24-inch iMac review: There’s still no step three

It’s not Apple’s best for power users, but it’s a nice fit for everyone else.

The 2021, 24-inch iMac with Apple's M1.

Enlarge / The 2021, 24-inch iMac with Apple's M1. (credit: Samuel Axon)

Much has been written about people embracing nostalgia for comfort during the COVID-19 pandemic. With the new 24-inch iMac's bright colors and simplistic design, Apple seems to be indulging in the pangs of nostalgia, too.

But the new iMac's nostalgia is only skin deep. Inside, it has arguably the most advanced CPU currently sold in consumer devices: the M1. This chip is equally at home in an iPad and a Mac, yet the M1 delivers performance that rivals or beats some of the best desktop chips available in some cases.

Even though the M1 offers enough performance to attract power users, this new iMac isn't really for them. Rather, the 24-inch iMac is first and foremost about simplicity. It's a computer that promises users they won't have to think about how to configure or maintain a system. It's a computer that's more concerned about fitting into the room than it is about taking you somewhere else.

Read 49 remaining paragraphs | Comments

Danish Piracy Crackdown Spreads from Torrent Sites to Facebook

A Danish court has convicted a man who streamed TV series and movies via Facebook Live. The owner of the ‘Facebio’ group was sentenced to 20-days probation and must pay $9,000 in piracy damages. The local anti-piracy group Rights Alliance, which referred the man to the authorities, is calling for stronger enforcement on legitimate social media platforms.

From: TF, for the latest news on copyright battles, piracy and more.

facebook liveOver the past several months, Danish law enforcement authorities have effectively dismantled the once-thriving local torrent tracker scene.

It started in September and October 2020 when DanishBits and NordicBits went offline after their operators were caught. Other trackers tried to fill this void but were soon targeted as well.

These efforts are the result of cooperation between the anti-piracy group Rights Alliance and local enforcement authorities. This partnership has proven to be quite effective and the enforcement actions have resulted in several prison sentences as well.

It is safe to say that the criminal prosecutions will make prospective pirate site operators think twice before they start a new site. That said, foreign torrent sites are relatively unaffected and there are plenty of other piracy options as well, including social media platforms.

Criminal Prosecution of a Facebook Pirate

This hasn’t done unnoticed by the Rights Alliance, which recently reported a Facebook group to the authorities. The owner of the ‘Facebio’ group streamed movies and series via Facebook’s Live feature and maintained a library of videos that could be viewed on-demand.

Following the referral, the Danish Government’s SØIK’s IP-Task Force tracked down the operator, who was confronted and later confessed to sharing 19 movies and TV shows without permission.

Probation and Damages

Earlier this week, a court in Sønderborg sentenced the man – who’s in his thirties – to 20 days probation. In addition, he was ordered to pay 55,000 Danish Krone (~$9,000) in damages to the Rights Alliance which acts on behalf of various copyright holders.

According to a source familiar with the matter, users of the ‘Facebio’ group are not under investigation. That said, piracy on legitimate streaming platforms is an increasing concern for copyright holders, which could lead to more enforcement efforts.

A recent piracy study from MediaVision found that these services are very popular among pirates. Roughly 30% of Danish pirates said they use YouTube to find illegal content, and 22% use Facebook as a piracy source.

More Piracy Policing on Social Media

The survey was conducted before the massive crackdown on local torrent trackers, so the numbers could be even higher now. Commenting on this development, Rights Alliance Director Maria Fredenslund calls on the authorities to make sure that enforcement efforts expand to social media platforms.

“We are following developments closely and can see that illegal content on legal services is an increasing challenge. Therefore, it is absolutely crucial that the IP Task Force expands its efforts and now also investigates the illegal use of films and TV series on social media,” she says.

For now, however, the anti-piracy group is pleased to see that SØIK took its complaint seriously and that the Facebook ‘pirate’ was brought to justice.

“It sends a clear signal that there is nothing harmless about watching and sharing content illegally – not even when it takes place on Facebook or Youtube,” Fredenslund adds.

From: TF, for the latest news on copyright battles, piracy and more.

When the bison come back, will the ecosystem follow?

Bring wild bison to the Great Plains, restore one of the world’s most endangered ecosystems.

When the bison come back, will the ecosystem follow?

Enlarge (credit: Scott Kublin)

On a blustery October afternoon at the Wolfcrow Bison Ranch in southern Alberta, Canada, Dan Fox and his ranch hand, Man Blackplume, tried to wrestle fence panels into place despite a 60 mph wind. The next day was weaning day—and the fence needed to be rock solid so the bison calves could be separated from their mothers.

The two members of the Kainai First Nation, also known as the Blood Tribe, braced their bodies against the 12-foot-high fence panels so they could nail them to the posts, but the panels flapped in the wind like giant wooden flags. Across the pasture, 30 bison stood huddled together in the corner, unfazed by the commotion. They were part of the first bison herd to grace the Blood Reserve in 150 years, Fox says. The Kainai First Nation is one of four tribal groups within the Blackfoot Confederacy, which includes the Blackfeet Tribe in Montana.

Fox, 63, believes the animals may have helped extend his life. He experienced a cancer scare more than 20 years ago, and at the suggestion of a Blackfoot healer and naturopath, he changed his diet, replacing processed food with bison meat and other ancestral foods. His health improved, and today he says he feels better than ever. He is convinced that his family and his community will benefit, as he did, by having the buffalo back on the land and in their lives. (Bison bison is the scientific name for the animal, but buffalo is the word that most Indigenous people use.)

Read 44 remaining paragraphs | Comments

"Wir brauchen Schutz von Spanien vor ukrainischen Rechtsextremen"

Der lange Arm ukrainischer Rechtsradikaler sorgt dafür, dass dem Journalisten Scharij der Flüchtlingsstatus aberkannt wurde, weshalb er eine Auslieferung in den sicheren Tod fürchtet

Der lange Arm ukrainischer Rechtsradikaler sorgt dafür, dass dem Journalisten Scharij der Flüchtlingsstatus aberkannt wurde, weshalb er eine Auslieferung in den sicheren Tod fürchtet

Hacker lexicon: What is a supply chain attack?

From NotPetya to SolarWinds, it’s a problem that’s not going away any time soon.

The word

Enlarge (credit: Frank Lindecke / Flickr)

Cybersecurity truisms have long been described in simple terms of trust: Beware email attachments from unfamiliar sources, and don't hand over credentials to a fraudulent website. But increasingly, sophisticated hackers are undermining that basic sense of trust and raising a paranoia-inducing question: What if the legitimate hardware and software that makes up your network has been compromised at the source?

That insidious and increasingly common form of hacking is known as a "supply chain attack," a technique in which an adversary slips malicious code or even a malicious component into a trusted piece of software or hardware. By compromising a single supplier, spies or saboteurs can hijack its distribution systems to turn any application they sell, any software update they push out, even the physical equipment they ship to customers, into Trojan horses. With one well-placed intrusion, they can create a springboard to the networks of a supplier's customers—sometimes numbering hundreds or even thousands of victims.

"Supply chain attacks are scary because they're really hard to deal with, and because they make it clear you're trusting a whole ecology," says Nick Weaver, a security researcher at UC Berkeley's International Computer Science Institute. "You're trusting every vendor whose code is on your machine, and you're trusting every vendor's vendor.”

Read 10 remaining paragraphs | Comments

Wenn Medien kritisiert werden…

Schweigen und Gerechtigkeit: Der Tagesspiegel erklärt und entschuldigt sich; die Debatte um #alledichtmachen schwelt weiter

Schweigen und Gerechtigkeit: Der Tagesspiegel erklärt und entschuldigt sich; die Debatte um #alledichtmachen schwelt weiter