Scientists in Australia claim to have discovered the exercise technique that burns the maximum amount of fat with the least amount of work. More »
More here:
Researchers Claim To Discover the Single Most Efficient Exercise Regimen
Scientists in Australia claim to have discovered the exercise technique that burns the maximum amount of fat with the least amount of work. More »
More here:
Researchers Claim To Discover the Single Most Efficient Exercise Regimen
The Boston Globe today broke the news that administrators at Harvard University secretly searched the e-mail accounts of 16 resident deans last fall, in an attempt to determine the source of “a leak to the media about the school’s sprawling cheating case.” [The Boston Globe]
Continue reading here:
Investigating leaks, Harvard secretly searched deans’ email accounts
An en banc (all the judges together) decision from the 9th Circuit has affirmed that you have the right to expect that your laptop and other devices will not be forensically examined without suspicion at the US border. It’s the first time that a US court has upheld electronic privacy rights at the border, and the court also said that using an encrypted device that can’t be casually searched is not grounds for suspicion. The judges also note that the prevalence of cloud computing means that searching at the border gives cops access to servers located all over the world. At TechDirt, Mike Masnick has some great analysis of this welcome turn of events: The ruling is pretty careful to strike the right balance on the issues. It notes that a cursory review at the border is reasonable: Officer Alvarado turned on the devices and opened and viewed image files while the Cottermans waited to enter the country. It was, in principle, akin to the search in Seljan, where we concluded that a suspicionless cursory scan of a package in international transit was not unreasonable. But going deeper raises more questions. Looking stuff over, no problem. Performing a forensic analysis? That goes too far and triggers the 4th Amendment. They note that the location of the search is meaningless to this analysis (the actual search happened 170 miles inside the country after the laptop was sent by border agents to somewhere else for analysis). So it’s still a border search, but that border search requires a 4th Amendment analysis, according to the court. It is the comprehensive and intrusive nature of a forensic examination—not the location of the examination—that is the key factor triggering the requirement of reasonable suspicion here…. Notwithstanding a traveler’s diminished expectation of privacy at the border, the search is still measured against the Fourth Amendment’s reasonableness requirement, which considers the nature and scope of the search. Significantly, the Supreme Court has recognized that the “dignity and privacy interests of the person being searched” at the border will on occasion demand “some level of suspicion in the case of highly intrusive searches of the person.” Flores-Montano, 541 U.S. at 152. Likewise, the Court has explained that “some searches of property are so destructive,” “particularly offensive,” or overly intrusive in the manner in which they are carried out as to require particularized suspicion. Id. at 152, 154 n.2, 155–56; Montoya de Hernandez, 473 U.S. at 541. The Court has never defined the precise dimensions of a reasonable border search, instead pointing to the necessity of a case-by-case analysis…. The court is led by Chief Judge Alex Kozinski, who is a fan of my book Little Brother (which features a scene where DHS officials force a suspect to decrypt his devices, on the grounds that his encryption itself is suspicious), and was kind enough to write me a blurb for the new edition of the book. I’m not saying that Little Brother inspired Kozinski to issue this decision, but I’m delighted to discover that something I’ve been pushing through fiction since 2008 has made it into law in 2013. 9th Circuit Appeals Court: 4th Amendment Applies At The Border; Also: Password Protected Files Shouldn’t Arouse Suspicion
View the original here:
US Ninth Circuit says forensic laptop searches at the border without suspicion are unconstitional
Once upon a time, Netflix was proud enough of its public API which enabled third-party services and apps to serve up its data and content in different ways that it opened a gallery to display them. Unfortunately, times have changed since 2009 — the old App Gallery is gone and now, so is public API access for new developers. A blog post indicates the API is now focused on supporting Netflix’s official clients on the many devices its customers use to stream movies, not hobbyist projects for managing ones queue or finding new movies to watch. While those already in place should still work since existing keys will remain active, the developer forums are being set to read-only, no new keys are being issued and new partners are no longer being accepted. The move is reminiscent of recent changes by Twitter , where as each company has grown it’s decided having control over the user experience through its own official apps outweighs allowing the community to build and extend access as it sees fit. We’re sad to see the program go, as many of these tools assisted Netflix members in ways the official website and apps either never did, or no longer do after the features were removed . Even though Netflix relies on its own secret sauce for recommendations, we’ve always found it hard to beat InstantWatcher’s curated lists (by year, Rotten Tomatoes rating, critic’s picks, titles most recently added by other users and more) to find a video, and FeedFliks was indispensable for monitoring exactly how valuable the service is until its features were cut down by API changes. They provided an edge the competition like Amazon Prime and Redbox couldn’t match, but we’ll have to wait and see if this change is noticed by enough subscribers to matter — we’ve seen how that can go . Filed under: Home Entertainment , HD Comments Via: TechCrunch Source: Netflix Developer Blog
Read More:
Netflix changes its public API program by ending it, will no longer issue new dev keys
An anonymous reader sends this Techdirt report on a welcome ruling from the 9th Circuit Court of Appeals: “”Here’s a surprise ruling. For many years we’ve written about how troubling it is that Homeland Security agents are able to search the contents of electronic devices, such as computers and phones at the border, without any reason. The 4th Amendment only allows reasonable searches, usually with a warrant. But the general argument has long been that, when you’re at the border, you’re not in the country and the 4th Amendment doesn’t apply. This rule has been stretched at times, including the ability to take your computer and devices into the country and search it there, while still considering it a “border search,” for which the lower standards apply. Just about a month ago, we noted that Homeland Security saw no reason to change this policy. Well, now they might have to. In a somewhat surprising 9th Circuit ruling (en banc, or in front of the entire set of judges), the court ruled that the 4th Amendment does apply at the border, that agents do need to recognize there’s an expectation of privacy, and cannot do a search without reason. Furthermore, they noted that merely encrypting a file with a password is not enough to trigger suspicion.” Read more of this story at Slashdot.
Taken from:
Court: 4th Amendment Applies At Border, Password Protected Files Not Suspiscious
Cook County in Chicago hopes that someone, somewhere might identify some of the bodies in its morgue. The images, though, are tough to take. [Read more]
An anonymous reader writes “The U.S. House of Representatives has voted to make the Pentagon disclose whether military drones are being used in U.S. airspace to spy on U.S. citizens. This follows Rand Paul’s filibuster on the floor of the Senate in which he demanded answers from the Obama administration as to whether drone strikes on U.S. soil were a possibility. (Senator Paul received an amusingly brief response (PDF) to his 13-hour question.) From the article: ‘A requirement buried in a lengthy appropriations bill calls on newly confirmed Defense Secretary Chuck Hagel to disclose to Congress what “policies and procedures” are in place “governing the use” of military drones or other unmanned aerial vehicles (UAVs) domestically. The report is due no later than 90 days after the bill is signed into law. The vote on the bill, which was overwhelmingly supported by Republicans and opposed by Democrats, comes as concerns about domestic use of drones have spiked. …The House’s language stops short of requiring Hagel to disclose whether he or his predecessor have taken the step of approving the targeting of any U.S. citizens for surveillance.'” Read more of this story at Slashdot.
Visit site:
Defense Dept. Directed To Disclose Domestic Drone Use
Aurich Lawson / Thinkstock Electronic Arts has indicated that it will not be altering its usual digital refund policy in the wake of SimCity server issues that have led to access problems and scaled-back features for players that are able to log in, days after the game’s North American release. “In general we do not offer refunds on digital download games,” EA tweeted through its official Origin account yesterday, directing people to the company’s online policy on returns and cancellations . While downloadable games purchased in North America are not be refunded “as a general policy,” EA does offer a “14-day unconditional guarantee” on any physical product sold through the Origin store. European customers, however, may be able to withdraw their downloadable purchase during a 14-day “Cooling Off period” as outlined on EA’s European return policy page . The recent tweet comes after a message posted to EA’s forums by Community Manager Raven on Tuesday, stating that “[i]f you regrettably feel that we let you down, you can of course request a refund for your order… though we’re currently still in the process of resolving this issue.” That message has now been revised to simply say “please review our refund policy here .” Read 6 remaining paragraphs | Comments
See the article here:
EA not altering return policy for furious SimCity buyers
iOS ( jailbroken ): Waiting for the camera app to load (and having other people see it on your screen) doesn’t exactly make for good covert photos. QuickShoot is a jailbreak tweak that takes a picture from your home screen without even opening the camera app. More »
Read More:
QuickShoot Takes Secret Photos from Your iPhone’s Home Screen
The new movie Oz the Great and Powerful opens today in theaters nationwide. The backstory of the wizard is loosely based on the L. Frank Baum book The Wonderful Wizard of Oz . Baum went on to write 14 more books about Oz, because the public kept demanding more. An interesting fact I didn’t know -one of his granddaughters was named after an Oz character! Baum had a granddaughter named “Ozma,” and his 11th Oz book, The Lost Princess of Oz (published 1917), was dedicated to her shortly after her birth. The story begins with the disappearance of Princess Ozma, the ruler of Oz. Read more interesting facts about Baumm’s Oz books and see artwork from all of them at Tres Sugar. Link -via Holy Kaw!
Read the original post:
7 Weird and Wonderful Facts About the Wizard of Oz Books