Turkey orders block of Twitter’s IP addresses

Just a few days after Turkey’s scandal-rocked government banned Twitter by tweaking national DNS settings, the state has doubled down by ordering ISPs to block Twitter’s IP addresses , in response to the widespread dissemination of alternative DNS servers, especially Google’s 8.8.8.8 and 8.8.4.4 (these numbers were even graffitied on walls ). Following the ban, Turkey’s Twitter usage grew by 138 percent. Now that Twitter’s IP range is blocked, more Turkish Internet users are making use of Tor and VPNs, and they continue to use SMS for access to the service. It’s interesting that Prime Minister Recep Tayyip Erdoğan has singled out Twitter for his attacks (“Twitter, schmitter! We will wipe out Twitter . I don’t care what the international community says.”) Why not Facebook or Google Plus? I’m not certain, but my hypothesis is that Facebook and Google’s “real names” policy — which make you liable to disconnection from the service if you’re caught using an alias — make them less useful for political dissidents operating in an environment in which they fear reprisals. According to the Internet activist collective Telecomix, there also were reports that devices configured to use Google’s DNS service or other DNS providers outside the country were being hijacked to a local DNS server by the Wi-Fi network at Istanbul’s airport. The move has driven up the usage of VPN services and the Tor anonymizing network in Turkey. Telecomix has been providing a list of Tor gateways for Turkish users. Tor network metrics show a huge spike in users directly connecting to the Tor network over the past few days, growing from 25,000 users to 35,000 since March 19. Downloads of VPN software have also exploded with VPN apps for Apple’s iOS and Google’s Android becoming the most downloaded apps from their respective app stores in Turkey. After DNS change fails, Turkish government steps up Twitter censorship [Sean Gallagher/Ars Technica]        

Continue reading here:
Turkey orders block of Twitter’s IP addresses

Unless companies pay, their Facebook updates reach 6 percent of followers

Facebook continues to tighten the screws on the businesses that use the service to market to their customers. Independent research shows that new updates from businesses reach about six percent of the people who follow those businesses. It is rumored that Facebook intends to reduce this number to “between one and two percent” over time. Businesses that want to reach the people who follow them at higher rates will have to pay Facebook to reach them through paid advertisements. If you’re building your business’s marketing and customer relations strategy atop Facebook, take note — and remember that if you have a real website, all your readers see your posts, even if you don’t pay Facebook! Facebook declined to comment on the percentage of fans that see posts from a typical Facebook page (the last publicly disclosed figure was 16 percent in the summer of 2012), but the company admitted in December that posts from Pages are reaching less users. Facebook attributes this change to increased competition as more people and companies join its service. The typical user is inundated with 1,500 posts per day from friends and Pages, and Facebook picks 300 to present in the News Feed. Getting squeezed out are both posts from Pages and meme photos as Facebook shifts its focus to what it deems “high quality” content. The solution for brands with declining engagement, according to Facebook, is to buy ads. “Like many mediums, if businesses want to make sure that people see their content, the best strategy is, and always has been, paid advertising,” a spokeswoman said in an emailed statement. The Free Marketing Gravy Train Is Over on Facebook [Victor Luckerson/Time] ( Image: flaming LIKE , a Creative Commons Attribution Share-Alike (2.0) image from zaigee’s photostream )        

View the original here:
Unless companies pay, their Facebook updates reach 6 percent of followers

Gorgeous Map of the Internet: XKCD meets National Geographic

Martin Vargic has produced a gorgeous mashup of XKCD’s Map of Online Communities and the classic National Geographic Maps, producing a work of art that is a wonder to behold. It’s for sale on Zazzle , as a $37, 34″x22″ poster. I was originally inspired by map of the internet created by xkcd, showing most popular social networks as countries and regions, back in 2010. It was not my original idea, but I extended it to such a scale for the first time. I used photoshop for the majority of drawing. The base style of the map was inspired by the National Geographic Maps, I also used Winkel Tripel Projection and similar border coloring fashion. I created the map in quite a short time, three weeks to be exact. I often worked early in the morning, and I can say I really enjoyed it. I got the data about website sizes mainly from Alexa and similar online services. Currently, I am working on the next versions of the map, which will be even more ridiculously detailed than the previous one, and will encompass all major websites without any significant exceptions, it will be coming in mid-february. The map is divided into 2 distinctive parts; the eastern continent, “the old world” showcases software companies, gaming companies and some of the more real-life oriented websites. Western part, “the new world” is composed from two major continent, northern one showcasing social networks, search websites, video websites, blogs, forums and art websites. All major adult-oriented websites, in addition to varioius warez and torrent sites, are located on the southwestern continent of the map. In the very south of the map, there is located “Great Southern Land” of obsolete websites and online services. Outside the main map, there are also 4 minimaps showing NSA monitoring by country, most used browser, most used social network, and internet penetration by country. Map of the Internet 1.0. ( via IO9 )        

View original post here:
Gorgeous Map of the Internet: XKCD meets National Geographic

Android gives you the ability to deny your sensitive data to apps

Android privacy just got a lot better. The 4.3 version of Google’s mobile operating system now has hooks that allow you to override the permissions requested by the apps you install. So if you download a flashlight app that wants to harvest your location and phone ID , you can install it, and then use an app like AppOps Launcher to tell Android to withhold the information. Peter Ecklersley, a staff technologist at the Electronic Frontier Foundation, has written up a good explanation of how this works , and he attributes the decision to competitive pressure from Ios, which allows users to deny location data to apps, even if they “require” it during the installation process. I think that’s right, but not the whole story: Android has also always labored under competitive pressure from its free/open forks, like Cyanogenmod. In the days when Android didn’t allow tethering (as a sop to the mobile carriers, who are the gatekeepers to new phones for many people), Cyanogenmod signed up large numbers of users, simply by adding this functionality . Google added tethering to Android within a couple of versions. Some versions of Cyanogenmod have had the option tell your phone to lie to apps about its identity, location, and other sensitive information — a way to get around the “all or nothing” installation process whereby your the apps you install non-negotiably demand your “permission” to plunder this information. I’m not surprised to see the same feature moving into the main branch of Android. This dynamic is fascinating to me: Google has to balance all kinds of priorities in rolling out features and “anti-features” (no tethering, non-negotiable permissions) in Android, in order to please customers, carriers and developers. Free/open forks like Cyanogenmod really only need to please themselves and their users, and don’t have to worry so much about these other pressures (though now that Cyanogenmod is a commercial operation , they’ll probably need to start playing nice with carriers). But because Android competes with Cyanogenmod and the other open versions, Google can’t afford to ignore the featureset that makes them better than the official version. It’s a unique, and extremely beneficial outflow of the hybrid free/commercial Android ecosystem. In the early days, that model was at an improvement on its major competitor, Apple’s iOS, which didn’t even have a permissions model. But after various privacy scandals, Apple started forcing apps to ask for permission to collect data: first location and then other categories, like address books and photos. So for the past two years, the iPhone’s app privacy options have been miles ahead of Android’s. This changed with the release of Android 4.3, which added awesome new OS features to enhance privacy protection. You can unlock this functionality by installing a tool like App Ops Launcher. When you run it, you can easily control most of the privacy-threatening permissions your apps have tried to obtain. Want to install Shazam without having it track your location? Easy. Want to install SideCar without letting it read your address book? Done.2 Despite being overdue and not quite complete, App Ops Launcher is a huge advance in Android privacy. Its availability means Android 4.3+ a necessity for anyone who wants to use the OS while limiting how intrusive those apps can be. The Android team at Google deserves praise for giving users more control of the data that others can snatch from their pockets. Awesome Privacy Tools in Android 4.3+        

Continue reading here:
Android gives you the ability to deny your sensitive data to apps

Botnet of 20,000 point-of-sale machines

Details are emerging about Stardust, a piece of malicious software that targets point-of-sale credit-card processing machines. Stardust has reportedly compromised over 20,000 PoS machines and turned them into a easy-to-control botnet. The malware’s masters can monitor the botnet in realtime and issue fine-grained commands to its components, harvesting a titanic volume of payment card details. The discovery comes as researchers from a separate security firm called Arbor Networks published a blog post on Tuesday reporting an active PoS compromise campaign. The advisory is based on two servers found to be hosting Dexter and other PoS malware. Arbor researchers said the campaign looks to be most active in the Eastern Hemisphere. There was no mention of a botnet or of US restaurants or retailers being infected, so the report may be observing a campaign independent from the one found by IntelCrawler. It remains unclear how the attackers manage to initially infect PoS terminals and servers that make up the botnet. In the past, criminals have targeted known vulnerabilities in applications that many sellers of PoS software use to remotely administer customer systems. Weak administrator passwords, a failure to install security updates in a timely fashion, or unknown vulnerabilities in the PoS applications themselves are also possibilities. Credit card fraud comes of age with advances in point-of-sale botnets [Dan Goodin/Ars Technica]        

Read this article:
Botnet of 20,000 point-of-sale machines

Super Mario fully implemented in HTML5

Full Screen Mario is Josh Goldberg ‘s complete remake of the classic Super Mario Brothers in HTML5. You can play re-creations of the original levels, make your own in an HTML5-based level editor, or play any of an infinite number of randomly generated levels.        

Visit link:
Super Mario fully implemented in HTML5

RIAA lies about Pandora’s royalty rates

Have you heard a lot of Internetular argle-bargle about Pandora’s crazy-low royalty rates? How they compare unfavorably to satellite rates, and how the company’s trying to cut them? You have? Me too. Turns out (unsurprisingly), it’s RIAA lies. For example, the comparison to satellite streaming rates is pure spin — it compares the rate of sending a song to every person turned into that satellite station to a single person listening to a Pandora stream. It would be pretty surprising if Pandora’s per-listener rates weren’t a fraction of the rates paid by satellite radio for a whole audience. And the business about trying to cut royalties just isn’t true, either: The next issue concerns the publishing side. Historically, Pandora has paid essentially the same rate as all other forms of radio, a rate established unilaterally by the performing rights organizations, ASCAP and BMI, in the late 1990s. In November of last year, following a lengthy negotiation, Pandora agreed with ASCAP to a new rate, an increase over the prior amount, and shook hands with ASCAP management. Not only was our hand-shake agreement rejected by the ASCAP board, but shortly thereafter we were subjected to a steady stream of “withdrawals” by major publishers from ASCAP and BMI seeking to negotiate separate and higher rates with Pandora, and only Pandora. This move caused us to seek the protection of the rate, also recently negotiated, enjoyed by the online radio streams of broadcast radio companies. It’s important to note that these streams represent 96% of the Internet radio listening hours among the top 20 services outside of Pandora (talk about an un-level playing field). We did not enter this period looking for a lower rate – we agreed to a higher rate. But in a sad irony, the actions of a few small, but powerful publishers seeking to gain advantage for themselves has caused all songwriters’ royalties to go down. Any characterization of Pandora as being out to cut publishing rates flies in the face of the facts. Pandora and Royalties ( via Techdirt )        

See original article:
RIAA lies about Pandora’s royalty rates

Schools and the cloud: will schools allow students to be profiled and advertised to in the course of their school-day?

Kate sez, “Technology companies are moving rapidly to get tools like email and document creation services into schools. This link to a recent survey of schools in the UK shows that use of such technology is expected to bring significant educational and social benefits. However, it also reveals that schools have deep concerns that providers of these services will mine student emails, documents or web browsing behaviour to build profiles for commercial purposes, such as serving advertisements. When data mining is done for profit, the relationship between the data miner and the consumer is simply a market transaction. As long as both parties are free to choose whether and when they wish to engage in such transactions, there is no reason to forbid them or place undue obstacles in their path. However, when children are using certain services at school and can neither consent to, control or even properly understand the data mining that is taking place, a clear line against such practices must be drawn, particularly when their data will be used by businesses to make a profit.” UK School Opinions of Cloud Services and Student Privacy [PDF] ( Thanks, Kate ! )        

Excerpt from:
Schools and the cloud: will schools allow students to be profiled and advertised to in the course of their school-day?

DDoS storm breaks records at 300 Gbps

The Internet has been groaning under the weight of a massive distributed denial of service (DDoS) attack on the Domain Name Service, apparently aimed at anti-spam vigilantes Spamhaus, in retaliation for their blacklisting of Dutch free speech hosting provider Cyberbunker. At 300 mbps, the DDoS is the worst in public Internet history. “These things are essentially like nuclear bombs,” said Matthew Prince, chief executive of Cloudflare. “It’s so easy to cause so much damage.” The so-called distributed denial of service, or DDoS, attacks have reached previously unknown magnitudes, growing to a data stream of 300 billion bits per second. “It is a real number,” Mr. Gilmore said. “It is the largest publicly announced DDoS attack in the history of the Internet.” Spamhaus, one of the most prominent groups tracking spammers on the Internet, uses volunteers to identify spammers and has been described as an online vigilante group. In the past, blacklisted sites have retaliated against Spamhaus with denial-of-service attacks, in which they flood Spamhaus with traffic requests from personal computers until its servers become unreachable. But in recent weeks, the attackers hit back with a far more powerful strike that exploited the Internet’s core infrastructure, called the Domain Name System, or DNS. As bad as this is, it could be a lot worse. An anonymous paper called Internet Census 2012: Port scanning /0 using insecure embedded devices reports on a researcher’s project to scan every IPv4 address for publicly available machines that will accept a telnet connection and yield up a root login to a default password. The researcher reports that 1.2 million such devices are available online (s/he compromised many of these machines in order to run the census). These machines are things like printers and routers with badly secured firmware, visible on the public net. They are often running an old version of GNU/Linux and can be hijacked to form part of a staggeringly large botnet that would be virtually unkillable, since the owners of these devices are vanishingly unlikely to notice that they are silently running attackware, and the devices themselves are completely unregarded. Firm Is Accused of Sending Spam, and Fight Jams Internet [NYT/John Markoff & Nicole Perlroth] ( via Hacker News )

View post:
DDoS storm breaks records at 300 Gbps