Just a few days after Turkey’s scandal-rocked government banned Twitter by tweaking national DNS settings, the state has doubled down by ordering ISPs to block Twitter’s IP addresses , in response to the widespread dissemination of alternative DNS servers, especially Google’s 8.8.8.8 and 8.8.4.4 (these numbers were even graffitied on walls ). Following the ban, Turkey’s Twitter usage grew by 138 percent. Now that Twitter’s IP range is blocked, more Turkish Internet users are making use of Tor and VPNs, and they continue to use SMS for access to the service. It’s interesting that Prime Minister Recep Tayyip Erdoğan has singled out Twitter for his attacks (“Twitter, schmitter! We will wipe out Twitter . I don’t care what the international community says.”) Why not Facebook or Google Plus? I’m not certain, but my hypothesis is that Facebook and Google’s “real names” policy — which make you liable to disconnection from the service if you’re caught using an alias — make them less useful for political dissidents operating in an environment in which they fear reprisals. According to the Internet activist collective Telecomix, there also were reports that devices configured to use Google’s DNS service or other DNS providers outside the country were being hijacked to a local DNS server by the Wi-Fi network at Istanbul’s airport. The move has driven up the usage of VPN services and the Tor anonymizing network in Turkey. Telecomix has been providing a list of Tor gateways for Turkish users. Tor network metrics show a huge spike in users directly connecting to the Tor network over the past few days, growing from 25,000 users to 35,000 since March 19. Downloads of VPN software have also exploded with VPN apps for Apple’s iOS and Google’s Android becoming the most downloaded apps from their respective app stores in Turkey. After DNS change fails, Turkish government steps up Twitter censorship [Sean Gallagher/Ars Technica]         
Continue reading here:
Turkey orders block of Twitter’s IP addresses
			
			
			
			
			
 Full Screen Mario is Josh Goldberg ‘s complete remake of the classic Super Mario Brothers in HTML5. You can play re-creations of the original levels, make your own in an HTML5-based level editor, or play any of an infinite number of randomly generated levels.         
			
 Have you heard a lot of Internetular argle-bargle about Pandora’s crazy-low royalty rates? How they compare unfavorably to satellite rates, and how the company’s trying to cut them? You have? Me too. Turns out (unsurprisingly), it’s RIAA lies. For example, the comparison to satellite streaming rates is pure spin — it compares the rate of sending a song to every person turned into that satellite station to a single person listening to a Pandora stream. It would be pretty surprising if Pandora’s per-listener rates weren’t a fraction of the rates paid by satellite radio for a whole audience. And the business about trying to cut royalties just isn’t true, either: The next issue concerns the publishing side. Historically, Pandora has paid essentially the same rate as all other forms of radio, a rate established unilaterally by the performing rights organizations, ASCAP and BMI, in the late 1990s. In November of last year, following a lengthy negotiation, Pandora agreed with ASCAP to a new rate, an increase over the prior amount, and shook hands with ASCAP management. Not only was our hand-shake agreement rejected by the ASCAP board, but shortly thereafter we were subjected to a steady stream of “withdrawals” by major publishers from ASCAP and BMI seeking to negotiate separate and higher rates with Pandora, and only Pandora. This move caused us to seek the protection of the rate, also recently negotiated, enjoyed by the online radio streams of broadcast radio companies. It’s important to note that these streams represent 96% of the Internet radio listening hours among the top 20 services outside of Pandora (talk about an un-level playing field). We did not enter this period looking for a lower rate – we agreed to a higher rate. But in a sad irony, the actions of a few small, but powerful publishers seeking to gain advantage for themselves has caused all songwriters’ royalties to go down. Any characterization of Pandora as being out to cut publishing rates flies in the face of the facts. Pandora and Royalties ( via Techdirt )         
			
 The Internet has been groaning under the weight of a massive distributed denial of service (DDoS) attack on the Domain Name Service, apparently aimed at anti-spam vigilantes Spamhaus, in retaliation for their blacklisting of Dutch free speech hosting provider Cyberbunker. At 300 mbps, the DDoS is the worst in public Internet history. “These things are essentially like nuclear bombs,” said Matthew Prince, chief executive of Cloudflare. “It’s so easy to cause so much damage.” The so-called distributed denial of service, or DDoS, attacks have reached previously unknown magnitudes, growing to a data stream of 300 billion bits per second. “It is a real number,” Mr. Gilmore said. “It is the largest publicly announced DDoS attack in the history of the Internet.” Spamhaus, one of the most prominent groups tracking spammers on the Internet, uses volunteers to identify spammers and has been described as an online vigilante group. In the past, blacklisted sites have retaliated against Spamhaus with denial-of-service attacks, in which they flood Spamhaus with traffic requests from personal computers until its servers become unreachable. But in recent weeks, the attackers hit back with a far more powerful strike that exploited the Internet’s core infrastructure, called the Domain Name System, or DNS. As bad as this is, it could be a lot worse. An anonymous paper called Internet Census 2012: Port scanning /0 using insecure embedded devices reports on a researcher’s project to scan every IPv4 address for publicly available machines that will accept a telnet connection and yield up a root login to a default password. The researcher reports that 1.2 million such devices are available online (s/he compromised many of these machines in order to run the census). These machines are things like printers and routers with badly secured firmware, visible on the public net. They are often running an old version of GNU/Linux and can be hijacked to form part of a staggeringly large botnet that would be virtually unkillable, since the owners of these devices are vanishingly unlikely to notice that they are silently running attackware, and the devices themselves are completely unregarded. Firm Is Accused of Sending Spam, and Fight Jams Internet [NYT/John Markoff & Nicole Perlroth] ( via Hacker News )