Friday, June 06, 2014

This has been going on too long and involves too many “rebels” in uniforms with too many weapons to be a spontaneous bunch of protesters. Or am I wrong?
Pro-Russian rebels take control of 3 government bases in eastern Ukraine
Pro-Russian insurgents dislodged government troops from three bases in eastern Ukraine, a new blow to beleaguered armed forces as its president-elect vowed new initiatives to help end the regional mutiny.
… The move follows nearly two months of fighting in the region


If I block your device, I'm a privacy advocate. If you block my device, you're denying my First Amendment rights! Is there any law covering this?
For the privacy-conscious: An app that can jam Google Glass' WiFi
Here's something for the privacy-conscious who are wary of Google Glass' secret recording capabilities - an app to jam the wearable computing device's WiFi access.
Berlin-based artist Julian Oliver created the program "Glasshole.sh" to detect any Glass device and block it from accessing a WiFi network, a report on Wired.com said."
When it detects Glass, it uses the program Aircrack-NG to impersonate the network and send a 'deauthorization' command, cutting the headset’s Wi-Fi connection. It can also emit a beep to signal the Glass-wearer’s presence to anyone nearby," Wired.com reported.


Robots, like any “Thing” connected to the “Internet of Things” will know everything the Internet knows. What will they be programmed to do with it?
Robots: Can we trust them with our privacy?
Joss Wright is training a robot to freak people out.
Wright, a computer scientist, is plotting an experiment with a humanoid robot called Nao. He and his colleagues plan to introduce this cute bot to people on the street and elsewhere – where it will deliberately invade their privacy. Upon meeting strangers, for example, Nao may use face-recognition software to dig up some detailed information online about them. Or, it may tap into their mobile phone's location tracking history, learn where they ate lunch yesterday, and ask what they thought of the soup.


Can I use one to conduct academic research? I want before and after pictures of certain politician's homes.
Hollywood to feds: Let us use drones
It's almost entirely illegal to use drones for money-making purposes in the United States. But a little Hollywood magic could change that.
… Currently, there's only one exemption to the Federal Aviation Administration's nationwide ban on commercial drones, called unmanned aircraft systems or UAS. That's a spot off Alaska's coast where drones are used by an oil company.


For my students (and my lawyer friends)
E-Mail Self Defense
by Sabrina I. Pacifici on June 5, 2014
“Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you’ve finished, you’ll be able to send and receive emails that are coded to make sure that a surveillance agent or thief can’t intercept your email and read it. Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you’re in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA. This guide relies on software which is freely licensed; it’s completely transparent and anyone can copy it or make their own version. This makes it safer from surveillance than proprietary software (like Windows). Learn more about free software at fsf.org. Email Self-Defense is a project of the Free Software Foundation. We fight for computer user’s rights, and promote the development of free (as in freedom) software like GnuPG, which is used in this guide. We have big plans to get this guide in the hands of people under bulk surveillance all over the world, and to make more tools like it.”


“Hey, we got him down, let's stomp on him!”
“Hey, he stole all that money, why should we let him use it to defend himself?”
Record companies want Kim Dotcom's assets frozen
Dotcom's assets had been frozen since January 2012 when his home was raided and Megaupload service was shut down. In April this year, a New Zealand court refused to extend the freeze on Dotcom's assets, which include a garage full of luxury cars, millions in cash, and other items taken from the raid of his mansion.
The court's decision has since been appealed by the Crown with a hearing due on July 30, and six major Hollywood studios also want Dotcom's assets to remain frozen while the case against him proceeds.
They are now joined by four record companies - reportedly Warner Music, UMG Recordings, Sony Music and Capitol Records - with papers served on Tuesday seeking to have Dotcom's assets frozen.


Learning how the (Brave new) world works.
Cloud Services For Dummies


For my student Mac users.
The Swift Programming Language
This book is available for download with iBooks on your Mac or iOS device, and with iTunes on your computer. Books can be read with iBooks on your Mac or iOS device.


Tools & Techniques
– lets you easily monitor the file access activities on your system. Have you ever wondered what’s going on with your disk system behind your watch? Why the disk is busy? What’s scratching your HDD? You may find them out using this simple program. There is an installable version and also a portable version.

No comments: