Radiohead’s Thom Yorke Pulls Albums From Spotify In Protest of Low Royalties

First time accepted submitter rpopescu writes “Thom Yorke of Radiohead fame has pulled his solo album ‘Eraser’ (as well as music made as Atoms for Peace) from the music streaming service Spotify, as a protest at how much it pays the artists. Quote: ‘”Make no mistake. These are all the same old industry bods trying to get a stranglehold on the delivery system.”‘” Read more of this story at Slashdot.

Originally posted here:
Radiohead’s Thom Yorke Pulls Albums From Spotify In Protest of Low Royalties

Human-powered helicopter takes the Sikorsky prize

The Sikorsky prize for human-powered helicopters has been claimed by a Kickstarter-funded startup called Aerovelo. Aerovelo’s founders, Canadians Todd Reichert and Cameron Robertson, won the $250, 000 purse for the 30-second flight of Atlas, a huge quadrotor with a bike in the middle whose flight is an absolute marvel to behold.        

More:
Human-powered helicopter takes the Sikorsky prize

Pirate Bay outs porno copyright trolls: they’re the ones pirating their own files

Yesterday, I wrote about an expert witness’s report on Prenda Law ( previously ), the notorious porno copyright trolls (they send you letters accusing you of downloading porn and demand money on pain of being sued and forever having your name linked with embarrassing pornography). The witness said that he believed that Prenda — and its principle, John Steele — had been responsible for seeding and sharing the files they accused others of pirating. After hearing about this, the administrators for The Pirate Bay dug through their logs and published a damning selection of log entries showing that many of the files that Steele and his firm accused others of pirating were uploaded by Steele himself, or someone with access to his home PC. The Pirate Bay logs not only link Prenda to the sharing of their own files on BitTorrent, but also tie them directly to the Sharkmp4 user and the uploads of the actual torrent files. The IP-address 75.72.88.156 was previously used by someone with access to John Steele’s GoDaddy account and was also used by Sharkmp4 to upload various torrents. Several of the other IP-addresses in the log resolve to the Mullvad VPN and are associated with Prenda-related comments on the previously mentioned anti-copyright troll blogs. The logs provided by The Pirate Bay can be seen as the missing link in the evidence chain, undoubtedly linking Sharkmp4 to Prenda and John Steele. Needless to say, considering the stack of evidence above it’s not outrageous to conclude that the honeypot theory is viable. While this is certainly not the first time that a copyright troll has been accused of operating a honeypot, the evidence compiled against Prenda and Steel is some of the most damning we’ve seen thus far. The Pirate Bay Helps to Expose Copyright Troll Honeypot [Ernesto/TorrentFreak]        

View the original here:
Pirate Bay outs porno copyright trolls: they’re the ones pirating their own files

How ransomware creeps cash out their payments

Brian Krebs offers an in-depth look at a “cashout” service used by ransomware crooks to get money from their victims. Ransomware is malicious software that encrypts your personal files and demands that you pay a ransom for the key to decrypt them; the crooks who run the attacks demand that their victims buy prepaid MoneyPak cards and send the numbers for them by way of payment. But converting MoneyPaks to cash is tricky — one laundry, which pipes the money through a horse/dog-track betting service — charges a 60% premium. * The ransomware victims who agree to purchase MoneyPak vouchers to regain control over their PCs. * The guys operating the botnets that are pushing ransomware, locking up victim PCs, and extracting MoneyPak voucher codes from victims. * The guy(s) running this cashout service. * The “cashiers” or “cashers” on the back end who are taking the Moneypak codes submitted to the cashing service, linking those codes to fraudulently-obtained prepaid debit cards, and then withdrawing the funds via ATMs and wiring the proceeds back to the cashing service, minus their commission. The cashing service then credits a percentage of the MoneyPak voucher code values to the ransomware peddler’s account. How much does the cashout service charge for all this work? More than half of the value of the MoneyPaks, it would seem. When a user logs in to the criminal service, he is greeted with the following message: “Dear clients, due to decrease of infection rate on exploits we are forced to lift the price. The price is now 0.6. And also, I explained the rules for returns many times, we return only cheques which return on my side if you cash them out after then we lock the account! There are many clients who don’t return anything, and I will work only with these people now. I warn you.” Cashout Service for Ransomware Scammers        

View article:
How ransomware creeps cash out their payments

Schools and the cloud: will schools allow students to be profiled and advertised to in the course of their school-day?

Kate sez, “Technology companies are moving rapidly to get tools like email and document creation services into schools. This link to a recent survey of schools in the UK shows that use of such technology is expected to bring significant educational and social benefits. However, it also reveals that schools have deep concerns that providers of these services will mine student emails, documents or web browsing behaviour to build profiles for commercial purposes, such as serving advertisements. When data mining is done for profit, the relationship between the data miner and the consumer is simply a market transaction. As long as both parties are free to choose whether and when they wish to engage in such transactions, there is no reason to forbid them or place undue obstacles in their path. However, when children are using certain services at school and can neither consent to, control or even properly understand the data mining that is taking place, a clear line against such practices must be drawn, particularly when their data will be used by businesses to make a profit.” UK School Opinions of Cloud Services and Student Privacy [PDF] ( Thanks, Kate ! )        

Excerpt from:
Schools and the cloud: will schools allow students to be profiled and advertised to in the course of their school-day?

UK film industry requisitions cops for massive raid on suspected pirate, get to question him at police station

In the UK, the movie industry’s lobby group gets to requisition huge numbers of police officers to raid peoples’ houses, solely on their say-so. Here’s the story of one man who was raided by ten cops, who arrived in five cars, along with representatives from FACT (the horribly named Federation Against Copyright Theft). The FACT agents directed the arrest of a 24-year-old man, along with the seizure of all his computers and storage media, on the basis of an “emergency” search-warrant. The FACT agents conducted the bulk of his questioning at the police station, with the cops acting as stenographers. When the man was bailed, the bail sheet specified that he had been arrested for a “miscellaneous offense.” He has been banned from entering any cinemas in England or Wales as a condition of bail. As TorrentFreak notes, FACT offers cash bounties to cinema workers who disrupt people thought to be “cammers” who are recording movies in cinemas. They paid more than a dozen such bounties last year, but did not have a single successful prosecution. “This morning I was arrested at my home under suspicion of recording and distributing Fast and Furious 6 and a few other titles,” the arrested man told TorrentFreak. Mp> After seizing numerous items including three servers, a desktop computer, blank hard drives and blank media, police detained the 24-year-old and transported him to a nearby police station. Despite the ‘emergency’ nature of the raid, no movie recording equipment was found. “At the police station I was interviewed by the police together with FACT (Federation Against Copyright and Theft). During questioning they asked me about Fast and Furious 6, where I obtained a copy from and if I was the one who went and recorded it at the cinema.” Despite police involvement, as in previous cases it appears they were only present in order to gain access to the victim’s property, sit on the sidelines taking notes, and for their powers when it comes to presenting crimes for prosecution. “I was detained for 3 hrs 12 minutes, out of that I was questioned for approximately 40 minutes. One police officer and two FACT officers conducted the interview. The police officer sat back and let FACT do all the questioning, so FACT were running the show,” the man reports. Five Undercover Police Cars Sent To Arrest Single Alleged Movie Pirate [Andy/TorentFreak]        

Read the original:
UK film industry requisitions cops for massive raid on suspected pirate, get to question him at police station

Anatomy of a password-crack, part II

Ars Technica’s Nate Anderson Dan Goodin follows up on Nate Anderson’s excellent piece on the nuts and bolts of password cracking with a further attempt to decrypt an encrypted password file leaked from LivingSocial, this time with the aid of experts. The password file they were working on was encrypted with the relatively weak (and now deprecated) SHA1 hashing algorithm, and they were only attacking it with a single GPU on a commodity PC, and were able to extract over 90% of the passwords in the file. The discussion of the guesswork and refinement techniques used in extracting passwords is absolutely fascinating and really is a must-read. However, the whole exercise is still a bit inconclusive — in the end, we know that a badly encrypted password file is vulnerable to an underpowered password-cracking device. But what we need to know is whether a well-encrypted password file will stand up to a good password-cracking system. The specific type of hybrid attack that cracked that password is known as a combinator attack. It combines each word in a dictionary with every other word in the dictionary. Because these attacks are capable of generating a huge number of guesses—the square of the number of words in the dict—crackers often work with smaller word lists or simply terminate a run in progress once things start slowing down. Other times, they combine words from one big dictionary with words from a smaller one. Steube was able to crack “momof3g8kids” because he had “momof3g” in his 111 million dict and “8kids” in a smaller dict… What was remarkable about all three cracking sessions were the types of plains that got revealed. They included passcodes such as “k1araj0hns0n,” “Sh1a-labe0uf,” “Apr!l221973,” “Qbesancon321,” “DG091101%,” “@Yourmom69,” “ilovetofunot,” “windermere2313,” “tmdmmj17,” and “BandGeek2014.” Also included in the list: “all of the lights” (yes, spaces are allowed on many sites), “i hate hackers,” “allineedislove,” “ilovemySister31,” “iloveyousomuch,” “Philippians4:13,” “Philippians4:6-7,” and “qeadzcwrsfxv1331.” “gonefishing1125” was another password Steube saw appear on his computer screen. Seconds after it was cracked, he noted, “You won’t ever find it using brute force.” Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”        

See the article here:
Anatomy of a password-crack, part II

Computer scientists to FBI: don’t require all our devices to have backdoors for spies

In an urgent, important blog post, computer scientist and security expert Ed Felten lays out the case against rules requiring manufacturers to put wiretapping backdoors in their communications tools. Since the early 1990s, manufacturers of telephone switching equipment have had to follow a US law called CALEA that says that phone switches have to have a deliberate back-door that cops can use to secretly listen in on phone calls without having to physically attach anything to them. This has already been a huge security problem — through much of the 1990s, AT&T’s CALEA controls went through a Solaris machine that was thoroughly compromised by hackers, meaning that criminals could listen in on any call; during the 2005/6 Olympic bid, spies used the CALEA backdoors on the Greek phone company’s switches to listen in on the highest levels of government. But now, thanks to the widespread adoption of cryptographically secured messaging services, law enforcement is finding that its CALEA backdoors are of declining utility — it doesn’t matter if you can intercept someone else’s phone calls or network traffic if the data you’re captured is unbreakably scrambled. In response, the FBI has floated the idea of “CALEA II”: a mandate to put wiretapping capabilities in computers, phones, and software. As Felten points out, this is a terrible idea. If your phone is designed to secretly record you or stream video, location data, and messages to an adverse party, and to stop you from discovering that it’s doing this, it puts you at huge risk when that facility is hijacked by criminals. It doesn’t matter if you trust the government not to abuse this power (though, for the record, I don’t — especially since anything mandated by the US government would also be present in devices used in China, Belarus and Iran) — deliberately weakening device security makes you vulnerable to everyone, including the worst criminals: Our report argues that mandating a virtual wiretap port in endpoint systems is harmful. The port makes it easier for attackers to capture the very same data that law enforcement wants. Intruders want to capture everything that happens on a compromised computer. They will be happy to see a built-in tool for capturing and extracting large amounts of audio, video, and text traffic. Better yet (for the intruder), the capability will be stealthy by design, making it difficult for the user to tell that anything is amiss. Beyond this, the mandate would make it harder for users to understand, monitor, and fix their own systems—which is bad for security. If a system’s design is too simple or its operation too transparent or too easy to monitor, then wiretaps will be evident. So a wiretappability mandate will push providers toward complex, obfuscated designs that are harder to secure and raise the total cost of building and operating the system. Finally, our report argues that it will not be possible to block non-compliant implementations. Many of today’s communication tools are open source, and there is no way to hide a capability within an open source code base, nor to prevent people from simply removing or disabling an undesired feature. Even closed source systems are routinely modified by users—as with jailbreaking of phones—and users will find ways to disable features they don’t want. Criminals will want to disable these features. Ordinary users will also want to disable them, to mitigate their security risks. Felten’s remarks summarize a report [PDF] signed by 20 distinguished computer scientists criticizing the FBI’s proposal. It’s an important read — maybe the most important thing you’ll read all month. If you can’t trust your devices, you face enormous danger. CALEA II: Risks of wiretap modifications to endpoints        

Read more here:
Computer scientists to FBI: don’t require all our devices to have backdoors for spies

First vatburger is ready to eat

After spending $250,000 worth of anonymously donated money, Mark Post from Maastricht University is ready to go public with his first vat-grown hamburger, which will be cooked and eaten at an event in London this week. Though they claim that it’s healthier than regular meat, one question not answered in the article is the Omega 3/6 balance — crappy, corn-fed, factory-farmed meet is full of Omega 6s and avoided by many eaters; the grass-fed, free-range stuff is higher in Omega 3s. Yet growing meat in the laboratory has proved difficult and devilishly expensive. Dr. Post, who knows as much about the subject as anybody, has repeatedly postponed the hamburger cook-off, which was originally expected to take place in November. His burger consists of about 20,000 thin strips of cultured muscle tissue. Dr. Post, who has conducted some informal taste tests, said that even without any fat, the tissue “tastes reasonably good.” For the London event he plans to add only salt and pepper. But the meat is produced with materials — including fetal calf serum, used as a medium in which to grow the cells — that eventually would have to be replaced by similar materials of non-animal origin. And the burger was created at phenomenal cost — 250,000 euros, or about $325,000, provided by a donor who so far has remained anonymous. Large-scale manufacturing of cultured meat that could sit side-by-side with conventional meat in a supermarket and compete with it in price is at the very least a long way off.“This is still an early-stage technology,” said Neil Stephens, a social scientist at Cardiff University in Wales who has long studied the development of what is also sometimes referred to as “shmeat.” “There’s still a huge number of things they need to learn.” There are also questions of safety — though Dr. Post and others say cultured meat should be as safe as, or safer than, conventional meat, and might even be made to be healthier — and of the consumer appeal of a product that may bear little resemblance to a thick, juicy steak. Engineering the $325,000 Burger [Henry Fountain/New York Times] ( via /. )        

See the article here:
First vatburger is ready to eat

HOWTO build a working digital computer out of paperclips (and stuff)

Windell at Evil Mad Scientist Labs has dredged up an amazing project book from the Internet Archive: How to Build a Working Digital Computer (1967) (by Edward Alcosser, James P. Phillips, and Allen M. Wolk) contains a full set of instructions for building a working computer out of paperclips and various bits and bobs from the local hardware store. You can even use paperclips for switches (though, as Windell notes, “Arrays of paperclip logic gates can get pretty big, pretty fast.”) The instructions include a read-only drum memory for storing the computer program (much like a player piano roll), made from a juice can, with read heads made from bent paper clips.   A separate manually-operated “core” memory (made of paper-clip switches) is used for storing data.   So can this “paper clip” computer actually built, and if so, would it work?  Apparently yes, on both counts. Cleveland youngsters Mark Rosenstein and Kenny Antonelli built one named “ Emmerack ” in 1972 (albeit substituting Radio Shack slide switches for most of the paper clips), and another was built in 1975 by the  Wickenburg High School Math Club  in Arizona.  And, at least one modern build has been completed, as you can see on YouTube . How to Build a Working Digital Computer… out of paperclips ( via O’Reilly Radar )        

Read more here:
HOWTO build a working digital computer out of paperclips (and stuff)