Stories in the Pipe

These are stories waiting to be published to the main page. Remember, anyone can submit a new story!

Apple idiot waits 10 days for the wrong phone
by Anonymous Coward on 2017-09-14 13:29
Just when you thought Apple fanatics could not get any idiotic someone has lowered the bar again. A man designated as "The Apple Idiot" lined up for days outside an Apple store for the wrong phone. The man thought he was lining up for an iPhone X, only to find after days of waiting that the phone he was waiting to buy was the iPhone 8, a phone he doesn't like. A true Apple fanatic, the man complained about the upcoming iPhone X costing between $1579 and $1829 while praising it yet to be confirmed features while confirming that he will line up again when the iPhone X is actually due to be released.
iPhone X boon for airport security
by Anonymous Coward on 2017-09-12 23:35

For the last few years an added stress when flying has been having security rifle through your phone and laptop looking for incriminating information. Being haranged for your social media credentials, your phone password, and email is now a thing of the past. Airport security can unlock your iPhone X by holding it up to your face. This should speed up the security checks at airports considerably. Security already take passenger phones, they just need to hold it up to each person's face to unlock the phone so the data can be extracted. Thanks, Apple.
Best IDE for Java Developers- Java IDE
by dheerajtiwari@pipedot.org on 2017-08-27 07:18
Java is the trend languages of programming and you should know which IDE to use when you are about to start java programming or if you want to change the development environment to make it smoother and easier then you should check these java IDE, this article has some of the finest IDEs to use which is useful for beginners as well as professionals.

Port jacking undermines phone two-factor authentication
by Anonymous Coward on 2017-08-26 10:46
Two-factor authentication is touted as being the best type of security currently available for everyday users as it puts a password or token out of reach of thieves. Until recently, this method of security was annoying but somewhat reliable. Not now. Mobile phone porting is being used to defeat two-factor authentication to gain access to people's bank accounts, their social network and whole lives via email accounts. Hundreds of complains have been made to authorities about phone numbers being hijacked. Port jackers have successfully stolen thousands of dollars from victims with the number of reports for this type of theft increasing. In a statement Australia Telco said that they recognise the threat and are working on it.
Privacy concerns cloud Aus marriage vote
by Anonymous Coward on 2017-08-21 22:50
1 comment
Concerns have been raised that the Australian Bureau of Statistics is going to use the Australian Marriage Law Postal Survey to verify the failed 2016 census with the intent on penalising those who dodged the census or provided false information, use the the information collected to generate funds and may link the vote to each person. The ABS has denied this. Given the #CensusFAIL of the ABS in 2016 Australians are wondering why this task was given to an agency for which is not widely trusted by the population.
Java Tutorial
by Anonymous Coward on 2017-08-16 10:50
This tutorial is very useful for beginners to learn Java Programming, JSP, Java Applets etc with example programs..
C Tutorial
by Anonymous Coward on 2017-08-16 10:47
Hi all
This tutorial is very useful for beginners to learn C programming. C language topics identifiers, keywords, tokens, datatypes, constants, dynamic memory allocation, constants, arrays, structure, union, functions, type casting etc are explained with example programs.

Terrot plan prompts American security theater in Australia
by Anonymous Coward on 2017-08-06 09:31
Australia is considering the implementation of full body scanners, aka pornoscanners, in all domestic airports after two Muslims were prevented from attempting to detonate an improvised explosive device on a flight from Sydney to Abu Dhabi. The proposed changes have been described as security theater mimicking American airline practices. Khaled Mahmoud Kayat and Mahmoud Kayat have been charged with preparation for or planning a terrorist act after attempting to smuggle an IED onto a plane. Authorities have confirmed that a brother of the accused terrorists is a known islamic state commander. In response to this incident the Australian government is considering implementing biometric checks by iris or fingerprint. Given that the Australian government is already aware of key factors of terrorism the proposed increased security measures are being labelled as security theater for which will do nothing more than increase costs to fly, increase the time required to board flights, annoy passengers and further erode the privacy of passengers.
Hans Reiser is a Prisoner of False Love. (Also: Bruce Perens has no response) (Was: Re: GrSecurity)
by Anonymous Coward on 2017-08-03 08:46
Re: MikeeUSA -- Notice Bruce Perens has NO response (nor does Moglen). [Was: Re: GrSecurity]

Malformed ascii art saying "Don't feed the trolls"

IE: Can't attack the message, attack the man.

Because White Men Programmers simply do not know what they do not know and take proper, correct, legal analysis from a license attorney dealing with a relevant issue as "trolling".

Here's a response from another attorney:

Notice Bruce Perens has NO response.
Neither does Professor Moglen who apparently forgot to include a no-revocation clause in version 2 of the GPL when he drafted it, thus keeping open the possibility of any rights-holder to unilaterally recind their grant at any time for any reason so-long as they did not make a relied-upon communication to the grantee speaking otherwise.
(seemingly** completely negligent drafting of the document) (a no-revocation clause would atleast make it easier to claim estopple and prevent unilateral revocation*)

(Notice that the later edition; v3 (which linux is not licensed under) rectify this ommission (yes this is the main reason v3 had to be drafted, the patent issue is a foil))

But Bruce and Moglen are friends (and both look down on Hans Reiser; feeling disparagingly about his work because Hans Reiser obeyed the dictats of his God regarding the adulterous behavior of the wife Nina, and then further, Hans did not accept any other ruler/judge/power etc (thus rejecting the plea agreement))
thus Moglen stays silent as Bruce Perens libels me. They have their square glasses on, they love their civilization that raises the woman above the man, that makes the man a draft animal of the woman, and keeps the man's love: the young girl***, from him.

Bruce Perens and Professor Moglen have adopted the white man's belief system:
That the man is the beast upon which the woman rightly rides;
(rather than the Overlord (ba'al) of the female).

Bruce Perens, Moglen, etc look down on those who see beauty where it truly resides: in the young girl***.
Bruce Perens and Moglen are thus feel Superior for spurning what is actually good and embracing a pale shadow that seeks to collapse upon them.

*no guarantee however... this is an inherent right of a property owner... to recind unilateral grants,control his property, alienate it as he wished
** we do not know the requirements that the Client privately communicated for the drafting of the document
***( taking girl children as brides is permitted by the God under Deuteronomy 22, 28-29, hebrew )

Hans Reiser did nothing wrong according to the Book of the Law (Deuteronomy).
Still, he stays strong.
First A victim of false love
Now A prisoner of conscience.

On 2017-08-03 05:01, John Morris wrote:
> At the risk of lowering the signal to noise on this list even more, I'd
> like to note that about seven minutes before this new nym posted here it
> posted the same text to the Fedora users list. There was exactly one
> reply. I won't spoil it, go look it up because it worked.
> _______________________________________________
> Dng mailing list
> Dng@lists.dyne.org
> https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng
Advertising on pipedot.org
by Anonymous Coward on 2017-07-30 13:29

I would love the chance to purchase some advertising space on your website. I have a few clients that I think would be a great fit for your niche.

Please let me know if this is something you’d like to hear more about and we can take it from there.

Thanks for your time.
Stacey McConnell

Yes you have standing to sue GRSecurity.
by Anonymous Coward on 2017-07-29 12:58
It has come to my attention that some entities are claiming that you, dear Linux Hackers, (1)need to go through some foundation or get some permission from upon high in-order to sue the progenitors of GRSecurity for their violation of section 6 of the terms underwhich the linux kernel is distributed (version 2 of the GPL). And, furthermore, that (2)this foundation has no intention of bringing such a suit.

(1) is false.
(2) may very well be true.

You do have standing to sue GRSecurity for their blatant continuing copyright violation if GRSecurity has made a derivative work of your code contribution to the Linux Kernel as-long as (a)you have not assigned your copyrights, and (b)you are not a work-for-hire.

How do you know if you are a work for hire or if you have signed away your copyrights?
If you are working for a company and as your job duties you are programming the linux kernel, there is a good chance that you are a work for hire and thus the company owns said copyrights.

How do you know if you signed away your copyrights? Well if you singed a document transferring ownership of your copyrights for the code you produced at some point.

If you are not working for a company while hacking linux and you haven't assigned your copyrights away then YOU OWN YOUR CONTRIBUTIONS.

This means most of you hobby hackers, if GRSecurity has modified your code, YES YOU HAVE STANDING TO SUE.

Yes your "betters" are lying to you.
You have individual separate standing to sue.

Yes you SHOULD consult a lawyer of your own.
Yes you SHOULD consider a joint filing with other individual rights-holders willing to bring suit against GRSecurity for their blatant violation of your terms, and yes you should consider starting CLASS ACTION since the number of Linux Kernel Contributors seemingly numbers in the multitudes upon multitudes upon multitudes.

And yes, I am an attorney.
But no, I'm not looking for clients. Just correcting some false information that has been spreading.

And yes, GRSecurity will try to claim that the linux-kernel is a work of Joint ownership (so as to shield themselves via procedural law) and yes they will try to claim fair use (probably de minimus), and yes your Lawyer will have to respond to these claims. The Joint ownership claim will go down quickly but it will have to be responded to. De minimus Fair Use depends on how much code is modified and how signifigant the modifications are. Don't let anyone but your own legal council dissuade you from bringing suit: Remember the statute of limitations is only a few years, so the clock is ticking on the CURRENT violation.

Also make sure you register your copyright of the version of the linux-kernel that GRSecurity is using in its violation prior to bringing suit. The registration must be for the specific version. Yes you can register after the violation has occurred, however if you have registered before the violation then you can also pursue recovery of legal fees, pursue statutory damages, etc.

( NOTE: If you would like to read on how your copyright is being violated by GRSecurity, Bruce Perens posted a good write-up on his web-page )
( perens.com/blog/2017/06/28/warning-grsecurity-potential-contributory-infringement-risk-for-customers/ )
( There was also a discussion on the linux section of slashdot, and on the debian user mailing list, and on the dng devuan mailing list and on the openwall mailing list and the fedora legal mailing list )
Bruce Perens - Warning: Grsecurity: Potential contributory infringement and breach of contract risk
by Anonymous Coward on 2017-07-05 21:45
Bruce Perens issues an advisory regarding the GRSecurity copyright issue:
Warning: Grsecurity: Potential contributory infringement and breach of contract risk for customers

It’s my strong opinion that your company should avoid the Grsecurity product sold at grsecurity.net because it presents a contributory infringement and breach of contract risk.

Grsecurity is a patch for the Linux kernel which, it is claimed, improves its security. It is a derivative work of the Linux kernel which touches the kernel internals in many different places. It is inseparable from Linux and can not work without it. it would fail a fair-use test (obviously, ask offline if you don’t understand). Because of its strongly derivative nature of the kernel, it must be under the GPL version 2 license, or a license compatible with the GPL and with terms no more restrictive than the GPL. Earlier versions were distributed under GPL version 2.

Currently, Grsecurity is a commercial product and is distributed only to paying customers. My understanding from several reliable sources is that customers are verbally or otherwise warned that if they redistribute the Grsecurity patch, as would be their right under the GPL, that they will be assessed a penalty: they will no longer be allowed to be customers, and will not be granted access to any further versions of Grsecurity. GPL version 2 section 6 explicitly prohibits the addition of terms such as this redistribution prohibition.

By operating under their policy of terminating customer relations upon distribution of their GPL-licensed software, Open Source Security Inc., the owner of Grsecurity, creates an expectation that the customer’s business will be damaged by losing access to support and later versions of the product, if that customer exercises their re-distribution right under the GPL license. This is tantamount to the addition of a term to the GPL prohibiting distribution or creating a penalty for distribution. GPL section 6 specifically prohibits any addition of terms. Thus, the GPL license, which allows Grsecurity to create its derivative work of the Linux kernel, terminates, and the copyright of the Linux Kernel is infringed. The contract from the Linux kernel developers to both Grsecurity and the customer which is inherent in the GPL is breached.

As a customer, it’s my opinion that you would be subject to both contributory infringement and breach of contract by employing this product in conjunction with the Linux kernel under the no-redistribution policy currently employed by Grsecurity.

I have previously endorsed a company that distributes enhanced versions of GPL software to paying customers, but that company operated differently (and in a way that I would recommend to Grsecurity). They did not make any threat to customers regarding redistribution. They publicly distributed their commercial version within 9 months to one year after its customer-only distribution.

This other company was essentially receiving payment from its customers for the work of making new GPL software available to the public after a relatively short delay, and thus they were doing a public benefit and were, IMO, in compliance with the letter of GPL though perhaps not the spirit. In contrast, Grsecurity does no redeeming public service, and does not allow any redistribution of their Linux derivative, in direct contravention to the GPL terms.

In the public interest, I am willing to discuss this issue with companies and their legal counsel, under NDA, without charge.

I am an intellectual property and technology specialist who advises attorneys, not an attorney. This is my opinion and is offered as advice to your attorney. Please show this to him or her. Under the law of most states, your attorney who is contracted to you is the only party who can provide you with legal advice.
Australian Government Plans to Access Encrypted Messages
by Anonymous Coward on 2017-06-11 09:07
The Australian Government has a plan to access encrypted messages by changing laws to force telecommunications and technology firms to help authorities decrypt suspect messages. Instead of trying to decrypt messages in transit they plan on capturing message content at either end.
GRSecurity goes full commercial, no more free testing patches, threatens programmer trying to port.
by Anonymous Coward on 2017-06-09 19:17
1 comment
(*1) https://lwn.net/Articles/723169/
(*2) https://www.phoronix.com/forums/forum/software/general-linux-open-source/948623-grsecurity-kernel-patches-will-no-longer-be-free-to-the-public?page=1
(*3) https://www.embedded-linux.de/18-news/886-grsecurity-nicht-mehr-kostenlos-verfuegbar
(*4) https://www.theregister.co.uk/2017/04/26/grsecurity_linux_kernel_freeloaders/

GRSecurity removes public testing patch - goes full commercial.

(*5) http://www.openwall.com/lists/kernel-hardening/2017/06/04/24

>"Don't worry about it, there's nothing for a "grateful" user like yourself
>to download anymore. Boy, if I had more "grateful" users like yourself
>obsessed with harrassing us on Twitter, Reddit, and IRC so that they
>can go around and paint themselves as some kind of victim, I wouldn't
>know what to do with myself.

Brad Spengler prevents a private purchaser from redistributing the sourcecode via contract clauses between him and they: thus willfully frustrating the purpose of the license HE was granted by the linux kernel rightsholders. This is another reason a court may find him in violation of the license grant of the GPL. As we discussed previously. (See: ****)

Also Brad Spengler threatens others with lawsuit in a nearly transparent attempt to get them to stop porting over the work:

>" This stops *now* or I'm sending lawyers after you and

(*6) http://www.openwall.com/lists/kernel-hardening/2017/06/03/14

>Guys, this is your *last warning*. This stops *now* or I'm sending lawyers
>after you and the companies paying you to plagiarize our work and violate
>our *registered* copyright (which for the record entitles us to punitive
>damages which now are very easily provable). It's time to get serious
>about attribution -- what you are doing is completely unacceptable. I'm
>already in contact with lawyers to prepare for the next time this happens.
>If any of this plagiarized and misattributed code actually made it into
>the Linux kernel, you'd all be in a world of pain.

Here Brad Spengler threatens a copyright infringement lawsuit regarding his non-original wholly-derivative work.
(An original work stands alone). This while he threatens those paying customers who might redistribute the work (see: **** below).

Note: Copyright licenses (like any license to use the property of another (copyright is freely alienable in the same way real property is)) are freely revocable unless barred by estoppel. The GPL v2 lacks a no-revocation clause thus estoppel would be more difficult to argue (additonally none of the "agreeing parties" have ever met each other).

Note2: GrSecurity is a derivative work of the linux kernel, it is non-seperable: it wholly relies on the linux kernel source code to work.
Courts in both the US and Germany have reaffirmed that if a work based on another work cannot stand alone it is clearly a derivative work.
(See the Anime Subtitles case from a few years ago) (See page 6 of the phoronix discussion at *2 for a review)

Note3:The linux kernel is not under joint copyright, it is simply a collection of derivative work upon derivative work.

A simple solution is for one or many of the rightsholders to the code GRSecurity is derived from/ modifies to rescind Brad Spengler's license to use or modify their code.

Additionally copyright violation claims can be filed as Brad Spengler has reportedly attempted to frustrate the purpose of the agreement that allows him to modify the linux kernel in the first place; placing additional restrictions to prevent redistribution of the sourcecode (a court would not be fooled by such a scheme).

(Addionally there were third parties who contributed to the GRSecurity code base when it was publically distributed.)

Other snippets from (*5) include Mr Spengler's unhappiness with the publication of his scheme and RMS's opinion of it:
>... It has been nearly 4 months now and despite repeated follow-ups, I still
>haven't received anything back more than an automated reply. Likewise
>regarding some supposed claims by RMS which were published last year by
>internet troll mikeeusa -- I have been trying since June 3rd of last
>year to get any response from him, but have been unable to. So when you ...

RMS' opinion can be seen here:
(*7) https://lists.debian.org/debian-user/2016/06/msg00020.html

>Re: GRsecurity is preventing others from employing their rights under version 2 the GPL to redistribute source code
>Richard Stallman (May 31 2016 10:27 PM)
>[[[ To any NSA and FBI agents reading my email: please consider ]]]
>[[[ whether defending the US Constitution against all enemies, ]]]
>[[[ foreign or domestic, requires you to follow Snowden's example. ]]]
>If I understand right, this is a matter of GPL 2 on the Linux patches.
>Is that right? If so, I think GRsecurity is violating the GPL on
>Dr Richard Stallman
>President, Free Software Foundation (gnu.org, fsf.org)
>Internet Hall-of-Famer (internethalloffame.org)
>Skype: No way! See stallman.org/skype.html.

GRsecurity is preventing others from employing their rights under version 2 the GPL to redistribute
(by threatening them with a non-renewal of a contract to recive this patch to the linux kernel.)
(GRsecurity is a derivative work of the linux kernel (it is a patch))

People who have dealt with them have attested to this fact:
"You will also lose the access to the patches in the form of grsec not renewing the contract.
Also they've asked us (a Russian hosting company) for $17000+ a year for access their stable
patches. $17k is quite a lot for us. A question about negotiating a lower price was completely
ignored. Twice." -- fbt2lurker

And it is suggested to be the case here aswell:
"Do you work for some company that pays for Grsecurity? If so then would you kindly excersise the
rights given to you by GPL and send me a tarball of all the latest patches and releases?" --
"sadly (for this case) no, i work in a human rights organization where we get the patches by a
friendly and richer 3rd party of the same field. we made the compromise to that 3rd party to not
distribute the patches outside and as we deal with some critical situations i cannot afford to
compromise that even for the sake of gpl :/
the "dumber" version for unstable patches will make a big problem for several projects, i would
keep an eye on them. this situation cannot be hold for a long time" -- disturbio
A Gas Station in Space Could Allow Us to Reach Other Worlds
by pranjal@pipedot.org on 2017-05-22 08:02
Five students at Caltech Space Challenge present their idea on the benefits of such a station. They proposed their designs what a lunar launch and supply station for deep space missions.
Read full: Gas Station in Space
Now, Google AI Can Beat Human Engineers
by pranjal@pipedot.org on 2017-05-22 07:59
1 comment
Google has developed an artificial neural network to mimic the way the brain learns. The system is called as AutoML, that can develop networks that are more powerful, efficient, and easy to use.
Read full story here: Google AI
Theresa May to create a halal internet for UK
by Anonymous Coward on 2017-05-21 06:09
The UK is taking a step down the slippery slope with the announcement of the intention to lock down access to the internet in the UK which will result in a controlled, filtered, monitored and punitive style of internet access of restricted use similar to that of Iran's "Halal Internet". From the documents available, Theresa May promises to impose another era of Victorian morality on England based on the values her party deems to be ideal. Whether or not this will be extended outside of the internet, which would force brothels, sex toy shops, adult book shops, and massage parlours to close and may cancel Christmas, is unknown. May's party has not disclosed how far they intend to apply their moral code on UK society.
Where to see what's next on netflix in the Netherlands
by fransve@pipedot.org on 2017-05-17 16:19
1 comment
I wonder if anyone could help me with this. I really enjoy netflix series however i only know http://www.netflix-aanbod.nl and not so many other website to see what's new on netflix. Anyone ??
Keylogger found in HP audio driver, no one surprised
by Anonymous Coward on 2017-05-14 14:34
Is 2017 going to be remembered as "Year of the Security Breach"? Security researchers have discovered a keylogger in a HP audio driver. The keylogger has probably been active since 2015. 28 models of HP laptops are affected. Given that HP has 20% of the PC market millions of people could be affected.
While Australia rolls out fiber iinet offers VDSL with comparative speeds
by Anonymous Coward on 2017-05-09 13:02
The creation of a new fiber based broadband network in Australia has received a lot of bashing recently with the government switching from the original plan of fiber to the premises to fiber to the node to fiber to the curb and "multi technology mix using existing and new copper cabling. NBN Co. has been repeatedly criticized for going over budget and over time while costing the taxpayers money for damage to existing facilities and unnecessary work. The NBN is supposed to deliver a fiber network with next generation speeds to boost Australia's position in the internet fueled global economy. In the midst of this national embarrassment local ISP iinet is now offering a VDSL2 service with comparable speeds to the NBN. This is a bloody nose for the beleaguered NBN Co. who are years behind their schedule and may not even finish the proposed fiber network. With up to 80Mbps on an unlimited data plan, can the NBN compete?
Aussies say no to paying using their mobile
by Anonymous Coward on 2017-05-06 11:52
1 comment
When mobile payment systems were first introduced in Australia there was a huge kerfuffle about Apple entering the market with Apple having to fight to play in the Aussie mobile banking space. With the players now in the market the overall picture of how Australians are adapting to paying by phone is clear: not at all. Due to the existing range of options and mistrust of mobile phone security Australians are largely avoiding smartphone payment systems. This may more to do with the entrenched easy to use tap and pay system already in place than other factors. While cash withdrawals in general are declining most Australians look to be set to continue using cash and tap and pay for the foreseeable future.
When a government breaks copyright everything is okay
by Anonymous Coward on 2017-05-02 10:45
General agreement is that copyright law has far exceeded its original intent and that it needs to be scaled back. Pundits wonder why the government fails to do so, instead passing laws that extend copyright. Perhaps it is because it does not affect them. They just don't care. The government of a country is untouchable. An example of this is being played out in New Zealand where Eninem is suing the NZ government for using his song without permission. Who watches the watchers? Who holds a government to account? Why should they even care what this singer does? After all, they pass these laws for people to be held accountable, not politicians.
Samsung forces Bixby on users in Galaxy 8
by Anonymous Coward on 2017-04-25 05:41
Have you ever wanted something looking over your shoulder watching everything you do that you can't get rid of? Samsung thinks you do. The latest flagship product from Samsung has an assistant program baked into the operating system for which cannot be disabled by the owner of the device. This is a receipe for privacy violations and data leakage. In comparison, most other programs including Google Services can be disabled. Is it time to pass a law requiring companies to hand over root access for devices to consumers?
eBay may block Australian buyers over GST collection
by Anonymous Coward on 2017-04-18 13:08
1 comment
eBay has responded to the Australian Government initiative to collect GST for all internet purchases by proposing to block Australians from using eBay on the grounds that the changes demanded by the ATO are unworkable. While the Australian Treasurer has stated that this measure is to ensure local Australian businesses are not disadvantaged by the availability of overseas goods, the bill does not address that goods not available in Australia will also be taxed. The cost to businesses around the world to collection and be audited for GST may be excessive enough for many businesses to simply block Australians from purchasing. Local stores including Harvey Norman and Premier Investments are being blamed for supporting this change providing the government a platform to reap more taxes. Should this occur, and eBay does block Australian buyers, then the Australian government may find itself facing a backlash from millions of voters that it is not in the position to manage.
Google invents a whole new way to creep us out
by Anonymous Coward on 2017-04-16 13:26
1 comment
Don't be evil. A motto to live by. A goal to achieve. A vision. A stupid utterance made by an exec before Google dominated the internet. Google has announced a new product named Google Hire which will allow a potential employee to see your internet search history. Privacy advocates are warning that now is a good time to clear your Google search history and take preventative measures. Google Hire will links events from your Google account, Youtube history, and other sources to give employers a deeper understanding of applicants. Google Hire will allow employers to employers to post job listings, and accept and manage applications similar to StackExchange and other sites.
Another group of thieves has their selfies uploaded to iCloud
by Anonymous Coward on 2017-04-09 13:27
Proving once again that criminals are just stupid a group of thieves has stolen an iPhone then taken selfies which automatically uploaded to the cloud. The phone's owner posted the pictures on Facebook and handed them to the police in the hope of catching the criminals. Years after the first news story where an idiot used a stolen phone not realizing that the pics were being uploaded it appears that thieves are still targeting these valuable devices. When will a universal kill switch be implemented to make this type of crime not worthwhile?
Microsoft admits how much data Windows 10 sends
by Anonymous Coward on 2017-04-08 09:16
Microsoft is in damage control after admitting how much data Windows 10 actually takes. The admission has sickened privacy groups fears and confirmed the rumours of how bad Windows 10 actually is. Microsoft intend to make the situation worse in the soon to be released, the Creators Update, will report all details of a windows machine to Microsoft down to the hardware serial numbers and colour of the machine. This is the type of information advertisers have been clawing to get for years. No word at time this on how much Microsoft would sell this data for.
ACCC to investigate how fast the NBN actually isn't
by Anonymous Coward on 2017-04-07 05:27
In a shock move, the Australian Customer Care and Cardiology department of the Australian Department is going to respond to repeated calls for the still-being-built National Broadband Network to be re-done due to complains of inconsistent speed and bad dropouts in the new fiber network. This will involve NBN victims^WCUSTOMERS putting a hardware device on their NBN line to report statistics in real time. around 4000 households will be tested to see exactly how bad the NBN is. Since its inception the NBN has been lambasted for its approach and implementation to build what is meant to be the fastest public infrastructure for the future ever seen in Australia for which is meant to last generations. In related news, a recent poll showed that less than half the country wants the NBN, and one third of the people polled think that they can just refuse the NBN when it is connected and keep using their existing copper line.
Galaxy 8 to have face recognition for payments
by Anonymous Coward on 2017-03-19 08:04
The latest Samsung Galaxy 8 will have facial recognition for payments, a 3.5mm audio jack and no home button. Samsung needs the Galaxy 8 to be a success after the shocking problems with the Note 7. With cheaper smartphones entering the mobile arena Samsung needs to capitalize on its market dominance to stay ahead.
iPhone Explodes in Customer's Hand at Repair Shop
by Anonymous Coward on 2017-03-18 04:45
A customer took their iPhone in to be repaired only to have the iPhone 6 explode in their hand as they pressed the screen. The screen blew right off. The shop had to be shut for the day due to the fumes created by the burning device. Beware of lithium-ion batteries in phones.
Dominos may win GPS Pizza Tracking suit by default
by Anonymous Coward on 2017-03-15 12:37
The Australian arm of Dominos is battling a lawsuit over its use of GPS technology to track pizza deliveries with Precision Tracking who claim that Dominos reversed their technology after initial talks fell through. Dominos claims to have gone with a superior GPS technology solution provider, Navman Wireless, who they are now suing, for which themselves have lodged a counterclaim against Precision Tracking making this a three way lawsuit. If Precision Tracking does not put up AU$200,000 as security then its case against Dominos will be halted. This three way stoush over the implementation method of using GPS to track pizza delivery shows how close Australia has become to following in America's footsteps in having legal battles over software patents for obvious inventions, tie up courts and harm innovation.
Vibrator maker pays out after admiting to tracking users with online app
by Anonymous Coward on 2017-03-15 12:07
A class action lawsuit has resulted in a leading vibrator manufacturer paying out up to $10,000 for any person who used their We-Vibe app after hackers discovered that personal data was being recorded by the company. While the company has claimed that it has done nothing wrong, anyone who owns a We-Vibe is entitled to part of the settlement based on that dates and times of use as well as vibration mode and pattern was being sent to servers owned by Innovation Standards using personally-identifiable email addresses as keys. As the data collected was deemed to be 'highly sensitive' the company will destroy all data collected.
Nokia brings back the 3310 but not for Aussies
by Anonymous Coward on 2017-02-27 02:20
With the recent rash of popularity of old style phones Nokia has licenced the old style 3310 candybar style phone to be ressurected. Sadly this phone is not useful in some countries like Australia where the 2G networks are being dismantled. If this retro phone does take off there is hope of a 3G or 4G version for diehard enthusiasts and people who appreciate a phone with 22 hours of talk time and one month standby.
Australia to introduce face recognition to speed up airport processing
by Anonymous Coward on 2017-01-22 07:36
1 comment
Australian introduced SmartGates a decade ago to scan passports automatically reducing the time required to process passengers through international airport security. Now the Australian Government is planning to spend 94M for a five year project to process 90% of travellers processed automatically. Passengers would not need to show their passports, instead being processed by biometric recognition of their faces, irises and/or fingerprints.
Fun with candy and hot water
by Anonymous Coward on 2016-12-23 07:32
Recent experiments have demonstrated the lovely patterns that can be formed from skittles and hot water. Now, the BOS shows how to mix hot water and m&m candy to create colorful patterns. Next up: hot water and jelly beans.
Australian Welfare Debt Automation Cockup So Bad Centrelink Boss Gives Out Personal Email Address
by Anonymous Coward on 2016-12-20 13:42
As of six months ago the Department of Human Services started spewing out 20,000 letters per week to people claiming that they owe Centrelink a debt. This is the same number of letters Centrelink, a part of DHS, used to send out per year. This is due to a new system implemented by the DHS for which pulls back five years of data from the Australian Tax Office then compares the amount of benefits paid to each person resulting in a calculation for if the person was potentially overpaid welfare. Due to the period of time many people have moved on and were not contactable by the DHS, so Centrelink sent the letters of demand to debt collectors when people could not be contacted to resolve the question of whether a debt was owed. Now, with Christmas approaching, thousands of people are being hunted down by debt collectors for debts they know nothing about and for in several cases debts that are not real. Understandably, many people are not happy about this. In response to the overwhelming negative response by the public to this situation Centrelink boss Hank Jongen has asked people to email him directly to discuss their issues. This is just the latest in a series of publicly humiliating incidents the DHS has faced in 2016 with special focus on its baneful MyGov and My Health Record systems and the outsourcing of the Bowel Cancer Screening Register. On the bright side, there are only 10 days left in 2016. What else can possibly go wrong this year.
Australia considers US style copyright reform
by Anonymous Coward on 2016-12-20 02:28
1 comment
In a move widely regarded as being a step in the right direction, Australia is considering adopting fair use provisions in cooyright law. However, restrictive Free Trade agreements prevent decreasing the length of copyright terms. This will bring Australian in line with America for fair use of copyrighted content, reduce the cost of dealing with infringements and may address other costly issues currently caused by existing laws.
Groupon Moves Operations to Ireland for Tax Breaks
by Anonymous Coward on 2016-12-19 22:55
Yet another company has followed in the footsteps of internet giants which currently claim to operate out of Ireland for tax purposes. From January 2017 online voucher powerhouse Groupon Australia will move its data and possibly some staff to Lower Ground Floor‚ Connaught House‚ 1 Burlington Road‚ Dublin 4‚ 216410 Ireland. Whether or not this will trigger recent ATO tax haven measures or result in a Australian Privacy Principle violation is yet to be determined.
Indian outsourcing fail as ATO brought to its knees
by Anonymous Coward on 2016-12-13 07:58
The outsourcing of Australian IT jobs to indian nationals failed badly today with key systems offline directly attributed to ATO's failed agile implementation and the outsourcing of many positions to Indian nationals. While ATO management have attempted to shift blame to "those who did not get onboard" the evidence of this failure is clear: outsourcing key functionality of the ATO is a failure. The attempted shift to agile is partly to blame with the implementation of agile using the SAFe methodology being proven to be an abject faikule. Most of the problems are centered with the employees sourced from India hired into key positions.
Libre-VideoGame Chaos-Esque Anthology reaches release 100.
by Anonymous Coward on 2016-12-11 12:34
1 comment
After years of constant, grinding, development the libre-videogame and fork of Xonotic known as Chaos-Esque Anthology has reached version 100.

The project has expanded Xonotic's original cast of 18 weapons to over 130 weapons, has added new textures, and maps, aswell as a list of other features including: city generation subsystem (with interiors), building subsystem (build buildings, furnishings, doors, blocks, the buildings have interiors and function similar to RTS buildables), marshaling subsytem, foliage subsystem, aswell as mounted weapons and more vehicles. Additionally hand-to-hand fighting was added for those wishing for a Mortal-Kombat feel in a libre 3d video-game.

More information can be found on the project's Linux Game Database page including changelog and download link of the ISO: https://lgdb.org/game/chaosesque-anthology

(Note: Chaos-Esque Anthology name was decided upon after input from the lead developer of Xonotic, many moons ago)
Australian NBN company runs out of money requiring a AUD20bn from Government to complete mixed techn
by Anonymous Coward on 2016-11-20 03:53
After downgrading the promised Australian fiber network to a 'mixed technology' which was promised to be delivered faster and cheaper the NBN Co. has run out of money. NBN Co. had loaned 20bn from the Australian Government to complete the NBN rollout. Even with this cash injection NBN Co. will still be unable to deliver the fiber network promised to the Australian people when the project first began.
ACT elections results website mirrors ABS PR incident
by Anonymous Coward on 2016-10-15 12:53
Following on from the terrible ABS performance during the Australian 2016 Census the ACT Elections Result page consistently threw a HTTP Error 404. The requested resource is not found. message. Given the current negative feedback of online government services with a range of failures from MyGOV through to the 2016 Census it is clear that Australian government departments need to up their game.
Australian Health Dept Releases Confidential Medicare Data
by Anonymous Coward on 2016-09-29 04:18
1 comment
The Australian privacy watchdog has been called on to investigate a breach of Australian Medicare data. This breach gives more weight to the privacy concerns surrounding the recent Australian 2016 census where the ABS has announced it will keep data permanently as a "linked key", store data for longer, and match data across government agencies. The Department of Health is the last in a list of Australian agencies to allow confidential data to be accessible.
How secure is your password
by Anonymous Coward on 2016-05-22 09:26
1 comment
With the recent theft of millions of users passwords and increased reliance on secondary authentication the need for educating users about insecure passwords has never been more important. With this in mind the people behind Dashlane Free Password Manager have released a web page that shows how long it takes to crack a password. The idea here is simple; users can see effective their password combination is and see in real time how long it would take today's computer systems to crack that password. What is being sought here is for users to choose longer passwords. This should be something which should be taught to kids in school.