New effort to fully audit TrueCrypt raises over $16,000 in a few short weeks

For nearly a decade now, TrueCrypt has been one of the trusty tools in a security-minded user’s toolkit. There’s just one problem, though. No one knows who created the software, and worse still, no one has ever conducted a full security audit on it—until now. Since last month, a handful of cryptographers have newly discussed problems and alternatives to the popular application, which lead on Monday to a public call to perform a full security audit on TrueCrypt. As of Tuesday afternoon, that fundraiser reached over $16,000, making a proper check more likely. Much of those funds came from a single $10,000 donation from an Atlanta-based security firm. “We’re now in a place where we have nearly—but not quite enough—to get a serious audit done,” wrote Matthew Green , a  well-known cryptography professor at Johns Hopkins University, on Twitter. Read 3 remaining paragraphs | Comments        

See original article:
New effort to fully audit TrueCrypt raises over $16,000 in a few short weeks

Facebook to rip search opt-out from under those who were using it

Here’s the dialog you’ll see if you were opted out of search, when Facebook gets around to opting you back in. Facebook If you checked that box saying you don’t want to appear in Facebook search results, get ready: soon, that choice is going away. Facebook announced in a blog post Thursday that it’s removing the ability to opt out of appearing in search results, both for friends and globally, for those who’ve had it enabled. Facebook actually removed the search opt-out for everyone who didn’t have it enabled early this year, around the time it introduced Graph Search . Now, ten months later, Facebook is giving the boot to anyone who actually cared enough to opt out, referring to the checkbox as an “old search setting.” Facebook claims that less than one percent of users were taking advantage of the feature. In simpler times, Facebook was smaller and easier to navigate, and everyone had a privacy setting asking “Who can look up your timeline by name?” Now that there are so many profiles that users become confused when they know they have a friend or know someone in a group, but try to find them by search and they don’t appear, says Facebook. Read 1 remaining paragraphs | Comments        

See the article here:
Facebook to rip search opt-out from under those who were using it

Obamacare site hits reset button on passwords as contractors scramble

Getting to this page on the Healthcare.gov site is just the start of the battle for would-be insurance customers. Sean Gallagher Amid all the attention, bugs, and work happening at Healthcare.gov in light of the Affordable Care Act, potential registrants talking to phone support today have been told that all user passwords are being reset to help address the site’s login woes. And the tech supports behind Healthcare.gov will be asking more users to act in the name of fixing the site, too. According to registrants speaking with Ars, individuals whose logins never made it to the site’s database will have to re-register using a different username, as their previously chosen names are now stuck in authentication limbo. The website for the Affordable Care Act (aka “Obamacare”) launched just last week. With all the scrutiny and debate happening, if ever there was a website launch that was “too big to fail, ” this was it.  So, of course, it did—depending on how you define “failure.” The inability of Obamacare portals to keep up with the traffic demands initially put upon them has been seized by politicians and conservative pundits as evidence that Obamacare “is not ready for prime time” in the words of Sen. Orrin Hatch (R-Utah). Now, a week later, the site appears to be stabilizing, with waiting times dropping dramatically for those who haven’t been able to register before. A test of the site this morning had me waiting four minutes to get to the signup page; others got on instantly. But problems persist beyond the front door. The contractors responsible for the exchange—CGI Federal for the website itself, Quality Software Systems Inc. (QSSI) for the information “hub” that determines eligibility for programs and provides the data on qualified insurance plans, and Booz Allen for enrollment and eligibility technical support—are scrambling to deploy more fixes. Technical support call center operators continue to handle an onslaught of calls from users who can’t get back into the system after registering. Read 13 remaining paragraphs | Comments        

Continue reading here:
Obamacare site hits reset button on passwords as contractors scramble

US indicts suspected Anonymous members for leading 2010 “Operation Payback”

Back in 2010, “Operation Payback” involved a series of distributed denial of service (DDoS) attacks against anti-piracy websites as a way to protest what some members of Anonymous viewed as an overly greedy intellectual property industry. The attack was later revived in early 2011. On Thursday, 13 men were indicted (PDF) in federal court in Virginia on one count of Conspiracy to Intentionally Cause Damage to a Protected Computer. They are accused of using the well-known Low-Orbit Ion Cannon application to conduct DDoS attacks on the Recording Industry Association of America, the Motion Picture Association of America, the United States Copyright Office of the Library of Congress, Visa, MasterCard, and Bank of America. According to the indictment, the victims suffered “significant damage, ” noting specifically that MasterCard suffered at least $5, 000 in losses during a one-year period. (For the record, MasterCard profited $415 million in 2010.) Read 8 remaining paragraphs | Comments        

View post:
US indicts suspected Anonymous members for leading 2010 “Operation Payback”

Ubuntu’s controversial Mir window system won’t ship with 13.10 desktop

Ubuntu 13.04. Ubuntu 13.10 (“Saucy Salamander”) is scheduled for a final release on Oct. 17, but the OS won’t include what was perhaps the biggest and most controversial change planned for the desktop environment. Canonical announced in March that it would replace the X window system with Mir, a new display server that will eventually work across phones, tablets, and desktops. It has proven controversial, with Intel rejecting Ubuntu patches because Canonical’s development of Mir meant it stopped supporting Wayland as a replacement for X. Mir will ship by default on Ubuntu Touch for phones (but not tablets) this month, allowing a crucial part of Ubuntu’s mobile plans to go forward. However, it won’t be the default system on the desktop, because XMir—an X11 compatibility layer for Mir—isn’t yet able to properly support multi-monitor setups. This is a step back from Canonical’s original plan to “Deliver Mir + XMir + Unity 7 on the [13.10] desktop for those cards that supported it, and fall back to X for those that don’t.” Read 5 remaining paragraphs | Comments        

Link:
Ubuntu’s controversial Mir window system won’t ship with 13.10 desktop

Nvidia seeks peace with Linux, pledges help on open source driver

Will Nvidia give Linus a reason to lower his finger? aaltouniversityace Few companies have been the target of as much criticism in the Linux community as Nvidia. Linus Torvalds himself last year called Nvidia the ” single worst company ” Linux developers have ever worked with, giving the company his middle finger in a public talk. Nvidia is now trying to get on Linux developers’ good side. Yesterday, Nvidia’s Andy Ritger e-mailed developers of Nouveau, an open source driver for Nvidia cards that is built by reverse engineering Nvidia’s proprietary drivers. Ritger wrote that “NVIDIA is releasing public documentation on certain aspects of our GPUs, with the intent to address areas that impact the out-of-the-box usability of NVIDIA GPUs with Nouveau. We intend to provide more documentation over time, and guidance in additional areas as we are able.” The first step was releasing documentation of the Device Control Block (DCB) layout in Nvidia’s VBIOS, describing the board’s topology and display connectors. Ritger continued: Read 5 remaining paragraphs | Comments        

Continue reading here:
Nvidia seeks peace with Linux, pledges help on open source driver

The new lifecycle of your old iPhone

Clifford Joseph Kozak After handling the entire digital expression of your life for one, two, or more years, the most mercenary and practical end that a smartphone can meet is to be sold off secondhand. Wheeling and dealing with used personal electronics is not a new business, but in the last few years, it’s been writ very large with the glut of tiny hand-computers we’re all using lately. Where those devices go after you sell them into wanting hands (Gazelle and NextWorth are two services that make their business on these transactions) has shifted a bit over the years. In the early days of the iPhone, companies were built on the activity of breaking down old iPhones into parts for repairing those still in use (or so some of the shadier companies claimed). Per a report in the New York Times back in 2008, one company named PCS Wireless claimed that 94-95 percent of the second-hand phones it obtained were broken down into parts. The source claimed at the time that the screens alone could fetch $200. Read 12 remaining paragraphs | Comments        

Continue reading here:
The new lifecycle of your old iPhone

Intel’s Atom CPUs finally get serious with the new Bay Trail architecture

Intel News from a certain other company has overshadowed the 2013 Intel Developer Forum a bit this week, but Intel is hardly sitting still. For well over a year now, the company has been intensifying its efforts in the mobile space, first with Android phones and later with both Windows and Android tablets. The chips the company has been using to make these strides into mobile have all used the Atom branding, which has come a long way since its inclusion in the low-rent netbooks of years past. Chips like Clover Trail and Clover Trail+ have proven that an Intel phone’s battery life can hang with ARM chips from companies like Qualcomm and Nvidia, even if their performance sometimes leaves something to be desired. Now, Intel is ready to take the next step. We’ve talked about its next-generation Atom system-on-a-chip (SoC) for tablets (codenamed Bay Trail ) before, and at IDF this week the company finally announced specific Bay Trail SKUs and devices that will include the chips when they ship later this year. Read 25 remaining paragraphs | Comments        

Continued here:
Intel’s Atom CPUs finally get serious with the new Bay Trail architecture

Fingerprints as passwords: New iPhone Touch ID gets mixed security verdict (Updated)

Chad Miller Of all the new features of Apple’s new iPhone 5S , few have drawn more attention than the built-in fingerprint scanner known as Touch ID. Apple billed it as an “innovative way to simply and securely unlock your phone with just the touch of a finger.” More breathless accounts were calling it a potential ” death knell for passwords ” or using similarly overblown phrases . Until the new phones are in the hands of skilled hackers and security consultants, we won’t know for sure if Touch ID represents a step forward from the security and privacy offered by today’s iPhones. I spent several hours parsing the limited number of details provided by Apple and speaking to software and security engineers. I found evidence both supporting and undermining the case that the fingerprint readers are an improvement. The thoughts that follow aren’t intended to be a final verdict—the proof won’t be delivered until we see how the feature works in the real world. The pros I’ll start with the encouraging evidence. Apple said Touch ID is powered by a laser-cut sapphire crystal and a capacitive touch sensor that is able to take a high-resolution image based on the sub-epidermal layers of a user’s skin. While not definitive, this detail suggests Apple engineers may have designed a system that is not susceptible to casual attacks. If the scans probe deeply enough, for instance, Touch ID probably wouldn’t be tricked by the type of clones that are generated from smudges pulled off a door knob or computer monitor. In 2008, hackers demonstrated just how easy it was to create such clones when they published more than 4, 000 pieces of plastic film containing the fingerprint of a German politician who supported the mandatory collection of citizens’ unique physical characteristics. By slipping the foil over their own fingers, critics were able to mimic then-Interior Minister Wolfgang Schauble’s fingerprint when touching certain types of biometric readers. Read 15 remaining paragraphs | Comments        

Original post:
Fingerprints as passwords: New iPhone Touch ID gets mixed security verdict (Updated)

Virtual Perfection: Why 8K resolution per eye isn’t enough for perfect VR

So you want me to squeeze two 8K displays into this space? No problem! Give me a decade or so… “Without going into a rant, the term ‘Retina Display’ is garbage, I think.” Palmer Luckey, the founder and creator of the Oculus Rift, is a bit of a perfectionist when it comes to creating the best possible virtual reality experience. So when our recent interview turned toward the ideal future for a head-mounted display—a theoretical “perfect” device that delivers everything he could ever dream of—he did go on a little rant about what we currently consider “indistinguishable” pixels. “There is a point where you can no longer distinguish individual pixels, but that does not mean that you cannot distinguish greater detail, ” he said. “You can still see aliasing on lines on a retina display. You can’t pick out the pixels, but you can still see the aliasing. Let’s say you want to have an image of a piece of hair on the screen. You can’t make it real-size… it would still look jaggy and terrible. There’s a difference between where you can’t see pixels and where you can’t make improvements.” Read 13 remaining paragraphs | Comments        

View original post here:
Virtual Perfection: Why 8K resolution per eye isn’t enough for perfect VR