Can Google, with its big data, map and zap the spread of Zika?

Tech giant and researchers hunt for spatial modeling, which could prove key.

Google software engineers John Li and Zora Tung with UNICEF research scientist Manuel Garcia Herranz and UX designer Tanya Bhandari working on the open source data platform. (credit: Google)

A vaccine would be a priceless weapon in the fight against Zika, a virus currently tearing through the Western Hemisphere and linked to devastating birth defects and paralyzing neurological conditions. But a vaccine wouldn’t be everything, of course. If the frustrating wars against measles and polio have proven anything, it’s that eradicating an infectious disease requires relentless public health outreach, surveillance, and containment, as well as medical advances. Indeed, the one and only eradication of an infectious disease of humans—smallpox—was accomplished not just with a vaccine, but tight networks for disease monitoring and strategic vaccination campaigns around disease hotspots—in other words, spatial data and responses.

While Zika is very different from smallpox and scientists are likely to be years away from having a vaccine, the importance of spatial data in stamping out a scourge are the same. And, when it comes to mapping Zika, Google thinks it’s uniquely suited for the task.

Thursday, the tech giant announced that it has assembled a team of volunteer engineers, designers, and data scientists that will use weather, travel, and disease data to map and forecast the spread of the virus. Google hopes that the resulting open source modeling will help governments and public health organizations monitor and anticipate outbreaks in real time so that they can direct resources and responses accordingly.

Read 4 remaining paragraphs | Comments

New attack steals secret crypto keys from Android and iOS phones

Researcher-devised exploit threatens Bitcoin wallets and other high-value assets.

Researchers have devised an attack on Android and iOS devices that successfully steals cryptographic keys used to protect Bitcoin wallets, Apple Pay accounts, and other high-value assets.

The exploit is what cryptographers call a non-invasive side-channel attack. It works against the Elliptic Curve Digital Signature Algorithm, a crypto system that's widely used because it's faster than many other crypto systems. By placing a probe near a mobile device while it performs cryptographic operations, an attacker can measure enough electromagnetic emanations to fully extract the secret key that authenticates the end user's data or financial transactions. The same can be done using an adapter connected to the USB charging cable.

"An attacker can non-invasively measure these physical effects using a $2 magnetic probe held in proximity to the device, or an improvised USB adapter connected to the phone's USB cable, and a USB sound card," the researchers wrote in a blog post published Wednesday. "Using such measurements, we were able to fully extract secret signing keys from OpenSSL and CoreBitcoin running on iOS devices. We also showed partial key leakage from OpenSSL running on Android and from iOS's CommonCrypto."

Read 6 remaining paragraphs | Comments

Volkswagen details what top management knew leading up to emissions revelations

But the extent to which the CEO understood the gravity of the situation is disputed.

(credit: ahhhhhlexis)

In a public statement on Wednesday evening, Volkswagen AG said that its top executives had been briefed on issues relating to the diesel emissions scandal prior to the time that the Environmental Protection Agency (EPA) issued the company a Notice of Violation last fall. Still, the company maintains that its CEO may not have understood the gravity of the situation.

VW Group has previously been cagey about whether top executives knew that engineers had been installing illegal defeat devices in diesel vehicles. (The term “defeat device” here refers to lines of code in the engine management software.) So-called defeat devices suppress the car’s emissions control system when it’s being driven normally, allowing the system to work when the car is being tested in a lab. This setup resulted in diesel Volkswagens, Audis, and Porsches releasing many times the allowed limit of NOx emissions every time the car got on the road.

If top executives knew about the defeat devices, they could face additional lawsuits from shareholders on top of the billions in fines that the EPA and the Department of Justice have sued VW Group for. The company also must account for the cost to fix or buy back the affected cars.

Read 14 remaining paragraphs | Comments

Amazon Fire OS 5 removes support for encryption from Fire tablets

Amazon Fire OS 5 removes support for encryption from Fire tablets

Apple may be fighting the FBI in court to resist demands that the company decrypt data on a customer’s smartphone. But Amazon seems to have taken a step in the opposite direction. The recent Fire OS 5 update for Fire tablets and Fire TV media streamers adds new functionality (such as Bluetooth speaker and keyboard […]

Amazon Fire OS 5 removes support for encryption from Fire tablets is a post from: Liliputing

Amazon Fire OS 5 removes support for encryption from Fire tablets

Apple may be fighting the FBI in court to resist demands that the company decrypt data on a customer’s smartphone. But Amazon seems to have taken a step in the opposite direction. The recent Fire OS 5 update for Fire tablets and Fire TV media streamers adds new functionality (such as Bluetooth speaker and keyboard […]

Amazon Fire OS 5 removes support for encryption from Fire tablets is a post from: Liliputing

Oculus Founder: Rift will come to Mac if Apple “ever releases a good computer”

Even high-end Mac Pro GPUs aren’t powerful enough for VR, Luckey says.

It's been almost a year now since Oculus announced that the consumer version of the Rift virtual reality headset would only support Windows PCs at launch—a turnaround from development kits that worked fine on Mac and Linux boxes. Now, according to Oculus co-founder Palmer Luckey, it "is up to Apple" to change that state of affairs. Specifically, "if they ever release a good computer, we will do it," he told Shacknews recently.

Basically, Luckey continued, even the highest-end Mac you can buy would not provide an enjoyable experience on the final Rift hardware, which is significantly more powerful than early development kits. "It just boils down to the fact that Apple doesn’t prioritize high-end GPUs," he said. "You can buy a $6,000 Mac Pro with the top-of-the-line AMD FirePro D700, and it still doesn’t match our recommended specs."

"So if they prioritize higher-end GPUs like they used to for a while back in the day, we’d love to support Mac. But right now, there’s just not a single machine out there that supports it," he added. "Even if we can support on the software side, there's just no audience that could run the vast majority of software on it."

Read 3 remaining paragraphs | Comments

RIAA and Tech Giants Clash In Usenet Piracy Case

The RIAA has joined adult publisher Perfect 10 in its appeal against Giganews. Both argue that the Usenet service is directly liable for the blatant copyright infringements on its service. Giganews is supported by several digital rights groups and tech companies, who fear that the RIAA’s request endangers a free and open Internet.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

pirate-clash-fightAdult magazine publisher Perfect 10 has made a business out of suing online services for allegedly facilitating copyright infringement.

Over the past several years the company has targeted a dozen high-profile companies including Google, Amazon, Yandex, MasterCard, Visa, Leaseweb, RapidShare, Depositfiles and Giganews.

Private settlements aside the legal campaigns haven’t been particularly successful for the publisher. Last year Perfect 10 lost another battle against Giganews, with the court ordering the company to pay $5.6 million in legal fees.

This case is now on appeal where it has attracted the attention of several major players, including the RIAA. The music industry group has joined Perfect 10 and argues that Giganews should be held responsible for its infringing activities.

In a brief submitted to the court the RIAA notes that, unlike several decades ago, Usenet is no longer a neutral means to share files. Instead, it’s populated by many “shady” companies who intentionally sell access to pirated content.

“Shady companies now use the Usenet network to copy copyrighted movies, music, software, and images from servers known to host pirated content; store those works on their own servers for extended periods of time to maximize the availability of the infringing content; and then distribute those pirated copies to their users,” the RIAA writes.

“These companies profit handsomely by charging their users monthly fees for private access to this unauthorized content – fees that increase based on the amount of content users download,” the add.

The RIAA goes on to cite a study which suggests that an overwhelming majority of the audio files shared through Giganews are likely to be copyright infringing.

giganews

The appeal has also introduced a dispute over the “volitional conduct rule,” which prescribes that Internet services can only be held directly liable if they also control the decision to copy pirated works.

Among other things the RIAA argues that this rule shouldn’t apply in the current case because it’s widely criticized and questioned by other courts, most recently by the Supreme Court in the Aereo case.

However, this stance is fiercely opposed by several digital rights groups including The Internet Association, the Computer & Communications Industry Association (CCIA), the EFF and Public Knowledge.

In two separate amicus curiae briefs submitted to the court this week, they urge the Court of Appeals not to reverse the District Court decision, as that may be disastrous for a free and open Internet.

When Internet services face direct liability, they may be inclined to block legitimate content or prevent content being posted, just to avoid legal issues, they argue.

“If an intermediary faces the possibility of potentially unlimited legal liability for content hosted, transmitted, or disseminated through its services by a small minority of users, it will feel compelled to scrutinize and limit all user activities,” the brief filed by EFF and Public Knowledge (pdf) reads.

“This is likely to lead to over-blocking, sacrificing lawful content in an effort to limit potential litigation. The strong incentive to over-block can cause particular harm to free speech where, as here, intermediaries often are not able to easily determine if the content is unlawful on its face,” the groups add.

The Internet Association and the CCIA, which includes prominent members such as Google, Facebook and Microsoft, agree (pdf) that scrapping the volitional conduct rule “would chill legitimate speech.”

According to the RIAA, however, it’s clear that Giganews profits from piracy and a ruling supporting this wouldn’t threaten the future of the Internet.

“This case simply involves defendants who utilize the Usenet to profit from piracy by selling access to infringing content from private servers that they control,” RIAA writes.

“Unlike legitimate service providers involved in the early Usenet cases, the defendants here are committing blatant copyright infringement. Recognizing this fact does not undermine in any way the operation of the open Internet,” they add.

It is now up to the court to weigh up the arguments from both sides.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

IBM sues Groupon over 1990s patents related to Prodigy

Big Blue also says it “owns” the idea of signing into an app with Facebook.

An IBM software engineer sketches out a pending patent. IBM has acquired more US patents than any other company for 23 years in a row. (Jared Lazarus/Feature Photo Service for IBM) (credit: IBM)

IBM is pushing big Internet companies to pay patent licensing fees in part because IBM invented the Prodigy service, a precursor to the modern Web.

Yesterday, Big Blue filed a lawsuit (PDF) against Groupon, saying the company has infringed four IBM patents, including patents 5,796,967 and 7,072,849. Each of those relates to the Prodigy service. IBM inventors working on Prodigy "developed novel methods for presenting applications and advertisements," and "the technological innovations embodied in these patents are fundamental to the efficient communication of Internet content," according to the company.

The Prodigy patents were filed in 1993 and 1996, but they have "priority dates" stretching back to 1988. That's because they're based on "divisional" and "continuation" patent applications, which were abandoned but first filed in that year.

Read 10 remaining paragraphs | Comments

PSA: Updated Apple certificate means old OS X installers don’t work anymore

If you’ve made a USB disk or downloaded a previous installer, please re-download.

(credit: Andrew Cunningham)

On February 14, something called the Apple Worldwide Developer Relations Intermediate Certificate expired. This sort of thing is typically routine; it was renewed and developers were advised to update their certificates so their Apple Wallet Passes, Mac apps, extensions, Safari push notifications, and App Store submissions would continue working properly.

There's one edge case for people who frequently troubleshoot and fix Macs, as pointed out by TidBits: old OS X installers downloaded from the Mac App Store before the certificate's expiration date will no longer work. This includes not just installers for El Capitan, but also downloaded installers for Yosemite, Mavericks, Mountain Lion, and Lion—every OS X installer issued using the Mac App Store. It also affects any USB install disks you've created using the downloaded installer.

You can easily re-download any installers you want using the Mac App Store, though for older OS X versions you'll need to make sure that the installer is listed in your purchase history. Also, note that you can't download a version of OS X that isn't compatible with the Mac you're downloading it on; my 2012 iMac can download everything back to Mountain Lion, but it refuses to download Lion. Keep this in mind if you have an extensive back catalog of old installers for archival reasons—as a workaround, setting your Mac's date to before February 14 should also allow older installers to work properly.

Read on Ars Technica | Comments

The first Ghostbusters trailer has just the right amount of ectoplasmic barf

But will the story be too much of a rehash of the first Ghostbusters movie?

The first trailer for the new Ghostbusters movie reveals... a plot that's fairly recognizable from the first Ghostbusters flick.

We've got our first glimpse of the new Ghostbusters reboot, which takes place 30 years after the last film and gives us a whole new generation of weird scientists battling the ghosts of New York City. So far, it looks promising.

The first Ghostbusters movie became an iconic piece of 1980s pop culture for two simple reasons: the cast was a comedy dream team, and the concept was a new take on the old-school monster hunter story. Plus, it was a horror fantasy set in a city, which was also a relatively new idea in the early 1980s. That decade was a milestone in the popularization of urban (and suburban) paranormal horror, a genre-busting phenomenon that became its own genre. It's going to be hard for the updated Ghostbusters to reinvent a story that was beloved for being a reinvention.

But is it a sequel or a reboot? Here's what's weird. Director Paul Feig and writer Katie Dippold have repeatedly emphasized that this movie is not a sequel. It's a complete reboot, set in a universe where nobody in New York has seen a ghost before and the city was never destroyed by a giant marshmallow. Yet, the trailer absolutely presents it as a sequel by saying that "30 years ago four scientists saved New York." That seems to disagree with Feig and Dippold's interpretation of the movie as a reboot or re-imagining and appears to sell it as a sequel. Or maybe the text is just a reference to the previous movie and not the plot of this movie? Either way, it's a confusing way to introduce the trailer if the creators want us to be clear on the fact this isn't a sequel.

Read 7 remaining paragraphs | Comments

PewDiePie could win an Emmy someday thanks to new Academy rules

New and revised Emmy categories make room for short-form, online video content.

The Television Academy has made some small changes that could mean big things for online video content creators. The organization announced that it has expanded the criteria to be considered for an Emmy, making it easier for Internet-exclusive shows to win awards.

Content that will fall under the new "short-form" award categories are defined as "series with a minimum of six episodes running an average of 15 minutes or less per episode, exhibited over-the-air and/or via cable, satellite or Internet." Specifically, the three award categories are Outstanding Short Form Series—Comedy or Drama, which replaces the Short Format Live Entertainment category; the new Outstanding Short Form Series—Variety category; and the Outstanding Short Form Series—Reality/Nonfiction, which replaces the Short Format Nonfiction category.

While online video creators still struggle to gain the same recognition as traditional media creators (and the big budgets that follow), this change to the Emmys is a step in the right direction. It provides more validity for online content like the shows on YouTube and YouTube Red, which is already showing content from PewDiePie, Lilly Singh, and Rooster Teeth. The main awards show for Internet video until this point has been The Webbys, which are big awards for Internet creators but nowhere near as well-known as the Emmys by the general public and media. If nothing else, this could give Web video creators the chance to show traditional media that online video can be just as artistic and legitimate as regular television shows.

Read on Ars Technica | Comments