Friday, March 21, 2014

Theresa May warns Yahoo that its move to Dublin is a security worry

Theresa May summoned the internet giant Yahoo for an urgent meeting on Thursday to raise security concerns after the company announced plans to move to Dublin where it is beyond the reach of Britain's surveillance laws.


By making the Irish capital rather than London the centre of its European, Middle East and Africa operations, Yahoo cannot be forced to hand over information demanded by Scotland Yard and the intelligence agencies through "warrants" issued under Britain's controversial anti-terror laws.

Yahoo has had longstanding concerns about securing the privacy of its hundreds of millions of users – anxieties that have been heightened in recent months by revelations from the whistleblower Edward Snowden.

Advertisement

In February, the Guardian revealed that Britain's eavesdropping centre GCHQ intercepted and stored the images of millions of people using Yahoo webcams, regardless of whether they were suspects. The data included a large quantity of sexually explicit pictures.

The company said this represented "a whole new level of violation of our users' privacy".

The home secretary called the meeting with Yahoo to express the fears of Britain's counter-terrorism investigators. They can force companies based in the UK to provide information on their servers by seeking warrants under the Regulation of Investigatory Powers Act, 2000 (Ripa).

The law, now under review by a parliamentary committee, has been widely criticised for giving police and the intelligence agencies too much access to material such as current emails and internet searches, as well as anything held on company records.

However, the Guardian has been told that Charles Farr, the head of the office for security and counter-terrorism (OSCT) within the Home Office, has been pressing May to talk to Yahoo because of anxiety in Scotland Yard's counter-terrorism command about the effect the move to Dublin could have on their inquiries.

Farr, a former senior intelligence officer, coordinates the work of Scotland Yard and the security service MI5, to prevent terrorist attacks in the UK.

"There are concerns in the Home Office about how Ripa will apply to Yahoo once it has moved its headquarters to Dublin," said a Whitehall source. "The home secretary asked to see officials from Yahoo because in Dublin they don't have equivalent laws to Ripa. This could particularly affect investigations led by Scotland Yard and the national crime agency. They regard this as a very serious issue."

The move to make Dublin the centre of its headquarters for Europe, the Middle East and Africa (EMEA) was announced last month and will take effect from Friday.

In a statement at the time, Yahoo said Dublin was a natural home for the company and that it would be incorporated into Irish laws.

The firm insisted the move was driven by "business needs … we believe it is in the best interest of our users. Dublin is already the European home to many of the world's leading global technology brands."

However, the firm has been horrified by some of the surveillance programmes revealed by Snowden and is understood to be relieved that it will be beyond the immediate reach of UK surveillance laws.

Following the Guardian's disclosures about snooping on Yahoo webcams, the company said it was "committed to preserving our users trust and security and continue our efforts to expand encryption across all of our services." It said GCHQ's activity was "completely unacceptable..we strongly call on the world's governments to reform surveillance law."Explaining the move to Dublin, the company said: "The principal change is that Yahoo EMEA, as the new provider of services to our European users, will replace Yahoo UK Ltd as the data controller responsible for handling your personal information. Yahoo EMEA will be responsible for complying with Irish privacy and data protection laws, which are based on the European data protection directive."

Emma Carr, deputy director of Big Brother Watch, said: "It should not come as a surprise if companies concerned about maintaining their users' trust to hold their information start to move to countries with more rigorous oversight processes, particularly where courts oversee requests for information." Surveillance laws have a direct impact on our economy and Yahoo's decision should be ring an alarm in Parliament that ignoring the serious questions about surveillance that are being debated around the world will only harm Britain's digital economy."

Under Ripa, a warrant can be issued for an investigation that has implications for national security, or might lead to the prevention or detection of serious crimes.

Warrants to seek the retention of communications data can be issued by specified officers within police forces and the intelligence agencies.

More intrusive surveillance techniques can require the signature of a cabinet minister. From Friday, investigators may have to seek information by using a more drawn out process of approaching Yahoo through a Mutual Legal Assistance Treaty between Ireland and the UK.

A Home Office spokesperson said: "We do not confirm the details of private meetings."

This blog is sponsored by: 
http://visitwebpages.info/paypalchecks/

http://RapidFire.ExperienceBA.com/?SOURCE=livingwithoutsecrets

Saturday, March 8, 2014

What the Talking Angela app is really saying to your kids

This week, a year-old hoax about the Talking Angela app being dangerous for children has been doing the rounds on Facebook again, despite having been debunked back then, and again now.

Parents can be forgiven for being spooked by the suggestion that a cutesy talking cat app is actually a front for a paedophile ring, as one of the hoax messages claimed. So what is Talking Angela really saying to your children, and is it inappropriate? The best way to find out is to actually use the app.

I’ve spent an hour in her company today doing just that. In short: yes, the hoax is a hoax. But the app’s developer Outfit7 could be doing more to ensure parents feel at ease with their children using the app.

Some facts first: Talking Angela is part of a wider series of apps called Talking Tom and Friends, which have been downloaded more than 1.5bn times since 2010, and are currently being used by 230m people every month – lots of children, but also lots of adults.

They’ve spawned a series of popular YouTube videos in partnership with Disney, as well as a range of physical toys. Outfit7 is a well-known apps company, not a shadowy network of child-catchers, in other words: I’ve interviewed the firm in March 2011, March 2012 and June 2013 tracking the rise of its apps.

Below, you can find out how Talking Angela really works with screenshots to help you make an informed decision about whether it’s suitable for your children.

Turn Child Mode on
Talking Angela was released in December 2012 for iPhone and iPad, then in January 2013 for Android. It follows the pattern of previous Talking Tom and Friends apps: a virtual animal who’ll squeakily repeat anything you say into your device’s microphone, while interacting with her by tapping and swiping on the screen.

The most important thing for parents to understand is that Talking Angela has a child mode. You’re asked if you want to turn it on the first time you run the app, and at any other point you can toggle it on or off by tapping on the little smiley face at the top right of the screen.

This is important, because the feature at the centre of the scary Facebook messages Angela’s ability to text-chat with users – is turned off when Child Mode is toggled on. If you’ve read about Angela asking kids for their names, ages or engaging in banter about clothes-swapping parties, none of this can happen if Child Mode is on.

The downside of this: it’s far too easy to toggle it on and off there’s no Pin preventing a child from tapping on the smiley face and switching it back on. Given the current controversy, this would be an easy but important change for Outfit7 to make.

What can kids do when Child Mode is turned on, though? They can get Angela to repeat her words, stroke and poke her (in the non-inappropriate sense!) to see animated responses, and make birds fly onto the screen – don’t worry, she doesn’t eat them.

There is also a camera feature, which has been referenced in some of the Facebook messages about Talking Angela. It’s true that it encourages users to look into their device’s camera and make specific gestures: nod, shake head, smile, yawn or stick out their tongue, so Angela can copy it.

Some changes needed
As a parent, there are some features in Talking Angela that concern me, although not the ones being cited in the Facebook hoax messages.

First, there’s a musical-note button at the bottom right which on my smartphone launched the YouTube app with the official Talking Tom and Friends channel – starting with a video trailer for the separate My Talking Tom mobile game.

The problem here: kids can easily scroll down to the comments section (samples: “I do not know why the fuck there’re many dislikes” and “Was I the only one who thought he was spelling out fuck?”. Not the kind of reading material you’d want for your young child.

You can also tap a “more” button to see suggestions of other videos, some of which are from Outfit7’s channel, and some of which aren’t. And then watching those videos brings up more suggestions, and so on. If you wouldn’t type “cats” into YouTube’s search box then leave your child to get on with it, you shouldn’t leave them unattended with Talking Angela.

Next, in-app ads. If you download Talking Angela for free, it’ll display banner ads at the top of the screen. They’re generally ads for other apps: Hotels.com, Google and (in a curveball) the Department for Work and Pensions all appeared while I was using it today. Usually, tapping on a banner ad takes you to its download page on the app store.

Finally, in-app purchases. Talking Angela uses a system of virtual coins to buy some features: presents and accessories for Angela, for example, from hats and handbags to makeup. Whoever’s using the app gets 25 free coins a day, while others can be bought from an in-app store: from £0.69 for 4,200 to £17.49 for 146,500.

Meanwhile, the app also offers free coins in return for watching video ads for other apps: The Simpsons: Tapped Out, Knights & Dragons, Total Domination Reborn, Battle Camp and Monster Legends for example.

If you’ve turned on your parental and app store restrictions, your kids shouldn’t be able to download free apps or make in-app purchases without your permission. Whether you feel comfortable with the features above is your decision, though.

Text-chatting with Angela
Finally, what happens if you turn child mode off – as any child can relatively easily – and start chatting to Angela using the text box at the bottom of the screen? It’s this feature that’s fuelled the Facebook hoax.

While it’s definitely not connecting your children to paedophiles, it does raise some issues. These are all genuine questions that Angela asked me while I chatted to her:

“How long have you been friends with your best friend?”

“I’ve met my best friends at school. Where did you meet yours?”

“What will you do today?”

“I’d like to be your friend. What’s your name?

“I’m 18. How old are you?”

“What do you do with your friends for fun?”

And yes, Angela does ask at one point “You know what’s fun too? A clothing swap party. Have you ever been to such a party?” before segueing into an anecdote about how she swapped clothes with her virtual boyfriend Tom for japes.

It ends innocently – “Friends ROFLed and everybody at the party cheered at us. It was a cool night!” – but taken out of context with some of the questions above, it’s no surprise that parents are spooked. She’ll even tell you that “cat sex is hair raising. It’s purrfect” if you ask her about, well, cat sex. As some children surely will.

The point: children aren’t meant to be using Talking Angela’s text-chat feature, yet the app’s developer hasn’t taken any meaningful measures to prevent them from simply toggling the child mode off. There’s not even the “swipe down with two fingers” or “write this sequence of numbers as figures” parental gate that’s become common in children’s apps in recent months.

Responsibility on both sides
This is the main thing to understand about Talking Angela: it’s an app aimed at children and adults alike, including text-chat that would seem cheeky and silly for the latter, but inappropriate for the former. The problem is the lack of a strong-enough barrier between the two modes.

When it comes down to it, your children are still going to be chatting to and sticking their tongues out at a cartoon cat, not falling into the clutches of the “PEDO RING” [sic] that’s been mentioned on Facebook.

A couple of commenters on my previous article about the Talking Angela hoax suggested concerns about the app normalising the kind of conversations that you wouldn’t want children having with strangers in the real world. That’s a legitimate criticism, and one that Outfit7 should act on by making it harder for kids to turn off the Child Mode.

But the hoax is a reminder that as parents, we also have responsibilities to be aware of what apps our kids are using and how they work – from first-hand experience. For now, I would steer my children to other apps rather than Talking Angela, but that’s based on testing it out for myself, rather than believing hysterical ALL-CAPS warnings posted on Facebook.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Friday, March 7, 2014

2014 is the year of the smart watch - and the toothbrush


A new smart toothbrush unveiled this week could monitor how well you brush your teeth, and could one day be used to send data back to your dentist. Oral B’s Smartseries toothbrush, which launched in the UK in June priced at £199, sends data back to a smartphone app recording how many brushstrokes are used, targeting problem areas and following personalised brushing routines.

This vision of the internet-connected future was just one of the gadgets unveiled this week at Mobile World Congress in Barcelona, which kicked off with a keynote from an exuberant Facebook founder Mark Zuckerberg.

Explaining the company’s $19bn acquisition of the messaging app WhatsApp, MWC’s 75,000-strong audience was abuzz with what the deal would mean for mobile networks, and whether WhatsApp’s latest move into voice technology would threaten traditional mobile businesses.


For Facebook, expansion depends on gaining users in developing markets, where the mobile phone is king and mobile broadband outstrips traditional internet three to one, according to data from the International Telecommunication Union.

But it was the internet of things - connecting physical devices to the internet - preoccupying the discussions of mobile phone networks. The potential is vast, and operators are excited by potential expansion of providing data services to everything from toothbrushes and fridges to cars and washing machines.

“We currently have 13m devices connected to our network, of which 1.6m of those connections are machine-to-machine,” said Olaf Swantee, chief executive of EE talking to the Guardian. “We are working to grow those connections up to 32m and M2M connections are going to play a very big part in that.”

The goal is to turn everything into a smart, data-driven device. Cars could talk to the road about black ice, fridges could order food automatically when it runs out, or you could ask your washing machine “how are you getting on?” and the washing machine could reply “almost there sir, just on the spin cycle, I’ll be done in 15 minutes”.

These machine-to-machine (M2M) connections are expected to number 250m globally by the end of 2014, according to data from the GSMA. To support the vast number of devices networks are working on capacity and speed, so there were plenty of companies keen to show off hardware that enables super fast connectivity.

In another corner of the trade show South Korean Telecom demonstrated its next generation 4G mobile data network, which is capable of delivering speeds of up to 450 megabits per second – over three times as fast as the fastest standard UK home broadband. Nokia Solutions & Networks claimed to be the ultimate king of speed, supplying data at 2.6Gbps or 2,600Mbps. At that speed, a very large 4K ultra high definition film could be downloaded in seconds.

For the high street, however, the first wave of a more connected world will be yet more devices to track health and fitness.

South Korean giant Samsung launched three new smartwatches, the Gear 2, Gear 2 Neo and Gear Fit, each with a built in heart-rate monitor.

Signalling an increasingly intense battle between the mobile phone makers, Huawei also launched a fitness tracker for the wrist but that can convert to a headset to take phone calls. Sony already has a smartwatch and a fitness band, while both Motorola and HTC are working on a smart wearable.

Mobile World Congress 2014 may not have been the year that internet connected devices became mainstream, but it will certainly be remembered as the year of the smartwatch.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Thursday, March 6, 2014

MtGox files for bankruptcy in Japan after collapse of bitcoin exchange

MtGox filed for bankruptcy protection in Tokyo on Friday, with the world’s former biggest bitcoin exchange blaming “a weakness in our system” for its collapse.

The exchange’s CEO Mark Karpeles, bowing, apologised at a news conference for causing trouble to so many people, and said that he intended to launch a criminal complaint against the hacking attack which caused the site’s downfall. However, he added, he had no specific means to do so.

Mt Gox had liquid liabilities of 6.5bn yen (£38m), dwarfing its total assets of 3.84bn yen (£22.6m), the company said. It had 127,000 creditors in bankruptcy, just over 1,000 of whom are Japanese.

The news conference is Karpeles’ second public statement since MtGox deleted its website on Tuesday, following a terse comment released on Wednesday.

The “weakness” referred to by Karpeles is thought to be an issue related to “transaction malleability“, a loophole in the bitcoin system which was exploited by malicious actors to get free bitcoins from the site.

“MtGox filing for bankruptcy is not the end of bitcoin but it is the beginning of the end of bitcoin in its current form,” says currency trader Alistair Cotton of Currencies Direct.

“Over the last year we’ve seen ever-increasing usage and with it huge volatility in value and blows from banks and regulators. These are growing pains as the currency evolves in front of our eyes and the MtGox bankruptcy is part of that.”

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Wednesday, March 5, 2014

Saint David's Day: Google doodle leeks online

Google has celebrated St David's Day with a doodle depicting a red dragon taking tea with a woman wearing the traditional Welsh national costume of a tall black bonnet and a long red dress.

St David's Day or Dydd Gŵyl Dewi Sant is the feast day of Saint David, the patron saint of Wales, and falls on 1 March every year.

Saint David was born towards the end of the 5th century and became renowned as a teacher and preacher, founding monastic settlements and churches. The date of his death is recorded as 1 March, though the year of his death is uncertain.

Schools and cultural societies across Wales commemorate Saint David with parades and concerts, and it is traditional to wear daffodils or strips of leek on lapels and caps.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Tuesday, March 4, 2014

Are Windows 8 tablets too expensive?

I’m looking for a good 7in or 8in tablet, and I don’t know what to do. It doesn’t have to have a super-duper HD retina display or Dolby sound. I use it mainly for Microsoft Exchange email, browsing, watching the occasional BBC video or live news etc, and running a few apps. I’m not a gamer.
Currently, I’m using a Kindle Fire to fill the gap, but it’s very limited both in terms of capabilities (what can be installed) and grunt.
I have bought four Android tablets -- a Samsung Galaxy Tab 7 (Wi-Fi/3g) in 2011 and three Google Nexus 7 tablets, including new and old models -- and they have all had problems. This year I tried another 2012 Nexus 7. All was well for a few days until Android updated to KitKat (4.4.2 KOT49H), when I started having exactly the same touch screen problems as I had had with both 2013 units. Having frequently suffered from things being broken by Android updates, this has just made me sick of Android.
I thought perhaps of a Windows 8 (not RT) tablet. I like the idea of being able to run some of my desktop software on a tablet, but they are just too expensive.
I also did something I thought I’d never do -- consider an Apple device -- so I’ve been reading up on the iPad Mini. The old model is now going for around £215, and I don’t really want to go too much higher. However, I’m not a fan of the Apple “closed” system or having iTunes installed: years ago it completely trashed my PC. Also, when I tried an iPad Mini in John Lewis, the video clips on the BBC News website wouldn’t play. The sales assistant told me the only way to watch BBC videos was by using the BBC News app, which curiously didn’t work. Brian
I’m tempted to suggest a BlackBerry tablet as that may be the only one you haven’t tried, and they are very cheap. However, the fact is that Android is the only real choice in the cheap tablet market (£50-£200) apart from Amazon’s Kindle Fire, and you already have one of those. Also, it’s not much of an alternative in the sense that it uses a forked version of the open source part of Android, without the proprietary Google layer that provides access to Google Play etc.

When it comes to choosing between an Apple iPad and a Windows 8 tablet, they are different beasts with different capabilities. You’d usually choose an iPad to get access to the vast selection of high-quality apps, which have actually been designed for tablets rather than phones. You’d usually choose a Windows 8 tablet because it provides access to the vast selection of Windows programs. The Windows Store now has about 240,000 tablet apps and covers most needs, but it’s still nowhere near the iPad’s ecosystem.


I don’t think there’s actually much difference in terms of ease of use in tablet mode, once you have learned the specific edge-swipes that do special things in the Metro-sorry-modern interface. (If you won’t learn those, you have no chance.) Most of the complaints about Windows 8 have been about using the tablet interface to access desktop features, and Microsoft is in the process of fixing those.

I’ve been using a Haswell-powered Surface Pro 2 on loan from Microsoft, and while it has many improvements over the first version, the experience hasn’t really changed the views I expressed when I reviewed it here (Microsoft Surface Pro review: a device of many talents). It’s amazingly versatile. For example, you can use it as a desktop with full size keyboard and monitor -- or several monitors -- and its Wacom-style pen-operated graphics make it exceptionally good value for creative types. It also makes life simpler when you can do PC-level photo and video editing then switch to tablet-style viewing on the same machine. It’s dramatically cheaper than buying a desktop, an Ultrabook, a graphics tablet, and a tablet. On the other hand, it’s not the optimum choice for any particular function, and if you don’t need all the features, it’s an expensive option.

It’s true that Windows 8 tablet hybrids can cost from about £350 to over £1,000, but new tablets with 8in screens are very much cheaper, and prices now start at about £250. (Or, for American buyers, about $250.) They can still do all the good stuff, such as supporting multiple monitors, though usually without the high-resolution digitising pen input. The obvious drawback is that an 8in screen is very small for running desktop programs, especially if you don’t know them well enough to use keyboard shortcuts.

The cost savings come from the smaller screen sizes and the use of 32-bit Intel Atom chips with 2GB of memory. However, the new Bay Trail chips are dramatically better than the old Atoms used in netbooks. For example, the Z3770 is roughly as fast as an Intel Celeron 1007U or a low-voltage Core i3-4010Y, and ahead of old staples such as the second-gen Core i3-2375M. Of course, the extra efficiency of Windows 8 helps as well.

Cheaper Windows?
There may be further price reductions to come, both through economies of scale -- production is still ramping up -- and because Microsoft might cut the price of Windows 8 on ultra low cost PCs.

You may know that netbooks were cheap partly because Microsoft offered manufacturers a special version of Windows XP called Home Edition ULCPC for “ultra low cost personal computers”. The rumoured price was closer to $15 than the usual $45, but it was basically free money for Microsoft -- XP had reached the end of its very profitable life -- and netbook manufacturers preferred it to free Linux. Today, the competition is with free Android, and Microsoft is willing to cut the price because it wants to sell more copies of Windows 8. (And it needs to sell more Windows 8 tablets to encourage developers to write more apps for the Windows Store.)

Anyway, on February 22, Bloomberg reported: “Manufacturers will be charged $15 to license Windows 8.1 and preinstall it on devices that retail for less than $250, instead of the usual fee of $50, said the people, who asked not to be named because the details aren’t public. The discount will apply to any products that meet the price limit, with no restrictions on the size or type of device, the people said.”

Currently there are exactly zero Windows 8.1 devices designed to retail for less than $250 (though you might get one in a sale), so if the story is true, Microsoft is trying to penetrate a part of the market that now goes by default to Android devices and low-end Chromebooks in the $199.99 to $249.99 price range.

Windows 8 mini-tablets
If you fancy trying an 8in Windows 8 tablet, there are several to choose from. The notable ones include the Dell Venue 8 Pro, Toshiba Encore, Acer Iconia W4, Lenovo MiiX 2 and Asus VivoTab Note 8.

The cheapest I can see at the moment is a Toshiba Encore 8 with 32GB of storage on sale (£50 off) for £199.99 at PC World. This has micro-USB and micro HDMI ports so you could plug it into a monitor or TV set, and apparently includes £100-worth of Microsoft Office Home and Student 2013. This is the same price as a Nexus 7 and cheaper than your discounted iPad Mini, without even counting the extra cost of Apple cables.

The rule of thumb is that 32GB on Windows tablets is equivalent to 16GB on Android and iPad tablets, but you can improve on that using tips from this Guide to Maximizing Disk Space on your Dell Venue 8 Pro (or other Windows 8.1 system). The standard tricks include copying off the Recovery platform, which saves 5GB or 6GB, and mounting a fast 64GB SD card as Permanent Storage.

I have nothing against the iPad Mini: when I had one on loan from Apple, I liked it a lot and gave it a five-star review. It played BBC videos perfectly, and colours looked more naturalistic than they did on a Kindle Fire. Also, if you want access to the iPad ecosystem, it’s the cheapest option. However, a Windows tablet will do the tablety things you need, and it will enable you to RDP into your desktop PC, and stream videos via an Xbox, if you have one. It will also run Adobe Flash and standard desktop PC software using a PC or wireless Bluetooth keyboard. And you won’t be forced to install iTunes.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Monday, March 3, 2014

Twitch Plays Pokémon: live gaming's latest big hit


An infinite number of monkeys with an infinite number of typewriters would rapidly type the works of Shakespeare. How would they do at videogames?

Currently, 56,312 people are attempting to play Pokémon Red at the same time. At times, that has been as high as 150,000. That is: there is one game of Pokémon Red, and all 150,000 people are controlling it at once.

It is going strangely well.

“Twitch Plays Pokémon” is half art project and half reality show for the 21st century. The idea is relatively simple. Pokémon Red, the 1996 Game Boy hit that kickstarted the Pokémon franchise, is running on an emulator hooked up to Twitch, a website which lets gamers broadcast video games live.

Viewers can enter button commands in the chat window, and they get passed onto the emulator, which enters them in order.

In theory, it harnesses the wisdom of the crowds to find the best way through the game, with playing 24 hours a day, seven days a week. (The game has currently been running for just over eight and a half days)

In practice, however, it looks like this:


With tens of thousands of players all entering commands at once, coordinated action is nearly impossible. Worse still, the footage is delayed by around 20 seconds, leaving players voting on actions they haven’t actually seen. And even when the decision is obvious, just enough viewers set out to deliberately disrupt events that nothing quite goes to plan.

Take the Ledge (an event which earned its capital L). In Pokémon, ledges are one-way barriers, which the player can jump off but not climb up. One particular ledge, encountered three days after the stream began, was just below a wall. To get past, all the players had to do was press right for a few seconds to walk twelve paces east, then up. Pressing down at any point would send them back to the start.

It took them seven hours to walk those twelve paces.

History

Twitch Plays Pokémon’s creator has mostly taken a back seat in the whole thing. Speaking to the Guardian under conditions of strict anonymity, they expressed surprise at the stream’s popularity.

“I wasn’t expecting it to get very popular at all. When I put it up I was thinking it would peak around 300 concurrent viewers at most, I wasn’t expecting over 100,000!

“I’m sitting at a computer all day and frequently dealing with servers anyway. The biggest change [since the stream began] has been the amount and nature of messages I receive. I have TPP opened on a secondary monitor all day so I can keep an eye on it.”

But while the game mostly plays itself, there have been times a hand from above has been required. The biggest change since the stream began was the introduction of “democracy mode” on Wednesday, which replaced the original “anarchy mode” with a system of votes on which button should be pushed next.

“It was made to make otherwise impossible sections possible,” explains the creator. “I knew when this thing got very popular and the inputs became chaotic that I’d eventually have to make a change that wouldn’t go over well with everyone…

“The problem was that some sections of the game are impossible without some amount of precision with the inputs, precision that just wasn’t going to be possible with the existing input mode.”

Initially, democracy mode was mandatory. But after the backlash, a system was introduced to let players vote on whether or not to vote.

“I made a change to the way inputs are determined but it didn’t go over well so I put in a toggle to switch between the original mode and the new mode. The viewers had already named these modes anarchy and democracy and I thought they were cool and descriptive names and used them.

“I think the community has responded much better than I was fearing: I was expecting viewer [numbers] to drop by a lot more, and to receive a lot more abusive messages.”

Community

TPP has generated a fanatical community, which has taken its devotion to almost-religious levels.

Typically, that would be hyperbole, but in this case it’s accurate. On the second day of the game, players received the Helix Fossil, an item with no practical use. But because it was at the top of the item list, it ended up being selected – often repeatedly – in the heat of battle. The community interpreted this as “turning to the Helix Fossil for guidance”, and so the meme of the blessed Helix Fossil was born.

Other legends were born along the way. Eevee is a low-level doglike Pokémon that can evolve into three different forms depending on which elemental rock is used. The water form, Vaporeon, is tremendously useful because it can use Surf to travel on water, which is crucial for finishing the game. Unfortunately, the players bought and used the Fire Stone instead, turning Eevee into Flareon. The fire dog became known as the “False Prophet”, before being released into the wild a few days later.

It goes on: a high-level Pidgeot is known as “Bird Jesus” for winning so many battles; a Rattata with dig, a move that can escape dungeons, is damned for digging the player out of Team Rocket’s HQ after hours spent navigating a maze; a Drowzee is the “Keeper” of Flareon after the two were placed in storage next to each other.

The whole thing has a tongue-in-cheek element, a self-aware attempt to find method in the madness. Even without the community, TPP is frequently gripping. Watching the community attempt to name a pokémon (party members have included “x(araggbaj”, “AAJST(????” and “aaabaaajss”), or feeling dread as the cursor hovers over a command which will destroy hours of work, is strangely compelling, even if it’s bookended with hours of dull repetition.

It’s provoked essays on the nature of anarchy and democracy, fan art detailing the history of the faith, a mention in XKCD and a lot of faintly terrible memes. There are even spin-offs, such as Twitch Plays Pokémon Plays Tetris, which takes the same commands and puts them into a hacked version of Tetris.

As I was writing this, the players had reached the most risky section yet, an area called the Safari Zone. It’s one of the few places it’s possible to render the game unfinishable, by running out of money entirely, and it relies on near-perfect commands to be entered 270 times in a row. But then they did it anyway, coming together and producing detailed maps to help with co-ordination.

The players are well over half way through the game, now, with three gym badges to go before they can fight the elite four, and finish the game.

It can’t be long, and the creator is already planning what comes next. “I’ve received a lot of requests to continue with the Pokémon franchise after the Elite Four and the Pokémon Champion get defeated, so I’m going to do that. I’m still deciding which of the generation 2 Pokémon games to go with.”

It’s tempting to draw wider conclusions about the success of Twitch Plays Pokémon. As tech blogger Andy Baio writes, it is “to me, the most wonderful thing online right now, a microcosm of the internet at large.”

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Sunday, March 2, 2014

How computer generated fake papers are flooding academia

Like all the best hoaxes, there was a serious point to be made. Three MIT graduate students wanted to expose how dodgy scientific conferences pestered researchers for papers, and accepted any old rubbish sent in, knowing that academics would stump up the hefty, till-ringing registration fees.

It took only a handful of days. The students wrote a simple computer program that churned out gobbledegook and presented it as an academic paper. They put their names on one of the papers, sent it to a conference, and promptly had it accepted. The sting, in 2005, revealed a farce that lay at the heart of science.

But this is the hoax that keeps on giving. The creators of the automatic nonsense generator, Jeremy Stribling, Dan Aguayo and Maxwell Krohn, have made the SCIgen program free to download. And scientists have been using it in their droves. This week, Nature reported, French researcher Cyril Labbé revealed that 16 gobbledegook papers created by SCIgen had been used by German academic publisher Springer. More than 100 more fake SCIgen papers were published by the US Institute of Electrical and Electronic Engineers (IEEE). Both organisations have now taken steps to remove the papers.

Hoaxes in academia are nothing new. In 1996, mathematician Alan Sokal riled postmodernists by publishing a nonsense paper in the leading US journal, Social Text. It was laden with meaningless phrases but, as Sokal said, it sounded good to them. Other fields have not been immune. In 1964, critics of modern art were wowed by the work of Pierre Brassau, who turned out to be a four-year-old chimpanzee. In a more convoluted case, Bernard-Henri Lévy, one of France's best-known philosophers, was left to ponder his own expertise after quoting the lectures of Jean-Baptiste Botul as evidence that Kant was a fake, only to find out that Botul was the fake, an invention of a French reporter.

Just as the students wrote a quick and dirty program to churn out nonsense papers, so Labbé has written one to spot the papers. He has made it freely available, so publishers and conference organisers have no excuse for accepting nonsense work in future.

Krohn, who has now founded a startup called Keybase.io in New York that provides encryption to programmers, said Labbé's detective work revealed how deep the problem ran. Academics are under intense pressure to publish, conferences and journals want to turn their papers into profits, and universities want them published. "This ought to be a shock to people," Krohn said. "There's this whole academic underground where everyone seems to benefit, but they are wasting time and money and adding nothing to science. The institutions are being ripped off, because they pay publishers huge subscriptions for this stuff."

Krohn sees an arms race brewing, in which computers churn out ever more convincing papers, while other programs are designed to sniff them out. Does he regret the beast he helped unleash, or is he proud that it is still exposing weaknesses in the world of science? "I'm psyched, it's so great. These papers are so funny, you read them and can't help but laugh. They are total bullshit. And I don't see this going away."

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks

Saturday, March 1, 2014

Meet the seven people who hold the keys to worldwide internet security

It sounds like the stuff of science fiction: seven keys, held by individuals from all over the world, that together control security at the core of the web. The reality is rather closer to The Office than The Matrix.

In a nondescript industrial estate in El Segundo, a boxy suburb in south-west Los Angeles just a mile or two from LAX international airport, 20 people wait in a windowless canteen for a ceremony to begin. Outside, the sun is shining on an unseasonably warm February day; inside, the only light comes from the glare of halogen bulbs.

There is a strange mix of accents predominantly American, but smatterings of Swedish, Russian, Spanish and Portuguese can be heard around the room, as men and women (but mostly men) chat over pepperoni pizza and 75 cent vending machine soda. In the corner, an Asteroids arcade machine blares out tinny music and flashing lights.


It might be a fairly typical office scene, were it not for the extraordinary security procedures that everyone in this room has had to complete just to get here, the sort of measures normally reserved for nuclear launch codes or presidential visits. The reason we are all here sounds like the stuff of science fiction, or the plot of a new Tom Cruise franchise: the ceremony we are about to witness sees the coming together of a group of people, from all over the world, who each hold a key to the internet. Together, their keys create a master key, which in turn controls one of the central security measures at the core of the web. Rumours about the power of these keyholders abound: could their key switch off the internet? Or, if someone somehow managed to bring the whole system down, could they turn it on again?

The keyholders have been meeting four times a year, twice on the east coast of the US and twice here on the west, since 2010. Gaining access to their inner sanctum isn't easy, but last month I was invited along to watch the ceremony and meet some of the keyholders a select group of security experts from around the world. All have long backgrounds in internet security and work for various international institutions. They were chosen for their geographical spread as well as their experience – no one country is allowed to have too many keyholders. They travel to the ceremony at their own, or their employer's, expense.

What these men and women control is the system at the heart of the web: the domain name system, or DNS. This is the internet's version of a telephone directory – a series of registers linking web addresses to a series of numbers, called IP addresses. Without these addresses, you would need to know a long sequence of numbers for every site you wanted to visit. To get to the Guardian, for instance, you'd have to enter "77.91.251.10" instead of theguardian.com.

The master key is part of a new global effort to make the whole domain name system secure and the internet safer: every time the keyholders meet, they are verifying that each entry in these online "phone books" is authentic. This prevents a proliferation of fake web addresses which could lead people to malicious sites, used to hack computers or steal credit card details.

The east and west coast ceremonies each have seven keyholders, with a further seven people around the world who could access a last-resort measure to reconstruct the system if something calamitous were to happen. Each of the 14 primary keyholders owns a traditional metal key to a safety deposit box, which in turn contains a smartcard, which in turn activates a machine that creates a new master key. The backup keyholders have something a bit different: smartcards that contain a fragment of code needed to build a replacement key-generating machine. Once a year, these shadow holders send the organisation that runs the system the Internet Corporation for Assigned Names and Numbers (I can) a photograph of themselves with that day's newspaper and their key, to verify that all is well.

The fact that the US-based, not-for-profit organisation I can rather than a government or an international body has one of the biggest jobs in maintaining global internet security has inevitably come in for criticism. Today's occasionally over-the-top ceremony (streamed live on Icann's website) is intended to prove how seriously they are taking this responsibility. It's one part The Matrix (the tech and security stuff) to two parts The Office (pretty much everything else).

For starters: to get to the canteen, you have to walk through a door that requires a pin code, a smartcard and a biometric hand scan. This takes you into a "mantrap", a small room in which only one door at a time can ever be open. Another sequence of smartcards, handprints and codes opens the exit. Now you're in the break room.

Already, not everything has gone entirely to plan. Leaning next to the Atari arcade machine, ex-state department official Rick Lamb, smartly suited and wearing black-rimmed glasses (he admits he's dressed up for the occasion), is telling someone that one of the on-site guards had asked him out loud, "And your security pin is 9925, yes?" "Well, it was…" he says, with an eye-roll. Looking in our direction, he says it's already been changed.

Lamb is now a senior programme manager for Icann, helping to roll out the new, secure system for verifying the web. This is happening fast, but it is not yet fully in play. If the master key were lost or stolen today, the consequences might not be calamitous: some users would receive security warnings, some networks would have problems, but not much more. But once everyone has moved to the new, more secure system (this is expected in the next three to five years), the effects of losing or damaging the key would be far graver. While every server would still be there, nothing would connect: it would all register as untrustworthy. The whole system, the backbone of the internet, would need to be rebuilt over weeks or months. What would happen if an intelligence agency or hacker the NSA or Syrian Electronic Army, say – got hold of a copy of the master key? It's possible they could redirect specific targets to fake websites designed to exploit their computers – although Icann and the keyholders say this is unlikely.

Standing in the break room next to Lamb is Dmitry Burkov, one of the keyholders, a brusque and heavy-set Russian security expert on the boards of several internet NGOs, who has flown in from Moscow for the ceremony. "The key issue with internet governance is always trust," he says. "No matter what the forum, it always comes down to trust." Given the tensions between Russia and the US, and Russia's calls for new organisations to be put in charge of the internet, does he have faith in this current system? He gestures to the room at large: "They're the best part of Icann." I take it he means he likes these people, and not the wider organisation, but he won't be drawn further.

It's time to move to the ceremony room itself, which has been cleared for the most sensitive classified information. No electrical signals can come in or out. Building security guards are barred, as are cleaners. To make sure the room looks decent for visitors, an east coast keyholder, Anne-Marie Eklund Löwinder of Sweden, has been in the day before to vacuum with a $20 dustbuster.

We're about to begin a detailed, tightly scripted series of more than 100 actions, all recorded to the minute using the GMT time zone for consistency. These steps are a strange mix of high-security measures lifted straight from a thriller (keycards, safe combinations, secure cages), coupled with more mundane technical details a bit of trouble setting up a printer and occasional bouts of farce. In short, much like the internet itself.

As we step into the ceremony room, 16 men and four women, it is just after lunchtime in LA and 21.14 GMT. As well as the keyholders, there are several witnesses here to make sure no one can find some sneaky back door into the internet. Some are security experts, others are laypeople, two are auditors from PricewaterhouseCoopers (with global online trade currently well in excess of $1tn, the key has a serious role to play in business security). Lamb uses an advanced iris scanner to let us all in.

"Please centre your eyes," the tinny automated voice tells him. "Please come a little closer to the camera… Sorry, we cannot confirm your identity."

Lamb sighs and tries again.

"Thank you, your identity has been verified."

We file into a space that resembles a doctor's waiting room: two rows of bolted-down metal seats facing a desk. Less like a doctor's waiting room are the networks of cameras live-streaming to Icann's website. At one side of the room is a cage containing two high-security safes.

Francisco Arias, Icann's director of technical services, acts as today's administrator. It is his first time, and his eyes regularly flick to the script. To start with, things go according to plan. Arias and the four keyholders (the ceremony requires a minimum of three, not all seven) enter the secure cage to retrieve their smartcards, held in tamper-evident bags. Middle-aged men wearing checked shirts and jeans, they are Portuguese keyholder João Damas, based in Spain; American Edward Lewis, who works for an internet and security analytics firm; and Uruguayan Carlos Martinez, who works for Lacnic, the internet registry for Latin America and the Caribbean.

All but one of the 21 keyholders has been with the organisation since the very first ceremony. The initial selection process was surprisingly low-key: there was an advertisement on Icann's site, which generated just 40 applications for 21 positions. Since then, only one keyholder has resigned: Vint Cerf, one of the fathers of the internet, now in his 70s and employed as "chief internet evangelist" by Google. At the very first key ceremony, in Culpeper, Virginia, Cerf told the room that the principle of one master key lying at the core of networks was a major milestone. "More has happened here today than meets the eye," he said then. "I would predict that… in the long run this hierarchical structure of trust will be applied to a number of other functions that require strong authentication." But Cerf struggled with the travel commitment and dropped his keyholder duties.

At 21.29, things go awry. A security controller slams the door of the safe shut, triggering a seismic sensor, which in turn triggers automatic door locks. The ceremony administrator and the keyholders are all locked in an 8ft square cage. Six minutes of quiet panic go by before they hit on a solution: trigger an alarm and an evacuation. Sirens blare and everyone piles out to mill around in the corridor until we can get back to the 100-point script. Every deviation has to be noted on an official record, which everyone present must read and sign off at a later point. Meanwhile, we use the downtime to snack: people rip open a few bags of Oreo biscuits and Cheez-Its.

Both the US commerce department and the Department of Homeland Security take a close interest, to differing degrees, in Icann's operations. In the wake of the ongoing revelations of NSA spying, and of undermined internet security, this does not sit well with many of Icann's overseas partners. Some, including Russia and Brazil – whose president has made such demands very public – are calling for a complete overhaul of how the internet is run, suggesting it should be put under UN auspices.

The question of who put Icann in charge is hotly contested. Lamb argues that "it's the online community; it's the people who've put Icann in charge". Eklund Löwinder, the Swedish keyholder who vacuumed the day before, puts it more bluntly. "Well, mainly, it was the US Department of Commerce," she says. The European Commission wants changes to this system, though it still expresses its faith in Icann; the EU recently called for a "clear timeline for the globalisation of Icann".

Eklund Löwinder explains that while the security might occasionally seem ridiculous, every step is very important when it comes to maintaining trust. "It's a system based on backups of backups, layers and layers of security," she says, her dangly cat earrings swinging. "Of course it is a bit romantic and thrilling to be a part of this, because I am a romantic by heart. I have to admit I love the internet. It's a piece of engineering art you have to admire. And to be able to contribute to make this a safer place makes me feel good."

Where does she keep her key? She admits she has two copies, in case she loses one; one of them never leaves a bank deposit box. The other, which she uses twice a year in the ceremonies on the east coast, is attached to a long metal chain. Most of the time it sits in a wooden puzzle box, with a hidden lock, created by her furniture designer son.

By 22.09 (we are all sticking to GMT) the ceremony is back on and everyone's returning to the script. The high-security machine that will generate the master key is set up. Once activated by the smartcards, this will produce a lengthy cryptographic code. If dropped, or even knocked too hard, the machine will self-destruct.

Now that everything has been removed from the safes, we move to act two of the ceremony: the key signing. The first step would be familiar to anyone – getting the laptop plugged in and booting it up – but some witnesses watch like hawks, logging and initialising each step. Others are beginning to flag, checking their watches or having whispered conversations with their neighbours.

At 22.40, a series of USB drives is set up, one of which will be used to load the signed key on to the live internet at the end of the ceremony: this is when the code is uploaded to the servers that dictate who controls .com, .net, .co.uk and more.

The output of the previous ceremony is checked, to make sure people are working off the same key – a process that requires Arias to read aloud a 64-character code. Everyone nods as they verify it against their sheets.

At 22.48 the high-security machine a small, plain grey box with a keypad and card slot in front is wired up. Each keyholder hands over his individual smartcard. Then, at 22.59, nearly two hours after the ceremony began, it's show time. Alejandro Bolivar, an American expert from Verisign, the security company that administers the "root zone" of the domain name system, steps forward to read out a nonsense sequence of words generated by the previous key. He begins: "Flatfoot warranty brickyard Camelot…" and continues for nearly a minute before concluding, "blackjack vagabond." The sequence corresponds with the witnesses' notes, so they nod and sign their script. A short line of code is typed into the laptop at 23.02, and seconds later the new key is signed, to a smattering of applause.

After a 20-minute sequence of disconnecting secure machines and powering down the laptop, a USB stick is handed to Tomofumi Okubo, another Icann staffer. Deliberately or otherwise, Okubo makes a slight bow as he is passed the stick holding the "signed" digital key. Later Okubo will transmit the key on a secure channel to Verisign and this signed key will be made live across the internet. It will take effect for three months, from 1 April (yes, really). After that, the key will expire and error messages will start to appear across the internet.

Given how high the stakes are, and the number of possible targets, does Okubo think the system is trustworthy? "I think so," he says. "You'd have to compromise a lot of people…" He trails off.

Does this often slightly bizarre ceremony work? Are the security precautions integral, or just for show? Bruce Schneier, an American cryptologist and security expert who worked with Glenn Greenwald and the Guardian to analyse some of the files leaked by Edward Snowden, suggests it's a little of both. "A lot of it is necessary, and some of it is necessary theatre," he concedes. "This process is both technical and political, which makes it extra complicated… I think the system is well designed." As to whether the system will survive in the aftermath of the NSA revelations, Schneier thinks the jury is still out: "That, we don't know."

Back in the ceremony room, the four keyholders are once again locked in a cage with the safes holding their smartcards, this time returning them for future use. It is 23.32 on the clock and each is solemnly holding up their keycard, in a new tamper-evident bag, for the cameras to witness before returning it to the safe. Not everyone present is entirely gripped. "It's like a combination of church and a baseball game and I don't know what else," says Icann PR Lynn Lipinski. "I'm getting sleepy."

At 00.06, five hours after we all arrived, it's time to shut off the live-streaming cameras. Lamb checks in to see how many people have been following the ceremony.

The system admin calls back: "We peaked at 12."

We file out, job done.

"Wait," Okubo says. "One question before we go… Can I ask who's coming for dinner?"


There's a show of hands and, with the web secure for another three months, the keyholders to the internet file out into the LA sunshine.

Source: The Guardian
This blog is sponsored by: http://visitwebpages.info/paypalchecks