The Almighty Buck

The People GoFundMe Leaves Behind (theoutline.com) 214

citadrianne shares a report from The Outline: President Donald Trump's proposed budget seeks to slash $54 billion from social services including programs like Medicaid and Meals on Wheels. As these resources dry up, crowdfunding websites will further entrench themselves as extra-governmental welfare providers in order to fill the gap. For a lucky few, these sites are a lifeline. For most people, they are worthless. Crowdfunding's fatal flaw is that not every campaign ends up getting the money it needs. A recent study published in the journal Social Science & Medicine found that more than 90 percent of GoFundMe campaigns never meet their goal. For every crowdfunding success story, there are hundreds of failures. "As many happy stories as there are in charitable crowdfunding, there are a lot of really worthy causes when you browse these platforms that nobody has given a cent to," Rob Gleasure, professor at the business school of the National University of Ireland, Cork told The Outline. "People haven't come across them." Feller and Gleasure's report highlighted how fickle crowdfunding can be. Of all the Razoo campaigns started in 2013, they found, more than a third didn't receive any funding at all. According to their report, donors are more likely to give to campaigns that feature lots of pictures and accompanying text.
Piracy

Sci-Hub Ordered To Pay $15 Million In Piracy Damages (torrentfreak.com) 156

An anonymous reader quotes a report from TorrentFreak: Two years ago, academic publisher Elsevier filed a complaint (PDF) against Sci-Hub and several related "pirate" sites. It accused the websites of making academic papers widely available to the public, without permission. While Sci-Hub is nothing like the average pirate site, it is just as illegal according to Elsevier's legal team, who obtained a preliminary injunction from a New York District Court last fall. The injunction ordered Sci-Hub's founder Alexandra Elbakyan to quit offering access to any Elsevier content. However, this didn't happen. Instead of taking Sci-Hub down, the lawsuit achieved the opposite. Sci-Hub grew bigger and bigger up to a point where its users were downloading hundreds of thousands of papers per day. Although Elbakyan sent a letter to the court earlier, she opted not engage in the U.S. lawsuit any further. The same is true for her fellow defendants, associated with Libgen. As a result, Elsevier asked the court for a default judgment and a permanent injunction which were issued this week. Following a hearing on Wednesday, the Court awarded Elsevier $15,000,000 in damages, the maximum statutory amount for the 100 copyrighted works that were listed in the complaint. In addition, the injunction, through which Sci-Hub and LibGen lost several domain names, was made permanent.
Space

FCC Grants OneWeb Approval To Launch Over 700 Satellites For 'Space Internet' (theverge.com) 88

OneWeb has been granted approval from the FCC to launch a network of internet-beaming satellites into orbit. FCC chairman Ajit Pai said in a statement: "Humans have long sought inspiration from the stars, from the ancient Egyptians orienting the pyramids toward certain stars to the Greeks using constellations to write their mythology. In modern times, we've done the same, with over 1,000 active satellites currently in orbit. Today, the FCC harnesses that inspiration as we seek to make the promise of high-speed internet access a reality for more Americans, partly through the skies..." The Verge reports: OneWeb plans to launch a constellation of 720 low-Earth orbit satellites using non-geostationary satellite orbit (NGSO) technology in order to provide global, high-speed broadband. The company's goal has far-reaching implications, and would provide internet to rural and hard-to-reach areas that currently have little access to internet connectivity. Additionally, OneWeb has a targets of "connecting every unconnected school" by 2022, and "bridging the digital divide" by 2027. According to OneWeb, the company plans to launch an initial 10 production satellites in early 2018, which, pending tests, will then be followed by a full launch as early as 2019.
Businesses

'Chiropractors Are Bullshit' (theoutline.com) 284

From an article on The Outline, submitted by two readers: If you're one of the approximately 80 percent of Americans who have suffered from back pain, you may have been referred to a chiropractor for medical help. In the modern-day internet landscape, you'll find chiropractic celebrities like Dr. Josh Axe (1.7 million Facebook followers), Dr. Billy DeMoss (20,000 Facebook followers), and Dr. Eric Berg (472,000 YouTube subscribers) giving advice that goes beyond managing spinal issues. Both in their offices and on social media, chiropractors have adapted to a marketplace that's demanding more than just pain management: they extol the virtues of an "alkaline diet," tell you how to manage stress with detoxing, and wax scientific about the adrenal gland. [...] Chiropractic care, I'm sorry to say, is little more than the buffoonery of a 19th-century lunatic who derived most of his medical theory from seances. It has not evolved much since its creation. Chiropractic beliefs are dangerously far removed from mainstream medicine, and the vocation's practices have been linked to strokes, herniated discs, and even death. Chiropractors can't replace your doctor, and I'm amazed that they're still even allowed to practice. [...] Though some chiropractors are now making an effort to introduce evidence-based practices into their treatment, chiropractic as a whole hasn't evolved like other areas of medicine -- with hypotheses, experimentation, and peer review. Instead, it was birthed by a strange combination of hocus pocus, guesswork, and strongly held religious beliefs.
Network

WikiLeaks Doc Dump Reveals CIA Tools For Hacking Air-Gapped PCs (bleepingcomputer.com) 71

An anonymous reader writes: "WikiLeaks dumped today the manuals of several hacking utilities part of Brutal Kangaroo, a CIA malware toolkit for hacking into air-gapped (offline) networks using tainted USB thumb drives," reports Bleeping Computer. The CIA uses these tools as part of a very complex attack process, that allows CIA operatives to infect offline, air-gapped networks. The first stage of these attacks start with the infection of a "primary host," an internet-connected computer at a targeted company. Malware on this primary host automatically infects all USB thumb drives inserted into the machine. If this thumb drive is connected to computers on an air-gapped network, a second malware is planted on these devices. This malware is so advanced, that it can even create a network of hacked air-gapped PCs that talk to each other and exchange commands. To infect the air-gapped computers, the CIA malware uses LNK (shortcut) files placed on the USB thumb drive. Once the user opens and views the content of the thumb drive in Windows Explorer, his air-gapped PC is infected without any other interaction.
Youtube

YouTube Claims 1.5 Billion Monthly Users (cnbc.com) 55

An anonymous reader shares a report: Google's YouTube unit says it now reaches 1.5 billion viewers every month -- and its users watch more than an hour of mobile videos per day -- as it expands its video programming to sell more digital ads. YouTube CEO Susan Wojcicki also wrote that YouTube Red, the company's foray into original videos, has launched 37 series that have generated "nearly a quarter billion views." YouTube Red has 12 new projects in the works, she said.
The Internet

If You Can Decentralize the Internet, Mozilla Has $2 Million For You (cnet.com) 124

Mozilla and the National Science Foundation want a new internet. And they want it to be free and accessible for everybody. From a report: They'll pay $2 million for it. On Wednesday, the two organizations issued a call to action for "big ideas that decentralize the web" as part of the "Wireless Innovation for a Networked Society" challenges. The challenges include getting the internet to communities off the grid, with proposals like a backpack with a computer and Wi-Fi router inside.
Government

Victims Aren't Reporting Ransomware Attacks, FBI Report Concludes (bleepingcomputer.com) 84

Catalin Cimpanu, writing for BleepingComputer: Despite being an expanding threat, ransomware infections are rarely reported to law enforcement agencies, according to conclusions from the 2016 Internet Crime Report (PDF), released yesterday by the FBI's Internet Crime Complaint Center (IC3). During 2016, FBI IC3 officials said they received only 2,673 complaints regarding ransomware incidents, which ranked ransomware as the 22nd most reported cyber-crime in the US, having caused just over $2.4 million in damages (ranked 25th). The numbers are ridiculously small compared to what happens in the real world, where ransomware is one of today's most prevalent cyber-threats, according to multiple reports from cyber-security companies.
Google

Google Will Now Hide Personal Medical Records From Search Results (betanews.com) 34

Mark Wilson, writing for BetaNews: Google has updated its search policies without any sort of fanfare. The search engine now "may remove" -- in addition to existing categories of information -- "confidential, personal medical records of private people" from search results. That such information was not already obscured from search results may well come as something of a surprise to many people. The change has been confirmed by Google, although the company has not issued any form of announcement about it.
China

Chinese Government Fabricates Social Media Posts for Strategic Distraction, not Engaged Argument (cnet.com) 68

Abstract of a study: The Chinese government has long been suspected of hiring as many as 2,000,000 people to surreptitiously insert huge numbers of pseudonymous and other deceptive writings into the stream of real social media posts, as if they were the genuine opinions of ordinary people. Many academics, and most journalists and activists, claim that these so-called "50c party" posts vociferously argue for the government's side in political and policy debates. As we show, this is also true of the vast majority of posts openly accused on social media of being 50c. Yet, almost no systematic empirical evidence exists for this claim, or, more importantly, for the Chinese regime's strategic objective in pursuing this activity. In the first large scale empirical analysis of this operation, we show how to identify the secretive authors of these posts, the posts written by them, and their content. We estimate that the government fabricates and posts about 448 million social media comments a year. In contrast to prior claims, we show that the Chinese regime's strategy is to avoid arguing with skeptics of the party and the government, and to not even discuss controversial issues. From a CNET article, titled, Chinese media told to 'shut down' talk that makes country look bad: Being an internet business in China appears to be getting tougher. Chinese broadcasters, including social media platform Weibo, streamer Acfun and media company Ifeng were told to shut down all audio and visual content that cast the country or its government in bad light, China's State Administration of Press, Publication, Radio, Film and Television posted on its website on Thursday, saying they violate local regulations. "[The service providers] broadcast large amounts of programmes that don't comply with national rules and propagate negative discussions about public affairs. [The agency] has notified all relevant authorities and ... will take measures to shut down these programmes and rectify the situation," reads the statement.
Businesses

Samsung Begins Production For Its First Internet of Things-optimised Exynos Processor (zdnet.com) 50

An anonymous reader shares a report: Samsung Electronics has launched the Exynos i T200, its first processor optimised for Internet of Things (IoT) devices, the company has announced. The South Korean tech giant said the chip has upped security and supports wireless connections, with hopes of giving it an advantage in the expanding IoT market. The Exynos i T200 applies Samsung's 28-nanometer High-K Metal Gate process and has multiple cores, with the Cortex-R4 doing the heavy lifting and an independently operating Cortex-M0+ allowing for multifunctionality. For example, if applied to a refrigerator, Cotext-R4 will run the OS and Cotex-M0+ will power LED displays on the doors.
Television

Netflix Launches New 'Interactive Shows' That Let Viewers Dictate the Story (thenextweb.com) 104

Netflix announced that it's launching an all-new interactive format that turns viewers in storytellers, letting them dictate each choice and direction the story takes. "In each interactive title, you can make choices for the characters, shaping the story as you go," according to Netflix. "Each choice leads to a different adventure, so you can watch again and again, and see a new story each time." The Next Web reports: The first two interactive shows that will be available on Netflix are Puss in Book: Trapped in an Epic Tale and Buddy Thunderstruck: The Maybe Pile. Puss in Book launches globally today, with Buddy Thunderstruck slated to make its debut a month from now on July 14. The new experience will be available on most television setups and iOS devices. "Content creators have a desire to tell non-linear stories like these, and Netflix provides the freedom to roam, try new things and do their best work," Product Innovation director Carla Fisher said. "The intertwining of our engineers in Silicon Valley and the creative minds in Hollywood has opened up this new world of storytelling possibilities." Fisher further added that, for the time being, the streaming service will be mainly focusing its efforts on producing interactive content for children -- especially since their research has shown that they already tend to be prone to interacting with the screen.
Network

Lawsuit Accuses Comcast of Cutting Competitor's Wires To Put It Out of Business (arstechnica.com) 140

An anonymous reader quotes a report from Ars Technica: A tiny Internet service provider has sued Comcast, alleging that the cable giant and its hired contractors cut the smaller company's wires in order to take over its customer base. Telecom Cable LLC had "229 satisfied customers" in Weston Lakes and Corrigan, Texas when Comcast and its contractors sabotaged its network, the lawsuit filed last week in Harris County District Court said. Comcast had tried to buy Telecom Cable's Weston Lakes operations in 2013 "but refused to pay what they were worth," the complaint says. Starting in June 2015, Comcast and two contractors it hired "systematically destroyed Telecom's business by cutting its lines and running off its customers," the lawsuit says. Comcast destroyed or damaged the lines serving all Telecom Cable customers in Weston Lakes and never repaired them, the lawsuit claims. Telecom Cable owner Anthony Luna estimated the value of his business at about $1.8 million, which he is seeking to recover. He is also seeking other damages from Comcast and its contractors, including exemplary damages that under state statute could "amount to a maximum of twice the amount of economic damages, plus up to $750,000 of non-economic damages," the complaint says. CourtHouse News Service has a story about the lawsuit, and it posted a copy of the complaint.
Firefox

Chrome and Firefox Headless Modes May Spur New Adware & Clickfraud Tactics (bleepingcomputer.com) 80

From a report: During the past month, both Google and Mozilla developers have added support in their respective browsers for "headless mode," a mechanism that allows browsers to run silently in the OS background and with no visible GUI. [...] While this feature sounds very useful for developers and very uninteresting for day-to-day users, it is excellent news for malware authors, and especially for the ones dabbling with adware. In the future, adware or clickfraud bots could boot-up Chrome or Firefox in headless mode (no visible GUI), load pages, and click on ads without the user's knowledge. The adware won't need to include or download any extra tools and could use locally installed software to perform most of its malicious actions. In the past, there have been quite a few adware families that used headless browsers to perform clickfraud. Martijn Grooten, an editor at Virus Bulletin, also pointed Bleeping Computer to a report where miscreants had abused PhantomJS, a headless browser, to post forum spam. The addition of headless mode in Chrome and Firefox will most likely provide adware devs with a new method of performing surreptitious ad clicks.
Businesses

Tesla Is Talking To the Music Labels About Creating Its Own Streaming Service (recode.net) 65

An anonymous reader shares a Recode report: Music industry sources say the carmaker has had talks with all of the major labels about licensing a proprietary music service that would come bundled with its cars, which already come equipped with a high-tech dashboard and internet connectivity. Label sources aren't clear about the full scope of Tesla's ambitions, but believe it is interested in offering multiple tiers of service, starting with a Pandora-like web radio offering. The bigger question: Why doesn't Tesla simply integrate existing services, like Spotify or Apple Music, into all of its cars from the start -- especially since Tesla already does a deal with Spotify for Teslas sold outside the U.S.? "We believe it's important to have an exceptional in-car experience so our customers can listen to the music they want from whatever source they choose," a Tesla spokesperson said. "Our goal is to simply achieve maximum happiness for our customers."
The Internet

Verizon Is Killing Tumblr's Fight For Net Neutrality (theverge.com) 75

An anonymous reader quotes a report from The Verge: In 2014, Tumblr was on the front lines of the battle for net neutrality. The company stood alongside Amazon, Kickstarter, Etsy, Vimeo, Reddit, and Netflix during Battle for the Net's day of action. Tumblr CEO David Karp was also part of a group of New York tech CEOs that met with then-FCC chairman Tom Wheeler in Brooklyn that summer, while the FCC was fielding public comment on new Title II rules. President Obama invited Karp to the White House to discuss various issues around public education, and in February 2015 The Wall Street Journal reported that it was the influence of Karp and a small group of liberal tech CEOs that swayed Obama toward a philosophy of internet as public utility. But three years later, as the battle for net neutrality heats up once again, Tumblr has been uncharacteristically silent. The last mention of net neutrality on Tumblr's staff blog -- which frequently posts about political issues from civil rights to climate change to gun control to student loan debt -- was in June 2016. And Tumblr is not listed as a participating tech company for Battle for the Net's next day of action, coming up in three weeks. One reason for Karp and Tumblr's silence? Last week Verizon completed its acquisition of Tumblr parent company Yahoo, kicking off the subsequent merger of Yahoo and AOL to create a new company called Oath. As one of the world's largest ISPs, Verizon is notorious for challenging the principles of net neutrality -- it sued the FCC in an effort to overturn net neutrality rules in 2011, and its general counsel Kathy Grillo published a note this April complimenting new FCC chairman Ajit Pai's plan to weaken telecommunication regulations.
The Almighty Buck

eBay Will Now Price Match Amazon, Walmart and Others On Over 50,000 Items (techcrunch.com) 68

eBay announced today a new Price Match Guarantee for over 50,000 items across its site -- promising that it will have the best deal online, or it will match the lowest price of a competitor. While only select items are available for this offer, "the move is a significant effort on eBay's part to ensure that it doesn't lose customers to Amazon, Walmart and other online stores as the market consolidates behind the industry's major players," reports TechCrunch. From the report: In order to qualify, the item must be one of the new, unopened items sold daily through eBay Deals, for starters. Deals are eBay's selection of "trending" inventory across all its categories -- like consumer electronics, home & garden, and fashion. The deals are also generally offered at 20 percent to 90 percent off, and are sourced from over 900 of eBay's trusted sellers. These sellers include both smaller merchants looking to grow their customer base as well as major consumer brands. At any time, eBay says there are "tens of thousands" of items offered through the Deals site, with featured deals updating at least once per day, beginning at 8 AM PT.
Software

NSA Opens GitHub Account, Lists 32 Projects Developed By the Agency (thehackernews.com) 64

An anonymous reader quotes a report from The Hacker News: The National Security Agency (NSA) -- the United States intelligence agency which is known for its secrecy and working in the dark -- has finally joined GitHub and launched an official GitHub page. GitHub is an online service designed for sharing code amongst programmers and open source community, and so far, the NSA is sharing 32 different projects as part of the NSA Technology Transfer Program (TTP), while some of these are "coming soon." "The NSA Technology Transfer Program (TTP) works with agency innovators who wish to use this collaborative model for transferring their technology to the commercial marketplace," the agency wrote on the program's page. "OSS invites the cooperative development of technology, encouraging broad use and adoption. The public benefits by adopting, enhancing, adapting, or commercializing the software. The government benefits from the open source community's enhancements to the technology." Many of the projects the agency listed are years old that have been available on the Internet for some time. For example, SELinux (Security-Enhanced Linux) has been part of the Linux kernel for years.
Network

Ask Slashdot: Best Way To Isolate a Network And Allow Data Transfer? 226

Futurepower(R) writes: What is the best way to isolate a network from the internet and prevent intrusion of malware, while allowing carefully examined data transfer from internet-facing computers? An example of complete network isolation could be that each user would have two computers with a KVM switch and a monitor and keyboard, or two monitors and two keyboards. An internet-facing computer could run a very secure version of Linux. Any data to be transferred to that user's computer on the network would perhaps go through several Raspberry Pi computers running Linux; the computers could each use a different method of checking for malware. Windows computers on the isolated network could be updated using Autopatcher, so that there would never be a direct connection with the internet. Why not use virtualization? Virtualization does not provide enough separation; there is the possibility of vulnerabilities. Do you have any ideas about improving the example above?
Privacy

California May Restore Broadband Privacy Rules Killed By Congress and Trump (arstechnica.com) 85

An anonymous reader quotes a report from Ars Technica: A proposed law in California would require Internet service providers to obtain customers' permission before they use, share, or sell the customers' Web browsing history. The California Broadband Internet Privacy Act, a bill introduced by Assembly member Ed Chau (D-Monterey Park) on Monday, is very similar to an Obama-era privacy rule that was scheduled to take effect across the US until President Trump and the Republican-controlled Congress eliminated it. If Chau's bill becomes law, ISPs in California would have to get subscribers' opt-in consent before using browsing history and other sensitive information in order to serve personalized advertisements. Consumers would have the right to revoke their consent at any time. The opt-in requirement in Chau's bill would apply to "Web browsing history, application usage history, content of communications, and origin and destination Internet Protocol (IP) addresses of all traffic." The requirement would also apply to geolocation data, IP addresses, financial and health information, information pertaining to minors, names and billing information, Social Security numbers, demographic information, and personal details such as physical addresses, e-mail addresses, and phone numbers.

Slashdot Top Deals