Mobiles Betriebssystem: Apple bringt iOS 12.1.2

Apple hat kurz nach iOS 12.1.1 mit iOS 12.1.2 das nächste Update für sein mobiles Betriebssystem veröffentlicht. Das Update soll eSIM- und Mobilfunk-Bugfixes beheben. (iOS 12, Apple)

Apple hat kurz nach iOS 12.1.1 mit iOS 12.1.2 das nächste Update für sein mobiles Betriebssystem veröffentlicht. Das Update soll eSIM- und Mobilfunk-Bugfixes beheben. (iOS 12, Apple)

Mobiles Betriebssystem: Apple bringt iOS 12.1.2

Apple hat kurz nach iOS 12.1.1 mit iOS 12.1.2 das nächste Update für sein mobiles Betriebssystem veröffentlicht. Das Update soll eSIM- und Mobilfunk-Bugfixes beheben. (iOS 12, Apple)

Apple hat kurz nach iOS 12.1.1 mit iOS 12.1.2 das nächste Update für sein mobiles Betriebssystem veröffentlicht. Das Update soll eSIM- und Mobilfunk-Bugfixes beheben. (iOS 12, Apple)

Sunswift: Solarauto fährt mit 3,25 kWh 100 km weit

Ein Team der University of New South Wales in Australien ist mit seinem solarbetriebenen Fahrzeug rund 4.100 km gefahren und hat dabei nur rund 3,25 kWh pro 100 km benötigt. (Solarenergie, Elektroauto)

Ein Team der University of New South Wales in Australien ist mit seinem solarbetriebenen Fahrzeug rund 4.100 km gefahren und hat dabei nur rund 3,25 kWh pro 100 km benötigt. (Solarenergie, Elektroauto)

MIPS chip architecture is going open source

Most desktop and laptop computers are powered by Intel and AMD chips based on x86 architecture, while most smartphones, many tablets, and some servers use chips based on ARM architecture. The distinctions aren’t as clear-cut as they used to be &#…

Most desktop and laptop computers are powered by Intel and AMD chips based on x86 architecture, while most smartphones, many tablets, and some servers use chips based on ARM architecture. The distinctions aren’t as clear-cut as they used to be — you can find ARM chips in Windows PCs and servers, and x86 chips in routers […]

The post MIPS chip architecture is going open source appeared first on Liliputing.

Google isn’t the company that we should have handed the Web over to

Analysis: Microsoft adopting Chromium puts the Web in a perilous place.

The word

Enlarge (credit: Aurich Lawson / Getty Images)

With Microsoft's decision to end development of its own Web rendering engine and switch to Chromium, control over the Web has functionally been ceded to Google. That's a worrying turn of events, given the company's past behavior.

Chrome itself has about 72 percent of the desktop-browser market share. Edge has about 4 percent. Opera, based on Chromium, has another 2 percent. The abandoned, no-longer-updated Internet Explorer has 5 percent, and Safari—only available on macOS—about 5 percent. When Microsoft's transition is complete, we're looking at a world where Chrome and Chrome-derivatives take about 80 percent of the market, with only Firefox, at 9 percent, actively maintained and available cross-platform.

The mobile story has stronger representation from Safari, thanks to the iPhone, but overall tells a similar story. Chrome has 53 percent directly, plus another 6 percent from Samsung Internet, another 5 percent from Opera, and another 2 percent from Android browser. Safari has about 22 percent, with the Chinese UC Browser sitting at about 9 percent. That's two-thirds of the mobile market going to Chrome and Chrome derivatives.

Read 20 remaining paragraphs | Comments

Courts Want “Something More” Than an IP-Address to Catch Pirates

Following a high-profile order at the Ninth Circuit Court of Appeals this summer, copyright holders are facing a roadblock in their quest to demand settlements from alleged file-sharers. Referencing the August order, federal courts in districts across the US are demanding more evidence than an IP-address alone.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

While it’s not getting making big headlines in the mainstream media, US courts are still loaded with BitTorrent related lawsuits.

The cases are filed by a small group of copyright holders. To state their claim, these companies generally rely on IP-addresses as evidence.

These IP-address details are collected from BitTorrent swarms and linked to a geographical location using geolocation tools. With this information in hand, rightsholders ask the courts to grant a subpoena, forcing Internet providers to hand over the personal details of the associated account holder.

This process isn’t new and the same tactics have been used for years. While some federal judges have raised doubts about the accuracy and sufficiency of IP-address evidence, many others let the cases continue.

In recent weeks, however, more and more judges have begun to ask questions.

This started after the Ninth Circuit Court of Appeals reached a verdict in Cobbler Nevada v. Gonzales. The Court ruled that identifying the registered subscriber of an IP-address by itself is not enough to argue that this person is also the infringer.

“Because multiple devices and individuals may be able to connect via an IP address, simply identifying the IP subscriber solves only part of the puzzle. A plaintiff must allege something more to create a reasonable inference that a subscriber is also an infringer,” the verdict read.

What this “something more” should be was not clarified, but the order didn’t go unnoticed. In recent weeks several district courts have cited the ruling, requesting copyright holders to come up with “something more” as well.

Just last week, US District Judge Sara Ellis dismissed a complaint Malibu Media had filed for this very reason.

“This Court agrees with the Ninth Circuit and those courts that have found that a plaintiff must allege more than simply the registration of an IP address to an individual in order to proceed against that individual for copyright infringement,” Judge Ellis wrote.

Malibu Media, one of the most prolific filers of BitTorrent lawsuits, was given the opportunity to amend the complaint with new details, but those will have to tie the defendant to the alleged infringement.

The company had already amended the complaint previously, showing that the IP address was the source of a persistent pattern of copyright infringement. That, however, was not enough.

In Nevada, US Magistrate Judge Nancy Koppe also highlighted the Gonzales ruling. A request for a subpoena by Strike 3 Holdings was denied because an IP-address alone is not enough.

“In the context of BitTorrent copyright infringement, the Ninth Circuit has recently held that a plaintiff bears the burden of pleading factual allegations that create a reasonable inference that the defendant is the infringer.

“Hence, a complaint that traces infringement to a particular IP address and pleads that the IP address is registered to the defendant is insufficient to state a claim,” Judge Koppe adds.

Over in Washington, District Judge Thomas Zilly asked for “something more” as well, in an order that spans twelve cases and dozens of defendants. Again, referencing the Appeals Court’s Gonzales ruling.

The rightsholder in those cases, Venice PI, did respond with further details.

The company said that it gathered various other details including download history and the layout of the residence and neighborhood, which make it likely that the account holder is the infringer. Whether that’s good enough remains to be seen.

What’s clear though is that the Appeals Court ruling is being used by courts across the country to demand “something more” than an IP-address alone.

While this is not the end of so-called “copyright trolling” practices just yet, it does make it harder for rightsholders to convince the courts.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Massive scale of Russian election trolling revealed in draft Senate report

Data shows messages tuned to support Trump, discourage opposition.

A report commissioned by the US Senate Select Committee on Intelligence, based on data provided to the committee by social media platforms, provides a look at just how large and ambitious the Internet Research Agency's campaign to shape the US Presidential election was.

Enlarge / A report commissioned by the US Senate Select Committee on Intelligence, based on data provided to the committee by social media platforms, provides a look at just how large and ambitious the Internet Research Agency's campaign to shape the US Presidential election was. (credit: Chesnot/Getty Images)

A report prepared for the Senate Select Committee on Intelligence (SSCI) due to be released later this week concludes that the activities of Russia's Internet Research Agency leading up to and following the 2016 US presidential election were crafted to specifically help the Republican Party and Donald Trump. The activities encouraged those most likely to support Trump to get out to vote while actively trying to spread confusion and discourage voting among those most likely to oppose him. The report, based on research by Oxford University's Computational Propaganda Project and Graphika Inc., warns that social media platforms have become a "computational tool for social control, manipulated by canny political consultants, and available to politicians in democracies and dictatorships alike."

In an executive summary to the Oxford-Graphika report, the authors—Philip N. Howard, Bharath Ganesh, and Dimitra Liotsiou of the University of Oxford, Graphika CEO John Kelly, and Graphika Research and Analysis Director Camille François—noted that, from 2013 to 2018, "the IRA's Facebook, Instagram, and Twitter campaigns reached tens of millions of users in the United States... Over 30 million users, between 2015 and 2017, shared the IRA's Facebook and Instagram posts with their friends and family, liking, reacting to, and commenting on them along the way."

While the IRA's activity focusing on the US began on Twitter in 2013, as Ars previously reported, the company had used Twitter since 2009 to shape domestic Russian opinion. "Our analysis confirms that the early focus of the IRA's Twitter activity was the Russian public, targeted with messages in Russian from fake Russian users," the report's authors stated. "These misinformation activities began in 2009 and continued until Twitter began closing IRA accounts in 2017."

Read 9 remaining paragraphs | Comments

Zanco S-Pen Is A Bluetooth Multi-tool For Mobile Office Warriors

Smartphones help us perform thousands of different tasks and keep us connected 24-7. Sometimes that’s more of a headache than a convenience. A new device offers a possible solution: leave your giant smartphone behind and tuck a giant pen-like thi…

Smartphones help us perform thousands of different tasks and keep us connected 24-7. Sometimes that’s more of a headache than a convenience. A new device offers a possible solution: leave your giant smartphone behind and tuck a giant pen-like thing in your pocket instead. A company called Zanco has launched a Kickstarter project for a […]

The post Zanco S-Pen Is A Bluetooth Multi-tool For Mobile Office Warriors appeared first on Liliputing.

FCC forces California to drop plan for government fees on text messages

FCC said texts aren’t telecommunications, causing California to ditch fee plan.

A woman sending a text message on a smartphone.

Enlarge (credit: Getty Images | Tom Werner)

California telecom regulators have abandoned a plan to impose government fees on text-messaging services, saying that a recent Federal Communications Commission vote has limited its authority over text messaging.

The FCC last week voted to classify text-messaging as an information service, rather than a telecommunications service.

"Information service" is the same classification the FCC gave to broadband when it repealed net neutrality rules and claimed that states aren't allowed to impose their own net neutrality laws. California's legislature passed a net neutrality law anyway and is defending it in court. But the state's utility regulator chose not to challenge the FCC on regulation of text messaging.

Read 13 remaining paragraphs | Comments

Conservation of energy used to parallelize quantum key distribution

Entangled photons provide key, conservation of energy provides address.

A large number of keys against a light-colored wooden background.

Enlarge (credit: Taki Steve / Flickr)

It has been a while since I wrote about quantum key distribution. Once a technology is commercially available, my interest starts to fade. But commercial availability in this case hasn't meant widespread use. Quantum key distribution has ended up a niche market because creating shared keys with it for more than one connection using a single device is so difficult.

That may all change now with a very inventive solution that makes use of all the best things: lasers, nonlinear optics, and conservation of energy.

Quantum key distribution in less than 500 words

The goal of quantum key distribution is to generate a random number that is securely shared between two people, always termed Alice and Bob. The shared random number is then used to seed classical encryption algorithms.

Read 14 remaining paragraphs | Comments