DOJ Threatens To Seize iOS Source Code

An anonymous reader writes from an article posted on iDownloadBlog: The DoJ is demanding that Apple create a special version of iOS with removed security features that would permit the FBI to run brute-force passcode attempts on the San Bernardino shooter’s iPhone 5c. Meanwhile, President Barack Obama has made public where he stands on the Apple vs. FBI case, which has quickly become a heated national debate. In the court papers, DoJ calls Apple’s rhetoric in the San Bernardino standoff as “false” and “corrosive” because the Cupertino firm dared suggest that the FBI’s court order could lead to a “police state.” Footnote Nine of DoJ’s filing reads: For the reasons discussed above, the FBI cannot itself modify the software on the San Bernardino shooter’s iPhone without access to the source code and Apple’s private electronic signature. The government did not seek to compel Apple to turn those over because it believed such a request would be less palatable to Apple. If Apple would prefer that course, however, that may provide an alternative that requires less labor by Apple programmers. As Fortune’s Philip-Elmer DeWitt rightfully pointed out, that’s a classic police threat. “We can do this [the] easy way or the hard way. Give us the little thing we’re asking for — a way to bypass your security software — or we’ll take [the] whole thing: your crown jewels and the royal seal too, ” DeWitt wrote. “With Apple’s source code, the FBI could, in theory, create its own version of iOS with the security features stripped out. Stamped with Apple’s electronic signature, the Bureau’s versions of iOS could pass for the real thing, ” he added. Read more of this story at Slashdot.

Read the article:
DOJ Threatens To Seize iOS Source Code

John McAfee: NSA’s Back Door Has Given Every US Secret To Enemies

John McAfee, American computer programmer and contributing editor of Business Insider, explains how the NSA’s back door has given every U.S. secret to its enemies. He begins by mentioning the importance of software, specifically meta- software, which contains a high level set of principles designed to help a nation survive in a cyberwar. Such software must not contain any back doors under any circumstances, otherwise it can and may very likely allow perceived enemies of the U.S. to have access to top-secret information. For example, the Chinese used the NSA’s back door to hack the Defense Department last year and steal 5.6 million fingerprints of critical personnel. “Whatever gains the NSA has made through the use of their back door, it cannot possibly counterbalance the harm done to our nation by everyone else’s use of that same back door.” McAfee believes the U.S. has failed to grasp the subtle implications of technology and, as a result, is 20 years behind the Chinese, and by association, the Russians as well. Read more of this story at Slashdot.

View post:
John McAfee: NSA’s Back Door Has Given Every US Secret To Enemies

Intel, Warner sue over device that strips 4K copy protection

The media industry was more than a little alarmed when 4K bootlegs of Amazon and Netflix streams showed up this November. Weren’t these feeds supposed to be relatively safe from pirates? It’s no surprise, then, that they’re doing something about it. Intel (through its Digital Content Protection brand) and Warner Bros. are suing LegendSky for offering HDFury, a series of devices designed to strip HDCP copy protection from many sources, including streams. The two plaintiffs claim that HDFury violates the Digital Millennium Copyright Act’s anti-circumvention measures, making it all too easy to rip and share 4K video. They also allege that LegendSky is dishonest when it says it meets HDCP’s licensing requirements. LegendSky hasn’t said how it’s handling the lawsuit, although it may not have much success fighting back. As TorrentFreak notes, 4K stream rips started surfacing mere days after the first HDFury boxes started shipping. Even if Intel and Warner can’t draw a direct link between the two events, the timing certainly looks suspicious. And while HDCP is notorious for being a nuisance to legitimate viewers, it’s not very likely that people are buying HDFury solely to reclaim some convenience. As it stands, it wasn’t too hard to see this coming. With 4K Blu-ray movies on the way, Warner and other studios are no doubt eager to minimize the related piracy before it really takes off — streaming was just the tip of the iceberg. Source: TorrentFreak

More:
Intel, Warner sue over device that strips 4K copy protection

Hyatt is the latest hotel chain to spot malware on its systems

Unfortunately, Hilton isn’t the only hotel chain grappling with malware on sensitive computers. Hyatt is now warning travelers that it recently spotted malware on its payment processing systems (on November 30th, the company tells us). It’s still investigating what happened and has precious few details, but it maintains that you can “feel confident” using your card. Unfortunately, that’s not much help if you recently stayed at a Hyatt. How long does it think the malware was hanging around? And how much damage did the rogue code do? Hyatt tells that it’ll share more when the investigation is over. Until it offers the full scoop, your best option is to watch your financial statements for any shady behavior. [Image credit: AP Photo/Charlie Riedel] Via: Krebs on Security Source: Hyatt

Continue Reading:
Hyatt is the latest hotel chain to spot malware on its systems

Explore 4,500 British Museum artifacts with Google’s help

The British Museum in London holds an array of beautiful and historically significant artifacts including the Rosetta Stone, which helped historians to understand the ancient hieroglyphics used in Egypt. Today, the organisation is teaming up with Google to bring its various collections online as part of the Google Cultural Institute . The search giant has been developing this resource for years by continually visiting and archiving exhibits around the world. With the British Museum, an extra 4, 500 objects and artworks are being added to its collection, complete with detailed photos and descriptions. Source: Google Cultural Institute

More:
Explore 4,500 British Museum artifacts with Google’s help

Next time a government hacks your Facebook account, Facebook will let you know

Facebook says that starting today, they will notify users “if we believe your account has been targeted or compromised by an attacker suspected of working on behalf of a nation-state.” (more…)

Read the original post:
Next time a government hacks your Facebook account, Facebook will let you know

Researchers have found that a malicious Chinese ad network, used in over 250 iOS apps, has been sile

Researchers have found that a malicious Chinese ad network, used in over 250 iOS apps, has been silently collecting user data including serial numbers and email addresses. Apple has already begun removing these apps from the App Store, but you can read more here . Read more…

View post:
Researchers have found that a malicious Chinese ad network, used in over 250 iOS apps, has been sile

This video proves China has the most insane traffic jams on Earth

“This is what happens when people come back from vacation in China and try to get into Beijing. And you thought your puny traffic jams were crazy.” (more…)

Read More:
This video proves China has the most insane traffic jams on Earth

Chinese Scientists Discover Structural Basis of Pre-mRNA Splicing

hackingbear writes: On August 21st, the research team led by Prof. Yigong Shi from School of Life Sciences, Tsinghua University in China published two side-by-side research articles in Science, reporting the long-sought-after structure of a yeast spliceosome at 3.6 angstrom resolution determined by single particle cryo-electron microscopy (cryo-EM), and the molecular mechanism of pre-messenger RNA splicing. Until now, decades of genetic and biochemical experiments have identified almost all proteins in spliceosome and uncovered some functions. Yet, the structure remained a mystery for a long time. The works, primarily performed by Dr. Chuangye Yan, and Ph.D students Jing Hang and Ruixue Wan under Prof. Yigong Shi’s supervision, settled this Holy Grail question and established the structural basis for the related area. This work was supported by funds from the Ministry of Science and Technology and the National Natural Science Foundation of China. Read more of this story at Slashdot.

View article:
Chinese Scientists Discover Structural Basis of Pre-mRNA Splicing

A Startling Portrait of African Cities—And How China is Building Them

If a continent’s infrastructure is its’ bones, then Africa is growing up quickly. From 2000 to 2010, six of the ten fastest growing economies were in sub-Saharan Africa, and the region had to accrue new housing, highways, skyscrapers, factories—much of it financed or constructed by China. Who better to build Africa’s new economy? Continent-sized China just had its own growth spurt, one that began thirty five years ago in a few special economic zones (SEZs) and now promises to make Beijing a new megacity five times the size of New York City— a home to 130 million people boasting industries from technology to textiles. China’s economy-building industries—construction, real estate financing, urban planning—have found a new home in the African continent. But is Africa filling a Chinese mold? Or is it growing into something entirely different? Portrait of Chinese construction site manager for a new light-rail line system in Addis Ababa. [Photo courtesy of Michiel Hulshof and Daan Roggeveen] [Photo courtesy of Michiel Hulshof and Daan Roggeveen] That question sits at the core of Facing East: Chinese Urbanism in Africa , an exhibition currently on display at New York City’s Storefront for Art and Architecture . The exhibit was curated by journalist Michiel Hulshof and architect Daan Roggeveen , both Dutch, who have extensively explored Chinese urbanism in their ongoing Go West Project . For Facing East , the pair travelled to six major African cities—Nairobi, Kigali, Lagos, Addis Ababa, Accra, Dar Es Salaam—over the past three years to photograph, interview and investigate. The exhibition’s walls of photographs, along with captions and a short essay, provide a condensed portrait of their experiences. So, what’s the verdict? Is Africa, in the words of one Kenyan small-business owner, truly “facing East to our new friends, the Chinese?” Installation view. [Facing East: Chinese Urbanism in Africa, 2015. Curated by Michiel Hulshof and Daan Roggevan. Storefront for Art and Architecture. Photo by Qi Lin.] Africans now have a choice between Western and Eastern-driven development and aid. [Facing East: Chinese Urbanism in Africa, 2015. Curated by Michiel Hulshof and Daan Roggevan. Storefront for Art and Architecture. Photo by Qi Lin.] The show catalogs the broad conditions and consequences of Africa’s developing cities. [Facing East: Chinese Urbanism in Africa, 2015. Curated by Michiel Hulshof and Daan Roggevan. Storefront for Art and Architecture. Photo by Qi Lin.] Facing East does not explore any projects in detail but articulates the broad tensions that are shaping the design and construction of Africa’s new infrastructure and cities. While development aid from the West aimed to reduce poverty and improve quality-of-life, China’s efforts are purely for-profit ventures. There’s no guarantee that rising waters of growth will lift all boats equally. This may be best exemplified by the massive slums that grow around Africa’s cities, a product of economic growth—jobs are the in cities—combined with a lack of government planning or services. Hulshof and Roggeveen cite a figure that three quarters of urban Africans live in such slums. This points to the second tension underscored by Facing East : unlike China, Africa is a diverse collection of cultures, governments, religions, and economies. Aerial view of Kilamba New City. [Photo courtesy of Michiel Hulshof and Daan Roggeveen] Kilamba New City, a housing development for 500, 000 located outside the Angolan capital of Luanda, could have easily been lifted straight from Shanghai or Chongqing. [Photo courtesy of Michiel Hulshof and Daan Roggeveen] View of the Kenya Commercial Bank Headquarters construction site in Nairobi. [Photo courtesy of Michiel Hulshof and Daan Roggeveen] View of Thika Superhighway, built by Chinese contractors in Nairobi. [Photo courtesy of Michiel Hulshof and Daan Roggeveen] Chinese managers oversee Ethiopian workers in this shoe factory in the Eastern Industry Zone—a a Special Economic Zone modeled after Shenzhen. [Photo courtesy of Michiel Hulshof and Daan Roggeveen] For example, Kilamba New City, a housing development for 500, 000 located outside the Angolan capital of Luanda, could’ve been lifted from Shanghai or Chongqing. But will its inhabitants finds the same industrial jobs that drive China’s growth? Will global economics and a host of supporting infrastructure—governmental, physical, and human—make it prosperous? These are difficult questions that only time will answer. Nevertheless, Facing East  presents two very different portraits that help give visual substance to that question. The first is physical: sprawling grids of roads, fields of cruciform housing towers, sinuous curves of highways and hardtop, and thick webs of scaffolding. These scenes could’ve been captured anywhere in China, today or ten years ago, but the second portrait records Africans caught in that growth. It’s a Chinese stage but the actors are all-new. Facing East: Chinese Urbanism in Africa is on view at Storefront for Art and Architecture through August 1st.

Read More:
A Startling Portrait of African Cities—And How China is Building Them