Eric Schmidt: Money is the only reason Julian Assange redacted WikiLeaks files

from FP Passport by John Hudson

Back in 2011, Google executive Eric Schmidt conducted a secret interview with Julian Assange while the WikiLeaks founder was under house arrest in Britain. The nature of the interview has not been revealed until now, a week before the release of Schmidt’s new book The New Digital Age. In the book, obtained by Foreign Policy, Schmidt and Assange discuss a range of issues related to secrecy and the free flow of information. But one particular exchange chips away at one of Assange’s core beliefs about protecting government informants from violent reprisal.

 Anonymous calls for Internet blackout on April 22 – Zee News
Zee News
Anonymous calls for Internet blackout on April 22 London: Hacking collective Anonymoushas called for an Internet blackout in protest of a bill, Cyber Intelligence Sharing and Protection Act (CISPA), which if signed into law, would make it legal for

 

U.S. House of Representatives Shamefully Passes CISPA; Internet Freedom Advocates Prepare for a Battle in the Senate

from EFF.org Updates by Dave Maass and Mark M. Jaycox

Today, Internet freedom advocates everywhere turned their eyes to the U.S. House of Representatives as that legislative body considered the Cyber Intelligence Sharing and Protection Act.

 

 

The ACLU blasts CISPA?s passage, calling it ?extreme? over lax privacy safeguards

from The Next Web by Alex Wilhelm

 

CISPA Cybersecurity Bill Passes the House

from Mashable! by Alex Fitzpatrick

 

Internet penetration is never correlated with increasing power to dictators, and is often correlated with increased freedom

from Boing Boing by Cory Doctorow

 

 

Google vs. Bing: Search Engines Deliver Infected Websites as Their Top Results

from Docuticker

Source: AV-Test Institute (Germany) It took the AV-TEST Institute …a total of 18 months to carry out a study that would confirm its initial suspicion, namely that the best-known search engines Google and Bing are being used to include websites containing malware among the top search results delivered to users. This exploitation

 

FindZebra: A search engine for rare diseases

from Docuticker

Source: arXiv.org From Abstract: Background: The web has become a primary information resource about illnesses and treatments for both medical and non-medical users. Standard web search is by far the most common interface for such information. It is therefore of interest to find out how well web search engines work for

 

Big Data: Tools and Access

from Oxford Internet Institute – Blogs

Linnet Taylor on 17 April 2013 at 13:10PM

This is a group post from a session held at the Big Data: Rewards and Risks for the Social Sciences conference in March (http://www.oii.ox.ac.uk/events/?id=557). Participants in the group were Chris Birchall, Michael Khoo, Cornelius Puschmann, Kalpana Shankar, Jillian Wallis, Janet Smart, Melissa Terras and Linnet Taylor. This is an account of the

 

Facebook Lets You Spy on Its Data Centers

from Wired Top Stories by Cade Metz

If you walk into the lobby of the data center Facebook operates in the high desert in Prineville, Oregon, you’ll find a flatscreen display on the wall where you can check the pulse of this massive computing facility.

 

Facebook builds public dashboards to show real-time power and water usage levels for its data centers

from The Next Web by Nick Summers

 

Which makes more money: mining Bitcoins or writing about mining Bitcoins?

from Boing Boing by Mark Frauenfelder

 

Cloud Computing has Already Changed the Internet

from The Next Web by Martha Pierce

 

The world according to Google: 5 crazy predictions from Eric Schmidt and Jared Cohen’s new book

from FP Passport by Ty McCormick

 

Is Bitcoin Social or is Social Bitcoin: The Cryptocurrencies Interdependency

from social media vb by Mark_3000

Social media certainly inspires a mob mentality and in the case of any form of investment of this nature, sentiment and confidence matter a lot. Outside factors aside from social media certainly affect Bitcoin prices (i.e. hacking, MTGox?s reliability and security issues). However, social media reflects this on a hyper level, creating both ups and downs at a super-fast rate.

 

As Amazon reportedly opens a Moscow office, what competition does it face in Russia?

from The Next Web by East-West Digital News

 

What’s Riskier Than Bitcoins? Bitcoin Companies

from Wired Top Stories by Michael V. Copeland

Angel investors and venture capitalists are putting money into the only thing riskier than Bitcoin: Bitcoin companies.

 

CISPA 2.0 Clears The House: Outcome Hazy

from Stanford Center for Internet and Society by Richard Forno

As expected, CISPA 2.0 passed the House of Representatives yesterday and the various privacy protections sought through amendments were dropped.  Although much has and will continue to be written about the merits (or lack thereof) of the bill — especially its infamous “notwithstanding any other provision of law” clause — I think this also provides opportunity to comment more generally upon the nature of modern American lawmakingpertaining to cybersecurity. Read more » about CISPA 2.0 Clears The House: Outcome Hazy

 

Online privacy policies explained

from Boing Boing by Cory Doctorow

The Zero Knowledge Foundation’s explainer on privacy policies is a pretty good introduction to where the fine-print on the sites you read comes from, and the surprisingly meaningful differences between different privacy policies on different sites. It’s easy to assume (as I usually do) that the average privacy policy says, “You have no privacy,” but there’s a lot of difference between the policies on Craigslist, Facebook and Twitter, say.

Enhanced by Zemanta

Tagged in: , , , , , , , , , , , , , ,

%d bloggers like this: