'People should be free from Peeping Toms' snapping pics of them!

'No place for photo censorship in Argyll', though


QuotW This was the week when a top US senator laid down the law with Google and Apple over their Maps apps. Or actually, he didn't, he just laid down his suggestion that maybe having "military-grade spy planes" flying around snapping pics of the whole world was less than desirable.

He thundered:

Barbecuing or sunbathing in your backyard shouldn't be a public event. People should be free from the worry of some high-tech Peeping Tom technology violating one's [sic] privacy when in your [sic] own home.

It's a little bit late for Senator Charles Schumer to be concerned about how much of the world Google's eyes have already creeped over, but he says he's more worried now because of reports that the Chocolate Factory and Apple have upgraded their spying mapping capabilities. But neither Apple nor Google need to be bothered by the senator's comments yet, since they are just that: comments, with no force of law behind them. Still, must feel good to get that off his chest.

Google was also in the news this week when it issued its annual Transparency Report on what kind of stuff it had been asked to take down off its sites and by whom. The web giant let us all know just how evil governments are, in sharp contrast of course to the Chocolate Factory-ness of Google itself.

The firm's senior policy analyst Dorothy Chou said:

Just like every other time before, we’ve been asked to take down political speech. It’s alarming not only because free expression is at risk, but because some of these requests come from countries you might not suspect — Western democracies not typically associated with censorship.

Over at Oracle, the executive VP of North American sales and consulting Keith Block showed that even the big boys fall into that trap of dissing the boss while at work.

HP outed the unfortunate Block, who had been rumoured to be on his way out Oracle's door, as being, er, fairly disgruntled when Larry Ellison brought Mark Hurd in to be co-president over him. He foolishly shared his unhappiness with the VP of human resources at Oracle, Anje Dodson, in an IM exchange that HP dumped online after Oracle leaked some internal HP documents.

Block said (restructured from IM format):

Here's the deal: this isn't HP. We bought a dog; it's all about exa. Asking reps to sell the dog is not a great thing. Mark wants us to sell the dog.

And speaking of Oracle CEO Larry Ellison, who bought an island in Hawaii this week by the way, one of our more lyrically minded commentards was inspired to come up with this:

Larry, Larry, quite contrary,

How does your empire grow?

With IP "rights" and patent fights,

and lawyers all in a row.

Another man in tech this week who saw no need to sugarcoat his feelings was Linux daddy Linus Torvalds. He made no effort to hide how he felt about NVIDIA during a Q&A after a presentation in Finland, when he said:

NVIDIA – f*** you.

The jibe came at the end of a diatribe against the GPU-maker, which doesn't offer support for Linux:

NVIDIA has been one of the worst trouble spots we have had with hardware manufacturers.

That is really sad because NVIDIA tries to sell chips into the Android market.

His expletive comment has been immortalised for all eternity by being captured on video and then, naturally, uploaded to YouTube.

Meanwhile, back in the good old USA, Apple was busily filing for patents as it continues its efforts to take over the tech world, including one to "protect" fanbois from online smut.

The fruity firm reckons the best way to stop anyone knowing what you're doing online (ie, looking at porn) is to create a data clone of you that will go to websites about kittens and basket-weaving (no, not those niche porn sites, that would defeat the purpose, silly).

The patent application explained:

Actions may be defined that permit the cloning service to appear to be the principal [real person] and visit specific basket weaving websites, issue internet searches related to basket weaving, and the like. This activity by the cloning service may be picked up by an eavesdropper and may be used to generate a polluted profile about the principal that suggests the principal is interested in basket weaving, when in fact this is not the case.

And finally, the prize for the fastest backtrack of the year so far has to go to Argyll and Bute council, which banned a school dinner blog one day and then dropped the ban and made it sound like it never wanted to stop the intrepid dinner-photographer the next.

NeverSeconds, a blog written by a nine-year-old schoolgirl, is plastered with pics of the pupil's school dinners – and the pint-sized kid's critiques of them, which are not always disparaging. However, as national media interest increased, the girl was sent to the head teacher's office and told she was no longer allowed to take the photos.

When her dad phoned the school to protest, the school said it was nothing to do with it, and that Argyll and Bute council had issued the ban.

For some unknown reason, Argyll and Bute councillors did not think that banning something for being popular in the press might lead to some negative attention, but that's exactly what happened, leaving the council head Roddy McCuish to issue the following statement the very next day:

There is no place for censorship in this council and never will be while I am leader.

Or in other words: "There is no place for censorship in this council after people have noticed we're censoring stuff and given us a load of negative press about it, causing us to give up on the plan for censorship we formulated just yesterday". ®


Other stories you might like

  • Returning to the Moon on the European Service Module
    Moving to series production and dealing with the US, where things are done slightly differently

    Interview NASA has set late August as the launch window for its much-delayed Artemis I rocket. Already perched atop the booster is the first flight-ready European Service Module (ESM). Five more are in the pipeline.

    Airbus industrial manager Siân Cleaver, whom The Register met at the Goodwood Festival of Speed's Future Lab, has the task of managing the assembly of the spacecraft, which will provide propulsion, power, water, oxygen and nitrogen for the Orion capsule.

    Looking for all the world like an evolution of the European Space Agency's (ESA) International Space Station (ISS) ATV freighter, the ESM is not pressurized and measures approximately 4 meters in length, including the Orbital Maneuvering System Engine (OMSE), which protrudes from the base.

    Continue reading
  • Running DOS on 64-bit Windows and Linux: Just because you can
    DOS isn't dead. You can still run it and its apps, even now

    FOSS Fest There are still ways to run DOS apps under 64-bit Windows and Linux, and a lot of free apps to choose from.

    One of the differences between the Microsoft and Apple approaches to maintaining widely used OSes is that Apple is quite aggressive about removing backwards compatibility, while Microsoft tries hard to keep it.

    One of the few times Microsoft removed a whole compatibility layer from Windows was with the launch of 64-bit Windows, which went mainstream with Vista in 2007. 64-bit editions of Windows can't run 16-bit apps, whether they're for DOS or Windows.

    Continue reading
  • China's blockchain boosters slam crypto as Ponzi scheme
    Communists reckon Bill Gates and Warren Buffet got it right

    Executives at China's Blockchain-based Service Network (BSN) – a state-backed initiative aimed at driving the commercial adoption of blockchain technology – labelled cryptocurrency "the biggest Ponzi scheme in human history" in state-sponsored media on Sunday.

    "The author of this article believes that virtual currency is becoming the largest Ponzi scheme in human history, and in order to maintain this scam, the currency circle has tried to put on various cloaks for it," wrote Shan Zhiguang and He Yifan in the People's Daily.

    He Yifan is the CEO of startup Red Date Technology – a founding member and architect behind BSN – where he serves as executive director. Co-author Zhiguang Shan is chair of the BSN Development Alliance.

    Continue reading
  • Carnival Cruises torpedoed by US states, agrees to pay $6m after waves of cyberattacks
    Now those are some phishing boats

    Carnival Cruise Lines will cough up more than $6 million to end two separate lawsuits filed by 46 states in the US after sensitive, personal information on customers and employees was accessed in a string of cyberattacks.

    A couple of years ago, as the coronavirus pandemic was taking hold, the Miami-based biz revealed intruders had not only encrypted some of its data but also downloaded a collection of names and addresses; Social Security info, driver's license, and passport numbers; and health and payment information of thousands of people in almost every American state.

    It all started to go wrong more than a year prior, as the cruise line became aware of suspicious activity in May 2019. This apparently wasn't disclosed until 10 months later, in March 2020.

    Continue reading
  • India extends deadline for compliance with infosec logging rules by 90 days
    Helpfully announced extension on deadline day

    India's Ministry of Electronics and Information Technology (MeitY) and the local Computer Emergency Response Team (CERT-In) have extended the deadline for compliance with the Cyber Security Directions introduced on April 28, which were due to take effect yesterday.

    The Directions require verbose logging of users' activities on VPNs and clouds, reporting of infosec incidents within six hours of detection - even for trivial things like unusual port scanning - exclusive use of Indian network time protocol servers, and many other burdensome requirements. The Directions were purported to improve the security of local organisations, and to give CERT-In information it could use to assess threats to India. Yet the Directions allowed incident reports to be sent by fax – good ol' fax – to CERT-In, which offered no evidence it operates or would build infrastructure capable of ingesting or analyzing the millions of incident reports it would be sent by compliant organizations.

    The Directions were roundly criticized by tech lobby groups that pointed out requirements such as compelling clouds to store logs of customers' activities was futile, since clouds don't log what goes on inside resources rented by their customers. VPN providers quit India and moved their servers offshore, citing the impossibility of storing user logs when their entire business model rests on not logging user activities. VPN operators going offshore means India's government is therefore less able to influence such outfits.

    Continue reading
  • Hangouts hangs up: Google chat app shuts this year
    How many messaging services does this web giant need? It's gotta be over 9,000

    Google is winding down its messaging app Hangouts before it officially shuts in November, the web giant announced on Monday.

    Users of the mobile app will see a pop-up asking them to move their conversations onto Google Chat, which is yet another one of its online services. It can be accessed via Gmail as well as its own standalone application. Next month, conversations in the web version of Hangouts will be ported over to Chat in Gmail. 

    Continue reading
  • OpenSSL 3.0.5 awaits release to fix potential worse-than-Heartbleed flaw
    Though severity up for debate, and limited chips affected, broken tests hold back previous patch from distribution

    The latest version of OpenSSL v3, a widely used open-source library for secure networking using the Transport Layer Security (TLS) protocol, contains a memory corruption vulnerability that imperils x64 systems with Intel's Advanced Vector Extensions 512 (AVX512).

    OpenSSL 3.0.4 was released on June 21 to address a command-injection vulnerability (CVE-2022-2068) that was not fully addressed with a previous patch (CVE-2022-1292).

    But this release itself needs further fixing. OpenSSL 3.0.4 "is susceptible to remote memory corruption which can be triggered trivially by an attacker," according to security researcher Guido Vranken. We're imagining two devices establishing a secure connection between themselves using OpenSSL and this flaw being exploited to run arbitrary malicious code on one of them.

    Continue reading

Biting the hand that feeds IT © 1998–2022