Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 52 declined, 16 accepted (68 total, 23.53% accepted)

Submission + - Fair-use trumps digital locks in Canada (michaelgeist.ca)

Pig Hogger writes: (In Canadian law, “fair use” is called “fair dealing” — “usage équitable”)

Huge win for Canadian digital media users; long-time Canadian user rights champion Michael Geist writes:

The Federal Court has issued a landmark decision (Blacklock’s Reports v. Attorney General of Canada — PDF warning) on copyright’s anti-circumvention rules which concludes that digital locks should not trump fair dealing. Rather, the two must co-exist in harmony, leading to an interpretation that users can still rely on fair dealing even in cases involving those digital locks. The decision could have enormous implications for libraries, education, and users more broadly as it seeks to restore the copyright balance in the digital world. The decision also importantly concludes that merely requiring a password does not meet the standard needed to qualify for copyright rules involving technological protection measures. If this all sounds technical, this post provides the necessary background and then reviews the decision.

Ironically,

The case arises from years of litigation between Blacklock’s Reporter, a paywalled news service based in Ottawa, and the Canadian government. Blacklock’s had launched a series of lawsuits against various government departments, arguing that some of its articles were distributed within departments beyond the limits of its licences.

However,

“how the password was obtained is significant as this may prevent a user from invoking the fair dealing provisions of the Act.” In other words, not all password sharing will qualify as fair dealing.

So Netflix users are out of luck...

Submission + - School districts are gobbling-up phone-hacking technologies like hot cakes (gizmodo.com) 1

Pig Hogger writes: Everywhere, every day, thousands of phones are plugged-into forensic tools that will pull out everything a phone has to offer an investigator. the thing is, investigators are not always working for police departments, but for school districts, who have been increasinly buying various phone hacking tools.

A teacher is suspected of having an affair with a student? No problemo, just search the phones of students (who have next to no constitutional rights in the US) and voilà! Instant evidence to nail the culprit.

Submission + - Raspberry Pi Used to Hack Tesla Model X SUV (tomshardware.com)

Pig Hogger writes: According to this tom’s Harware story, a Belgian PhD student managed to wrest full control of a Tesla Model X SUV, by way of hijacking the Bluetooth keyfob and reprogramming it, using a Raspberry Pi.

Tesla has since issued a software update to protect against that kind of attack

Since the attack is done via Bluetooth, control could be gained wirelessly from 5 meters away.

Submission + - Canadian wholesale ISP rates ruling confirmed by Court of Appeals (fca-caf.gc.ca)

Pig Hogger writes: In August 2019, Canadian telecom regulator CRTC ruled that ISPs must lower their wholesale rates (for other independant ISPs) retroactively to March 2016.

Big telecoms (Bell, Rogers, Cogeco, Vidéotron, Shaw & Eastlink) appealed, which suspended the rate decrease immediately. Now, a year later, the Canadian Federal Court of Appeals ruled that the CRTC decision stands, and that they must also pay the legal fees paid by the independant ISPs.

For now, the big ISPs have 30 days to appeal to the Supreme Court of Canada.

Submission + - How to effectively implement sitewide file encryption?

Pig Hogger writes: The recent assertion that, given the recent CIA/Wikileaks dump about “encryption really working” makes encryption much more desirable.

So, if you decide to implement server-level encryption accross all your servers, how do you manage the necessary keys/passwords/passphrases to insure that you both have maximum uptime (you can access your data if you need to reboot your servers), yet that the keys cannot be compromised, as if the password is known by many different people, because, once the server is seized, you can’t change the password?

What are established practices to address this issue?
Hardware Hacking

Submission + - Hacking Canon point-and-shoot cameras (lifehacker.com) 1

Pig Hogger writes: "If you're stuck with a cheap Canon point-and-shoot camera who has feature envy over the neighbour's sophisticated latest-model, fret not! According to this LifeHacker article, the CHDK project allows nearly complete programmatic control of cheap Canon point-and-shoot cameras that allows users to add features, up to BASIC scripting."

Slashdot Top Deals

Nothing happens.

Working...