Court Rules Google’s Search Results Qualify As Free Speech

wabrandsma writes with this news from Ars Technica: The regulation of Google’s search results has come up from time to time over the past decade, and although the idea has gained some traction in Europe (most recently with “right to be forgotten” laws), courts and regulatory bodies in the U.S. have generally agreed that Google’s search results are considered free speech. That consensus was upheld last Thursday, when a San Francisco Superior Court judge ruled in favor of Google’s right to order its search results as it sees fit. Read more of this story at Slashdot.

Visit site:
Court Rules Google’s Search Results Qualify As Free Speech

1 percent of recording artists earn 77 percent of recorded music revenue

Thanks to the internet, there are now more ways than ever to get music. But this hasn’t allowed smaller artists to get a bigger share of the financial pie. In fact, the top 1 percent of artists now collect 77 percent of all revenue from recorded music. Read more…

Read More:
1 percent of recording artists earn 77 percent of recorded music revenue

Rosetta’s Lander Has Found Organic Molecules on a Comet 

Philae, the probe that landed on a comet as part of the Rosetta mission, has detected organic molecules in the comet’s atmosphere. We don’t know exactly what the molecules are yet, but they could hold a key to early life on Earth. Hell, this is a big reason we sent Rosetta all the way to a lonely comet in the first place. Read more…

Continued here:
Rosetta’s Lander Has Found Organic Molecules on a Comet 

12 Emoji That You’re Probably Using Wrong

New York ‘s cover story this week proclaims, “Smile, You’re Speaking Emoji.” But are you? Do you understand the difference between the tongue-out emoji and the winking tongue-out emoji? Today’s children communicate almost exclusively in these little smileys , and soon the weak emoji-illiterates in our society will be left behind. Read more…

Originally posted here:
12 Emoji That You’re Probably Using Wrong

US DOE Sets Sights On 300 Petaflop Supercomputer

dcblogs writes U.S. officials Friday announced plans to spend $325 million on two new supercomputers, one of which may eventually be built to support speeds of up to 300 petaflops. The U.S. Department of Energy, the major funder of supercomputers used for scientific research, wants to have the two systems – each with a base speed of 150 petaflops – possibly running by 2017. Going beyond the base speed to reach 300 petaflops will take additional government approvals. If the world stands still, the U.S. may conceivably regain the lead in supercomputing speed from China with these new systems. How adequate this planned investment will look three years from now is a question. Lawmakers weren’t reading from the same script as U.S. Energy Secretary Ernest Moniz when it came to assessing the U.S.’s place in the supercomputing world. Moniz said the awards “will ensure the United States retains global leadership in supercomputing.” But Rep. Chuck Fleischmann (R-Tenn.) put U.S. leadership in the past tense. “Supercomputing is one of those things that we can step up and lead the world again, ” he said. Read more of this story at Slashdot.

Original post:
US DOE Sets Sights On 300 Petaflop Supercomputer

81% of Tor Users Can Be De-anonymized By Analysing Router Information

An anonymous reader writes A former researcher at Columbia University’s Network Security Lab has conducted research since 2008 indicating that traffic flow software included in network routers, notably Cisco’s ‘Netflow’ package, can be exploited to deanonymize 81.4% of Tor clients. Professor Sambuddho Chakravarty, currently researching Network Anonymity and Privacy at the Indraprastha Institute of Information Technology, uses a technique which injects a repeating traffic pattern into the TCP connection associated with an exit node, and then compares subsequent aberrations in network timing with the traffic flow records generated by Netflow (or equivalent packages from other router manufacturers) to individuate the ‘victim’ client. In laboratory conditions the success rate of this traffic analysis attack is 100%, with network noise and variations reducing efficiency to 81% in a live Tor environment. Chakravarty says: ‘it is not even essential to be a global adversary to launch such traffic analysis attacks. A powerful, yet non- global adversary could use traffic analysis methods [] to determine the various relays participating in a Tor circuit and directly monitor the traffic entering the entry node of the victim connection.’ Read more of this story at Slashdot.

More:
81% of Tor Users Can Be De-anonymized By Analysing Router Information

Speed Up CrashPlan Backups and Free Up CPU Power with These Scripts

We love CrashPlan for its inexpensive, unlimited and automated backup service, but many of us have seen terrible upload speeds or high CPU usage when CrashPlan is running. This might be the fix. Read more…

Read this article:
Speed Up CrashPlan Backups and Free Up CPU Power with These Scripts

A Man Going Deaf Can Hear Wi-Fi Signals, and Here’s How They Sound

Losing your hearing can be a frighteningly isolating experience. But instead of trying to replace the audible landscape he began losing at age 20, science writer Frank Swain decided to find a way to listen in on something humans can’t hear: the hum of Wi-Fi all around us. Read more…

Read More:
A Man Going Deaf Can Hear Wi-Fi Signals, and Here’s How They Sound

What the Ingredients On Your Shampoo Bottle Actually Mean

That shampoo you’re lathering into your hair may claim that it’s packed with “all-natural ingredients, ” but the label tells a different story. DMDM hydantoin? Ammonium lauryl sulphate? What is this stuff anyhow? Read more…

View original post here:
What the Ingredients On Your Shampoo Bottle Actually Mean

Tor Project Mulls How Feds Took Down Hidden Websites

HughPickens.com writes: Jeremy Kirk writes at PC World that in the aftermath of U.S. and European law enforcement shutting down more than 400 websites (including Silk Road 2.0) which used technology that hides their true IP addresses, Tor users are asking: How did they locate the hidden services? “The first and most obvious explanation is that the operators of these hidden services failed to use adequate operational security, ” writes Andrew Lewman, the Tor project’s executive director. For example, there are reports of one of the websites being infiltrated by undercover agents and one affidavit states various operational security errors.” Another explanation is exploitation of common web bugs like SQL injections or RFIs (remote file inclusions). Many of those websites were likely quickly-coded e-shops with a big attack surface. Exploitable bugs in web applications are a common problem says Lewman adding that there are also ways to link transactions and deanonymize Bitcoin clients even if they use Tor. “Maybe the seized hidden services were running Bitcoin clients themselves and were victims of similar attacks.” However the number of takedowns and the fact that Tor relays were seized could also mean that the Tor network was attacked to reveal the location of those hidden services. “Over the past few years, researchers have discovered various attacks on the Tor network. We’ve implemented some defenses against these attacks (PDF), but these defenses do not solve all known issues and there may even be attacks unknown to us.” Another possible Tor attack vector could be the Guard Discovery attack. The guard node is the only node in the whole network that knows the actual IP address of the hidden service so if the attacker manages to compromise the guard node or somehow obtain access to it, she can launch a traffic confirmation attack to learn the identity of the hidden service. “We’ve been discussing various solutions to the guard discovery attack for the past many months but it’s not an easy problem to fix properly. Help and feedback on the proposed designs is appreciated.” According to Lewman, the task of hiding the location of low-latency web services is a very hard problem and we still don’t know how to do it correctly. It seems that there are various issues that none of the current anonymous publishing designs have really solved. “In a way, it’s even surprising that hidden services have survived so far. The attention they have received is minimal compared to their social value and compared to the size and determination of their adversaries.” Read more of this story at Slashdot.

Read the original:
Tor Project Mulls How Feds Took Down Hidden Websites