prisoninmate quotes a report from Softpedia: Announced for the first time back in November 2014, Devuan is a Debian fork that doesn't use systemd as init system. It took more than two and a half years for it to reach 1.0 milestone, but the wait is now over and Devuan 1.0.0 stable release is here. Based on the packages and software repositories of the Debian GNU/Linux 8 "Jessie" operating system, Devuan 1.0.0 "Jessie" is now considered the first stable version of the GNU/Linux distribution, which stays true to its vision of developing a free Debian OS without systemd. This release is recommended for production use. As Devuan 1.0.0 doesn't ship with systemd, several adjustments needed to be made. For example, the distro uses a systemd-free version of the NetworkManager network connection manager and includes several extra libsystemd0-free packages in its repository.
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's now on IFTTT. Check it out! Check out the new SourceForge HTML5 Internet speed test! ×
Trailrunner7 quotes a report from On the Wire: A bill that would allow victims of cybercrime to use active defense techniques to stop attacks and identify attackers has been amended to require victims to notify the FBI of their actions and also add an exemption to allow victims to destroy their data once they locate it on an attacker's machine. The Active Cyber Defense Certainty Act, drafted by Rep. Tom Graves (R-Ga.) in March, is designed to enable people who have been targets of cybercrime to employ certain specific techniques to trace the attack and identify the attacker. The bill defines active cyber defense as "any measure -- (I) undertaken by, or at the direction of, a victim"; and "(II) consisting of accessing without authorization the computer of the attacker to the victim" own network to gather information in order to establish attribution of criminal activity to share with law enforcement or to disrupt continued unauthorized activity against the victim's own network." After releasing an initial draft of the bill in March, Rep. Tom Graves held a public event in Georgia to collect feedback on the legislation. Based on that event and other feedback, Graves made several changes to the bill, including the addition of the notification of law enforcement and an exception in the Computer Fraud and Abuse Act for victims who use so-called beaconing technology to identify an attacker. "The provisions of this section shall not apply with respect to the use of attributional technology in regard to a defender who uses a program, code, or command for attributional purposes that beacons or returns locational or attributional data in response to a cyber intrusion in order to identify the source of the intrusion," the bill says.
An anonymous reader quotes a report from Ars Technica: T-Mobile has announced the launch of its "Digits" program, coming May 31. Digits is a revamp of how T-Mobile phone numbers work, virtualizing customer numbers so they can work across multiple devices. It sounds a lot like Google Voice -- rather than having a phone number tied to a single SIM card or a device, numbers are now account-based, and you can "log in" to your phone number on several devices. T-Mobile says the new phone number system will work "across virtually all connected devices," allowing multiple phones, tablets, and PCs to get texts and calls. This means T-Mobile needs apps across all those platforms, with the press release citing "native seamless integration" in Samsung Android phones, Android and iOS apps, and a browser interface for PCs. The new phone number system is free to all T-Mobile customers. Customers can also buy an extra phone number for $10 or by signing up to the $5-per-month "T-Mobile One Plus" package, which is a bundle of extra features like a mobile hotspot and in-flight Wi-Fi.
An anonymous reader shares a report: A new survey of security professionals reveals that 83 percent say colleagues in other departments turn to them to fix personal computer problems. The study by security management company FireMon shows a further 80 percent say this is taking up more than an hour of their working week, which in a year could equate to more than $88,000. For organizations, eight percent of professionals surveyed helping colleagues out five hours a week or more could be costing over $400,000. Organizations are potentially paying qualified security professionals salaries upwards of $100,000 a year and seeing up to 12.5 percent of that investment being spent on non-security related activities.
Eric Petitt, head up Firefox marketing, writing in a blog: I use Chrome every day. Works fine. Easy to use. There are multiple things that bug me about the Chrome product, for sure, but I'm OK with Chrome. I just don't like only being on Chrome. And that's what Chrome wants. It wants you to only use Chrome. Chrome is not evil, it's just too big for its britches. Its influence on the internet economy and individuals is out of balance. Chrome, with 4 times the market share of its nearest competitor (Firefox), is an eight-lane highway to the largest advertising company in the world. Google built it to maximize revenue from your searches and deliver display ads on millions of websites. To monetize every... single... click. And today, there exists no meaningful safety valve on its market dominance. Beyond Google, the web looks more and more like a feudal system, where the geography of the web has been partitioned off by the Frightful Five. Google, Facebook, Microsoft, Apple and Amazon are our lord and protectors, exacting a royal sum for our online behaviors. We're the serfs and tenants, providing homage inside their walled fortresses. Noble upstarts are erased or subsumed under their existing order. (Footnote: Petitt has made it clear that the aforementioned views are his own, and not those of Mozilla.)
The UK must keep its doors open to top talent from around the world if its technology firms are to thrive, Apple's chief designer has told the BBC. An anonymous reader shares the article: Sir Jonathan Ive, who has just been appointed Chancellor of the Royal College of Art, also said that technology hubs like Silicon Valley had a "tremendous cultural diversity". Some technology firms fear they may lose access to talent after Brexit. "That general principle [on access] is terribly important for creating a context for multiple companies to grow and in a healthy way explore and develop new products and new product types," Sir Jonathan told BBC Radio 4's Today programme. Sir Jonathan said the UK had a "fabulous tradition of design education", but that it needed to do more to become a technology hub on a par with Silicon Valley in California, where the likes of Apple, Facebook and Google are based. "I think Silicon Valley has infrastructures to support start-up companies... ranging from technological support through to funding," he said. "And there is the sense that failure isn't irreversible, so very often people will work on an idea, and there isn't the same sense of stigma when one idea and perhaps one company doesn't work out."
Stephen Curry, a professor of structural biology at Imperial College London, has a piece on The Guardian today in which he outlines the history of the relationship between commercial interests, academic prestige and the circulation of research. An excerpt from the article: "Publish or perish" has long been the mantra of seeking to make a success of their research career. Reputations are built on the ability to communicate something new to the world. Increasingly, however, they are determined by numbers, not by words, as universities are caught in a tangle of management targets composed of academic journal impact factors, university rankings and scores in the government's research excellence framework. The chase for metricised success has been further exacerbated by the takeover of scholarly publishing by profit-seeking commercial companies, which pose as partners but no longer seem properly in tune with academia. Evidence of the growing divergence between academic and commercial interests is visible in the secrecy around negotiations on subscription and open access charges. It's also clear from the popularity among academics of the controversial site Sci-Hub, which has made over 60m research articles freely available on the internet. Over-worked researchers could be forgiven for thinking that the time-honoured mantra has morphed to "publish, and perish anyway."
Ahmed Aboulenein, reporting for Reuters: Egypt has banned 21 websites, including the main website of Qatar-based Al Jazeera television and prominent local independent news site Mada Masr, accusing them of supporting terrorism and spreading false news. The blockade is notable in scope and for being the first publicly recognized by the government. It was heavily criticized by journalists and rights groups. The state news agency announced it late on Wednesday. Individual websites had been inaccessible in the past but there was never any official admission. Reuters found the websites named by local media and were inaccessible. The move follows similar actions taken on Wednesday by Egypt's Gulf allies Saudi Arabia and the United Arab Emirates, which blocked Al Jazeera and other websites after a dispute with Qatar. From a separate report: "This is not the typical Egyptian regime attitude," Lina Attalah, the editor-in-chief of Mada Masr told BuzzFeed News in an interview in Cairo. "We are used to facing troubles with the regime since we have always chosen to write the stories they don't like to hear. We are used to being arrested or have cases filed against us, but blocking us is a new thing." Mada Masr, since its founding in 2013, has regularly published critical stories of the regime in both English and Arabic.
A newly found flaw in widely used networking software leaves tens of thousands of computers potentially vulnerable to an attack similar to that caused by WannaCry, which infected more than 300,000 computers worldwide, cybersecurity researchers said on Thursday. From a Reuters report: The U.S. Department of Homeland Security on Wednesday announced the vulnerability, which could be exploited to take control of an affected computer, and urged users and administrators to apply a patch. Rebekah Brown of Rapid7, a cybersecurity company, told Reuters that there were no signs yet of attackers exploiting the vulnerability in the 12 hours since its discovery was announced. But she said it had taken researchers only 15 minutes to develop malware that made use of the hole. "This one seems to be very, very easy to exploit," she said. Rapid7 said it had found more than 100,000 computers running vulnerable versions of the software, Samba, free networking software developed for Linux and Unix computers.
Sara Fischer, writing for Axios: Cord-cutters are ditching their cable packages at the fastest rate ever, opting instead for cheaper, bundled digital TV options, according to the latest Magid Broadcast Study. The trend reflects consumers' preferences to ditch bundled cable packages for more affordable, niche bundled services that can be accessed on TV box tops or on mobile. For consumers, there are more bundled packages than ever, all popping up around similar price ranges. YouTube TV and Hulu TV launched within the past two month, joining the likes of SlingTV and DirectTV Now -- all at a roughly $40 monthly price point -- a bargain considering the average American pays $92 monthly for cable.
Dieter Bohn, writing for The Verge: Traditionally, we think of the web as a combination of a set of specific technologies paired with some core philosophical principles. The problem -- the reason this question even matters -- is that there are a lot of potential replacements for the parts of the web that fix what's broken with technology, while undermining the principles that ought to go with it. [...] A lot of tech companies are flailing around looking for ways to fix this problem. There are web apps that work in Chrome but not really all that well elsewhere. There are Instant Articles in Facebook and AMP pages on Google. There are Instant Android apps that stream to your phone over the internet instead of being installed, which go away when you're done with them just like a browser tab. Google claims to be trying to bring some of the open ethos of the web to smart speakers. Hell, go back to 2014 and you'll find Apple pundit John Gruber arguing we should consider apps and "anything transmitted using HTTP and HTTPS" as part of the web. [...] And now, a brief definition of the web: To count as being part of the web, your app or page must: 1. Be linkable, and 2. Allow any client to access it. That's it.
Aaron Pressman, writing for Fortune: It seems nobody loves their cable TV or home Internet provider. Wireless carriers, however, are on the upswing.That's the news from the huge annual survey of 43 industries from the American Customer Satisfaction Index. In 2017, cable operators and ISP tied for last place, with an average customer satisfaction rating of just 64 percent. The wireless industry was still near the bottom of the rankings, in 38th place, just below the U.S. postal system. But its 73 percent score was up almost three percentage points from last year. Many of the same companies, like Comcast and Verizon, dominate both fields, ACSI noted. And neither industry offer much choice to consumers, with most localities having only one or two cable and Internet providers. The cable industry's rating slipped 1.5 percentage points from last year, while the rating for ISPs was unchanged.
Google's AlphaGo has defeated the world's best Go player in the second out of three games, scoring an overall win for the artificial intelligence algorithm in the fiendishly complex board game. CNET adds: The human gave it his all. "Incredible," wrote DeepMind founder and CEO Demis Hassabis on Twitter while the match was underway. "According to AlphaGo evaluations Ke Jie is playing perfectly at the moment." The match took place over a year after AlphaGo bested Lee Sedol, one of the world's top Go players, in four out of five matches in March 2016. It also beat European champion Fan Hui 5-0 in October 2015. The match was being played in China, the place where the abstract and intuitive board game was born. The government, however, isn't a big fan of letting its citizens know about the battle and has censored all the livestreams in the country.
Two anonymous readers and Mi share an article: U.K. police investigating the Manchester terror attack say they have stopped sharing information with the U.S. after a series of leaks that have so angered the British government that Prime Minister Therese May wants to discuss them with President Donald Trump during a North Atlantic Treaty Organization meeting in Brussels. What can Trump tell her, though? The leaks drive him nuts, too. Since the beginning of this century, the U.S. intelligence services and their clients have acted as if they wanted the world to know they couldn't guarantee the confidentiality of any information that falls into their hands. At this point, the culture of leaks is not just a menace to intelligence-sharing allies. It's a threat to the intelligence community's credibility. [...] If this history has taught the U.S. intelligence community anything, it's that leaking classified information isn't particularly dangerous and those who do it largely enjoy impunity. Manning spent seven years in prison (though she'd been sentenced to 35), but Snowden, Assange, Petraeus, the unknown Chinese mole, the people who stole the hacking tools and the army of recent anonymous leakers, many of whom probably still work for U.S. intelligence agencies, have escaped any kind of meaningful punishment. President Donald Trump has just now announced that the administration would "get to the bottom" of leaks. In a statement, he said: "The alleged leaks coming out of government agencies are deeply troubling. These leaks have been going on for a long time and my Administration will get to the bottom of this. The leaks of sensitive information pose a grave threat to our national security. I am asking the Department of Justice and other relevant agencies to launch a complete review of this matter, and if appropriate, the culprit should be prosecuted to the fullest extent of the law. There is no relationship we cherish more than the Special Relationship between the United States and the United Kingdom.
An anonymous reader writes: In another intraday jump of more than $200, bitcoin surged to a record Thursday on strong Asian demand overnight. Bitcoin jumped more than 10 percent to an all-time high of $2,752.07, more than twice its April 30 price of $1,347.96 according to CoinDesk. The digital currency last traded near $2,726. At Thursday's record, Bitcoin has now gained more than 45 percent since last Thursday and more than 180 percent for the year so far. "There is no question that we are in the middle of a price frenzy," said Brian Kelly of BKCM, in a note to clients Thursday. "There will be a correction and it could be severe, but it's unclear if that correction will start from current prices of $2700 or from some place much higher."