Miscellaneous Tech News
-
Twitter prepares for huge cull of inactive users
Twitter will begin deleting accounts that have been inactive for more than six months, unless they log in before an 11 December deadline.
The cull will include users who stopped posting to the site because they died - unless someone with that person's account details is able to log-in. It is the first time Twitter has removed inactive accounts on such a large scale. The site said it was because users who do not log-in were unable to agree to its updated privacy policies. A spokeswoman also said it would improve credibility by removing dormant accounts from people's follower counts, something which may give a user an undue sense of importance. The first batch of deleted accounts will involve those registered outside of the US. The firm bases inactivity on whether or not a person has logged in at least once in the past six months. Twitter said the effort is not, as had been suggested by some users on the network, an attempt to free up usernames. -
Suspect can’t be compelled to reveal “64-character” password, court rules
The Fifth Amendment to the US Constitution bars people from being forced to turn over personal passwords to police, the Pennsylvania Supreme Court ruled this week.
In a 4-3 ruling, justices from Pennsylvania’s highest court overturned a lower-court order that required the suspect in a child-pornography case to turn over a 64-character password to his computer. The lower-court ruling had held that the compelled disclosure didn’t violate the defendant’s Fifth Amendment rights because of statements he made to police during questioning.
“It’s 64 characters and why would I give that to you,” Joseph J. Davis of Pennsylvania’s Luzerne County told investigators in response to their request for his password. “We both know what’s on there. It’s only going to hurt me. No fucking way I’m going to give it to you.”
-
Topic temporarily locked for fork..... hold on.
-
If you want to discuss the "Admission of Guilt" topic, it is here:
-
@Dashrender said in Miscellaneous Tech News:
@DustinB3403 said in Miscellaneous Tech News:
@Dashrender said in Miscellaneous Tech News:
@bnrstnr said in Miscellaneous Tech News:
@scottalanmiller said in Miscellaneous Tech News:
@bnrstnr said in Miscellaneous Tech News:
No, the defense could claim he meant his Christmas list...
Defense can claim anything. It's what he actually said that matters, and what he said is that the cops know. So if the cops say, under oath, that it's child porn, then child porn it is.
Did he literally say that he had child pornography on there? I must have missed that part... They still have to prove that it's there.
I'm not sure I agree with that. I'm leaning toward Scott's side on this. Really it would be up to you on a jury to hear - the defendant said "We both know what’s on there. " What do you as a juror think he meant? Come on, put on your big boy pants and think about that... what do you really think he meant. it's a piece of evidence that the defendant provided - verbal evidence... so you as a juror can weight it however you want.
@Dashrender that doesn't matter.
Whether the defendant and cops know what's on the computer, doesn't mean that the defendant needs to provide access to the evidence of the crime. The police need to get the evidence, and they cannot force a defendant to provide the password to said evidence.
It needs to be provided willfully by the defendant and no coerced AKA compelled speech.
To that I completely agree - he does NOT have to provide the password - but that's OK - as Scott said, the defendant already admitted to the crime.... so the actual evidence is not required.
In a no body murder case - if the defendant admits to guilt, that's it.
Now of course, in this case, the defendant will claim that this statement was not an admission of guilt - so likely the judge will rule that the defendant doesn't go directly to sentencing, but instead will get a trial, where this statement will be submitted to the jury, and if I were on that jury, I would accept that statement as an admission and he's be going to jail.
Ugh, you missed me saying not to respond here, then the lock, and the creation of the new topic, and the lock being left on for a while....
-
@scottalanmiller said in Miscellaneous Tech News:
@Dashrender said in Miscellaneous Tech News:
@DustinB3403 said in Miscellaneous Tech News:
@Dashrender said in Miscellaneous Tech News:
@bnrstnr said in Miscellaneous Tech News:
@scottalanmiller said in Miscellaneous Tech News:
@bnrstnr said in Miscellaneous Tech News:
No, the defense could claim he meant his Christmas list...
Defense can claim anything. It's what he actually said that matters, and what he said is that the cops know. So if the cops say, under oath, that it's child porn, then child porn it is.
Did he literally say that he had child pornography on there? I must have missed that part... They still have to prove that it's there.
I'm not sure I agree with that. I'm leaning toward Scott's side on this. Really it would be up to you on a jury to hear - the defendant said "We both know what’s on there. " What do you as a juror think he meant? Come on, put on your big boy pants and think about that... what do you really think he meant. it's a piece of evidence that the defendant provided - verbal evidence... so you as a juror can weight it however you want.
@Dashrender that doesn't matter.
Whether the defendant and cops know what's on the computer, doesn't mean that the defendant needs to provide access to the evidence of the crime. The police need to get the evidence, and they cannot force a defendant to provide the password to said evidence.
It needs to be provided willfully by the defendant and no coerced AKA compelled speech.
To that I completely agree - he does NOT have to provide the password - but that's OK - as Scott said, the defendant already admitted to the crime.... so the actual evidence is not required.
In a no body murder case - if the defendant admits to guilt, that's it.
Now of course, in this case, the defendant will claim that this statement was not an admission of guilt - so likely the judge will rule that the defendant doesn't go directly to sentencing, but instead will get a trial, where this statement will be submitted to the jury, and if I were on that jury, I would accept that statement as an admission and he's be going to jail.
Ugh, you missed me saying not to respond here, then the lock, and the creation of the new topic, and the lock being left on for a while....
yep.. i stepped away...
-
@Dashrender said in Miscellaneous Tech News:
@scottalanmiller said in Miscellaneous Tech News:
@Dashrender said in Miscellaneous Tech News:
@DustinB3403 said in Miscellaneous Tech News:
@Dashrender said in Miscellaneous Tech News:
@bnrstnr said in Miscellaneous Tech News:
@scottalanmiller said in Miscellaneous Tech News:
@bnrstnr said in Miscellaneous Tech News:
No, the defense could claim he meant his Christmas list...
Defense can claim anything. It's what he actually said that matters, and what he said is that the cops know. So if the cops say, under oath, that it's child porn, then child porn it is.
Did he literally say that he had child pornography on there? I must have missed that part... They still have to prove that it's there.
I'm not sure I agree with that. I'm leaning toward Scott's side on this. Really it would be up to you on a jury to hear - the defendant said "We both know what’s on there. " What do you as a juror think he meant? Come on, put on your big boy pants and think about that... what do you really think he meant. it's a piece of evidence that the defendant provided - verbal evidence... so you as a juror can weight it however you want.
@Dashrender that doesn't matter.
Whether the defendant and cops know what's on the computer, doesn't mean that the defendant needs to provide access to the evidence of the crime. The police need to get the evidence, and they cannot force a defendant to provide the password to said evidence.
It needs to be provided willfully by the defendant and no coerced AKA compelled speech.
To that I completely agree - he does NOT have to provide the password - but that's OK - as Scott said, the defendant already admitted to the crime.... so the actual evidence is not required.
In a no body murder case - if the defendant admits to guilt, that's it.
Now of course, in this case, the defendant will claim that this statement was not an admission of guilt - so likely the judge will rule that the defendant doesn't go directly to sentencing, but instead will get a trial, where this statement will be submitted to the jury, and if I were on that jury, I would accept that statement as an admission and he's be going to jail.
Ugh, you missed me saying not to respond here, then the lock, and the creation of the new topic, and the lock being left on for a while....
yep.. i stepped away...
but seriously how did you miss the lock post and the new topic post. do you never reload after being away for a long time?
-
@JaredBusch said in Miscellaneous Tech News:
@Dashrender said in Miscellaneous Tech News:
@scottalanmiller said in Miscellaneous Tech News:
@Dashrender said in Miscellaneous Tech News:
@DustinB3403 said in Miscellaneous Tech News:
@Dashrender said in Miscellaneous Tech News:
@bnrstnr said in Miscellaneous Tech News:
@scottalanmiller said in Miscellaneous Tech News:
@bnrstnr said in Miscellaneous Tech News:
No, the defense could claim he meant his Christmas list...
Defense can claim anything. It's what he actually said that matters, and what he said is that the cops know. So if the cops say, under oath, that it's child porn, then child porn it is.
Did he literally say that he had child pornography on there? I must have missed that part... They still have to prove that it's there.
I'm not sure I agree with that. I'm leaning toward Scott's side on this. Really it would be up to you on a jury to hear - the defendant said "We both know what’s on there. " What do you as a juror think he meant? Come on, put on your big boy pants and think about that... what do you really think he meant. it's a piece of evidence that the defendant provided - verbal evidence... so you as a juror can weight it however you want.
@Dashrender that doesn't matter.
Whether the defendant and cops know what's on the computer, doesn't mean that the defendant needs to provide access to the evidence of the crime. The police need to get the evidence, and they cannot force a defendant to provide the password to said evidence.
It needs to be provided willfully by the defendant and no coerced AKA compelled speech.
To that I completely agree - he does NOT have to provide the password - but that's OK - as Scott said, the defendant already admitted to the crime.... so the actual evidence is not required.
In a no body murder case - if the defendant admits to guilt, that's it.
Now of course, in this case, the defendant will claim that this statement was not an admission of guilt - so likely the judge will rule that the defendant doesn't go directly to sentencing, but instead will get a trial, where this statement will be submitted to the jury, and if I were on that jury, I would accept that statement as an admission and he's be going to jail.
Ugh, you missed me saying not to respond here, then the lock, and the creation of the new topic, and the lock being left on for a while....
yep.. i stepped away...
but seriously how did you miss the lock post and the new topic post. do you never reload after being away for a long time?
nope, I don't.
-
China Now Requires a Face Scan for Every New Phone Purchase
If you want to buy a new phone or switch phone service in China, a face scan is now mandatory as part of the setup process alongside showing your national ID.
China is well known as a surveillance state, but the government continues to increase its ability to identify and therefore track individuals. That's why it's now mandatory to provide a face scan when registering a new phone or signing up for a phone service in the country. As the BBC reports, in what the Chinese government is describing as a way to "protect the legitimate rights and interest of citizens in cyberspace," a new layer of identity verification has been introduced for smartphones this month. When purchasing a new phone or signing up for a phone service such as a mobile data plan, individuals will be required to have their face scanned as well as presenting their national identification card. Before now, a national ID and photos were required. -
@mlnews said in Miscellaneous Tech News:
China Now Requires a Face Scan for Every New Phone Purchase
If you want to buy a new phone or switch phone service in China, a face scan is now mandatory as part of the setup process alongside showing your national ID.
China is well known as a surveillance state, but the government continues to increase its ability to identify and therefore track individuals. That's why it's now mandatory to provide a face scan when registering a new phone or signing up for a phone service in the country. As the BBC reports, in what the Chinese government is describing as a way to "protect the legitimate rights and interest of citizens in cyberspace," a new layer of identity verification has been introduced for smartphones this month. When purchasing a new phone or signing up for a phone service such as a mobile data plan, individuals will be required to have their face scanned as well as presenting their national identification card. Before now, a national ID and photos were required.Well, that’s one way to get a huge sample of Chinese faces into a FB for AI use.
-
@Dashrender said in Miscellaneous Tech News:
Well, that’s one way to get a huge sample of Chinese faces into a FB for AI use.
Or a really simple way to track and identify your masses.
-
Samsung starts Android 10 update at a record pace: Only three months late
International Exynos models get Android 10, but the US will have to wait.
Samsung is starting the slow and arduous process of updating its flagship smartphone to the latest version of Android: Android 10. This is just the beginning of the Android 10 rollout for Samsung, which, according to tracking from SamMobile, starts with Exynos-powered Galaxy S10s in European and Asian countries, including Germany, South Korea, the UK, India, Poland, and Spain. Android 10 came out on September 3, and with the first devices landing the update on November 28, Samsung took 86 days to begin to rollout stable builds of Android 10 across its user base. Samsung still has a long way to go to release Android 10 to everyone with a Galaxy S10, though. Devices in Europe, Africa, and most of Asia ship with a Samsung Exynos SoC, while devices in North America, South America, and China ship with a Qualcomm Snapdragon SoC. So far only the Exynos units have gotten the update. -
https://www.itnews.com.au/news/aussie-broadband-pauses-ipv6-trial-due-to-cisco-bug-534851
The internet provider said it had been forced to pause the trial after a patch released by Cisco for the bug contained a new bug that then caused an unrelated issue.
...the ASRs are currently impacted by a firmware bug that “causes the DHCP [Dynamic Host Configuration Protocol] process on the routers to crash, so customers are not able to reauthenticate,” Aussie Broadband said in a customer advisory.
...
The bug has official recognition from Cisco - and is one of five that Aussie Broadband has uncovered in Cisco code over the past 18 months “that have not been discovered previously”. -
New crypto-cracking record reached, with less help than usual from Moore’s Law
795-bit factoring and discrete logarithms achieved using more efficient algorithms.
Researchers have reached a new milestone in the annals of cryptography with the factoring of the largest RSA key size ever computed and a matching computation of the largest-ever integer discrete logarithm. New records of this type occur regularly as the performance of computer hardware increases over time. The records announced on Monday evening are more significant because they were achieved considerably faster than hardware improvements alone would predict, thanks to enhancements in software used and the algorithms it implemented. Many public-key encryption algorithms rely on extremely large numbers that are the product of two prime numbers. Other encryption algorithms base their security on the difficulty of solving certain discrete logarithm problems. With sufficiently big enough key sizes, there is no known way to crack the encryption they provide. The factoring of the large numbers and the computing of a discrete logarithm defeat the cryptographic assurances for a given key size and force users to ratchet up the number of bits of entropy it uses. -
Elementary OS 5.1 Hera
https://www.omgubuntu.co.uk/2019/12/elementary-os-5-1-hera-release -
HackerOne breach lets outside hacker read customers’ private bug reports
Company security analyst sent session cookie allowing account take-over.
As a leading vulnerability reporting platform, HackerOne has paid hackers more than $23 million on behalf of more than 100 customers, including Twitter, Slack, and the US Pentagon. The company’s position also gives it access to unimaginable amounts of sensitive data. Now, the company has paid a $20,000 bounty out of its own pocket after accidentally giving an outside hacker the ability to read and modify some customer bug reports. The outsider—a HackerOne community member who had a proven track record of finding and privately reporting vulnerabilities through the platform—had been communicating late last month with one of the company’s security analysts. In one message, the HackerOne analyst sent the community member parts of a cURL command that mistakenly included a valid session cookie that gave anyone with possession of it the ability to read and partially modify data the analyst had access to. -
5G on the horizon: here’s what it is and what’s coming
5G is many things—but the most interesting part is what it will eventually become.
The long-touted fifth generation of wireless communications is not magic. We’re sorry if unending hype over the world-changing possibilities of 5G has led you to expect otherwise. But the next generation in mobile broadband will still have to obey the current generation of the laws of physics that govern how far a signal can travel when sent in particular wavelengths of the radio spectrum and how much data it can carry. For some of us, the results will yield the billions of bits per second in throughput that figure in many 5G sales pitches, going back to early specifications for this standard. For everybody else, 5G will more likely deliver a pleasant and appreciated upgrade rather than a bandwidth renaissance. -
-
-
@Danp said in Miscellaneous Tech News:
That article keeps jumping between them being web hosts or VPS hosts. They might be both, but the author is acting like the two are the same thing, which they are not at all.