Sony: Frisches Zubehör für die Playstation-Familie

Nicht nur Konsolen: Neben der Playstatio 4 Slim und Pro hat Sony auch Zubehör wie den dezent überarbeiteten Dualshock-Controller vorgestellt. Wer sich für Playstation VR interessiert und noch keine Playstation Kamera hat, bekommt ab dem 15. September ein neugestaltetes Gerät. (Playstation 4, Sony)

Nicht nur Konsolen: Neben der Playstatio 4 Slim und Pro hat Sony auch Zubehör wie den dezent überarbeiteten Dualshock-Controller vorgestellt. Wer sich für Playstation VR interessiert und noch keine Playstation Kamera hat, bekommt ab dem 15. September ein neugestaltetes Gerät. (Playstation 4, Sony)

MacOS 10.12 Sierra: OS-X-Nachfolger erscheint am 20. September 2016

Apple wird das neue Mac-Betriebssystem bereits kurz nach der Freigabe von iOS und WatchOS verteilen. Die Goldmaster werden bereits an Entwickler verteilt. Im Vergleich zum Vorjahr verkürzt Apple damit den Abstand zu den Mobilbetriebsystemen. (Apple, Betriebssystem)

Apple wird das neue Mac-Betriebssystem bereits kurz nach der Freigabe von iOS und WatchOS verteilen. Die Goldmaster werden bereits an Entwickler verteilt. Im Vergleich zum Vorjahr verkürzt Apple damit den Abstand zu den Mobilbetriebsystemen. (Apple, Betriebssystem)

Omnicam: Fraunhofer-HHI überträgt Panoramabilder über Satellit

Eintauchen in Ereignisse am anderen Ende der Welt: Das Fraunhofer HHI hat eine Technik entwickelt, um sehr hochaufgelöste Bilder per Satellit zu übertragen. Mit einem HMD kann der Zuschauer einen Live-Eindruck eines Konzerts oder einer Sportveranstaltung bekommen, ohne dabei zu sein. (Fraunhofer, Technologie)

Eintauchen in Ereignisse am anderen Ende der Welt: Das Fraunhofer HHI hat eine Technik entwickelt, um sehr hochaufgelöste Bilder per Satellit zu übertragen. Mit einem HMD kann der Zuschauer einen Live-Eindruck eines Konzerts oder einer Sportveranstaltung bekommen, ohne dabei zu sein. (Fraunhofer, Technologie)

Prime: Amazon weitet Lieferung am Bestelltag in Deutschland aus

Amazon bietet seinen Dienst Same-Day in sechs weiteren Städten an. Die Artikel werden zwischen 18 und 21 Uhr desselben Tages geliefert. Prime Now bleibt auf zwei Städte begrenzt. (Amazon, Heimkino)

Amazon bietet seinen Dienst Same-Day in sechs weiteren Städten an. Die Artikel werden zwischen 18 und 21 Uhr desselben Tages geliefert. Prime Now bleibt auf zwei Städte begrenzt. (Amazon, Heimkino)

ISP Deletes IP-address Logs to Fend Off Piracy “Extortion Letters”

Swedish Internet service provider Bahnhof continues to fight against copyright holders that target alleged file-sharers. The company explains that it has setup its logging policies in such as way that it can refuse requests for IP-address information from so-called copyright trolls, suggesting that other ISPs should follow suit.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

deleteIn recent years file-sharers around the world have been threatened with lawsuits, if they don’t pay a significant settlement fee.

These so-called “copyright trolling” efforts have been a common occurrence in countries such as Germany and the United States, and last week they started in Sweden as well.

Rightsholders are targeting thousands of alleged pirates. First, they ask the court for a subpoena to expose the personal details of account holders connected to certain IP-addresses, which they then present to the associated ISPs.

Some Internet providers have been cooperating with these requests, but not all. Most notably, the privacy-oriented ISP Bahnhof is doing everything in its power to prevent its customers from being exposed.

This week the ISP explained how its logging policies are tailored to only allow only requests that are made in criminal cases, not civil claims against BitTorrent users or other alleged file-sharers.

In Sweden, ISPs are required to keep IP-address logs for six months under the Electronic Communications Act (LEK). This legislation allows the authorities to demand this type of data in criminal cases, such as those involving murder and terrorism.

To comply with this requirement, Bahnhof has setup a database of logs which are stored for the minimal required period and can be accessed for these cases only. The regular logs are purged immediately.

Bahnhof, illustrating its logging policy

ipbahn

When copyright holders request IP-address details, which they do under the contested IPRED legislation, the ISP simply has nothing to hand over. This is very similar to the non-logging policies of many VPN services.

“We store logs for six months to fight crime, absolutely. But we save everything in a separate system, which is only used for LEK,” Bahnhof CEO Jon Karlung says.

“My impression is that some other operators have their clients’ IP addresses stored in several different places. They then also become more vulnerable to having to disclose data IPRED rules.”

Bahnhof itself has operated like this for years, but now that mass file-sharing cases have landed in Sweden the value of this policy is becoming apparent.

Rightly so, according to the ISP, which says it has found a good way to fend off copyright trolls.

“If all operators stored data the way we do, we would avoid the extortion letters altogether. Because we have the motto ‘Internet privacy’ we are very careful with personal data,” Karlung says.

Bahnhof’s CEO adds that other companies should think more carefully about where data is stored. The more databases there are, the more likely it is that they can be compelled to share subscriber data.

“The more different databases there are, the greater the risk that privacy is compromised,” Karlung adds.

Rick Falkvinge, founder of the Swedish Pirate Party, applauds Bahnhof’s logging policy. He discussed the issue in a recent article and informs TorrentFreak that data retention laws which are supposed to help catch terrorists shouldn’t be used against file-sharers.

“The damage these copyright trolls are doing to society is immeasurable. They were able to get shameless mail-order legislation justified by the war on terror, and are now turning those anti-terrorism laws against defenseless single mothers in order to protect a crumbling entertainment monopoly.

“There is absolutely no reason to tolerate, nor to forgive, this kind of behavior,” he adds

It will be interesting to see whether any of the ISPs currently handing over personal detailed connected to IP-addresses will follow suit and change their policies in the future.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Update: Apples iOS 10 erscheint in wenigen Tagen

Apple will die fertige Version von iOS 10 Anfang kommender Woche veröffentlichen. Mit der neuen Betriebssystemversion verschwinden einige Apple-typische Besonderheiten. Damit soll die Nutzung von iPhone und iPad angenehmer werden. (iOS, Smartphone)

Apple will die fertige Version von iOS 10 Anfang kommender Woche veröffentlichen. Mit der neuen Betriebssystemversion verschwinden einige Apple-typische Besonderheiten. Damit soll die Nutzung von iPhone und iPad angenehmer werden. (iOS, Smartphone)

Audi-Entwicklung: Mit der VR-Brille ein richtiges Auto fahren

Der Autohersteller Audi nutzt die virtuelle Realität zur Demonstration von Sicherheitsfunktionen. Kunden können zudem ihr künftiges Auto durch eine solche Brille konfigurieren. (Audi, OLED)

Der Autohersteller Audi nutzt die virtuelle Realität zur Demonstration von Sicherheitsfunktionen. Kunden können zudem ihr künftiges Auto durch eine solche Brille konfigurieren. (Audi, OLED)

The $10,000 golden Apple Watch is no more

There’s still an Apple Watch Edition, it’s just less expensive and less golden.

Enlarge / The Apple Watch Edition is now ceramic, and also like $9,000 cheaper. (credit: Andrew Cunningham)

When Apple announced its Watch Series 2 earlier today, it said that the watch would come in a new ceramic white finish to complement the returning aluminum and stainless steel finishes. Completely absent was any mention of the Apple Watch Edition branding, which Apple used last year to launch a pair of $10,000-and-up Apple Watches that worked the same way as the cheap ones but were made out of actual gold instead of workaday, plebeian metals.

It turns out that the new ceramic watch is the Apple Watch Edition, and all mentions of the gold versions have been scrubbed from Apple's site. The company began downplaying the gold watches earlier this year, removing them from the main Apple Watch product page circa the iPhone SE launch.

The "reimagined" ceramic Apple Watch Edition starts at $1,249, roughly twice the cost of a stainless steel Series 2 and three times the cost of an aluminum Series 2 (the Sport branding also seems to have disappeared from the watches themselves, though it still applies to some of the bands). The Edition is still more expensive than the other models and is still intended as a sort of status symbol, but is no longer the hulking monument to conspicuous consumption that it once was. And on Apple's end, giving buyers an upmarket option they can actually afford is probably a good way to drive up the average selling price. Everyone wins.

Read on Ars Technica | Comments

Stealing login credentials from a locked PC or Mac just got easier

20 seconds of physical access with a $50 device is all it takes.

Enlarge

Snatching the login credentials of a locked computer just got easier and faster, thanks to a technique that requires only $50 worth of hardware and takes less than 30 seconds to carry out.

Rob Fuller, a principal security engineer at R5 Industries, said the hack works reliably on Windows devices and has also succeeded on OS X, although he's working with others to determine if it's just his setup that's vulnerable. The hack works by plugging a flash-sized minicomputer into an unattended computer that's logged in but currently locked. In about 20 seconds, the USB device will obtain the user name and password hash used to log into the computer. Fuller, who is better known by his hacker handle mubix, said the technique works using both the Hak5 Turtle ($50) and USB Armory ($155), both of which are USB-mounted computers that run Linux.

"First off, this is dead simple and shouldn’t work, but it does," mubix wrote in a blog post published Tuesday. "Also, there is no possible way that I’m the first one that has identified this, but here it is (trust me, I tested it so many ways to confirm it because I couldn’t believe it was true)."

Read 6 remaining paragraphs | Comments