Google experimenting with spy-resistant encrypted Google Drive

CNet’s Declan McCullagh reports on a rumor that Google is testing a system for encrypting its users’ files on Google Drive; they are reportedly considering the move as a means of making it harder for government spies to harvest user-data.        

Read More:
Google experimenting with spy-resistant encrypted Google Drive

Human-powered helicopter takes the Sikorsky prize

The Sikorsky prize for human-powered helicopters has been claimed by a Kickstarter-funded startup called Aerovelo. Aerovelo’s founders, Canadians Todd Reichert and Cameron Robertson, won the $250, 000 purse for the 30-second flight of Atlas, a huge quadrotor with a bike in the middle whose flight is an absolute marvel to behold.        

More:
Human-powered helicopter takes the Sikorsky prize

RIAA lies about Pandora’s royalty rates

Have you heard a lot of Internetular argle-bargle about Pandora’s crazy-low royalty rates? How they compare unfavorably to satellite rates, and how the company’s trying to cut them? You have? Me too. Turns out (unsurprisingly), it’s RIAA lies. For example, the comparison to satellite streaming rates is pure spin — it compares the rate of sending a song to every person turned into that satellite station to a single person listening to a Pandora stream. It would be pretty surprising if Pandora’s per-listener rates weren’t a fraction of the rates paid by satellite radio for a whole audience. And the business about trying to cut royalties just isn’t true, either: The next issue concerns the publishing side. Historically, Pandora has paid essentially the same rate as all other forms of radio, a rate established unilaterally by the performing rights organizations, ASCAP and BMI, in the late 1990s. In November of last year, following a lengthy negotiation, Pandora agreed with ASCAP to a new rate, an increase over the prior amount, and shook hands with ASCAP management. Not only was our hand-shake agreement rejected by the ASCAP board, but shortly thereafter we were subjected to a steady stream of “withdrawals” by major publishers from ASCAP and BMI seeking to negotiate separate and higher rates with Pandora, and only Pandora. This move caused us to seek the protection of the rate, also recently negotiated, enjoyed by the online radio streams of broadcast radio companies. It’s important to note that these streams represent 96% of the Internet radio listening hours among the top 20 services outside of Pandora (talk about an un-level playing field). We did not enter this period looking for a lower rate – we agreed to a higher rate. But in a sad irony, the actions of a few small, but powerful publishers seeking to gain advantage for themselves has caused all songwriters’ royalties to go down. Any characterization of Pandora as being out to cut publishing rates flies in the face of the facts. Pandora and Royalties ( via Techdirt )        

See original article:
RIAA lies about Pandora’s royalty rates

Digital Grotesque: complex, 3D-printed room

Digital Grotesque is an ambitious architectural project using 3D printers and game-of-life-style algorithms to produce a room whose walls, baseboards, ceiling and moldings are all a-crawl with the most astonishing array of forms and complexities. They’ve completed a 1:3 prototype, which is presently on exhibit in Basel, and are proceeding to print out the full-scale item. the prototypes show a regard for both material sensitivity and the limits of technologically manipulated form– millions of grains of sand bind together to create a new typology of sandstone and subsequently treated to be glazed and gilded. drawing from the algorithmic confines of the game of life and cell division, a set of simple geometries met with minimal parameters begets a highly involved form. the result is rich, shimmering composition ridden with impossible undercuts and a transcendental sense of the limits of technology. the term grotesque is derived from the unplanned complexities of a water-shaped grotto, itself a naturally occurring architecture long regarded for the uncanny presence of human-sized spaces in various landscapes. digital grotesque showcases 3-d printed room by michael hansmeyer ( Images: Digital Grotesque ) ( via Dvice )        

More:
Digital Grotesque: complex, 3D-printed room

Edward Snowden answers your questions

On the Guardian right now NSA whistleblower Edward Snowden is answering live questions from the world at large. 1) First, the US Government, just as they did with other whistleblowers, immediately and predictably destroyed any possibility of a fair trial at home, openly declaring me guilty of treason and that the disclosure of secret, criminal, and even unconstitutional acts is an unforgivable crime. That’s not justice, and it would be foolish to volunteer yourself to it if you can do more good outside of prison than in it. Second, let’s be clear: I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn’t declared war on the countries – the majority of them are our allies – but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we’re not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the “consent of the governed” is meaningless. The whistleblower behind the biggest intelligence leak in NSA history will be live online at 11am ET/4pm BST to answer your questions about the NSA surveillance revelations        

Read More:
Edward Snowden answers your questions

Ergonomic advice from the 17th century

The 1611 treatise ” A Nevv Booke, containing all sorts of hands vsvally written at this day in Christendome, as the English and French Secretary, the Roman, Italian, French, Spanish, high and low Dutch, Court and Chancerie hands: with Examples of each of them in their proper tongue and Letter. Also an Example of the true and iust proportion of the Romane Capitals. Collected by the best approued writers in these languages” is archived at the Folger Shakespeare Library and features extensive, cutting-edge 17th century advice on penmanship and ergonomics: Place your body right forward, as it shall be most seemly and easie for you: and tourne not you head too much aside, nor bed it downe too lowe, for auoyding of wearines and paine: and for such as haue occasion to sit long, I would wish them to sit soft, for their better enduring to write … Let not your pen be too full of inke, for feare of blotting: and when it writeth not cleane, or is ouer worne, either wipe it, or mend it: If you should write smaller, tourne your pen a little more a side, and write with the lower neb thereof. ‘Hovv Yov Ovght to Hold Your Penne’        

See more here:
Ergonomic advice from the 17th century

Schools and the cloud: will schools allow students to be profiled and advertised to in the course of their school-day?

Kate sez, “Technology companies are moving rapidly to get tools like email and document creation services into schools. This link to a recent survey of schools in the UK shows that use of such technology is expected to bring significant educational and social benefits. However, it also reveals that schools have deep concerns that providers of these services will mine student emails, documents or web browsing behaviour to build profiles for commercial purposes, such as serving advertisements. When data mining is done for profit, the relationship between the data miner and the consumer is simply a market transaction. As long as both parties are free to choose whether and when they wish to engage in such transactions, there is no reason to forbid them or place undue obstacles in their path. However, when children are using certain services at school and can neither consent to, control or even properly understand the data mining that is taking place, a clear line against such practices must be drawn, particularly when their data will be used by businesses to make a profit.” UK School Opinions of Cloud Services and Student Privacy [PDF] ( Thanks, Kate ! )        

Excerpt from:
Schools and the cloud: will schools allow students to be profiled and advertised to in the course of their school-day?

Anatomy of a password-crack, part II

Ars Technica’s Nate Anderson Dan Goodin follows up on Nate Anderson’s excellent piece on the nuts and bolts of password cracking with a further attempt to decrypt an encrypted password file leaked from LivingSocial, this time with the aid of experts. The password file they were working on was encrypted with the relatively weak (and now deprecated) SHA1 hashing algorithm, and they were only attacking it with a single GPU on a commodity PC, and were able to extract over 90% of the passwords in the file. The discussion of the guesswork and refinement techniques used in extracting passwords is absolutely fascinating and really is a must-read. However, the whole exercise is still a bit inconclusive — in the end, we know that a badly encrypted password file is vulnerable to an underpowered password-cracking device. But what we need to know is whether a well-encrypted password file will stand up to a good password-cracking system. The specific type of hybrid attack that cracked that password is known as a combinator attack. It combines each word in a dictionary with every other word in the dictionary. Because these attacks are capable of generating a huge number of guesses—the square of the number of words in the dict—crackers often work with smaller word lists or simply terminate a run in progress once things start slowing down. Other times, they combine words from one big dictionary with words from a smaller one. Steube was able to crack “momof3g8kids” because he had “momof3g” in his 111 million dict and “8kids” in a smaller dict… What was remarkable about all three cracking sessions were the types of plains that got revealed. They included passcodes such as “k1araj0hns0n,” “Sh1a-labe0uf,” “Apr!l221973,” “Qbesancon321,” “DG091101%,” “@Yourmom69,” “ilovetofunot,” “windermere2313,” “tmdmmj17,” and “BandGeek2014.” Also included in the list: “all of the lights” (yes, spaces are allowed on many sites), “i hate hackers,” “allineedislove,” “ilovemySister31,” “iloveyousomuch,” “Philippians4:13,” “Philippians4:6-7,” and “qeadzcwrsfxv1331.” “gonefishing1125” was another password Steube saw appear on his computer screen. Seconds after it was cracked, he noted, “You won’t ever find it using brute force.” Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”        

See the article here:
Anatomy of a password-crack, part II

Japanese folk music glitch hop

Daniel Ryan describes his music as “a mix of Japanese folk music and glitch hop.” This isn’t normally my sort of thing — I pretty much only listen to music with words — but I played this one three times in a row this morning. There’s a lot of clever stuff going on here that I lack the vocabulary to describe but possess the aesthetic apparatus to appreciate. According to one redditor, the folk song is this track off the Samurai Champloo soundtrack. Nagasaki        

See the article here:
Japanese folk music glitch hop