Briefe und Pakete: Bundesregierung will Rechte von Postkunden stärken

Aufgrund gestiegener Beschwerden über Mängel bei der Post- und Paketzustellung will das Bundeswirtschaftsministerium die Rechte von Postkunden stärken. Dabei geht es auch um die Frage von Sanktionsmöglichkeiten. (Bundesnetzagentur, Onlineshop)

Aufgrund gestiegener Beschwerden über Mängel bei der Post- und Paketzustellung will das Bundeswirtschaftsministerium die Rechte von Postkunden stärken. Dabei geht es auch um die Frage von Sanktionsmöglichkeiten. (Bundesnetzagentur, Onlineshop)

Amazons Patentanmeldung: Alexa-Aktivierungswort kann auch am Ende gesagt werden

Amazon will die Nutzung von Sprachassistenten natürlicher machen. Amazons digitaler Assistent Alexa würde dann auch reagieren, wenn das Aktivierungswort etwa am Ende eines Befehls gesagt wird. Ein entsprechender Patentantrag liegt vor. (Amazon Alexa, A…

Amazon will die Nutzung von Sprachassistenten natürlicher machen. Amazons digitaler Assistent Alexa würde dann auch reagieren, wenn das Aktivierungswort etwa am Ende eines Befehls gesagt wird. Ein entsprechender Patentantrag liegt vor. (Amazon Alexa, Amazon)

Hundreds of Thousands of ‘Pirate’ Sites Disappear Following Takedown Notices

New research reveals some interesting findings regarding the volume, senders, and targets of takedown notices. One of the most intriguing findings is that hundreds of thousands of domain names disappear, shortly after they are targeted by complaints.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Takedown notices are a vital tool for copyright holders who want to make sure that infringing copies of their work are not widely distributed.

Every week millions of these requests are sent to hosting platforms, as well as third-party services, such as search engines. 

Quite a few of the major players, including Twitter, Google, and Bing, publish these requests online. However, due to the massive volume, it’s hard for casual observers to spot any trends in the data. 

Researchers from Queen Mary University of London and Boston University aim to add some context with an elaborate study covering a broad database of takedown requests. Their results are now bundled in a paper titled: “Who Watches the Watchmen: Exploring Complaints on the Web.”

The research covers all takedown requests that were made available through the Lumen Database in 2017. The majority of these were sent to Google, with Bing, Twitter, and Periscope as runners-up. In total, more than one billion reported URLs were analyzed.

Most takedown requests or ‘web complaints’ were copyright-related, 98.6% to be precise. This means that other notices, such as defamation reports, court orders, and Government requests, make up a tiny minority. 

The researchers report that the complaints were submitted by 38,523 unique senders, covering 1.05 billion URLs.  While that’s a massive number, most reported links are filed by a very small group of senders. 

“We find that the distribution of notices is highly skewed towards a few extremely active senders. The top 10% of notice senders report over 1 billion URLs, in stark contrast to just 550K by the bottom 90%,” the researchers write.

Not surprisingly, the list of top senders is entirely made up of anti-piracy groups and trade organizations. In 2017, the top senders were Rivendell, Aiplex, and the UK music group BPI. 

On the domain side, the results are skewed as well. The top 1% of all reported domain names were targeted in 63% of all complaints. In other words, a small number of sites are responsible for the vast majority of all takedown notices. 

These and other figures provide more insight into the various takedown characteristics. What we were most surprised about, however, are the researchers’ findings regarding the availability of the reported domain names. 

The researchers carried out periodic checks on the domains and URLs to verify if the websites are still active. This revealed that a few weeks after the first takedown notices were filed, 22% of the reported domains were inactive, returning an NXDOMAIN response.

“Many domain names are soon taken offline and 22% of the URLs are inaccessible within just 4 weeks of us observing the complaints. Hence, it is clear that we shed light on a highly dynamic environment from the perspective of domain operators too,” the article reads.

With a total dataset of more than a billion domain names, this suggests that hundreds or thousands of sites simply disappeared. Whether the takedown requests have anything to do with this is unclear though, as many site owners may not even be aware of them.

The disappearing domain names mostly use more exotic TLDs, with .LOL being the most popular, followed by .LINK, .BID, .SPACE, and .WIN. The vast majority of these (97%) have an Alexa rank lower than one million, which means that they only have a few visitors per day. 

It’s not clear why these domains disappear and the authors of the article stress that follow-up research is required to find out more. It would not be a surprise, however, if many of these are related to spam or scams that rely on temporary search engine traffic. 

Finally, the article also observed worrying activity carried out by copyright holders. For example, some use seemingly fabricated URLs, as we have highlighted in the past, while others send hundreds of duplicate notices. 

All in all the research should help to provide a better understanding of how takedown requests impact various stakeholders. This type of transparency is essential to improve procedures for the senders, but also to prevent abuse.

“Transparency is critical and, as a society, it is important to know how and why information is filtered. This is particularly the case as we have found that these mechanisms might not be always used wisely,” the researchers conclude. 

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Cox Business Subscriber Doesn’t Want Identity Revealed in Piracy Lawsuit

As part of the ongoing lawsuit with several record labels, ISP Cox Communications agreed to identify thousands of business subscribers accused of sharing pirated material. One of the affected businesses believes this goes too far, so has asked a Virginia federal court to shield its identity.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Last year a group of prominent record labels, all members of the RIAA, filed a lawsuit against ISP Cox Communications. 

The labels argue that Cox categorically failed to terminate repeat copyright infringers and that it substantially profited from this ongoing ‘piracy’ activity. All at the expense of the record labels and other rightsholders.

As part of the discovery phase, both parties requested relevant information from each other. The labels, for example, were interested in finding out the names and addresses of Cox business subscribers that received copyright infringement warnings. 

In addition to regular households, Cox also offers Internet connections to business clients and many of these – 2,793 to be precise – were flagged as pirates.

After some back and forth Cox and the record labels agreed on a stipulated court order, requiring the ISP to disclose this information. While the court signed off on this, not all affected subscribers are happy with this decision. One of them objected in court this week. 

The company in question appeared as “John Doe” and explained that it’s a  non-profit corporation that provides hospital and medical care facilities outside of Virginia. 

As is quite common today, the non-profit operates a secured network that’s only accessible to its employees. In addition, it offers public WiFi access to patients and visitors. The latter was provided by Cox in the relevant time period.

“Like other medical care providers, John Doe provides an unsecured, public
wireless network that can be accessed by patients and other visitors who agree to abide by John Doe’s terms of use for the Public WiFi network. Cox is the internet service provider for this Public WiFi network,” the company notes

It was this unsecured network that triggered the referenced copyright infringement notifications. This, despite the fact that all users had to agree to the terms of service, which specifically prohibited illegal downloading.

From the ToS

The health care provider doesn’t refute that visitors or patients may have used the network to share copyright-infringing content. However, it notes that there’s not much it can do to identify these infringers. Not then and not now.

The health care provider doesn’t track MAC addresses of people who connected to the network, and even if it did, that would only identify a device, not a person. 

Given this background, the “John Doe” company doesn’t see any reason why its details should be shared with the record labels. That won’t help to identify any copyright infringers. However, it does breach the health care provider’s privacy rights. 

“Thus, disclosure of John Doe’s subscriber information will not lead to the discovery of the individual(s) who are alleged by Plaintiffs to have engaged in copyright infringement through the misuse of John Doe’s network in violation of the access agreement,” the company informs the court.

“All disclosure will accomplish is a breach of John Doe’s privacy rights under the Cable Communications Privacy Act, 47 USC § 551, and the imposition of time and expense burdens on John Doe, all without furthering any claim or defense in this case.”

It is now up to the court to decide whether the details of the company can be handed over by Cox. Meanwhile, it remains unclear why the record labels are interested in this information at all, and how this will help their case.

A copy of John Doe’s objection to the disclosure is available here (pdf).

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

30-plus years of HyperCard, the missing link to the Web

From the archives: Before the World Wide Web did anything, HyperCard did everything.

The Computer Lab's Beyond Cyberpunk Hypercard stack

The Computer Lab's Beyond Cyberpunk Hypercard stack (credit: Beyond Cyberpunk!)

Update: It's Memorial Day weekend here in the US, and the Ars staff has a long weekend accordingly. Many will spend that time relaxing or traveling with family, but maybe someone will dust off their old MacIntosh and fire up Hypercard, a beloved bit of Apple software and development kit in the pre-Web era. The application turns 32 later this summer, so with staff off we thought it was time to resurface this look at Hypercard's legacy. This piece originally ran on May 30, 2012 as Hypercard approached its 25th anniversary, and it appears unchanged below.

Sometime around 1988, my landlady and I cut a deal. She would purchase a Macintosh computer, I would buy an external hard drive, and we would leave the system in the living room to share. She used the device most, since I did my computing on an IBM 286 and just wanted to keep up with Apple developments. But after we set up the Mac, I sat down with it one evening and noticed a program on the applications menu. "HyperCard?" I wondered. "What's that?"

I opened the app and read the instructions. HyperCard allowed you to create "stacks" of cards, which were visual pages on a Macintosh screen. You could insert "fields" into these cards that showed text, tables, or even images. You could install "buttons" that linked individual cards within the stack to each other and that played various sounds as the user clicked them, mostly notably a "boing" clip that to this day I can't get out of my mind. You could also turn your own pictures into buttons.

Read 28 remaining paragraphs | Comments

Website for storing digital currencies hosted code with a sneaky backdoor

WalletGenerator.net and the mystery of the backdoored random number generator.

Website for storing digital currencies hosted code with a sneaky backdoor

(credit: NoHoDamon)

A website that bills itself as providing a safer way to store Bitcoin and other digital currencies has been using a coding sleight of hand to generate private keys that are suspiciously trivial for the operators to guess, leaving all funds stored in the wallets open to theft, researchers with a different service said on Friday.

WalletGenerator.net provides code for creating what are known as paper wallets for 197 different cryptocurrencies. Paper wallets were once billed as a secure way to store digital coins because—in theory, at least—the private keys that unlock the wallets are stored on paper, rather than on an Internet-connected device that can be hacked. (In reality, paper wallets are open to hack for a variety of reasons.) While the site advises people to download the code from this Github page and run it while the computer is unplugged from the Internet, it also hosted a simpler, stand-alone service above all the instructions for generating the same wallets.

Researchers from MyCrypto, which provides an open-source tool for cryptocurrency and blockchain users, compared the code hosted on Github and WalletGenerator.net and found some striking differences. Sometime between August 17 and August 25 of last year, the WalletGenerator.net code was changed to alter the way it produced the random numbers that are crucial for private keys to be secure.

Read 13 remaining paragraphs | Comments

Here are the finalists for 2019’s “Board game of the year” award

Tabletop gaming’s highest honor, the Spiel des Jahres, is back.

Here are the finalists for 2019’s “Board game of the year” award

Enlarge (credit: Spiel des Jahres)

Welcome to Ars Cardboard, our weekend look at tabletop games! Check out our complete board gaming coverage at cardboard.arstechnica.com.

The nominees for board gaming's biggest award, the German "Spiel des Jahres" trophy, were announced this week and feature a total absence of entries from designers Wolfgang Warsch and Michael Kiesling. (If you have no idea what I'm talking about, those two absolutely dominated last year's awards).

This year, the jury of German critics went with light, easy-to-teach games for the family-friendly "Spiel des Jahres" award. Just One and Werwörter (Werewords in English) are word-based party games, while L.A.M.A. is a card-shedding game from design legend Reiner Knizia. All three play in under 20 minutes (!).

Read 4 remaining paragraphs | Comments

US-Boykott: Huawei bekommt Probleme bei SD-Karten und Drahtlosnetzen

Durch den Handelsboykott der USA gerät Huawei immer stärker unter Druck: Das chinesische Unternehmen könnte die Möglichkeit verlieren, seine Mobilegeräte nach den gängigen Standards für SD-Karten und Drahtlosnetzwerke zu bauen – oder zumindest mit den …

Durch den Handelsboykott der USA gerät Huawei immer stärker unter Druck: Das chinesische Unternehmen könnte die Möglichkeit verlieren, seine Mobilegeräte nach den gängigen Standards für SD-Karten und Drahtlosnetzwerke zu bauen - oder zumindest mit den entsprechenden Logos zu werben. (Huawei, WLAN)

Apple: Update auf iOS 12.3.1 behebt Probleme mit VoLTE

Apple hat ohne öffentlichen Betatest ein Update für iOS veröffentlicht. Es löst mehrere Probleme, darunter einen ärgerlichen Bug mit Voice over LTE und zwei Fehler in der Nachrichten-App. (Apple, iPhone)

Apple hat ohne öffentlichen Betatest ein Update für iOS veröffentlicht. Es löst mehrere Probleme, darunter einen ärgerlichen Bug mit Voice over LTE und zwei Fehler in der Nachrichten-App. (Apple, iPhone)