Apple can decrypt iPhones for cops; Google can remotely “reset password” for Android devices

Apple apparently has the power to decrypt iPhone storage in response to law-enforcement requests, though they won’t say how. Google can remotely “reset the password” for a phone for cops, too: Last year, leaked training materials prepared by the Sacramento sheriff’s office included a form that would require Apple to “assist law enforcement agents” with “bypassing the cell phone user’s passcode so that the agents may search the iPhone.” Google takes a more privacy-protective approach: it “resets the password and further provides the reset password to law enforcement,” the materials say, which has the side effect of notifying the user that his or her cell phone has been compromised. Ginger Colbrun, ATF’s public affairs chief, told CNET that “ATF cannot discuss specifics of ongoing investigations or litigation. ATF follows federal law and DOJ/department-wide policy on access to all communication devices.” …The ATF’s Maynard said in an affidavit for the Kentucky case that Apple “has the capabilities to bypass the security software” and “download the contents of the phone to an external memory device.” Chang, the Apple legal specialist, told him that “once the Apple analyst bypasses the passcode, the data will be downloaded onto a USB external drive” and delivered to the ATF. It’s not clear whether that means Apple has created a backdoor for police — which has been the topic of speculation in the past — whether the company has custom hardware that’s faster at decryption, or whether it simply is more skilled at using the same procedures available to the government. Apple declined to discuss its law enforcement policies when contacted this week by CNET. It’s not clear to me from the above whether Google “resetting the password” for Android devices merely bypasses the lock-screen or actually decrypts the mass storage on the phone if it has been encrypted. I also wonder if the “decryption” Apple undertakes relies on people habitually using short passwords for their phones — the alternative being a lot of screen-typing in order to place a call. Apple deluged by police demands to decrypt iPhones [Declan McCullagh/CNet] ( via /. )        

Visit link:
Apple can decrypt iPhones for cops; Google can remotely “reset password” for Android devices

Astronaut Chris Hadfield performs David Bowie’s “Space Oddity” on the ISS

Astronaut Chris Hadfield — the tweeting , tumbling Canadian astronaut who’s a one-dude astro-ambassador from the space programme to the Internet — has produced and released a video of his own performance of David Bowie’s “Space Oddity” (AKA the “Major Tom song”) on the ISS. He adapts the lyrics a bit to his own situation — and changes out the whole dying-in-space chorous — but is otherwise pretty faithful. From the credits, it appears that David Bowie gave permission for this, though that’s not entirely clear. I would think that not even a major record label would be hamfisted and cack-handed enough to send a takedown notice over this one (it’s been suggested for Boing Boing more than any other link in my memory), but I’m prepared to be surprised. Space Oddity        

Read More:
Astronaut Chris Hadfield performs David Bowie’s “Space Oddity” on the ISS

HOWTO build a working digital computer out of paperclips (and stuff)

Windell at Evil Mad Scientist Labs has dredged up an amazing project book from the Internet Archive: How to Build a Working Digital Computer (1967) (by Edward Alcosser, James P. Phillips, and Allen M. Wolk) contains a full set of instructions for building a working computer out of paperclips and various bits and bobs from the local hardware store. You can even use paperclips for switches (though, as Windell notes, “Arrays of paperclip logic gates can get pretty big, pretty fast.”) The instructions include a read-only drum memory for storing the computer program (much like a player piano roll), made from a juice can, with read heads made from bent paper clips.   A separate manually-operated “core” memory (made of paper-clip switches) is used for storing data.   So can this “paper clip” computer actually built, and if so, would it work?  Apparently yes, on both counts. Cleveland youngsters Mark Rosenstein and Kenny Antonelli built one named “ Emmerack ” in 1972 (albeit substituting Radio Shack slide switches for most of the paper clips), and another was built in 1975 by the  Wickenburg High School Math Club  in Arizona.  And, at least one modern build has been completed, as you can see on YouTube . How to Build a Working Digital Computer… out of paperclips ( via O’Reilly Radar )        

Read more here:
HOWTO build a working digital computer out of paperclips (and stuff)

Fair use decision: remixing is legal even when there is no intent to comment or parody original work

A Second Circuit Appeals Court judge has handed down a landmark fair use decision in Cariou v. Prince . Prince, a collagist, remixed some of Cariou’s photos and sold them for large sums. Cariou argued that the new works were not fair because Prince did not create his collages as a comment on the original (one of the factors judges can consider in fair use cases is whether the new work is a commentary or parody). The lower court agreed, and ordered destruction of the show catalogs and a ban on hanging the new works. But the appeals court overturned, and held that a use can be fair even when it doesn’t comment on the original. “We conclude that the district court applied the incorrect standard to determine whether Prince’s artworks make fair use of Cariou’s copyrighted photographs,” writes Judge B.D. Parker in the decision, which was released this morning. “We further conclude that all but five of Prince’s works do make fair use of Cariou’s copyrighted photographs. With regard to the remaining five Prince artworks, we remand the case to the district court to consider, in the first instance, whether Prince is entitled to a fair use defense.” “This decision absolutely clarifies that the law does not require that a new work of art comment on any of its source material to qualify as fair use,” attorney Virginia Rutledge told A.i.A. by phone this morning after a preliminary survey of the decision. “This is a major win for Prince on at least two counts,” NYU art law professor Amy Adler told A.i.A. via e-mail. (She consulted on the case but was speaking for herself.) “The court decided that artwork does not need to comment on previous work to qualify as fair use, and that Prince’s testimony is not the dispositive question in determining whether a work is transformative. Rather the issue is how the work may reasonably be perceived. This is the right standard because it takes into account the underlying public purpose of copyright law, which should not be beholden to statements of individual intent but instead consider the value that all of us gain from the creation of new work.” Richard Prince Wins Major Victory in Landmark Copyright Suit [Brian Boucher/Art in America] ( Thanks, Tim ! )        

Read the original:
Fair use decision: remixing is legal even when there is no intent to comment or parody original work

Noodle Robots Replacing Workers In Chinese Restaurants

kkleiner writes “Recently developed noodle-making robots have now been put into operation in over 3,000 restaurants in China. Invented by a noodle restaurant owner, each unibrow-sporting robot currently costs 10,000 yuan ($1,600), which is only three months wages for an equivalent human noodle cook. As the cost of the robot continues to drop, more noodle shops are bound to displace human workers for the tirelessly working cheaper robots.” Read more of this story at Slashdot.

See the article here:
Noodle Robots Replacing Workers In Chinese Restaurants

American public schools in 9 states sharing every conceivable personal detail of their students with third parties

Greg Costikyan sez, inBloom , a Gates-funded non-profit to harness data to improve grade school education, has partnered with New York and eight other states to encourage the development of apps to “further education” by using intimate data about students, without parental consent and with no ability for parents to opt out. Among the data shared are name, address, phone numbers, test scores, grades, economic status, test scores, disciplinary records, picture, email, race, developmental delay… just about everything conceivable , and all specific, none of it anonymized. inBloom has arrangements with nine states (New York, Massachusetts, Louisiana, Colorado, Illinois, North Carolina, Georgia, Delaware and Kentucky) to do this. The XML schema used are downloadable here . Anyone can register as a developer and start using “sample” data, but “real” data is supposedly only available to developers with contracts with a school board. But this includes for-profit, third party developers, such as, say, Amplify, a News Corp subsidiary with a contract with New York. And it doesn’t appear there are any constraints on their use of this data. Who is Stockpiling and Sharing Private Information About New York Students? ( Thanks, Greg! )        

Excerpt from:
American public schools in 9 states sharing every conceivable personal detail of their students with third parties

DDoS storm breaks records at 300 Gbps

The Internet has been groaning under the weight of a massive distributed denial of service (DDoS) attack on the Domain Name Service, apparently aimed at anti-spam vigilantes Spamhaus, in retaliation for their blacklisting of Dutch free speech hosting provider Cyberbunker. At 300 mbps, the DDoS is the worst in public Internet history. “These things are essentially like nuclear bombs,” said Matthew Prince, chief executive of Cloudflare. “It’s so easy to cause so much damage.” The so-called distributed denial of service, or DDoS, attacks have reached previously unknown magnitudes, growing to a data stream of 300 billion bits per second. “It is a real number,” Mr. Gilmore said. “It is the largest publicly announced DDoS attack in the history of the Internet.” Spamhaus, one of the most prominent groups tracking spammers on the Internet, uses volunteers to identify spammers and has been described as an online vigilante group. In the past, blacklisted sites have retaliated against Spamhaus with denial-of-service attacks, in which they flood Spamhaus with traffic requests from personal computers until its servers become unreachable. But in recent weeks, the attackers hit back with a far more powerful strike that exploited the Internet’s core infrastructure, called the Domain Name System, or DNS. As bad as this is, it could be a lot worse. An anonymous paper called Internet Census 2012: Port scanning /0 using insecure embedded devices reports on a researcher’s project to scan every IPv4 address for publicly available machines that will accept a telnet connection and yield up a root login to a default password. The researcher reports that 1.2 million such devices are available online (s/he compromised many of these machines in order to run the census). These machines are things like printers and routers with badly secured firmware, visible on the public net. They are often running an old version of GNU/Linux and can be hijacked to form part of a staggeringly large botnet that would be virtually unkillable, since the owners of these devices are vanishingly unlikely to notice that they are silently running attackware, and the devices themselves are completely unregarded. Firm Is Accused of Sending Spam, and Fight Jams Internet [NYT/John Markoff & Nicole Perlroth] ( via Hacker News )

View post:
DDoS storm breaks records at 300 Gbps

DIY cellphone

David Mellis at the High-Low Tech group at the MIT Media Lab built a DIY Cellphone, making a custom circuit-board and laser-cutting his own wooden case. The files are hosted on GitHub in case you’d like to try your hand at it. An exploration into the possibilities for individual construction and customization of the most ubiquitous of electronic devices, the cellphone. By creating and sharing open-source designs for the phone’s circuit board and case, we hope to encourage a proliferation of personalized and diverse mobile phones. Freed from the constraints of mass production, we plan to explore diverse materials, shapes, and functions. We hope that the project will help us explore and expand the limits of do-it-yourself (DIY) practice. How close can a homemade project come to the design of a cutting edge device? What are the economics of building a high-tech device in small quantities? Which parts are even available to individual consumers? What’s required for people to customize and build their own devices? The initial prototype combines a custom electronic circuit board with a laser-cut plywood and veneer enclosure. The phone accepts a standard SIM card and works with any GSM provider. Cellular connectivity is provided by the SM5100B GSM Module, available from SparkFun Electronics. The display is a color 1.8″, 160×128 pixel, TFT screen on a breakout board from Adafruit Industries. Flexures in the veneer allow pressing of the buttons beneath. Currently, the software supports voice calls, although SMS and other functionality could be added with the same hardware. The prototype contains about $150 in parts. Mellis’s Master’s thesis is “Case studies in the digital fabrication of open-source consumer electronic products” and includes a 3D printed mouse, fabbed speakers and a fabbed FM radio. High-Low Tech – DIY Cellphone ( via Hacker News ) ( Images: Laser-cut plywood and veneer case , a Creative Commons Attribution (2.0) image from mellis’s photostream; Making a call , a Creative Commons Attribution (2.0) image from mellis’s photostream )

See the article here:
DIY cellphone

Imagine Carl Sagan, Stephen Hawking and Arthur C. Clarke together in conversation. It happened.

Back in 1988, Magnus Magnusson (best name ever) somehow managed to bring three of the 20th Century’s most fascinating personalities together to discuss God, the Universe, and Everything Else . In the hour-long program, the three talked about the Big Bang theory, the connection between science and scifi, the rise of computer science, extraterrestrial intelligence, and the puzzle that is human existence. More »

See the article here:
Imagine Carl Sagan, Stephen Hawking and Arthur C. Clarke together in conversation. It happened.

Archaeologists Mistake Viking Brewhouses For Bathhouses

For years, archaeologists studying Viking remnants and artifacts in Britain had assumed that certain stone structures were bathhouses, or a kind of primitive sauna. But a husband-and-wife team has now thrown this thinking into question by suggesting that they weren’t bathhouses at all — that they were brewhouses where the Vikings made their beer. More »

See original article:
Archaeologists Mistake Viking Brewhouses For Bathhouses