Cloudflare Refutes MPA and RIAA’s Piracy Concerns

Cloudflare is frustrated with the continued criticism from entertainment industry groups, which accuse the company of assisting pirate sites. In a letter to the U.S. Government, the CDN provider once again rebuts these claims, stressing that it’s not obliged to shut down potentially infringing websites.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Earlier this month several copyright holder groups sent their annual “Notorious Markets” complaints to the U.S. Trade Representative (USTR).

The recommendations are meant to call out well-known piracy sites, apps, and services, but Cloudflare is frequently mentioned as well.

The American CDN provider can’t be officially listed since it’s not a foreign company. However, rightsholders have seizes the opportunity to point out that the CDN service helps pirate sites with their infringing activities.

The MPA and RIAA, for example, wrote that Cloudflare frustrates enforcement efforts by helping pirate sites to “hide” their hosting locations. In addition, the Hollywood-affiliated Digital Citizens Alliance (DCA) pointed out that the company helps pirate sites to deliver malware.

This week Cloudflare responded to these allegations. In a rebuttal, sent to the USTR’s Director for Innovation and Intellectual Property, General Counsel Doug Kramer writes that these reports are not an accurate representation of how the company operates.

“My colleagues and I were frustrated to find continued misrepresentations of our business and efforts to malign our services,” Kramer writes.

“We again feel called on to clarify that Cloudflare does not host the referenced websites, cannot block websites, and is not in the business of hiding companies that host illegal content–all facts well known to the industry groups based on our ongoing work with them.”

Kramer points out that the copyright holder groups “rehash” previous complaints, which Cloudflare previously rebutted. In fact, some parts of the CDN provider’s own reply are rehashed too, but there are several new highlights as well.

For example, the USTR’s latest review specifically focuses on malware issues. According to Cloudflare, its services are specifically aimed at mitigating such threats.

“Our system uses the collective intelligence from all the properties on our network to support and immediately update our web application firewall, which can block malware at the edge and prevent it from reaching a site’s origin server. This protects the many content creators who use our services for their websites as well as the users of their websites, from malware,” Kramer writes.

The DCA’s submission, which included a 2016 report from the group, is out of date and inaccurate, Cloudflare says. Several of the mentioned domains are no longer Cloudflare customers, for example. In addition, the DCA never sent any malware complaints to the CDN service.

Cloudflare did previously reach out to the DCA following its malware report, but this effort proved fruitless, the company writes.

“Despite our repeated attempts to get additional information by either
phone or email, DCA cancelled at least three scheduled calls and declined to provide any specific information that would have allowed us to verify the existence of the malware and protect users from malicious activity online,” Kramer notes.

Malware aside, the allegations that Cloudflare helps pirate sites to ‘hide’ their hosting locations are not entirely true either.

Kramer points out that the company has a “Trusted Reporter” program which complainants, including the RIAA, use frequently. This program helps rightsholders to easily obtain the actual hosting locations of Cloudflare customers that engage in widespread copyright infringement.

Although Cloudflare admits that it can’t stop all bad actors online, it will continue to work with the RIAA, MPA, and others to provide them with all the information they need for their enforcement efforts.

None of this is new though. Year after year the same complaints come in and Cloudflare suggests that copyright holders are actually looking for something else. They would like the company to terminate accounts of suspected pirate sites. However, the CDN provider has no intention to do so.

“Their submissions to the Notorious Markets process seem intended to pressure Cloudflare to take over efforts to identify and close down infringing websites for them, but that is something that we are not obligated to do,” Kramer says.

While it would be technically possible, it would require the company to allocate considerable resources to the task. These resources are currently needed to pursue its primary goal, which is to keep the Internet secure and protect users from malware and other risks.

It’s clear that Cloudflare doesn’t want to take any action against customers without a court order. While it has occasionally deviated from this stance by kicking out Daily Stormer and 8Chan, pirate sites are on a different level.

A copy of the letter Cloudflare’s General Counsel Doug Kramer sent to the USTR’s Director for Innovation and Intellectual Property, Jacob Ewerdt, is available here (pdf).

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Intel “Tremont” low-power chip details coming soon (next-gen Atom)

Intel’s new 10th-gen Core processors for mobile devices include Comet Lake chips that use as little as 4.5 watts of power and Ice Lake processors that use as much as 28 watts. But the company also has another line of low-power chips aimed at chea…

Intel’s new 10th-gen Core processors for mobile devices include Comet Lake chips that use as little as 4.5 watts of power and Ice Lake processors that use as much as 28 watts. But the company also has another line of low-power chips aimed at cheaper laptops, tablets, mini PCs, and IoT devices — and the […]

The post Intel “Tremont” low-power chip details coming soon (next-gen Atom) appeared first on Liliputing.

The Pixel 4’s face unlock works on sleeping, unconscious people

Google’s lack of an alertness check raises security concerns.

Google's recently announced Pixel 4 has a new biometric feature—well, new for Google, at least—face unlock. Like most new biometric systems, that means we'll probably be writing about security flaws in its implementation, and the first one has already popped up before the phone is even out. You don't need to have your eyes open for the Pixel 4's face unlock to work. The flaw was first publicized by the BBC's technology reporter, Chris Fox, who was able to get face unlock to work on several people with their eyes closed.

The thing about biometrics versus a password or PIN is that having to enter data via a keyboard is a pretty good indicator of consent. You're conscious, you're recalling this secret information, and you're typing it into the phone. You're at least aware of what's going on. Biometrics, on the other hand, are something other people can do for you, or to you. The easiest example is pointing a phone at a sleeping person to unlock it. You could also lift a person's finger and put it on a fingerprint reader, but at least you have to touch the victim to do that. There's a real lack of consent and awareness when you can just point the phone at an unconscious person.

Fox gives a great video example on Twitter:

Read 2 remaining paragraphs | Comments

H2.City Gold: Caetanobus stellt Brennstoffzellenbus mit Toyota-Technik vor

Damit die Luft in Städten besser wird, sollen Busse sauberer werden. Ein neuer Bus aus Portugal mit Brennstoffzellenantrieb emititiert als Abgas nur Wasserdampf. (Brennstoffzellenauto, Technologie)

Damit die Luft in Städten besser wird, sollen Busse sauberer werden. Ein neuer Bus aus Portugal mit Brennstoffzellenantrieb emititiert als Abgas nur Wasserdampf. (Brennstoffzellenauto, Technologie)

Should all connected cars have a physical network kill switch?

Consumer Watchdog raises the alarm about connected cars with misguided report.

Should all connected cars have a physical network kill switch?

Enlarge (credit: Aurich Lawson / Getty)

Connected cars should come with a kill switch. That's the take-home message—and the title—of a report by the group Consumer Watchdog. Software increasingly defines the vehicles we drive, and software can be exploited by nefarious people for nefarious means. The problem is compounded by the fact that automakers rely on software written by third parties, including open source software that is riddled with security holes, it says.

Therefore, to prevent "a 9/11-like cyber-attack on our cars," the report calls for physical "kill switches" to be built into new cars to allow them to be completely disconnected from the Internet. If carmakers don't agree to the report's recommendations by year's end, then "legislators and regulators should mandate these protections," it says.

Yes, there’s a modem in your new car

You may have noticed that it's becoming increasingly difficult to buy a new vehicle that doesn't feature an embedded modem in it. The benefits of a connected car are various, we're told. It enables onboard telematics that the car maker can use both to improve future products and to allow features like predictive maintenance alerts. And an Internet connection to the infotainment system opens up streaming media services alongside more traditional platforms like FM or satellite radio. In Europe, an onboard modem that can call emergency services in the event of a serious crash has been mandatory since last year.

Read 11 remaining paragraphs | Comments

Ceconomy: Offene Führungskrise bei Media Markt und Saturn

Die Diskussion um die mögliche Absetzung von Ceconomy-Chef Jörn Werner sollte eigentlich noch nicht öffentlich werden. Jetzt wissen es alle, und es gibt keinen Nachfolger. (Media-Saturn, Media Markt)

Die Diskussion um die mögliche Absetzung von Ceconomy-Chef Jörn Werner sollte eigentlich noch nicht öffentlich werden. Jetzt wissen es alle, und es gibt keinen Nachfolger. (Media-Saturn, Media Markt)

Report: More than half of all US doctors get money from pharma each year

The payouts aren’t changing despite newer disclosure requirements.

Hundred dollar bills inside prescription pill bottles

Enlarge (credit: Getty | Bill Diodato)

Drug makers and medical device makers are still spending between $2.1 billion and $2.2 billion a year to woo doctors into prescribing and using their products, according to a new investigation by ProPublica.

Between 2014 and 2018, more than 600,000 of the approximately 1.1 million doctors in the US received at least one payment from industry in any given year. The payments were for things including speaking fees, consulting, meals, gifts, travel, and royalties.

While thousands of doctors have made $100,000 or more, more than 2,500 received $500,000 or more in the five-year period—and those payments do not include royalties. More than 700 received at least $1 million.

Read 6 remaining paragraphs | Comments

Polizei: Hunde, die nach Datenspeichern schnüffeln

Spürhunde können neben Sprengstoff und Drogen auch Datenspeicher oder Smartphones erschnüffeln. Die Polizei in Nordrhein-Westfalen hat kürzlich ihre frisch ausgebildeten Speicherschnüffler vorgestellt. (Polizei, Smartphone)

Spürhunde können neben Sprengstoff und Drogen auch Datenspeicher oder Smartphones erschnüffeln. Die Polizei in Nordrhein-Westfalen hat kürzlich ihre frisch ausgebildeten Speicherschnüffler vorgestellt. (Polizei, Smartphone)

Explaining how fighting games use delay-based and rollback netcode

How to design your game for optimal play over a network.

Explaining how fighting games use delay-based and rollback netcode

Enlarge (credit: Aurich Lawson / Capcom / Getty Images)

Ricky "Infil" Pusch is a long-time fighting game fan and content creator. He wrote The Complete Killer Instinct Guide, an interactive and comprehensive website for learning about Killer Instinct. This article was originally published there.

At its core, netcode is simply a method for two or more computers, each trying to play the same game, to talk to each other over the Internet. While local play always ensures that all player inputs arrive and are processed at the same time, networks are constantly unstable in ways the game cannot control or predict. Information sent to your opponent may be delayed, arrive out of order, or become lost entirely depending on dozens of factors, including the physical distance to your opponent, if you’re on a WiFi connection, and whether your roommate is watching Netflix.

Online play in games is nothing new, but fighting games have their own set of unique challenges. They tend to involve direct connections to other players, unlike many other popular game genres, and low, consistent latency is extremely important because muscle memory and reactions are at the core of virtually every fighting game. As a result, two prominent strategies have emerged for playing fighting games online: delay-based netcode and rollback netcode.

Read 164 remaining paragraphs | Comments

Ring Fit Adventure ausprobiert: Sportlich spielen auf der Nintendo Switch

Ein Kunststoffring als Sportgerät, vor allem aber als magische Verbindung in eine Abenteuerwelt: Mit Ring Fit Adventure veröffentlicht Nintendo eine ungewöhnliche Mischung aus Fitness und Fantasy. Golem.de hat sich in den Kampf gegen einen bösen Bodybu…

Ein Kunststoffring als Sportgerät, vor allem aber als magische Verbindung in eine Abenteuerwelt: Mit Ring Fit Adventure veröffentlicht Nintendo eine ungewöhnliche Mischung aus Fitness und Fantasy. Golem.de hat sich in den Kampf gegen einen bösen Bodybuilderdrachen gestürzt. (Nintendo Switch, Nintendo)