you're looking to spend a couple of hours drenched in unrelenting misery, and if you want a film experience that will haunt you for literally years to come, I have some great news. The 1984 BBC telemovie Threads is receiving a new Blu-ray release, remastered in HD by Severin Films.

Threads is grim viewing. Set in Sheffield in the UK, it tells the story of Ruth in the month leading up to, and 13 years following, all-out nuclear war between NATO and the USSR. It lacks the cheery, upbeat tone of its closest US counterpart, 1983's The Day After, favoring instead bleak realism. As the threads of society break down, the poor unfortunates who survived the initial barrage don't so much live as merely exist in the post-apocalyptic ruins.

I was thankfully too young to watch Threads when it originally aired during the Cold War. Instead, I saw it at school in the late 1990s. The fall of the Soviet Union made the threat of nuclear annihilation much less present—at the time it seemed almost absurd to even contemplate—but the pure, unadulterated horror of the film was nonetheless traumatic and deeply affecting. Teenage boys normally greet serious material with cynical mockery; Threads got ashen-faced, nauseated silence, and an overwhelming sense of relief that the threat of global thermonuclear war was largely averted.

Read 3 remaining paragraphs | Comments

Mayor quits FCC committee, says it favors ISPs over the public interest

Ajit Pai accused of tilting broadband committee toward industry representatives.

Enlarge / FCC Chairman Ajit Pai with his oversized coffee mug in November 2017. (credit: Getty Images | Bloomberg)

A broadband deployment advisory group organized by the Federal Communications Commission is trying to make it harder for cities and towns to build and operate their own Internet services.

The Broadband Deployment Advisory Committee (BDAC) was set up by the FCC last year and is now releasing draft versions of its recommendations. One member—the mayor of San Jose, California—quit the group today out of frustration that the recommendations favor the interests of private industry over municipalities.

The problem "became particularly apparent at our most recent meeting in Washington, DC," San Jose Mayor Sam Liccardo told FCC Chairman Ajit Pai in his resignation letter.

Read 36 remaining paragraphs | Comments

Pirate Bay Founder’s Domain Service “Mocks” NY Times Legal Threats

When The New York Times discovered that a site was sharing copies of their articles without permission, it demanded the associated domain registration service to identify the owner. While some companies may be eager to comply, Njalla is not. The anonymous registration service replied with some unusual responses instead, reminiscent of TPB’s infamous ‘legal threats’ section.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

Back in the day, The Pirate Bay was famous for its amusing responses to legal threats. Instead of complying with takedown notices, it sent witty responses to embarrass the senders.

Today the notorious torrent site gives copyright holders the silent treatment, but the good-old Pirate Bay spirit still lives on elsewhere.

Earlier today the anonymous domain registration service Njalla, which happens to be a venture of TPB co-founder Peter Sunde, posted a series of noteworthy responses it sent to The New York Times’ (NYT) legal department.

The newspaper warned the registration service about one of its customers, paywallnews.com, which offers the news service’s content without permission. Since this is a violation of The Times’ copyrights, according to the paper, Njalla should take action or face legal consequences.

NYT: Accordingly, we hereby demand that you immediately provide us with contact information — including email addresses — for both the actual owner of the paywallnew.com website, and for the hosting provider on which the paywallnew.com website is located.

If we have not heard from you within three (3) business days of receipt of this letter, we will have no choice but to pursue all available legal remedies.

Njalla is no stranger to threats of this kind but were somewhat offended by the harsh language, it seems. The company, therefore, decided to inform the NYT that there are more friendly ways to reach out.

Njalla: Thanks for that lovely e-mail. It’s always good to communicate with people that in their first e-mail use words as “we demand”, “pursue all available legal remedies” and so forth. I’d like to start out with some free (as in no cost) advice: please update your boiler threat letters to actually try what most people try first: being nice. It’s not expensive (actually the opposite) and actually it works much better than your method (source: a few tens of thousands years of human development that would not have been as efficient with threats as it would have been with cooperation).

In addition, Njalla also included a request of its own. They kindly asked (no demand) the newspaper’s legal department for proof that they are who they say they are. You can never be too cautious, after all.

Njalla: Now, back to the questions you sent us. We’re not sure who you are, so in order to move further we’d like to see a copy of your ID card, as well as a notarised power of attorney showing that you are actually representing the people you’re claiming to do.

This had the desired effect, for Njalla at least. The NYT replied with an apology for the tough language that was used, noting that they usually deal with companies that employ people who are used to reading legal documents.

The newspaper did, however, submit a notarized letter signed by the company’s Executive Vice President, General Counsel and Secretary, and once again asked for details on the Njalla customer.

NYT: Once again, as I mention above, the referenced website is stealing large amounts of New York Times content. If you click on this link: http://www.paywallnews.com/sites/nytimes

As this abuse — aside from being an egregious infringement of The Times’s copyright — breaches your own Terms of Service, I hope you will be able to see your way to helping me to put a stop to this practice by providing me with the name and contact information for the owner of paywallnews.com and for the ISP on which it is hosted.

This is when things started to get really interesting. Founded by someone with an extensive background in “sharing,” Njalla clearly has a different definition of stealing than the NYT’s legal department.

The reply, which is worth reading in full along with the rest of the communication, makes this quite clear.

Njalla: Stealing content seem quite harsh of this website though, didn’t know that they did that! Is there anyway you can get the stolen items back though? You should either go to the police and request them to help you get the stolen items back. Or maybe talk to your insurance company, they might help to compensate you for the loss. But a helpful idea; if they’ve stolen something and then put copies of that on a website that you can freely access, I would suggest just copying it, so that both of you have the same things. That’s a great thing with the digital world, everyone can have copies of things. I am surprised they stole something when they could just have copied it. I’m guessing it’s some older individuals that don’t know the possibilities of modern day technology to make copies.

It’s obvious that the domain registration service makes a clear distinction between copying and stealing.

Piracy vs. Theft

In addition, Njalla contests that the site is problematic at all, noting that this might be a “cultural difference.”

Njalla spotted something even more worrying though. The NYT claims that the site in question violates its terms of service. Specifically, they reference the section that prohibits sites from spreading content that is illegal according to local law.

Is the NYT perhaps spreading illegal content itself, Njalla questions?

Njalla: Deborah, I was quite shocked and appalled that you referred to this part of our ToS. It made me actually not visit the website in question even though you’ve linked it now a few times. You’re admitting to spreading illegal content at your newspaper, for profit, is that correct?

We’re quite big proponents of freedom of speech, let me assure you of that, but we also have limits. If you spread illegal content, and our customers stole that illegal content and are now handing out free copies of that, that’s a huge issue for us. Since it would be illegal for us to get those copies if they’re illegal, I’m asking you what type of content it is?

As an attachment to the reply, Njalla also sent back a “notarized” letter of their own, by simply copying the NYT letter and sticking their own logo on it, to show how easily these can be fabricated.

TorrentFreak reached out to Sunde who informed us that they never heard from The New York Times after the last reply. As a domain registrant, Njalla is not obliged to comply with takedown requests, he explains.

“If they need help from us on copyright issues, they’re totally missing what we’re doing, and that they should look somewhere else anyhow. But I think most domain services gets tons of these threat emails, and a lot of them think they’re responsible because they don’t have access to legal help and just shut customers down.

“That’s what a lot of our customers say at least, since they migrated from a shitty service which doesn’t know their own business,” Sunde adds.

The NYT is not completely without options though. If they take the case to court in Sweden and win an injunction against paywallnews.com, Njalla will comply. The same is true if a customer really violates the terms of service.

Meanwhile, paywallnews.com remains online.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons