Friday, September 26, 2014

Always worthwhile.
The Privacy Foundation at the University of Denver Sturm College of Law presents:
PRIVACY: The Internet of Things (IoT)
FRIDAY, October 10, 2014, 10:00 am — 1:00 PM Followed by lunch
Ricketson Law Building, Room 290 2255 E Evans Avenue Denver, Colorado 80208


For my Ethical Hackers.
Kevin Mitnick Launches Brokerage Service for Zero-Day Exploits
According to Mitnick Security, Absolute Zero-Day Exploit Exchange is an exclusive brokerage service through which top-paying government and corporate buyers can connect with security researchers and exploit developers. The service was silently launched six months ago, but the company only started publicly advertising it recently.
Selling exploits to government agencies is a highly controversial matter. Companies like Vupen and Exodus Intelligence have often been in the spotlight over their practices. It's interesting that Mitnick would take on this role considering his history with the US government and the fact that he plans on launching a book that teaches people how to stay "invisible" in this age of Big Brother and big data.
However, Mitnick told Wired in an interview that he would never consider selling exploits to governments like the one in Syria or a criminal organization. [That's “where the money is” Kevin. Bob]


For my Computer Security students.
Shellshock’ Bug Spells Trouble for Web Security
As if consumers weren’t already suffering from breach fatigue: Experts warn that attackers are exploiting a critical, newly-disclosed security vulnerability present in countless networks and Web sites that rely on Unix and Linux operating systems. Experts say the flaw, dubbed “Shellshock,” is so intertwined with the modern Internet that it could prove challenging to fix, and in the short run is likely to put millions of networks and countless consumer records at risk of compromise.
The bug is being compared to the recent Heartbleed vulnerability because of its ubiquity and sheer potential for causing havoc on Internet-connected systems — particularly Web sites. Worse yet, experts say the official patch for the security hole is incomplete and could still let attackers seize control over vulnerable systems.
The problem resides with a weakness in the GNU Bourne Again Shell (Bash), the text-based, command-line utility on multiple Linux and Unix operating systems.


Should we be “Concerned” that the FBI is “Concerned?”
FBI Director ‘Concerned’ About New Smartphone Encryption
FBI Director James Comey on Thursday said he’s bothered by moves by Apple Inc. and Google Inc. to market privacy innovations on smartphones that put some data out of the reach of police, saying agency officials have been in touch with both companies.
“What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law,” Mr. Comey said in a briefing with reporters, reports WSJ’s Brent Kendall.
Mr. Comey said he still wants to get a better handle on the implications of the technology, saying FBI officials have engaged in discussions with the companies “to understand what they’re thinking and why they think it makes sense.” [Because of comments like this? Bob]
As WSJ earlier reported, officials in Washington have been expecting a confrontation with Silicon Valley in the wake of Apple’s announcement that its new operating system for phones would prevent law enforcement from retrieving data stored on a locked phone, such as photos, videos and contacts.


Even Facebook thinks it's wrong.
John Ribeiro reports:
Facebook’s appeal against the collection by law enforcement in New York of bulk user data under a gag order has been accepted.
The appellate division, first department of the New York State Supreme Court ruled Thursday against a government move to dismiss the appeal as well as accepted briefs in support of Facebook filed by some civil rights organizations and tech companies, including Google and Microsoft.
Read more on ITWorld.

(Related) New to me. (I haven't been invited) Simple Business Plan: Learn what irritates users and build a system that doesn't do that.
Will anti-Facebook Ello draw big fan base for its anti-ad nature or its big privacy promise?
The more they learn about Facebook, the more some people are turned off by the social networking site and its practices. But Ello shuns a good deal of what turns users against Facebook, promising no ads and hefty privacy compared to Mark Zuckerberg's site.
Paul Budnitz created and designed Ello, a social networking site that uses an invite-only strategy, at least for right now. Ello's exclusivity is likely the big factor driving some of the site's rising demand, but its privacy approach -- the social network vows it will never sell user data to anyone and it seeks to operate without shoving sponsored ads in front of its users' eyeballs -- is what may make users big fans in the long run.
… "When a network is run for advertisers, the advertiser is really the customer," Mr. Budnitz said. "That really goes against what a social network is. When you're putting up artwork, or something you wrote or created, and there's an add for underwear, it conflicts in a violating way."

(On the other hand) Some free isn't?
Ello Says You're Not a Product, But You Are


It all started with troops of the King of America – and even they got it wrong.
If you slept through your history classes in school, and now wish you had paid more attention to the Bill of Rights, Mike Maharrey provides a nice recap of the historical context for the Fourth Amendment.
And then he goes on to point out how our government violates it every damned day.
Read more on Tenth Amendment Center.


Another issue we can debate endlessly.
An Information Theory of Copyright Law
Fromer, Jeanne C., An Information Theory of Copyright Law (September 23, 2014). Emory Law Journal, Vol. 64, p. 71, 2014. Available for download at SSRN: http://ssrn.com/abstract=2500614
The dominant American theory of copyright law is utilitarian, in offering the incentive of limited copyright protection to creators to generate material that is valuable to society. Less settled is the question of the sorts of works that copyright law seeks to encourage: Ever more copyrightable creations? Only some that are artistically worthy? What makes a work valuable to society? This Article seeks to answer important aspects of these questions by examining them through the lens of information theory, a branch of applied mathematics that quantifies information and suggests optimal ways to transmit it. Using these concepts, this Article proposes that what makes expressive works valuable to society is that they make a contribution in at least one of two principal ways: by using that expression to communicate knowledge — be it systematic, factual, or cultural — and by conveying expression that is enjoyable in and of itself. Information theory sheds light on how copyright law can spur these valuable works. In undertaking this analysis, this Article explores the implications for the central doctrines of copyright law, including copyrightability, the idea-expression distinction, infringement, and fair use. In this context, this Article also considers whether we want distinct creators communicating these valuable types of information or whether it is optimal to unify particular communications of information in a single creator.”


This could save the postal service. If it works, can we sell it to Amazon?
Postal Service Seeks to Extend Grocery Deliveries
The U.S. Postal Service wants to deliver more groceries for Amazon.com Inc., and potentially for other retailers.
… In a filing Tuesday with the Postal Regulatory Commission, the Postal Service said the expanded test could bring in revenue of more than $10 million a year for the cash-strapped agency. It said it is hoping to develop "a long-term, scalable solution to enable expansion of customized delivery to additional major metropolitan markets across the nation."


My Excel students are in for a surprise this Quarter.
Data Visualization: Old Practice, New Value
Data visualization is not new.
During a recent International Institute for Analytics (IIA) webinar, Bill Franks, chief analytics officer for Teradata and author of several books including Taming the Big Data Tidal Wave and the forthcoming The Analytics Revolution, shared a visualization created in 1869 to illustrate Napolean's troop losses during his invasion of Russia in 1812. Those early visualizations required lots of manual labor to collect and then illustrate the data, chores performed by a data specialist.
Despite advancements through the years, visualization remained largely the purview of data specialists until visualization capabilities were added to desktop tools such as Microsoft Excel. Yet even using those tools, creating visualizations was a labor intensive process that involved lots of cutting, pasting and manual entry of data.
Today, however, modern tools make it easy to create robust data visualizations, Franks said, and to combine text with visuals so analytics can "tell a story."
On the "outer edge" of data visualization, some companies are beginning to leverage technologies used for video gaming and other immersive experiences to produce compelling visualizations, he said, noting that Facebook purchased virtual reality headset maker Oculus in March.
… Tools from such companies as SAS, Tableau, Tibco Spotfire, QlikView and MicroStrategy facilitate this kind of exploration, which can result in discovering trends and patterns that were difficult to identify before, Franks said.

(Related)
The 36 best tools for data visualization
… Not a web designer or developer? You may prefer Free tools for creating infographics.

(Related) ...and because these are amusing.
22 maps and charts that will surprise you


Really interesting, but really new. If you see an image on your screen, you can search for that image.
Google Search by Image” From Your Screenshots With This Extension
... “Screenshot Search” lets you take a screenshot and upload that to Google Search By Image, instantly and do a search.


For my i- students. Type without typing? How Zen. Consider Privacy!
Type Superfast With Real Time Voice Dictation in iOS 8
Relatively little has been said about the new real-time dictation function in iOS, and in previous versions it may not have been worthy of the highlight. But with the recent iOS 8 update, Apple has restored bragging rights when it comes voice dictation and mobile devices.
Past iOS dictation implementation wouldn’t show the text you dictated until you tapped the Done button, which meant activating the feature several times for long form dictation. Well, not anymore. For me, the new voice-to-text feature works more efficiently than Dragon Dictate on the Mac
The dictation feature is ready to use when you install iOS 8. You don’t need to add a new keyboard, and it works in any iOS application. However, you can only activate voice dictation using the default Apple iOS keyboard – it doesn’t show up in third-party keyboards.
The feature also requires an Internet connection to work. What you dictate is recorded and sent to Apple’s server, and in turn it converts what you say into text on your device. The feature will also access the names and nicknames in your device’s address book for more accurate spelling of names.


Dilbert illustrates exactly how I help my students!

No comments: