Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 9 declined, 15 accepted (24 total, 62.50% accepted)

Submission + - Thinking carefully about Google's military AI projects (eff.org)

Peter Eckersley writes: Yesterday the New York Times reported that there is widespread unrest amongst Google's employees about the company's work on a US military project called Project Maven. Google has claimed that its work on Maven is for "non-offensive uses only", but it seems that the company is building computer vision systems to flag objects and people seen by military drones for human review. This may in some cases lead to subsequent targeting by missile strikes. EFF has been mulling the ethical implications of such contracts, and we have some advice for Google and other tech companies that are considering building military AI systems.

Submission + - EFF launches new AI progress measurement project (eff.org)

Peter Eckersley writes: There's a lot of real progress happening in the field of machine learning and artificial intelligence, and also a lot of hype. These technologies already have serious policy implications, and may have more in the future. But what's the ratio of hype to real progress? At EFF, we decided to find out.

Today we are launching a pilot project to measure the progress of AI research. It breaks the field into a taxonomy of subproblems like game playing, reading comprehension, computer vision, and asking neural networks to write computer programs, and tracks progress on metrics across these fields. We're hoping to get feedback and contributions from the machine learning community, with the aim of using this data to improve the conversations around the social implications, transparency, safety, and security of AI.

Submission + - Anouncing Certbot: EFF's client for Let's Encrypt (eff.org)

Peter Eckersley writes: EFF has just launched Certbot, which is the next iteration of the Let's Encrypt client. It's a powerful tool for obtaining TLS/SSL certificates from Let's Encrypt, and (if you wish) automatically installing them to enable and tune HTTPS on your website. It's extensible, and supports a rapidly-growing range of server software. Install Certbot, and help us encrypt the Web today!

Submission + - Is your browser safe from Web tracking? (eff.org)

Peter Eckersley writes: Today EFF has launched Panopticlick 2.0. In addition to measuring whether your browser exposes unique — and therefore trackable — settings and configuration to websites, the site can now test if you have correctly configured ad- and tracker-blocking software. Think you have correctly configured tracker-blocking software? Visit Panopticlick to test if you got it right.

Submission + - Let's Encrypt is now in Public Beta (eff.org)

Peter Eckersley writes: As of today, Let's Encrypt is in Public Beta. If you're comfortable running beta software that may have a few bugs and rough edges, you can use it to instantly obtain and install certificates for any HTTPS website or TLS service. You can find installation instructions here.

Submission + - Launching 2015: a new Certificate Authority to Encrypt the Entire Web (eff.org)

Peter Eckersley writes: Today EFF, Mozilla, Cisco and Akamai announced a forthcoming project called Let's Encrypt. Let's Encrypt will be a certificate authority that issues free certificates to any website, using automated protocols (demo video here). Launching in summer 2015, we believe this will be the missing piece that deprecates the woefully insecure HTTP protocol in favor of HTTPS.

Submission + - EFF begins a Campaign for Secure and Usable Cryptography (eff.org)

Peter Eckersley writes: Over at EFF we just launched our Secure Messaging Scorecard, which is the first phase in a campaign to promote the development of communications protocols that are genuinely secure and usable by ordinary people. The Scorecard evaluates communications software against critical minimum standards for what a secure messaging app should look like; subsequent phases are planned to examine real world usability, metadata protection, protocol openness, and involve a deeper look at the security of the leading candidates. Right now, we don't think the Internet has any geninely usable, genuinely secure messaging protocols — but we're hoping to encourage tech companies and the open source community to starting closing that gap.

Submission + - With HTTPS Everywhere, is Firefox now the most secure mobile browser? (eff.org) 2

Peter Eckersley writes: Over at EFF, we just released a version of our HTTPS Everywhere extension for Firefox for Android. HTTPS Everywhere upgrades your insecure web requests to HTTPS on many thousands of sites, and this means that Firefox on Android with HTTPS Everywhere is now by far the most secure browser against dragnet surveillance attacks like those performed by the NSA, GCHQ, and other intelligence agencies.

Android users should install the Firefox app and then add HTTPS Everywhere to it. iPhone and iPad users will unfortunately have to switch to Android to get this level of security because Apple has locked Mozilla Firefox out of their platforms.

Submission + - Australian Networks Censoring Community University Website (eff.org)

Peter Eckersley writes: At the EFF we were recently contacted by the organisers of the Melbourne Free University (MFU), an Australian community education group, whose website had been unreachable from a number of Australian ISPs since the 4th of April.

It turns out that the IP address of MFU's virtual host has been black-holed by several Australian networks; there is suggestive but not conclusive evidence that this is a result of some sort of government request or order. It is possible that MFU and 1200 other sites that use that IP address are the victims of a block that was put in place for some other reason.

Further technical analysis and commentary is in our blog post.

Privacy

Submission + - Presidential campaigns leaking supporters' identities to online tracking firms? (webpolicy.org)

Peter Eckersley writes: "Stanford privacy researcher Jonathan Mayer has published new research showing that websites of both the Obama and Romney presidential campaigns, which are used to communicate with and coordinate their volunteers, leak large amounts of private information to third-party online tracking firms. The Obama campaign site leaked names, usernames, zip codes and street addresses to up to ten companies. The Romney campaign site leaked names, zip codes and partial email addresses to up to thirteen firms."
Privacy

Submission + - EFF's HTTPS Everywhere Detects and Warns About Cryptographic Vulnerabilities (eff.org)

Peter Eckersley writes: "EFF has released version 2 of the HTTPS Everywhere browser extension for Firefox, and a beta version for Chrome. The Firefox release has a major new feature called the Decentralized SSL Observatory. This optional setting submits anonymous copies of the HTTPS certificates that your browser sees to our Observatory database allowing us to detect attacks against the web's cryptographic infrastructure. It also allows us to send real-time warnings to users who are affected by cryptographic vulnerabilities or man-in-the-middle attacks. At the moment, the Observatory will send warnings if you connect to a device has a weak private key due to recently discoveredrandom number generator bugs, and we will be adding more such tests in the future."
Privacy

Submission + - Widespread hijacking of search traffic in the US (eff.org)

Peter Eckersley writes: "The Netalyzr research project from the ICSI networking group has discovered that on a number of US ISPs' networks, search traffic for Bing, Yahoo! and sometimes Google is being redirected to proxy servers operated by a company called Paxfire.

In addition to posing a grave privacy problem, this server impersonation is being used to redirect certain searches away from the user's chosen search engine and to affiliate marketing programs instead. Further analysis in a post at EFF."

Security

Submission + - EFF to Verizon: Should Etisalat have a CA cert? (eff.org)

Peter Eckersley writes: Today EFF published an open letter to Verizon (NYTimes coverage), calling for investigation of whether Etisalat is really an appropriate party to be a trusted SSL Certificate Authority. Etisalat is a majority state-owned telecom of the United Arab Emirates with operations throughout the Middle East. You may remember that last year Etisalat installed malware on its subscribers' BlackBerry phones, and was recently pivotal in the UAE's threat to disconnect BlackBerry devices altogether if Research In Motion did not provide a backdoor for BES servers' crypto.

This company, which appears to be institutionally hostile to the existence and use of secure cryptosystems, is in possession of a master certificate for HTTPS, encrypted POP and IMAP, and other SSL-based security systems. Etisalat's CA certificate is not trusted directly by Mozilla and Microsoft, but was instead delegated as an Intermediate CA by Verizon. As a result, we are asking Verzion to investigate whether it is appropriate for Etisalat to continue holding this certificate, and to consider revoking it.

Privacy

Submission + - Tracking browsers without cookies or IP addresses? (eff.org) 1

Peter Eckersley writes: The EFF has launched a research project called Panopticlick, to determine whether seemingly innocuous browser configuration information (like User Agent strings, plugin versions and, fonts) may create unique fingerprints that allow web users to be tracked, even if they limit or delete cookies. Preliminary results indicate that the User Agent string alone has 10.5 bits of entropy, which means that for a typical Internet user, only one in about 1,500 (2 ^ 10.5) others will share their User Agent string.

If you visit Panopticlick, you can get an reading of how rare or unique your browser configuration is, as well as helping EFF to collect better data about this problem and how best to defend against it.

Slashdot Top Deals

How come financial advisors never seem to be as wealthy as they claim they'll make you?

Working...