Did Mathematician Shinichi Mochizuki Invent Bitcoin?

It’s hard not to be curious about the true identity of Bitcoin creator Satoshi Nakamoto, since he or she basically just stuck around on the internet long enough to introduce Bitcoin/get everyone all riled up and then disappeared. But Ted Nelson, the sociologist who invented the term “hypertext,” thinks he knows who Nakamoto really is, and in the video below he calls out Japanese mathematician Shinichi Mochizuki . Read more…        

More:
Did Mathematician Shinichi Mochizuki Invent Bitcoin?

Yahoo to acquire Tumblr in $1.1 billion cash deal

That cat’s out of the bag a day early , it seems. Yahoo’s board has approved a $1.1 billion cash deal to purchase the blogging site Tumblr, according to The Wall Street Journal . We were expecting Yahoo to announce the acquisition during tomorrow’s NYC media event — CEO Marissa Mayer may instead use the last-minute gathering to detail the company’s plans for integrating the popular platform. It’s unclear how Yahoo intends to utilize its latest procurement, but with a 10-figure price tag now public, we can only imagine that Tumblr will be put to good use. We’ll be covering tomorrow afternoon’s event live, so stay tuned for more details from New York City. Filed under: Internet Comments Source: Wall Street Journal (Twitter)

See the original article here:
Yahoo to acquire Tumblr in $1.1 billion cash deal

Yahoo to acquire Tumblr in $1.1 billion cash deal, says the WSJ

That cat’s out of the bag a day early , it seems. Yahoo’s board has approved a $1.1 billion cash deal to purchase the blogging site Tumblr, according to The Wall Street Journal . We were expecting Yahoo to announce the acquisition during tomorrow’s NYC media event — CEO Marissa Mayer may instead use the last-minute gathering to detail the company’s plans for integrating the popular platform. It’s unclear how Yahoo intends to utilize its latest procurement, but with a 10-figure price tag now public, we can only imagine that Tumblr will be put to good use. We’ll be covering tomorrow afternoon’s event live, so stay tuned for more details from New York City. Filed under: Internet Comments Source: Wall Street Journal (Twitter)

More:
Yahoo to acquire Tumblr in $1.1 billion cash deal, says the WSJ

Yahoo! Japan May Have Had 22 Million User IDs Stolen

hypnosec writes with report of the possible theft of up to 22 million user IDs revealed by Yahoo! Japan. That scale is massive, but, he writes, “According to Yahoo, the information that was stolen didn’t have passwords or any other information that would allow unauthorized users to carry out user identity verification.” A story at the Japan Times adds a bit more detail. Read more of this story at Slashdot.

Read this article:
Yahoo! Japan May Have Had 22 Million User IDs Stolen

Ex-Valve Engineers’ Crazy AR Glasses Put Tiny Projectors On Your Face

Want some more tech to put on your face? Neither full-on goggles like the Oculus Rift nor slender no-AR-yet specs like Google’s Glass , CastAR takes a whole different approach to modified-reality tech by slapping tiny projectors on your face, and The Verge got to take a peek . Read more…        

Continue reading here:
Ex-Valve Engineers’ Crazy AR Glasses Put Tiny Projectors On Your Face

Printable A3-sized solar cells hit a new milestone in green energy

Victorian Organic Solar Cell Consortium Imagine a future where solar panels speed off the presses, like newspaper. Australian scientists have brought us one step closer to that reality. Researchers from the Victorian Organic Solar Cell Consortium (VICOSC) have developed a printer that can print 10 meters of flexible solar cells a minute. Unlike traditional silicon solar cells, printed solar cells are made using organic semi-conducting polymers, which can be dissolved in a solvent and used like an ink, allowing solar cells to be printed. Not only can the VICOSC machine print flexible A3 solar cells, the machine can print directly on to steel, opening up the possibility for solar cells to be embedded directly into building materials. Read 7 remaining paragraphs | Comments

See original article:
Printable A3-sized solar cells hit a new milestone in green energy

Fed. Appeals Court Says Police Need Warrant to Search Phone

An anonymous reader writes “In a decision that’s almost certainly going to result in this issue heading up to the Supreme Court, the Federal 1st Circuit Court of Appeals [Friday] ruled that police can’t search your phone when they arrest you without a warrant. That’s contrary to most courts’ previous findings in these kinds of cases where judges have allowed warrantless searches through cell phones.” (But in line with the recently mentioned decision in Florida, and seemingly with common sense.) Read more of this story at Slashdot.

More:
Fed. Appeals Court Says Police Need Warrant to Search Phone

Computer scientists to FBI: don’t require all our devices to have backdoors for spies

In an urgent, important blog post, computer scientist and security expert Ed Felten lays out the case against rules requiring manufacturers to put wiretapping backdoors in their communications tools. Since the early 1990s, manufacturers of telephone switching equipment have had to follow a US law called CALEA that says that phone switches have to have a deliberate back-door that cops can use to secretly listen in on phone calls without having to physically attach anything to them. This has already been a huge security problem — through much of the 1990s, AT&T’s CALEA controls went through a Solaris machine that was thoroughly compromised by hackers, meaning that criminals could listen in on any call; during the 2005/6 Olympic bid, spies used the CALEA backdoors on the Greek phone company’s switches to listen in on the highest levels of government. But now, thanks to the widespread adoption of cryptographically secured messaging services, law enforcement is finding that its CALEA backdoors are of declining utility — it doesn’t matter if you can intercept someone else’s phone calls or network traffic if the data you’re captured is unbreakably scrambled. In response, the FBI has floated the idea of “CALEA II”: a mandate to put wiretapping capabilities in computers, phones, and software. As Felten points out, this is a terrible idea. If your phone is designed to secretly record you or stream video, location data, and messages to an adverse party, and to stop you from discovering that it’s doing this, it puts you at huge risk when that facility is hijacked by criminals. It doesn’t matter if you trust the government not to abuse this power (though, for the record, I don’t — especially since anything mandated by the US government would also be present in devices used in China, Belarus and Iran) — deliberately weakening device security makes you vulnerable to everyone, including the worst criminals: Our report argues that mandating a virtual wiretap port in endpoint systems is harmful. The port makes it easier for attackers to capture the very same data that law enforcement wants. Intruders want to capture everything that happens on a compromised computer. They will be happy to see a built-in tool for capturing and extracting large amounts of audio, video, and text traffic. Better yet (for the intruder), the capability will be stealthy by design, making it difficult for the user to tell that anything is amiss. Beyond this, the mandate would make it harder for users to understand, monitor, and fix their own systems—which is bad for security. If a system’s design is too simple or its operation too transparent or too easy to monitor, then wiretaps will be evident. So a wiretappability mandate will push providers toward complex, obfuscated designs that are harder to secure and raise the total cost of building and operating the system. Finally, our report argues that it will not be possible to block non-compliant implementations. Many of today’s communication tools are open source, and there is no way to hide a capability within an open source code base, nor to prevent people from simply removing or disabling an undesired feature. Even closed source systems are routinely modified by users—as with jailbreaking of phones—and users will find ways to disable features they don’t want. Criminals will want to disable these features. Ordinary users will also want to disable them, to mitigate their security risks. Felten’s remarks summarize a report [PDF] signed by 20 distinguished computer scientists criticizing the FBI’s proposal. It’s an important read — maybe the most important thing you’ll read all month. If you can’t trust your devices, you face enormous danger. CALEA II: Risks of wiretap modifications to endpoints        

Read more here:
Computer scientists to FBI: don’t require all our devices to have backdoors for spies

Mac malware signed with Apple ID infects activist’s laptop

F-Secure Stealthy Mac OS X spyware that was digitally signed with a valid Apple Developer ID has been detected on the laptop of an Angolan activist attending a human rights conference, researchers said. The backdoor, which is programmed to take screenshots and send them to remote servers under the control of the attackers, was spread using a spear phishing e-mail , according to privacy activist Jacob Appelbaum. Spear phishing is a term for highly targeted e-mails that address the receiver by name and usually appear to come from someone the receiver knows. The e-mails typically discuss topics the two people have talked about before. According to AV provider F-Secure, the malware was discovered during a workshop showing freedom of speech activists how to secure their devices against government monitoring. The malware was signed with a valid Apple Developer ID  allowing it to more easily bypass the Gatekeeper feature Apple introduced in the Mountain Lion version of OS X. If it’s not the first time Mac malware has carried such a digital assurance, it’s certainly among the first. Both F-Secure and Appelbaum said the backdoor, identified as OSX/KitM.A, is new and previously unknown. For its part, AV provider Intego said the malware is a variant of a previously seen trojan known as OSX/FileSteal. Intego continued: Read 3 remaining paragraphs | Comments

See more here:
Mac malware signed with Apple ID infects activist’s laptop