Video Deters People From Pirate Sites…Or Encourages Them to Start One?

Videos published by Sweden’s Patent and Registration Office are attempting to deter people away from pirate sites because it’s making their operators rich. However, the videos – which depict pirates wearing strange animal masks surrounded by luxury items and piles of cash – might inadvertently encourage some to get into the game. Who wouldn’t want an indoor pool and a Dodge Viper?

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

There are almost as many anti-piracy strategies as there are techniques for downloading.

Litigation and education are probably the two most likely to be seen by the public, who are often directly targeted by the entertainment industries.

Over the years this has led to many campaigns, one of which famously stated that piracy is a crime while equating it to the physical theft of a car, a handbag, a television, or a regular movie DVD. It’s debatable whether these campaigns have made much difference but they have raised awareness and some of the responses have been hilarious.

While success remains hard to measure, it hasn’t stopped these PSAs from being made. The latest efforts come out of Sweden, where the country’s Patent and Registration Office (PRV) was commissioned by the government to increase public awareness of copyright and help change attitudes surrounding streaming and illegal downloading.

“The purpose is, among other things, to reduce the use of illegal streaming sites and make it easier and safer to find and choose legal options,” PRV says.

“Every year, criminal networks earn millions of dollars from illegal streaming. This money comes from advertising on illegal sites and is used for other criminal activities. The purpose of our film is to inform about this.”

The series of videos show pirates in their supposed natural habitats of beautiful mansions, packed with luxurious items such as indoor pools, fancy staircases, and stacks of money. For some reason (perhaps to depict anonymity, perhaps to suggest something more sinister) the pirates are all dressed in animal masks, such as this one enjoying his Dodge Viper.

The clear suggestion here is that people who visit pirate sites and stream unlicensed content are helping to pay for this guy’s bright green car. The same holds true for his indoor swimming pool, jet bike, and gold chains in the next clip.

While some might have a problem with pirates getting rich from their clicks, it can’t have escaped the targets of these videos that they too are benefiting from the scheme. Granted, hyena-man gets the pool and the Viper, but they get the latest movies. It seems unlikely that pirate streamers refused to watch the copy of Black Panther that leaked onto the web this week (a month before its retail release) on the basis that someone else was getting rich from it.

That being said, most people will probably balk at elements of the full PSA, which suggests that revenue from illegal streaming goes on to fuel other crimes, such as prescription drug offenses.

After reporting piracy cases for more than twelve years, no one at TF has ever seen evidence of this happening with any torrent or streaming site operators. Still, it makes good drama for the full video, embedded below.

“In the film we follow a fictional occupational criminal who gives us a tour of his beautiful villa. He proudly shows up his multi-criminal activity, which was made possible by means of advertising money from his illegal streaming services,” PRV explains.

The dark tone and creepy masks are bound to put some people off but one has to question the effect this kind of video could have on younger people. Do pirates really make mountains of money so huge that they can only be counted by machine? If they do, then it’s a lot less risky than almost any other crime that yields this claimed level of profit.

With that in mind, will this video deter the public or simply encourage people to get involved for some of that big money? We sent a link to the operator of a large pirate site for his considered opinion.

“WTF,” he responded.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Report: Chinese government is behind a decade of hacks on software companies

Though sloppy at times, Winnti Umbrella remain advanced and extremely prolific.

Enlarge / This phishing message used Google's link-shortening service, allowing researchers to learned details about potential targets. (credit: ProtectWise)

Researchers said Chinese intelligence officers are behind almost a decade's worth of network intrusions that use advanced malware to penetrate software and gaming companies in the US, Europe, Russia, and elsewhere. The hackers have struck as recently as March in a campaign that used phishing emails in an attempt to access corporate-sensitive Office 365 and Gmail accounts. In the process, they made serious operational security errors that revealed key information about their targets and possible location.

Researchers from various security organizations have used a variety of names to assign responsibility for the hacks, including LEAD, BARIUM, Wicked Panda, GREF, PassCV, Axiom, and Winnti. In many cases, the researchers assumed the groups were distinct and unaffiliated. According to a 49-page report published Thursday, all of the attacks are the work of Chinese government's intelligence apparatus, which the report's authors dub the Winnti Umbrella. Researchers from 401TRG, the threat research and analysis team at security company ProtectWise, based the attribution on common network infrastructure, tactics, techniques, and procedures used in the attacks as well as operational security mistakes that revealed the possible location of individual members.

A decade of hacks

Attacks associated with Winnti Umbrella have been active since at least 2009 and possibly date back to 2007. In 2013, antivirus company Kaspersky Lab reported that hackers using computers with Chinese and Korean language configurations used a backdoor dubbed Winnti to infect more than 30 online video game companies over the previous four years. The attackers used their unauthorized access to obtain digital certificates that were later exploited to sign malware used in campaigns targeting other industries and political activists.

Read 14 remaining paragraphs | Comments

Ars Technica System Guide, Spring 2018: The show-your-work edition

For this system guide edition, we focus on rationale over straight recommendations.

Enlarge (credit: Aurich Lawson / Getty)

In the December 2017 System Guide, we discovered the unexpected. Given the bevy of pre-built computing devices now available, there's a lot of debate and confusion about building one yourself these days. What's the goal behind a custom PC build in 2018? What makes a certain hardware choice "right" to support that?

So rather than starting 2018 with a traditional guide—where Ars presents three build ideas and a set of specific hardware to accomplish each—we're going to take a step back. This will be more of a meta-guide than an actual guide; we're going to share the methods and mechanics behind putting together your favorite long-running PC building guide. So while this guide will build from a set of three major system design goals like always, this edition will go through each major PC hardware component one by one, focusing more on ideology than instruction, discussing how a specific part does (or doesn't) contribute to a specific construction goal.

Standard system design goals

It's not enough to say a system should be "fast" just like it's not enough to sum up a sports car with its 0-60 time on a track. A gaming-focused system that impressively renders the most demanding scenes in Crysis can still be frustratingly slow to boot... and may handle the same gaming scenes abysmally if you forgot to (or didn't want to) close your email client or your 30-tab Web browser first. A system with server intentions may effortlessly run five or 10 entire virtual machines but similarly stumble on a single demanding application. Meanwhile, a five-year-old system that doesn't have very impressive specs might feel surprisingly fast. You know you're not going to play the latest AAA games in 4K on it, and you don't expect it to handle 200 tabs in Chrome, but somehow, despite how old it is, such a build can feel comfortable.

Read 58 remaining paragraphs | Comments

Don’t charge your brain implant during thunderstorms, docs warn after incident

Doctors report a close call of a woman with an implant that treats her tremor.

Enlarge (credit: Getty | Barcroft Media)

Last year, futurist Elon Musk announced a new project: a medical research company called Neuralink set to develop a new generation of brain implant devices—which may, among other things, help us in the coming AI apocalypse. But evil robots aside, the devices first have to face a more nefarious foe: lightning.

Doctors in Slovenia report that a 66-year-old woman with an existing brain implant experienced a close call with the device after lightning struck her apartment building. The strike ruined the woman’s television and air conditioning unit and managed to switch off her brain implant. Luckily, the woman and her device were not otherwise armed.

But in a report published this week in the Journal of Neurosurgery, the doctors say the situation could have easily been much worse, possibly zapping her brain or destroying her implant. They call for more precautions, such as surge protectors, as well as better awareness of the risks of lightning strikes with such implants—or deep brain stimulation (DBS) devices.

Read 7 remaining paragraphs | Comments

Google Daydream VR goes standalone with Lenovo’s Mirage Solo

The hardware works, and the Mirage Camera can be fun, but there’s nothing to change minds here.

Enlarge / The Lenovo Mirage Solo headset with its WorldSense cameras clearly visible on the front. (credit: Lenovo)

Daydream, Google's foray into the crowded virtual reality space, has hitherto used headsets that are simply holsters, a way of holding an Android smartphone right in front of your face so that it works as a pair of VR goggles. This makes Daydream's cost of entry cheap—the headset can be a completely passive device with no electronics of its own—which is important for making VR accessible.

Lenovo's $400 Mirage Solo, out today, is the first standalone Daydream headset. You don't slot a phone into this one—the device has all the hardware it needs to provide a standalone VR experience. The hardware inside the headset is certainly phone-like; it has a Snapdragon 835 processor with 4GB RAM, 64GB of storage, and a 4,000mAh battery. It also contains phone-like sensors, with a gyroscope, accelerometer, and magnetometer. But because it's built for VR, it has a couple of extra sensors: a pair of world-facing cameras that Google calls "WorldSense."

WorldSense is Google's inside-out, six-degree-of-freedom motion-tracking solution. As with similar systems in Microsoft's HoloLens and the various Windows Mixed Reality headsets, the system combines data from the device's internal sensors with data from the cameras to track the headset's position and orientation in space, without requiring the fixed-base stations that are used on the first-generation HTC Vive and Oculus Rift devices.

Read 17 remaining paragraphs | Comments

Lyft: 30 autonome Taxis fahren Passagiere in Las Vegas

Nun kann jeder Passagier mit einem Robotertaxi durch Las Vegas fahren: Der Dienstleister Lyft bietet diesen Service zusammen mit einem Partner namens Aptiv auf Basis von 30 BMW an. (Autonomes Fahren, Technologie)

Nun kann jeder Passagier mit einem Robotertaxi durch Las Vegas fahren: Der Dienstleister Lyft bietet diesen Service zusammen mit einem Partner namens Aptiv auf Basis von 30 BMW an. (Autonomes Fahren, Technologie)

Alan Turing’s chemistry hypothesis turned into a desalination filter

A chemical reaction he suggested can now be done, and it makes a great membrane.

Enlarge / A reverse osmosis facility. (credit: South Florida Water District)

Alan Turing is rightly famed for his contributions to computer science. But one of his key concepts—an autonomous system that can generate complex behavior from a few simple rules—also has applications in unexpected places, like animal behavior. One area where Turing himself applied the concept is in chemistry, and he published a paper describing how a single chemical reaction could create complex patterns like stripes if certain conditions are met.

It took us decades to figure out how to actually implement Turing's ideas about chemistry, but we've managed to create a number of reactions that display the behaviors he described. And now, a team of Chinese researchers has figured out how to use them to make something practical: a highly efficient desalination membrane.

From hypothesis to chemistry

Many chemical reactions end up going to completion, with all the possible reactants doing their thing and producing a product that's distributed uniformly within the reaction chamber. But under the right conditions, some chemical reactions don't reach equilibrium. These reactions are what interested Turing, since they could generate complex patterns.

Read 10 remaining paragraphs | Comments

Alan Turing’s chemistry hypothesis turned into a desalination filter

A chemical reaction he suggested can now be done, and it makes a great membrane.

Enlarge / A reverse osmosis facility. (credit: South Florida Water District)

Alan Turing is rightly famed for his contributions to computer science. But one of his key concepts—an autonomous system that can generate complex behavior from a few simple rules—also has applications in unexpected places, like animal behavior. One area where Turing himself applied the concept is in chemistry, and he published a paper describing how a single chemical reaction could create complex patterns like stripes if certain conditions are met.

It took us decades to figure out how to actually implement Turing's ideas about chemistry, but we've managed to create a number of reactions that display the behaviors he described. And now, a team of Chinese researchers has figured out how to use them to make something practical: a highly efficient desalination membrane.

From hypothesis to chemistry

Many chemical reactions end up going to completion, with all the possible reactants doing their thing and producing a product that's distributed uniformly within the reaction chamber. But under the right conditions, some chemical reactions don't reach equilibrium. These reactions are what interested Turing, since they could generate complex patterns.

Read 10 remaining paragraphs | Comments

Minecraft: Aquatic-Update wird das letzte für ältere Konsolen

Besitzer einer Xbox 360 oder der Wii U können mit Minecraft noch im Aquatic-Update in die Tiefsee tauchen. Wer dann Erweiterungen mit neuen Inhalten möchte, muss laut Entwickler Majong mit einer der neueren Konsolen spielen. (Minecraft, Microsoft)

Besitzer einer Xbox 360 oder der Wii U können mit Minecraft noch im Aquatic-Update in die Tiefsee tauchen. Wer dann Erweiterungen mit neuen Inhalten möchte, muss laut Entwickler Majong mit einer der neueren Konsolen spielen. (Minecraft, Microsoft)

UK Internet Filters Block Disney Sites, Internet Safety Tips, and More

In the UK, Internet providers offer site-blocking tools to their subscribers, so they can filter harmful content from the web. While these tools can be helpful to some, there are some rather peculiar blocks which show that they’re far from perfect, to say the least.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Over the past several years we have regularly written about court-ordered blockades of pirate sites in the UK.

Today, we take a closer look at another type of blocking, the Internet safety filters UK ISPs offer. These filters, which are sometimes enabled by default, help subscribers to block harmful content, especially for their children.

With help from the Open Rights Group’s Blocked initiative, which documents the scope of various ISP filters, we took a look at how these perform.

The first results are as expected. Many porn sites are blocked and so are sites that are clearly oriented at a mature audience. That’s more or less what these filters are meant for, so no issues there.

We also noticed that many proxies and VPNs are not accessible. While this may seem broad, as they’re not offensive, these tools could allow clever sorts to bypass parental controls, so there’s an argument to be made for their inclusion.

Oddly enough, the Tor browser, which can do the same, is freely accessible. But let’s not digress.

What really stood out to us is that some sites which are targeted at kids, or at least useful to them, are blocked too.

One prime example is the official UK Disney website, located at disney.co.uk, which is blocked by BT’s Strict filters. That seems a bit cruel. The same is true for disneymoviesanywhere.com, which is not very useful, but certainly doesn’t seem harmful to us either.

Apparently, BT doesn’t want children to visit these Disney sites.

No Disney

The parental control filters are supposed to make the web a safer place for kids. While this is a laudable aim, the execution is not always perfect. For example, several ISPs including BT, Plusnet and Virgin Media, are blocking the internetsafetyday.org website.

Admittedly, the site is targeted at parents, but since these will often be behind the same filters, they’re missing out on some good tips and tricks on how to educate their children.

No safety

Talking about education. It’s always good when kids start to experiment with coding at a young age. This is also one of the core messages of the non-profit organization Kidsandcode.org.

“Everyone should have the opportunity to learn how to code,” the site reads.

This makes sense, you’d think, but for kids who are trapped behind the BT Strict or BT Light filters, this is not an option.

What can kids do nowadays then? Play a few simple games? Ideally educational games such as the ones playkidsgames.com offers. As you may have guessed by now, that’s not an option either, at least not behind BT’s Strict filter.

Maybe kids should stick to more boring stuff. Perhaps finish that school project on Vikings, that should be doable, right? Well, it is, as long as you don’t look up vikingsword.com, a historical and educational side dedicated to Viking swords.

Both Three and Sky have blocked the site, with Sky explaining that it’s placed in the “Weapons, Violence, Gore and Hate” category.

Ancient weapons

Perhaps we’re too insensitive, but I think that most children can handle grainy drawings of swords. After all, the average cartoon is more violent nowadays.

And yes, it’s true that decades-old Viking swords are weapons, but Three and Sky are not very consistent as the website of today’s largest weapons manufacturer Lockheed Martin appears to pass through all parental filters just fine.

Luckily, the Open Rights Group allows us to check for these odd results, and report sites which are inaccurately blocked. Interested in checking if your favorite website is blocked? You can do so here. Feel free to report any unusual findings in the comments.

Open Rights Group is currently looking for donations and other means of support to keep its Blocked project up and running. More information is available here.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.