Mickeycaskill writes: Facebook will start testing a 400kg drone with the wingspan of a Boeing 737 next year, CEO Mark Zuckerberg has said, as part of the company's drive to connect people in remote areas to the Internet. Aquila will fly between 60,000ft and 90,000ft as to avoid adverse weather conditions and commercial air routes, while the attached laster can transmit data at 10Gbps. Facebook claims it can accurately connect with a point the size of a US 5-cent coin from more than 10 miles away.
jcomeau_ictx provided that teaser of a headline, but writes: Not really. But the countdown at tunnelbroker.net should go to zero sometime tomorrow around noon, considering it's at 45,107 as I write this, it's counting down about one address every two seconds, and there are 86,400 seconds per day. Just happened to notice it today. Might be worth a little celebration at every NOC and IT enterprise tomorrow.
New submitter Gryle writes: ArsTechnica is reporting on an interesting legal tactic by ISPs in the net neutrality fight. In a 95-page brief the United States Telecom Association claims Internet access qualifies as information service, not a telecommunication service, because it involves computer processing. The brief further claims "The FCC's reclassification of mobile broadband internet access as a common-carrier service is doubly unlawful." (page 56)
An anonymous reader writes: The Tor Project has announced a new initiative to open exit relays in public libraries. "This is an idea whose time has come; libraries are our most democratic public spaces, protecting our intellectual freedom, privacy, and unfettered access to information, and Tor Project creates software that allows all people to have these rights on the internet." They point out that this is both an excellent way to educate people on the value of private internet browsing while also being a practical way to expand the Tor network. A test for this initiative is underway at the Kilton Library in Lebanon, New Hampshire, which already has a computing environment full of GNU/Linux machines.
alphadogg writes: Attackers could exploit a new vulnerability in BIND, the most popular Domain Name System (DNS) server software, to disrupt the Internet for many users. The vulnerability affects all versions of BIND 9, from BIND 9.1.0 to BIND 9.10.2-P2, and can be exploited to crash DNS servers that are powered by the software. The vulnerability announced and patched by the Internet Systems Consortium is critical because it can be used to crash both authoritative and recursive DNS servers with a single packet.
Last month, French data protection agency CNIL ordered Google to comply with the European "right to be forgotten" order by delisting certain search results not just on the European versions of Google's search engine, but on all versions. Google has now publicly rejected that demand. CNIL has promised a response, and it's likely the case will go before local courts. Google says, This is a troubling development that risks serious chilling effects on the web. While the right to be forgotten may now be the law in Europe, it is not the law globally. Moreover, there are innumerable examples around the world where content that is declared illegal under the laws of one country, would be deemed legal in others: Thailand criminalizes some speech that is critical of its King, Turkey criminalizes some speech that is critical of Ataturk, and Russia outlaws some speech that is deemed to be "gay propaganda." If the CNIL's proposed approach were to be embraced as the standard for Internet regulation, we would find ourselves in a race to the bottom. In the end, the Internet would only be as free as the world's least free place.
An anonymous reader writes: Prime Minister David Cameron says that if online pornographers don't voluntarily install effective age-restricted controls on their websites he'll introduce legislation that will close them down altogether. A recent Childline poll found nearly 10% of 12-13-year-olds were worried they were addicted to pornography and 18% had seen shocking or upsetting images. The minister for internet safety and security, Joanna Shields, said: “As a result of our work with industry, more than 90% of UK consumers are offered the choice to easily configure their internet service through family-friendly filters – something we take great pride in having achieved. It’s a gold standard that surpasses those of other countries. “Whilst great progress has been made, we remain acutely aware of the risks and dangers that young people face online. This is why we are committed to taking action to protect children from harmful content. Companies delivering adult content in the UK must take steps to make sure these sites are behind age verification controls.”
tmk writes: Despite plenty of evidence that the U.S. spied on German top government officials, German Federal Prosecutor General Harald Range has declined to investigate any wrongdoings of the secret services of allied nations like the NSA or the British GCHQ. But after plans of the German secret service "Bundesamt für Verfassungsschutz" to gain some cyper spy capabilities like the NSA were revealed by the blog netzpolitik.org, Hange started an official investigation against the bloggers and their sources. They are now being probed for possible treason charges.
Zothecula writes: Sri Lanka is set to become the first country with universal Internet access after signing a memorandum of understanding with Google to use the company's Project Loon balloons. Officials say there is not a timetable for when the balloons will be covering the 25,000 square mile nation, but this is a crucial first step. The Foreign minister noted that "from this event onwards advertisements or headlines saying “Matara covered” or “Jaffna covered” will become a part of history." And concluded his speech saying that he was "proud to declare that we are at the cusp of a reclaiming our heritage of being connected to each other and connected to the world. In a few months we will truly be able to say: Sri Lanka, Covered."
Kim Dotcom was the founder of Megaupload, its successor Mega, and New Zealand's Internet Party. A while ago you had a chance to ask him about those things as well as the U.S. government charging him with criminal copyright violation and racketeering. Below you'll find his answers to your questions.
itwbennett writes: Symantec said in a report that the hacking group Black Vine, which has been active since 2012 and has gone after other businesses that deal with sensitive and critical data, including organizations in the aerospace, technology and finance industries, is behind the hack against Anthem. The Black Vine malware Mivast was used in the Anthem breach, according to Symantec.
An anonymous reader writes: Cyberwar and its ramifications have been debated for some time and the issue has been wrought with controversy. Few would argue that cyber-attacks are not prevalent in cyberspace. However, does it amount to a type of warfare? Let's break this down by drawing parallels from a treatise by 6th century military general, Sun Tzu, who authored one of the most definitive handbooks on warfare, "The Art of War." His writings have been studied throughout the ages by professional militaries and can be used to not only answer the question of whether or not we are in a cyberwar, but how one can fight a cyber-battle.
An anonymous reader writes: Windows 10 launches today and with it comes a whole new browser, Microsoft Edge. You can still use Internet Explorer if you want, but it's not the default. IE turns 20 in less than a month, which is ancient in internet years, so it's not surprising that Microsoft is shoving it aside. Still, leaving behind IE and launching a new browser built from the ground up marks the end of an era for Microsoft. “Knowing that browsing is still one of the very top activities that people do on a PC, we knew there was an opportunity, and really an obligation, to push the web browsing experience and so that’s what we’ve done with Microsoft Edge," Drew DeBruyne, director of program management at Microsoft told VentureBeat.
An anonymous reader writes: The MPEG LA has announced a call for patents essential to the Dynamic Adaptive Streaming over HTTP (or DASH) standard. According to the MPEG LA's press release, "Market adoption of DASH technology standards has increased to the point where the market would benefit from the availability of a convenient nondiscriminatory, nonexclusive worldwide one-stop patent pool license." The newly formed MPEG-DASH patent pool's licensing program will allegedly offer the market "efficient access to this important technology."
An anonymous reader writes: People should be allowed to delete embarrassing social media posts when they reach adulthood, UK internet rights campaigners are urging. The iRights coalition has set out five rights which young people should expect online, including being able to easily edit or delete content they have created, and to know who is holding or profiting from their information. Highlighting how campaigners believe adults should not have to bear the shame of past immaturity, iRights also wants children to be protected from illegal or distressing pages; to be digitally literate; and be able to make informed and conscious choices.
Trailrunner7 writes: Security issues continue to crop up within the so-called "smart home." A pair of vulnerabilities have been reported for the Tuxedo Touch controller made by Honeywell, a device that's designed to allow users to control home systems such as security, climate control, lighting, and others. The controller, of course, is accessible from the Internet. Researcher Maxim Rupp discovered that the vulnerabilities could allow an attacker to take arbitrary actions, including unlocking doors or modifying the climate controls in the house.
An anonymous reader writes: An industry insider has told Business Insider of his conviction that ad-serving companies deliberately prolong the 'auctioning' process for ad spots when a web-page loads. They do this to maximize revenue by allowing automated 'late-comers' to participate beyond the 100ms limit placed on the decision-making process. The unnamed source, a principal engineer at a global news company (whose identity and credentials were confirmed by Business Insider), concluded with the comment: "My entire team of devs and testers mostly used Adblock when developing sites, just because it was so painful otherwise." Publishers use 'daisy-chaining' to solicit bids from the most profitable placement providers down to the 'B-list' placements, and the longer the process is run, the more likely that the web-page will be shown with profitable advertising in place.
HughPickens.com writes: Keith Collins writes at Quartz that the going rate for a stolen identity is about twenty bucks on the internet black market. Collins analyzed hundreds of listings for a full set of someone's personal information—identification number, address, birthdate, etc., known as "fullz" that were put up for sale over the past year, using data collected by Grams, a search engine for the dark web. The listings ranged in price from less than $1 to about $450, converted from bitcoin. The median price for someone's identity was $21.35. The most expensive fullz came from a vendor called "OsamaBinFraudin," and listed a premium identity with a high credit score for $454.05. Listings on the lower end were typically less glamorous and included only the basics, like the victim's name, address, social security number, perhaps a mother's maiden name. Marketplaces on the dark web, not unlike eBay, have feedback systems for vendors ("cheap and good A+"), refund policies (usually stating that refunds are not allowed), and even well-labeled sections. "There is no shortage of hackers willing to do about anything, computer related, for money," writes Elizabeth Clarke. "and they are continually finding ways to monetize personal and business data."
An anonymous reader writes: Password managers aren't a security panacea, but experts widely agree that it's better to use one than to have weak (but easy-to-remember) passwords. Just this week, they were listed as a tool non-experts don't use as much as experts do. I use one, and a pet peeve of mine is when a website specifically (or through bad design) interferes with the copying and pasting of a password. Thus, I appreciated this rant about it in Wired: "It's unacceptable that in an age where our lives are increasingly being played out online, and are sometimes only protected by a password, some sites deliberately stop their users from being as secure as possible, for no really justifiable reason."