Government

Congress Is Looking To Extend Copyright Protection Term To 144 Years (wired.com) 274

"Because it apparently isn't bad enough already, Congress is looking to extend the copyright term to 144 years," writes Slashdot reader llamalad. "Please write to your representatives and consider donating to the EFF." American attorney Lawrence Lessig writes via Wired: Almost exactly 20 years ago, Congress passed the Sonny Bono Copyright Term Extension Act, which extended the term of existing copyrights by 20 years. The Act was the 11th extension in the prior 40 years, timed perfectly to assure that certain famous works, including Mickey Mouse, would not pass into the public domain. Immediately after the law came into force, a digital publisher of public domain works, Eric Eldred, filed a lawsuit challenging the act [which the Supreme Court later rejected].

Twenty years later, the fight for term extension has begun anew. Buried in an otherwise harmless act, passed by the House and now being considered in the Senate, this new bill purports to create a new digital performance right -- basically the right to control copies of recordings on any digital platform (ever hear of the internet?) -- for musical recordings made before 1972. These recordings would now have a new right, protected until 2067, which, for some, means a total term of protection of 144 years. The beneficiaries of this monopoly need do nothing to get the benefit of this gift. They don't have to make the work available. Nor do they have to register their claims in advance.

Crime

Alleged Owners of Mugshots.com Have Been Arrested For Extortion (lawandcrime.com) 101

Reader schwit1 writes: The alleged owners of Mugshots.com have been charged and arrested. These four men Sahar Sarid, Kishore Vidya Bhavnanie, Thomas Keesee, and David Usdan only removed a person's mugshot from the site if this individual paid a "de-publishing" fee, according to the California Attorney General on Wednesday. That's apparently considered extortion. On top of that, they also face charges of money laundering, and identity theft.

If you read a lot of articles about crime, then you're probably already familiar with the site (which is still up as of Friday afternoon). They take mugshots, slap the url multiple times on the image, and post it on the site alongside an excerpt from a news outlet that covered the person's arrest. According to the AG's office, the owners would only remove the mugshots if the person paid a fee, even if the charges were dismissed. This happened even if the suspect was only arrested because of "mistaken identity or law enforcement error." You can read the affidavit here.

Businesses

The Internet of Trash: IoT Has a Looming E-Waste Problem (ieee.org) 78

As we add computing and radios to more things, we're also adding to the problem of e-waste. The United Nations found that people generated 44.7 million metric tons of e-waste globally in 2016, and expects that to grow to 52.2 million metric tons by 2021. From a report: There are two issues. We're adding semiconductors to products that previously had none, and we're also shortening the life of devices as we add more computing, turning products that might last 15 years into ones that must be replaced every five years. In fact, many small connected devices such as trackers, jewelry, or wearables are designed to fail once the battery dies. At that point, the consumer tosses it out and buys another.
Programming

Ask Slashdot: What's the Most Sophisticated Piece of Software Ever Written? (quora.com) 232

An anonymous reader writes: Stuxnet is the most sophisticated piece of software ever written, given the difficulty of the objective: Deny Iran's efforts to obtain weapons grade uranium without need for diplomacy or use of force, John Byrd, CEO of Gigantic Software (formerly Director of Sega and SPM at EA), argues in a blog post, which is being widely shared in developer circles, with most agreeing with Byrd's conclusion.

He writes, "It's a computer worm. The worm was written, probably, between 2005 and 2010. Because the worm is so complex and sophisticated, I can only give the most superficial outline of what it does. This worm exists first on a USB drive. Someone could just find that USB drive laying around, or get it in the mail, and wonder what was on it. When that USB drive is inserted into a Windows PC, without the user knowing it, that worm will quietly run itself, and copy itself to that PC. It has at least three ways of trying to get itself to run. If one way doesn't work, it tries another. At least two of these methods to launch itself were completely new then, and both of them used two independent, secret bugs in Windows that no one else knew about, until this worm came along."

"Once the worm runs itself on a PC, it tries to get administrator access on that PC. It doesn't mind if there's antivirus software installed -- the worm can sneak around most antivirus software. Then, based on the version of Windows it's running on, the worm will try one of two previously unknown methods of getting that administrator access on that PC. Until this worm was released, no one knew about these secret bugs in Windows either. At this point, the worm is now able to cover its tracks by getting underneath the operating system, so that no antivirus software can detect that it exists. It binds itself secretly to that PC, so that even if you look on the disk for where the worm should be, you will see nothing. This worm hides so well, that the worm ran around the Internet for over a year without any security company in the world recognizing that it even existed."
What do Slashdot readers think?
Music

'Yanny vs. Laurel' Reveals Flaws In How We Listen To Audio (theproaudiofiles.com) 231

Unless you've been living under a rock for the past few days, you've probably heard about the controversy over "Yanny" and "Laurel." The internet has been abuzz over an audio clip in which the name being said depends on the listener. Some hear "Laurel" while others hear "Yanny." Ian Vargo, an audio enthusiast who spends most of his working hours of the day listening to and editing audio, helps explain why we hear the name that we do: Human speech is actually composed of many frequencies, in part because we have a resonant chest cavity which creates lower frequencies, and the throat and mouth which creates higher frequencies. The word "laurel" contains a combination of both which are therefore present in the original recording at vocabulary.com, but the clip that you most likely heard has accentuated higher frequencies due to imperfections in the audio that were created by data compression. To make it worse, the playback device that many people first heard the audio clip playing out of was probably a speaker system built into a cellular phone, which is too small to accurately recreate low frequencies.

This helpful interactive tool from The New York Times allows you to use a slider to more clearly hear one or the other. Pitch shifting the audio clip up seems to accentuate "laurel" whereas shifting it down accentuates "yanny." In summary, this perfect storm of the human voice creating both low and high frequencies, the audio clip having been subject to data compression used to create smaller, more convenient files, and our tendency to listen out of devices with subpar playback components lead to an apparent near-even split of the population hearing "laurel" or "yanny."

Music

YouTube Unveils New Streaming Service 'YouTube Music,' Rebrands YouTube Red (gizmodo.com) 105

An anonymous reader quotes a report from Gizmodo: YouTube Music, a streaming music platform designed to compete with the likes of Spotify and Apple Music, officially has a launch date: May 22nd. Its existence will also shift around YouTube and Google's overall media strategy, which has thus far been quite the mess. YouTube Music will borrow the Spotify model and offer a free, ad-supported tier as well as a premium version. The paid tier, which will be called YouTube Music Premium, will be available for $9.99 per month. It will debut in the U.S., Australia, New Zealand, Mexico, and South Korea before expanding to 14 other countries.

One of the selling points for YouTube Music will be the ability to harness the endless amount of information Google knows about you, which it will use to try to create customized listening experiences. Pitchfork reported that the app, with the help of Google Assistant, will make listening recommendations based on the time of day, location, and listening patterns. It will also apparently offer "an audio experience and a video experience," suggesting perhaps an emphasis on music videos and other visual content. From here, Google seems to be focused on making its streaming strategy a little less wacky. Google Play Music, the company's previous music streaming service that is still inexplicably up and running despite teetering on the brink of extinction for years, will slowly be phased out according to USA Today.
Meanwhile, the paid streaming subscription service, known as YouTube Red, is being rebranded to YouTube Premium and will cost $11.99 per month instead of $9.99. (Pitchfork notes that existing YouTube Red subscribers will be able to keep their $9.99 rate.) YouTube Premium will include access to YouTube Music Premium. Here's a handy-dandy chart that helps show what is/isn't included in the two plans.
Twitter

Twitter Will Start Hiding Tweets That 'Detract From the Conversation' (slate.com) 183

Yesterday, Twitter announced several new changes to quiet trolls and remove spam. According to Slate, the company "will begin hiding tweets from certain accounts in conversations and search results." In order to see them, you'll now have to scroll to the bottom of the conversation and click "Show more replies," or go into your search settings and choose "See everything." From the report: When Twitter's software decides that a certain user is "detract[ing] from the conversation," all of that user's tweets will be hidden from search results and public conversations until their reputation improves. And they won't know that they're being muted in this way; Twitter says it's still working on ways to notify people and help them get back into its good graces. In the meantime, their tweets will still be visible to their followers as usual and will still be able to be retweeted by others. They just won't show up in conversational threads or search results by default. The change will affect a very small fraction of users, explained Twitter's vice president of trust and safety, Del Harvey -- much less than 1 percent. Still, the company believes it could make a significant difference in the average user's experience. In early testing of the new feature, Twitter said it has seen a 4 percent drop in abuse reports in its search tool and an 8 percent drop in abuse reports in conversation threads.
Google

Google Fixes Issue That Broke Millions of Web-Based Games in Chrome (bleepingcomputer.com) 37

Google this week rolled out an update to Chrome to patch a bug that had rendered millions of web-based games useless. From a report: The bug was introduced in mid-April when Google launched Chrome 66. One of this release's features was its ability to block web pages with auto-playing audio. [...] Not all games were affected the same. For some HTML5 games, users could re-enable audio by interacting with the game's canvas via a click-to-play interaction. Unfortunately, older games and those that weren't coded with such policy remained irrevocably broken, no matter what Chrome options users tried to modify in their settings sections. [...] With today's release of Chrome for Desktop v66.0.3359.181, Google has now fixed this issue, but only temporarily. John Pallett, a product manager at Google, admitted that Google "didn't do a good job of communicating the impact of the new autoplay policy to developers using the Web Audio API." He said, for this reason, the current version of Chrome, v66, will no longer automatically mute Web Audio objects.
Businesses

Senate Votes To Save Net Neutrality (gizmodo.com) 288

In a monumental decision that will resonate through election season, the U.S. Senate on Wednesday voted to reinstate the net neutrality protections the Federal Communications Commission decided to repeal late last year. From a report: For months, procedural red tape has delayed the full implementation of the FCC's decision to drop Title II protections that prevent internet service providers from blocking or throttling online content. Last week, FCC Chairman Ajit Pai confirmed that the repeal of the 2015 Open Internet Order would go into effect on June 11. But Democrats put forth a resolution to use its power under the Congressional Review Act (CRA) to review new regulations by federal agencies through an expedited legislative process. All 49 Democrats in the Senate supported the effort to undo the FCC's vote. Republicans, Sen. Susan Collins of Maine, John Kennedy of Louisiana and Lisa Murkowski of Alaska crossed party lines to support the measure. Further reading: ArsTechnica.
Youtube

YouTube Might Finally Get An Incognito Mode (androidpolice.com) 61

Currently, you can head to the "History and Privacy" settings in YouTube and toggle on the options to pause watch and search history if you don't want the site to track your searches and watched videos, but that can be a bit complicated each time you want to search for something weird. According to Android Police, "YouTube will make it a little easier to go into incognito without digging into many settings and without having to disable it later." A new "Incognito Mode" will appear when you tap your account avatar in the top right of the app. From the report: With "Incognito Mode" on, all your activity from the current session is not saved and subscriptions are hidden too. It's as if you were signed out without being so, and there's a neat incognito icon replacing your avatar. If you turn off Incognito or become inactive on YouTube, you'll be back to using your own account.
The Almighty Buck

Comcast Charges $90 Install Fee At Homes That Already Have Comcast Installed (arstechnica.com) 141

An anonymous reader quotes a report from Ars Technica: Based on our tests, signing up for standalone Internet or TV service on Comcast.com often requires payment of a $59.99 or $89.99 installation fee, depending on where you live. (The fee was $60 in two Massachusetts suburbs and $90 at homes in Houston, Texas, and Seattle, Washington.) In cases where the $60 or $90 fee is charged, the fee is required whether you purchase your own modem or rent one from Comcast for another $11 a month.

The installation fee might be charged even if the home you're buying service at has existing Comcast service, and even if you order Internet speeds lower than those purchased by the current occupant. That means the fee is charged even when Comcast doesn't have to make any upgrades at the house or apartment you're moving into. Internet speed makes no difference, as the fee may be charged whether you purchase 15Mbps downloads or gigabit service. You can avoid the installation fee by purchasing certain bundles that include both TV and Internet, but the fee is often mandatory if you buy only TV service or broadband individually. The $60 or $90 fee is also charged when you buy phone service only or a "double-play" package of phone service and broadband.

Businesses

FedEx Sees Blockchain as 'Next Frontier' For Logistics (bloomberg.com) 106

Convinced that blockchain is on the brink of transforming the package-delivery business, FedEx is testing the technology to track large, higher-value cargo. From a report: "We're quite confident that it has big, big implications in supply chain, transportation and logistics," Chief Executive Officer Fred Smith said at a blockchain conference in New York. "It's the next frontier that's going to completely change worldwide supply chains." Blockchain uses computer code to record every step of a transaction and delivery in a permanent digital ledger, providing transparency. The ledger can't be changed unless all involved agree, reducing common disputes over issues like time stamps, payments and damages. FedEx's interest in blockchain and the Internet of Things are part of the company's strategy to improve customer service and fend off competition, Smith said.
The Internet

The Rise of Free Urban Internet (axios.com) 78

Intersection, the Alphabet-backed smart cities startup known for creating free internet kiosks for cities, is pushing to make free internet accessible in as many major cities as possible across the globe. From a report: As more aspects of our daily lives -- from healthcare to communication to travel -- become dependent on internet-connected devices, the concept of providing internet as a public good is becoming more widespread. Intersection is best known for its successful transformation of NYC's 7,500 pay-phones into free internet kiosks that act as hot-spots and advertising space. It's also spreading its programs to cities like Philadelphia, Chicago, and even London. The program is entirely funded by advertising that the company sells on LinkNYC internet kiosks, so less densely-populated cities may be a tougher sell.
Facebook

Facebook Faulted By Judge For 'Troubling Theme' In Privacy Case (bloomberg.com) 61

schwit1 quotes a report from Bloomberg: A judge scolded Facebook for misconstruing his own rulings as he ordered the company to face a high-stakes trial accusing it of violating user privacy. The social media giant has misinterpreted prior court orders by continuing to assert the "faulty proposition" that users can't win their lawsuit under an Illinois biometric privacy law without proving an "actual injury," U.S. District Judge James Donato said in a ruling Monday. Likewise, the company's argument that it's immune from having to pay a minimum of $1,000, and as much as $5,000, for each violation of the law is "not a sound proposition," he said. Under the Illinois Biometric Information Privacy Act, the damages in play at a jury trial set for July 9 in San Francisco could easily reach into the billions of dollars for the millions of users whose photos were allegedly scanned without consent. Apart from his concerns about the "troubling theme" in Facebook's legal arguments, Donato ruled a trial must go forward because there are multiple factual issues in dispute, including a sharp disagreement over how the company's photo-tagging software processes human faces.
Intel

Intel's First 10nm Cannon Lake CPU Sees the Light of Day (anandtech.com) 184

Artem Tashkinov writes: A Chinese retailer has started selling a laptop featuring Intel's first 10nm CPU the Intel Core i3 8121U. Intel promised to start producing 10nm CPUs in 2016 but the rollout has been postponed almost until the second half of 2018. It's worth noting that this CPU does not have integrated graphics enabled and features only two cores.

AnandTech opines: "This machine listed online means that we can confirm that Intel is indeed shipping 10nm components into the consumer market. Shipping a low-end dual core processor with disabled graphics doesn't inspire confidence, especially as it is labelled under the 8th gen designation, and not something new and shiny under the 9th gen -- although Intel did state in a recent earnings call that serious 10nm volume and revenue is now a 2019 target. These parts are, for better or worse, helping Intel generate some systems with the new technology. We've never before seen Intel commercially use low-end processors to introduce a new manufacturing process, although this might be the norm from now on."

Communications

Slashdot Asks: Which Is Your Favorite Email Client? 404

With Google recently rolling out a big revamp of Gmail to mixed reviews, we would like to know which email client you prefer. Are you a firm believe in the "inbox zero" idea -- that is, the approach to email management aimed at keeping the inbox empty, or almost empty, at all times? If you're looking for inspiration, Ars Technica recently published an article highlighting several different email clients used by the editors of the site: Are you the sort of person who needs to read and file every email they get? Or do you delight in seeing an email client icon proudly warning of hundreds or even thousands of unread items? For some, keeping one's email inbox with no unread items is more than just a good idea: it's a way of life, indicating control over the 21st century and its notion of productivity. For others, it's a manifestation of an obsessively compulsive mind. The two camps, and the mindsets behind them, have been a frequent topic of conversation here in the Ars Orbiting HQ. And rather than just argue with each other on Slack, we decided to collate our thoughts about the whole "inbox zero" idea and how, for those who adhere to it, that happens. Some of the clients floated by the editors include: Webmail, Airmail 3, Readdle's Spark, Edison Mail, Sparrow, Inbox by Gmail, and MailSpring.
Encryption

Encrypted Email Has a Major, Divisive Flaw (wired.com) 116

An anonymous reader quotes a report from Wired: The ubiquitous email encryption schemes PGP and S/MIME are vulnerable to attack, according to a group of German and Belgian researchers who posted their findings on Monday. The weakness could allow a hacker to expose plaintext versions of encrypted messages -- a nightmare scenario for users who rely on encrypted email to protect their privacy, security, and safety. The weakness, dubbed eFail, emerges when an attacker who has already managed to intercept your encrypted emails manipulates how the message will process its HTML elements, like images and multimedia styling. When the recipient gets the altered message and their email client -- like Outlook or Apple Mail -- decrypts it, the email program will also load the external multimedia components through the maliciously altered channel, allowing the attacker to grab the plaintext of the message.

The eFail attack requires hackers to have a high level of access in the first place that, in itself, is difficult to achieve. They need to already be able to intercept encrypted messages, before they begin waylaying messages to alter them. PGP is a classic end-to-end encryption scheme that has been a go-to for secure consumer email since the late 1990s because of the free, open-source standard known as OpenPGP. But the whole point of doing the extra work to keep data encrypted from the time it leaves the sender to the time it displays for the receiver is to reduce the risk of access attacks -- even if someone can tap into your encrypted messages, the data will still be unreadable. eFail is an example of these secondary protections failing.

Facebook

Researchers Reportedly Exposed Facebook Quiz Data On 3 Million Users (newscientist.com) 19

According to a report from New Scientist, researchers exposed quiz data on over three million Facebook users via an insecure website. The data includes answers to intimate questionnaires, and was held by academics from the University of Cambridge's Psychometrics Centre. While the breach isn't as severe as the Cambridge Analytica leak, it is distantly connected as the project previously involved Alexandr Kogan, the researcher at the center of the scandal. From the report: Facebook suspended myPersonality from its platform on April 7 saying the app may have violated its policies due to the language used in the app and on its website to describe how data is shared. More than 6 million people completed the tests on the myPersonality app and nearly half agreed to share data from their Facebook profiles with the project. All of this data was then scooped up and the names removed before it was put on a website to share with other researchers. The terms allow the myPersonality team to use and distribute the data "in an anonymous manner such that the information cannot be traced back to the individual user."

However, for those who were not entitled to access the data set because they didn't have a permanent academic contract, for example, there was an easy workaround. For the last four years, a working username and password has been available online that could be found from a single web search. Anyone who wanted access to the data set could have found the key to download it in less than a minute.

The Internet

Chrome Tests Picture-in-Picture API To Show Floating Video Popups Outside the Browser (bleepingcomputer.com) 150

Browser makers are working on a new W3C API that will standardize Picture-in-Picture (PiP) mode and allow websites to show a floating video popup outside the browser window itself. From a report: In the past, picture-in-picture has only been supported inside a web page's canvas as a floating window that only appeared inside the current website, as the user scrolled up and down the page. Some platforms added support for a picture-in-picture mode, but those were OS-specific APIs that worked with all sorts of video apps, not just browsers. Now, the Web Platform Incubator Community Group (WICG) at the World Wide Web Consortium (W3C), has released details about a browser-specific API for standardizing picture-in-picture interactions that allow websites to open an external "floating video" popup outside the browser window itself. [...] Chrome and Safari have already shipped out the new Picture-in-Picture API.
The Internet

Top-Level Domain .App Is Now Open For General Registration (googleblog.com) 81

Christina Chiou Yeh, writing for Google Registry: On May 1 we announced .app, the newest top-level domain (TLD) from Google Registry. It's now open for general registration so you can register your desired .app name right now. We begin our journey with sitata.app, which provides real-time travel information about events like protests or transit strikes. Looks all clear, so our first stop is the Caribbean, where we use thelocal.app and start exploring. After getting some sun, we fly to the Netherlands, where we're feeling hungry. Luckily, picnic.app delivers groceries, right to our hotel. With our bellies full, it's time to head to India, where we use myra.app to order the medicine, hygiene, and baby products that we forgot to pack. Did we mention this was a business trip? Good thing lola.app helped make such a complex trip stress free. Time to head home now, so we slip on a hoodie we bought on ov.app and enjoy the ride.

Slashdot Top Deals