Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
China

China's Foreign Ministry: China Did Not Attack Github, We Are the Major Victims 126

Posted by samzenpus
from the it-wasn't-us dept.
An anonymous reader writes At the Regular Press Conference on March 30, China's Foreign Ministry Spokesperson Hua Chunying responded on the charge of DDoS attack over Github. She said: "It is quite odd that every time a website in the US or any other country is under attack, there will be speculation that Chinese hackers are behind it. I'd like to remind you that China is one of the major victims of cyber attacks. We have been underlining that China hopes to work with the international community to speed up the making of international rules and jointly keep the cyber space peaceful, secure, open and cooperative. It is hoped that all parties can work in concert to address hacker attacks in a positive and constructive manner."
China

Chinese Scientists Plan Solar Power Station In Space 214

Posted by samzenpus
from the or-you-know-stop-polluting-so-much dept.
knwny points out this lofty proposed power plan in China. "The battle to dispel smog, cut greenhouse gases and solve the energy crisis is moving to space. If news reports are to be believed, Chinese scientists are mulling the construction of a solar power station in a geosynchronous orbit 36,000 kilometres above ground. The electricity generated would be converted to microwaves or lasers and transmitted to a collector on Earth. If realized, it will surpass the scale of the Apollo project and the International Space Station and be the largest-ever space project."
China

IBM and OpenPower Could Mean a Fight With Intel For Chinese Server Market 82

Posted by timothy
from the round-the-mulberry-bust dept.
itwbennett writes With AMD's fade out from the server market and the rapid decline of RISC systems, Intel has stood atop the server market all by itself. But now IBM, through its OpenPOWER Foundation, could give Intel and its server OEMs a real fight in China, which is a massive server market. As the investor group Motley Fool notes, OpenPOWER is a threat to Intel in the Chinese server market because the government has been actively pushing homegrown solutions over foreign technology, and many of the Foundation members, like Tyan, are from China.
Government

Notel Media Player Helps North Koreans Skirt Censorship 54

Posted by timothy
from the one-day-will-be-on-ebay.nk dept.
An anonymous reader writes A small portable media device, costing roughly $50, is allowing North Koreans to access and view foreign media despite tight government censorship, according to a Reuters report. The 'Notel', a mashup of notebook and television, is being described as a symbol of change in the repressed society. Used to watch DVDs and shared content from USB sticks and SD cards, the media player can be easily concealed and transported among families and friends. According to correspondents in the region, as many as half of all urban North Korean households have a notel and are swapping a broad range of banned media such as soaps and TV dramas from South Korea and China, Hollywood blockbusters, and news clips — all of which is strictly forbidden by Pyongyang law.
China

Github Under JS-Based "Greatfire" DDoS Attack, Allegedly From Chinese Government 114

Posted by Soulskill
from the year-of-the-ddos dept.
An anonymous reader writes: During the past two days, popular code hosting site GitHub has been under a DDoS attack, which has led to intermittent service interruptions. As blogger Anthr@X reports from traceroute lists, the attack originated from MITM-modified JavaScript files for the Chinese company Baidu's user tracking code, changing the unencrypted content as it passed through the great firewall of China to request the URLs github.com/greatfire/ and github.com/cn-nytimes/. The Chinese government's dislike of widespread VPN usage may have caused it to arrange the attack, where only people accessing Baidu's services from outside the firewall would contribute to the DDoS. This wouldn't have been the first time China arranged this kind of "protest."
Censorship

Feds Attempt To Censor Parts of a New Book About the Hydrogen Bomb 339

Posted by Soulskill
from the you-can't-do-that-on-bookovision dept.
HughPickens.com writes: The atom bomb — leveler of Hiroshima and instant killer of some 80,000 people — is just a pale cousin compared to the hydrogen bomb, which easily packs the punch of a thousand Hiroshimas. That is why Washington has for decades done everything in its power to keep the details of its design out of the public domain. Now William J. Broad reports in the NY Times that Kenneth W. Ford has defied a federal order to cut material from his new book that the government says teems with thermonuclear secrets. Ford says he included the disputed material because it had already been disclosed elsewhere and helped him paint a fuller picture of an important chapter of American history. But after he volunteered the manuscript for a security review, federal officials told him to remove about 10 percent of the text, or roughly 5,000 words. "They wanted to eviscerate the book," says Ford. "My first thought was, 'This is so ridiculous I won't even respond.'" For instance, the federal agency wanted him to strike a reference to the size of the first hydrogen test device — its base was seven feet wide and 20 feet high. Dr. Ford responded that public photographs of the device, with men, jeeps and a forklift nearby, gave a scale of comparison that clearly revealed its overall dimensions.

Though difficult to make, hydrogen bombs are attractive to nations and militaries because their fuel is relatively cheap. Inside a thick metal casing, the weapon relies on a small atom bomb that works like a match to ignite the hydrogen fuel. Today, Britain, China, France, Russia and the United States are the only declared members of the thermonuclear club, each possessing hundreds or thousands of hydrogen bombs. Military experts suspect that Israel has dozens of hydrogen bombs. India, Pakistan and North Korea are seen as interested in acquiring the potent weapon. The big secret the book discusses is thermal equilibrium, the discovery that the temperature of the hydrogen fuel and the radiation could match each other during the explosion (PDF). World Scientific, a publisher in Singapore, recently made Dr. Ford's book public in electronic form, with print versions to follow. Ford remains convinced the book "contains nothing whatsoever whose dissemination could, by any stretch of the imagination, damage the United States or help a country that is trying to build a hydrogen bomb." "Were I to follow all — or even most — of your suggestions," says Ford, "it would destroy the book."
Security

Chinese CA Issues Certificates To Impersonate Google 133

Posted by Soulskill
from the doing-trust-wrong dept.
Trailrunner7 writes: Google security engineers, investigating fraudulent certificates issued for several of the company's domains, discovered that a Chinese certificate authority was using an intermediate CA, MCS Holdings, that issued the unauthorized Google certificates, and could have issued certificates for virtually any domain. Google's engineers were able to block the fraudulent certificates in the company's Chrome browser by pushing an update to the CRLset, which tracks revoked certificates. The company also alerted other browser vendors to the problem, which was discovered on March 20. Google contacted officials at CNNIC, the Chinese registrar who authorized the intermediate CA, and the officials said that they were working with MCS to issue certificates for domains that it registered. But, instead of simply doing that, and storing the private key for the registrar in a hardware security module, MCS put the key in a proxy device designed to intercept secure traffic.
IBM

IBM Will Share Tech With China To Help Build IT Industry There 108

Posted by Soulskill
from the different-tack-from-Google dept.
An anonymous reader sends this report from Reuters: IBM Corp will share technology with Chinese firms and will actively help build China's industry, CEO Virginia Rometty said in Beijing as she set out a strategy for one of the foreign firms hardest hit by China's shifting technology policies. IBM must help China build its IT industry rather than viewing the country solely as a sales destination or manufacturing base, Rometty said. ... [Her] remarks were among the clearest acknowledgements to date by a high-ranking foreign technology executive that companies must adopt a different tack if they are to continue in China amid growing political pressure. A number of U.S. technology companies operating in China are forming alliances with domestic operators, hoping a local partner will make it easier to operate in the increasingly tough environment for foreign businesses.
Windows

OEMs Allowed To Lock Secure Boot In Windows 10 Computers 362

Posted by Soulskill
from the feel-free-to-do-whatever-we-want-with-your-new-computer dept.
jones_supa writes: Hardware that sports the "Designed for Windows 8" logo requires machines to support UEFI Secure Boot. When the feature is enabled, the core software components used to boot the machine are verified for correct cryptographic signatures, or the system refuses to boot. This is a desirable security feature, because it protects from malware sneaking into the boot process. However, it has an issue for alternative operating systems, because it's likely they won't have a signature that Secure Boot will authorize. No worries, because Microsoft also mandated that every system must have a UEFI configuration setting to turn the protection off, allowing booting other operating systems. This situation may now change. At its WinHEC hardware conference in Shenzhen, China, Microsoft said the setting to allow Secure Boot to be turned off will become optional when Windows 10 arrives. Hardware can be "Designed for Windows 10," and offer no way to opt out of the Secure Boot lock down. The choice to provide the setting (or not) will be up to the original equipment manufacturer.
Piracy

Microsoft Offers Pirates Amnesty and Free Windows 10 Upgrades 322

Posted by Soulskill
from the fighting-fire-with-free-gasoline dept.
An anonymous reader writes: Microsoft will make Windows 10 available as a free upgrade even to pirated copies of other Windows operating systems in China. Terry Myerson of Microsoft's operating systems unit made the announcement at the WinHEC technology conference in Shenzhen, China, and then told Reuters, "We are upgrading all qualified PCs, genuine and non-genuine, to Windows 10." Microsoft has a history of attempting to tackle massive and rising software piracy rates in Asia and developing countries, and periodically offers low-cost "licence amnesties" to the worst-offending countries, such as Indonesia and Kenya. Update: 03/18 14:59 GMT by S : Microsoft has clarified that the free upgrade will be offered for unlicensed copies of Windows worldwide, not just in China.
The Military

US Asks Vietnam To Stop Russian Bomber Refueling Flights From Cam Ranh Air Base 273

Posted by timothy
from the well-it's-not-a-land-war-in-asia dept.
HughPickens.com writes Reuters reports that the United States has asked Vietnam to stop letting Russia use its former US base at Cam Ranh Bay to refuel nuclear-capable bombers engaged in shows of strength over the Asia-Pacific region. General Vincent Brooks, commander of the U.S. Army in the Pacific, says the Russian bombers have conducted "provocative" flights, including around the U.S. Pacific Ocean territory of Guam, home to a major American air base. Brooks said the planes that circled Guam were refueled by Russian tankers flying from the strategic bay, which was transformed by the Americans during the Vietnam War into a massive air and naval base. Russia's Defense Ministry confirmed that the airport at Cam Ranh was first used for staging Il-78 tankers for aerial refueling of Tu-95MS bombers in January 2014. Asked about the Russian flights in the region, the State Department official, who spoke on condition of anonymity, said Washington respected Hanoi's right to enter agreements with other countries but added that "we have urged Vietnamese officials to ensure that Russia is not able to use its access to Cam Ranh Bay to conduct activities that could raise tensions in the region."

Cam Ranh is considered the finest deepwater shelter in Southeast Asia. North Vietnamese forces captured Cam Ranh Bay and all of its remaining facilities in 1975. Vietnam's dependence on Russia as the main source of military platforms, equipment, and armaments, has now put Hanoi in a difficult spot. Russia has pressed for special access to Cam Ranh Bay ever since it began delivering enhanced Kilo-class submarines to Vietnam. "Hanoi is invariably cautious and risk adverse in its relations with the major powers," says Carl Thayer. "The current issue of Russian tankers staging out of Cam Ranh pits Russia and China on one side and the United States on the other. There is no easy solution for Vietnam."
Earth

In Historic Turn, CO2 Emissions Flatline In 2014, Even As Global Economy Grows 283

Posted by Soulskill
from the getting-better-at-not-getting-worse dept.
mdsolar sends this report from Forbes: A key stumbling block in the effort to combat global warming has been the intimate link between greenhouse gas emissions and economic growth. When times are good and industries are thriving, global energy use traditionally increases and energy-related carbon dioxide emissions also go up. Only when economies stumble and businesses shutter — as during the most recent financial crisis — does energy use typically decline, in turn bringing down planet-warming emissions.

But for the first time in nearly half a century, that synchrony between economic growth and energy-related emissions seems to have been broken, according to the Paris-based International Energy Agency, prompting its chief economist to wonder if an important new pivot point has been reached — one that decouples economic vigor and carbon pollution. The IEA pegged carbon dioxide emissions for 2014 at 32.3 billion metric tons — essentially the same volume as 2013, even as the global economy grew at a rate of about 3 percent. Whether the disconnect is a mere fluke or a true harbinger of a paradigm shift is impossible to know. The IEA suggested that decreasing use of coal in China — and upticks in renewable electricity generation there using solar, wind and hydropower — could have contributed to the reversal.
Censorship

Reporters Without Borders Unblocks Access To Censored Websites 37

Posted by timothy
from the look-over-here-instead dept.
Mark Wilson writes Online censorship is rife. In many countries, notably China, citizens are prevented from accessing certain websites at the behest of their government. To help provide access to information and unbiased news, freedom of information organization Reporters Without Borders has set up mirrors to nine censored websites so they can be accessed from 11 countries that blocked them. As part of Operation Collateral Freedom, Reporters Without Borders is mirroring the likes of The Tibet Post International which is blocked in China, and Gooya News which is blocked in Iran. Mirrored sites are hosted on Amazon, Microsoft and Google servers which are unlikely to be blocked by a censoring country.
China

Knock-Off Apple Watches Hit the Chinese Market Less Than 24 Hours After Launch 156

Posted by samzenpus
from the that-didn't-take-very-long dept.
schwit1 writes Fake versions of the Apple Watch can be bought for as little as £25 — despite the fact the real thing will set you back more than 10 times that. The flagship new product was only launched in San Francisco yesterday but knock-offs are already available in China. According to CNN Money, they can be found at Huaqiangbei electronics market in the southern city of Shenzhen, and others are being sold nationwide via popular e-commerce websites. Right down to the digital crown, the fakes mimic the design and style of Apple's new offering.
Businesses

Reactions to the New MacBook and Apple Watch 450

Posted by Soulskill
from the wrist-not-hip-enough dept.
As the dust settles from Apple's press conference yesterday, there have been a broad variety of reactions around the web. Robinson Meyer at The Atlantic says Apple's $10,000 watch demonstrates the company has lost its soul. "The prices grate. And they grate not because they’re so expensive, but because they’re gratuitously expensive. ... To many commentators, this is unsurprising. It’s good business sense, really. Apple has made its world-devouring profits by ratcheting up profit margins on iPhones. There is no better target for these massive margins than the super-rich. But high margins do not a luxury brand make." Others suspect the high-end watches are targeted more at rich people in China.

As for the less expensive watches, perhaps they're around not so much to become a new major sales category for Apple, but rather to drive more iPhone sales. Meanwhile, the redesigned MacBook may signify a bigger change for the laptop industry than people realize: "We don’t need all those other ports, Apple says. We are living in a wireless world now, where we can connect most of our peripherals without cords." The new MacBook has also fueled speculation that Apple could be working on a more powerful tablet, something that could compete with Microsoft's Surface Pro line.
Encryption

UK Parliament: Banning Tor Is Unacceptable and Technologically Impossible 98

Posted by Soulskill
from the moments-of-clarity dept.
An anonymous reader writes: Months after UK prime minister David Cameron sought to ban strong encryption, a new parliamentary briefing contradicts that, at least when it comes to Tor. The briefing says, "there is widespread agreement that banning online anonymity systems altogether is not seen as an acceptable policy option in the UK. Even if it were, there would be technical challenges." The briefing cites Tor's ability to circumvent such censorship in countries like China as well as looking at both legal and illegal uses of Tor.
China

China's Arthur C. Clarke 187

Posted by timothy
from the visionaries-are-unevenly-distributed dept.
HughPickens.com writes Joshua Rothman has a very interesting article in The New Yorker about Liu Cixin, China's most popular science-fiction writer. The author of thirteen books has retained his day job as a computer engineer with a State-run power plant in a remote part of Shanxi province, because it helps him to stay grounded, enabling him to "gaze at the unblemished sky" as many of his co-workers do. In China, Cixin is about as famous as William Gibson in the United States and Cixin is often compared to Arthur C. Clarke, whom he cites as an influence. Rothman writes that American science fiction draws heavily on American culture, of course—the war for independence, the Wild West, film noir, sixties psychedelia—and so humanity's imagined future often looks a lot like America's past. For an American reader, one of the pleasures of reading Liu is that his stories draw on entirely different resources.

For example, in The Wages of Humanity, visitors from space demand the redistribution of Earth's wealth, and explain that runaway capitalism almost destroyed their civilization. In Taking Care of Gods, the hyper-advanced aliens who, billions of years ago, engineered life on Earth descend from their spaceships; they turn out to be little old men with canes and long, white beards. "We hope that you will feel a sense of filial duty towards your creators and take us in," they say. "I doubt that any Western sci-fi writer has so thoroughly explored the theme of filial piety," writes Rothman. In another story, The Devourer, a character asks, "What is civilization? Civilization is devouring, ceaselessly eating, endlessly expanding." But you can't expand forever; perhaps it would be better, another character suggests, to establish a "self-sufficient, introspective civilization." "At the core of Liu's sensibility," concludes Rothamn, "is a philosophical interest in the problem of limits. How should we react to the inherent limitations of life? Should we push against them or acquiesce?"
Businesses

Amazon Opening Imported Goods Store On Alibaba 31

Posted by timothy
from the goes-both-ways dept.
itwbennett (1594911) writes "Amazon is usually on the other end of the 'if you can't beat em, join em' dynamic. But next month Amazon is launching a store on Alibaba's Tmall.com site to get access to some of the Chinese online retail giant's 265 million monthly active users. Amazon already has its own e-commerce site geared for the country, but its share of China's online retail market is only 0.8 percent, according to Beijing-based research firm Analysys International. Alibaba, in contrast, controls three quarters of the market through its Tmall and Taobao Marketplace sites."
China

Chinese Government Takes Down Anti-Pollution Documentary "Under The Dome" 87

Posted by timothy
from the go-about-your-business dept.
An anonymous reader writes with a link to BBC's report that [A]uthorities in China have removed from websites a popular documentary which highlights the country's severe pollution problem. Under the Dome explains the social and health costs of pollution, and was watched by more than 100 million people online, sparking debates. It was removed just two days after Premier Li Keqiang called pollution a blight on people's lives. Searching YouTube gives you a pretty good idea of what the Chinese government doesn't want people to see.
Privacy

Schneier: Either Everyone Is Cyber-secure Or No One Is 130

Posted by Soulskill
from the nobody's-safe-except-the-amish dept.
Presto Vivace sends a new essay from Bruce Schneier called "The Democratization of Cyberattack." Quoting: When I was working with the Guardian on the Snowden documents, the one top-secret program the NSA desperately did not want us to expose was QUANTUM. This is the NSA's program for what is called packet injection--basically, a technology that allows the agency to hack into computers.Turns out, though, that the NSA was not alone in its use of this technology. The Chinese government uses packet injection to attack computers. The cyberweapons manufacturer Hacking Team sells packet injection technology to any government willing to pay for it. Criminals use it. And there are hacker tools that give the capability to individuals as well. ... We can't choose a world where the U.S. gets to spy but China doesn't, or even a world where governments get to spy and criminals don't. We need to choose, as a matter of policy, communications systems that are secure for all users, or ones that are vulnerable to all attackers. It's security or surveillance.