industryterm:internet

  • Former Google Scientist Tells Senate to Act Over Company’s “Unethical and Unaccountable” China Censorship Plan
    https://theintercept.com/2018/09/26/former-google-scientist-tells-senate-to-act-over-companys-unethical-an

    A scientist who quit Google over its plan to build a censored search engine in China has told U.S. senators that some company employees may have “actively subverted” an internal privacy review of the system. Jack Poulson resigned from Google in August after The Intercept reported that a group of the internet giant’s staffers was secretly working on a search engine for China that would remove content about subjects such as human rights, democracy, peaceful protest, and religion. “I view our (...)

    #Google #algorithme #Dragonfly #censure #filtrage #web #surveillance

  • HIDE AND SEEK Tracking NSO Group’s Pegasus Spyware to Operations in 45 Countries
    https://citizenlab.ca/2018/09/hide-and-seek-tracking-nso-groups-pegasus-spyware-to-operations-in-45-cou

    In this post, we develop new Internet scanning techniques to identify 45 countries in which operators of NSO Group’s Pegasus spyware may be conducting operations. 1. Executive Summary Israel-based “Cyber Warfare” vendor NSO Group produces and sells a mobile phone spyware suite called Pegasus. To monitor a target, a government operator of Pegasus must convince the target to click on a specially crafted exploit link, which, when clicked, delivers a chain of zero-day exploits to penetrate (...)

    #NSO #smartphone #Pegasus #spyware #écoutes #exportation #sécuritaire #activisme #web (...)

    ##surveillance

  • Origins of an Epidemic: Purdue Pharma Knew Its Opioids Were Widely Abused - The New York Times
    https://www.nytimes.com/2018/05/29/health/purdue-opioids-oxycontin.html

    Prosecutors found that the company’s sales representatives used the words “street value,” “crush,” or “snort” in 117 internal notes recording their visits to doctors or other medical professionals from 1997 through 1999.

    The 120-page report also cited emails showing that Purdue Pharma’s owners, members of the wealthy Sackler family, were sent reports about abuse of OxyContin and another company opioid, MS Contin.
    Image
    “We have in fact picked up references to abuse of our opioid products on the internet,” Purdue Pharma’s general counsel, Howard R. Udell, wrote in early 1999 to another company official. That same year, prosecutors said, company officials learned of a call to a pharmacy describing “OxyContin as the hottest thing on the street — forget Vicodin.”

    A spokesman for Purdue Pharma, Robert Josephson, declined to comment on the allegations in the report but said the company was involved in efforts to address opioid abuse.

    Suggesting that activities that last occurred more than 16 years ago are responsible for today’s complex and multifaceted opioid crisis is deeply flawed ,” he said in a statement.

    La famille sacquer savait, dès le début...

    In May 1996, five months after OxyContin’s approval, Richard Sackler and Mr. Udell were sent an older medical journal article describing how drug abusers were extracting morphine from MS Contin tablets in order to inject the drug , prosecutors reported. A Purdue Pharma scientist researched the issue and sent his findings to several Sacklers, the government report states.
    “I found MS Contin mentioned a couple of times on the internet underground drug culture scene,” the researcher wrote in that 1996 email. “Most of it was mentioned in the context of MS Contin as a morphine source.”

    #Opioides #Sackler

  • Cutting ‘Old Heads’ at IBM
    https://features.propublica.org/ibm/ibm-age-discrimination-american-workers

    As it scrambled to compete in the internet world, the once-dominant tech company cut tens of thousands of U.S. workers, hitting its most senior employees hardest and flouting rules against age bias. For nearly a half century, IBM came as close as any company to bearing the torch for the American Dream. As the world’s dominant technology firm, payrolls at International Business Machines Corp. swelled to nearly a quarter-million U.S. white-collar workers in the 1980s. Its profits helped (...)

    #IBM #travail #procès #discrimination

  • 10 Human Rights Organisations v. United Kingdom
    https://privacyinternational.org/legal-action/10-human-rights-organisations-v-united-kingdom

    In March 2015, Privacy International, together with nine other NGOs, filed an application to the European Court of Human Rights (ECtHR), challenging two aspects of the United Kingdom’s surveillance regime revealed by the Snowden disclosures : (1) UK bulk interception of internet traffic transiting undersea fibre optic cables landing in the UK and (2) UK access to the information gathered by the US through its various bulk surveillance programs. Our co-applicants are the American Civil (...)

    #GCHQ #algorithme #spyware #écoutes #web #surveillance #DRIP #ACLU #PrivacyInternational

    /sites/default/files/fav/apple-icon-180x180.png

  • #GDPR : what could possibly go wrong?
    https://diasp.eu/p/7698882

    #GDPR : what could possibly go wrong?

    It turns out that Internet regulations such as GDPR very hardly can cover every aspect/protocol, just because of the nature of Internet : it is not designed to be limited to a few set of protocols.

    Clearly, the main goal is to put pressure on the major centralized/proprietary platforms that make a living of collecting and exploiting personal data, and the the little sisters that make use of the same business model.

    Of course, users must be able to master the usage of their digital footprints/tracks they generate. Digital identity is now so closely tied to physical identitiy, it is not just about an ip address. So GDPR requirements for minimum data collecting and security culture around it are very important.

    However, now for those that use (...)

  • THE RISE OF THE CYBER-MERCENARIES
    What happens when private firms have cyberweapons as powerful as those owned by governments?
    https://foreignpolicy.com/2018/08/31/the-rise-of-the-cyber-mercenaries-israel-nso
    https://foreignpolicymag.files.wordpress.com/2018/08/1_cyber_weapon_final1.jpg?w=1024&h=1536&crop=0,0,0

    he first text message showed up on Ahmed Mansoor’s phone at 9:38 on a sweltering August morning in 2016. “New secrets about torture of Emiratis in state prisons,” it read, somewhat cryptically, in Arabic. A hyperlink followed the words. Something about the number and the message, and a similar one he received the next day, seemed off to Mansoor, a well-known human rights activist in the United Arab Emirates. He resisted the impulse to click on the links.

    Instead, Mansoor sent the notes to Citizen Lab, a research institute based at the University of Toronto specializing in human rights and internet security. Working backward, researchers there identified the hyperlinks as part of a sophisticated spyware program built specifically to target Mansoor. Had he clicked on the links, the program would have turned his phone into a “digital spy in his pocket,” Citizen Lab later wrote in a report—tracking his movements, monitoring his messages, and taking control of his camera and microphone.

    But the big revelation in the report wasn’t so much the technology itself; intelligence agencies in advanced countries have developed and deployed spyware around the world. What stood out was that Citizen Lab had traced the program to a private firm: the mysterious Israeli NSO Group. (The name is formed from the first initials of the company’s three founders.) Somehow, this relatively small company had managed to find a vulnerability in iPhones, considered to be among the world’s most secure cellular devices, and had developed a program to exploit it—a hugely expensive and time-consuming process. “We are not aware of any previous instance of an iPhone remote jailbreak used in the wild as part of a targeted attack campaign,” the Citizen Lab researchers wrote in their report.

  • Decentralisation: the next big step for the world wide web
    https://www.theguardian.com/technology/2018/sep/08/decentralisation-next-big-step-for-the-world-wide-web-dweb-data-interne

    he story that broke early last month that Google would again cooperate with Chinese authorities to run a censored version of its search engine, something the tech giant has neither confirmed nor denied, had ironic timing. The same day, a group of 800 web builders and others – among them Tim Berners-Lee, who created the world wide web – were meeting in San Francisco to discuss a grand idea to circumvent internet gatekeepers like Google and Facebook. The event they had gathered for was the Decentralised Web Summit, held from 31 July to 2 August, and hosted by the Internet Archive.

    The proponents of the so-called decentralised web – or DWeb – want a new, better web where the entire planet’s population can communicate without having to rely on big companies that amass our data for profit and make it easier for governments to conduct surveillance. And its proponents have got projects and apps that are beginning to function, funding that is flowing and social momentum behind them. In light of the Snowden revelations and Cambridge Analytica scandal, public concerns around spying and privacy have grown. And more people have heard about the DWeb thanks to the television comedy Silicon Valley, whose main character recently pivoted his startup to try and build this “new internet”.

    #Internet #GAFA #DWeb #réinventer_l'Internet

  • For safety’s sake, we must slow #innovation in internet-connected things - MIT Technology Review
    https://www.technologyreview.com/s/611948/for-safetys-sake-we-must-slow-innovation-in-internet-connected-thi

    In a new book called de “Click Here to Kill Everybody”, Bruce Schneier argues that governments must step in now to force companies developing connected gadgets to make security a priority rather than an afterthought. The author of an influential security newsletter and blog, Schneier is a fellow at the Berkman Klein Center for Internet and Society at Harvard University and a lecturer in public policy at the Harvard Kennedy School. Among other roles, he’s also on the board of the Electronic Frontier Foundation and is chief technology officer of IBM Resilient, which helps companies prepare to deal with potential cyberthreats.

    Schneier spoke with MIT Technology Review about the risks we’re running in an ever more connected world and the policies he thinks are urgently needed to address them.

    #internet_des_objets #sécurité

  • Are New York’s Free LinkNYC Internet Kiosks Tracking Your Movements ?
    https://theintercept.com/2018/09/08/linknyc-free-wifi-kiosks

    LinkNYC kiosks have become a familiar eyesore to New Yorkers. Over 1,600 of these towering, nine-and-a-half-foot monoliths — their double-sided screens festooned with ads and fun facts — have been installed across the city since early 2016. Mayor Bill de Blasio has celebrated their ability to provide “the fastest and largest municipal Wi-Fi network in the world” as “a critical step toward a more equal, open, and connected city for every New Yorker, in every borough.” Anyone can use the kiosks’ (...)

    #WiFi #géolocalisation #ACLU #EFF #LinkNYC #rethinklink.nyc

  • Google, Seeking a Return to China, Is Said to Be Building a Censored Search Engine
    https://www.nytimes.com/2018/08/01/technology/china-google-censored-search-engine.html

    Google withdrew from China eight years ago to protest the country’s censorship and online hacking. Now, the internet giant is working on a censored search engine for China that will filter websites and search terms that are blacklisted by the Chinese government, according to two people with knowledge of the plans. Google has teams of engineers working on a search app that restricts content banned by Beijing, said the people, who asked for anonymity because they were not permitted to speak (...)

    #Google #Facebook #GoogleSearch #algorithme #Dragonfly #censure #StateControl #web (...)

    ##surveillance

  • World’s Leading Human Rights Groups Tell Google to Cancel Its China Censorship Plan
    https://theintercept.com/2018/08/28/google-china-censorship-plan-human-rights

    Leading human rights groups are calling on Google to cancel its plan to launch a censored version of its search engine in China, which they said would violate the freedom of expression and privacy rights of millions of internet users in the country. A coalition of 14 organizations — including Amnesty International, Human Rights Watch, Reporters Without Borders, Access Now, the Committee to Protect Journalists, the Electronic Frontier Foundation, the Center for Democracy and Technology, PEN (...)

    #Google #GoogleSearch #algorithme #Dragonfly #censure #StateControl #voisinage #surveillance #web #TheGreatFirewallofChina #RSF #AccessNow #CDT (...)

    ##EFF

  • The Fake-News Fallacy | The New Yorker
    https://www.newyorker.com/magazine/2017/09/04/the-fake-news-fallacy

    Not so very long ago, it was thought that the tension between commercial pressure and the public interest would be one of the many things made obsolete by the Internet. In the mid-aughts, during the height of the Web 2.0 boom, the pundit Henry Jenkins declared that the Internet was creating a “participatory culture” where the top-down hegemony of greedy media corporations would be replaced by a horizontal network of amateur “prosumers” engaged in a wonderfully democratic exchange of information in cyberspace—an epistemic agora that would allow the whole globe to come together on a level playing field. Google, Facebook, Twitter, and the rest attained their paradoxical gatekeeper status by positioning themselves as neutral platforms that unlocked the Internet’s democratic potential by empowering users. It was on a private platform, Twitter, where pro-democracy protesters organized, and on another private platform, Google, where the knowledge of a million public libraries could be accessed for free. These companies would develop into what the tech guru Jeff Jarvis termed “radically public companies,” which operate more like public utilities than like businesses.

    But there has been a growing sense among mostly liberal-minded observers that the platforms’ championing of openness is at odds with the public interest. The image of Arab Spring activists using Twitter to challenge repressive dictators has been replaced, in the public imagination, by that of ISIS propagandists luring vulnerable Western teen-agers to Syria via YouTube videos and Facebook chats. The openness that was said to bring about a democratic revolution instead seems to have torn a hole in the social fabric. Today, online misinformation, hate speech, and propaganda are seen as the front line of a reactionary populist upsurge threatening liberal democracy. Once held back by democratic institutions, the bad stuff is now sluicing through a digital breach with the help of irresponsible tech companies. Stanching the torrent of fake news has become a trial by which the digital giants can prove their commitment to democracy. The effort has reignited a debate over the role of mass communication that goes back to the early days of radio.

    The debate around radio at the time of “The War of the Worlds” was informed by a similar fall from utopian hopes to dystopian fears. Although radio can seem like an unremarkable medium—audio wallpaper pasted over the most boring parts of your day—the historian David Goodman’s book “Radio’s Civic Ambition: American Broadcasting and Democracy in the 1930s” makes it clear that the birth of the technology brought about a communications revolution comparable to that of the Internet. For the first time, radio allowed a mass audience to experience the same thing simultaneously from the comfort of their homes. Early radio pioneers imagined that this unprecedented blurring of public and private space might become a sort of ethereal forum that would uplift the nation, from the urban slum dweller to the remote Montana rancher. John Dewey called radio “the most powerful instrument of social education the world has ever seen.” Populist reformers demanded that radio be treated as a common carrier and give airtime to anyone who paid a fee. Were this to have come about, it would have been very much like the early online-bulletin-board systems where strangers could come together and leave a message for any passing online wanderer. Instead, in the regulatory struggles of the twenties and thirties, the commercial networks won out.

    Corporate networks were supported by advertising, and what many progressives had envisaged as the ideal democratic forum began to seem more like Times Square, cluttered with ads for soap and coffee. Rather than elevating public opinion, advertisers pioneered techniques of manipulating it. Who else might be able to exploit such techniques? Many saw a link between the domestic on-air advertising boom and the rise of Fascist dictators like Hitler abroad.

    Today, when we speak about people’s relationship to the Internet, we tend to adopt the nonjudgmental language of computer science. Fake news was described as a “virus” spreading among users who have been “exposed” to online misinformation. The proposed solutions to the fake-news problem typically resemble antivirus programs: their aim is to identify and quarantine all the dangerous nonfacts throughout the Web before they can infect their prospective hosts. One venture capitalist, writing on the tech blog Venture Beat, imagined deploying artificial intelligence as a “media cop,” protecting users from malicious content. “Imagine a world where every article could be assessed based on its level of sound discourse,” he wrote. The vision here was of the news consumers of the future turning the discourse setting on their browser up to eleven and soaking in pure fact. It’s possible, though, that this approach comes with its own form of myopia. Neil Postman, writing a couple of decades ago, warned of a growing tendency to view people as computers, and a corresponding devaluation of the “singular human capacity to see things whole in all their psychic, emotional and moral dimensions.” A person does not process information the way a computer does, flipping a switch of “true” or “false.” One rarely cited Pew statistic shows that only four per cent of American Internet users trust social media “a lot,” which suggests a greater resilience against online misinformation than overheated editorials might lead us to expect. Most people seem to understand that their social-media streams represent a heady mixture of gossip, political activism, news, and entertainment. You might see this as a problem, but turning to Big Data-driven algorithms to fix it will only further entrench our reliance on code to tell us what is important about the world—which is what led to the problem in the first place. Plus, it doesn’t sound very fun.

    In recent times, Donald Trump supporters are the ones who have most effectively applied Grierson’s insight to the digital age. Young Trump enthusiasts turned Internet trolling into a potent political tool, deploying the “folk stuff” of the Web—memes, slang, the nihilistic humor of a certain subculture of Web-native gamer—to give a subversive, cyberpunk sheen to a movement that might otherwise look like a stale reactionary blend of white nationalism and anti-feminism. As crusaders against fake news push technology companies to “defend the truth,” they face a backlash from a conservative movement, retooled for the digital age, which sees claims for objectivity as a smoke screen for bias.

    For conservatives, the rise of online gatekeepers may be a blessing in disguise. Throwing the charge of “liberal media bias” against powerful institutions has always provided an energizing force for the conservative movement, as the historian Nicole Hemmer shows in her new book, “Messengers of the Right.” Instead of focussing on ideas, Hemmer focusses on the galvanizing struggle over the means of distributing those ideas. The first modern conservatives were members of the America First movement, who found their isolationist views marginalized in the lead-up to the Second World War and vowed to fight back by forming the first conservative media outlets. A “vague claim of exclusion” sharpened into a “powerful and effective ideological arrow in the conservative quiver,” Hemmer argues, through battles that conservative radio broadcasters had with the F.C.C. in the nineteen-fifties and sixties. Their main obstacle was the F.C.C.’s Fairness Doctrine, which sought to protect public discourse by requiring controversial opinions to be balanced by opposing viewpoints. Since attacks on the mid-century liberal consensus were inherently controversial, conservatives found themselves constantly in regulators’ sights. In 1961, a watershed moment occurred with the leak of a memo from labor leaders to the Kennedy Administration which suggested using the Fairness Doctrine to suppress right-wing viewpoints. To many conservatives, the memo proved the existence of the vast conspiracy they had long suspected. A fund-raising letter for a prominent conservative radio show railed against the doctrine, calling it “the most dastardly collateral attack on freedom of speech in the history of the country.” Thus was born the character of the persecuted truthteller standing up to a tyrannical government—a trope on which a billion-dollar conservative-media juggernaut has been built.

    The online tumult of the 2016 election fed into a growing suspicion of Silicon Valley’s dominance over the public sphere. Across the political spectrum, people have become less trusting of the Big Tech companies that govern most online political expression. Calls for civic responsibility on the part of Silicon Valley companies have replaced the hope that technological innovation alone might bring about a democratic revolution. Despite the focus on algorithms, A.I., filter bubbles, and Big Data, these questions are political as much as technical.

    #Démocratie #Science_information #Fake_news #Regulation

  • The Rise and Fall of #Soft_Power – Foreign Policy
    https://foreignpolicy.com/2018/08/20/the-rise-and-fall-of-soft-power

    In his recent book, Has the West Lost It?, Kishore Mahbubani, a Singaporean academic and former diplomat, calls all this Western hubris. Indeed, hubris may be the only appropriate word for what transpired. Confidence in the potency and legitimacy of soft power was so great that tremendous hard power was deployed in its name. The Iraq War was the most prominent example. And the intervention in Libya, with European support, was the most recent. In both cases, the United States and Europe were left worse off.

    Third, the hubris of soft power led to the illusion that soft power could somehow exist on its own . [...] The idea that soft power could perhaps be effective on its own perhaps underpinned the fatally mistaken belief that Iraq would automatically become a liberal democracy after Saddam Hussein was toppled.

    The European project, perhaps even more so, was built on a false understanding of soft power. For many decades, Europe was essentially a free rider in the soft power game; the United States guaranteed its security, and its economic well-being was reliant on the U.S.-led global economic order. With the United States now less interested in providing either—and focusing more on hard power—Europe is facing real challenges.

    [...]

    When the West was confident of its soft power, it cherished the belief that the more open a society, the better. But now, calls for censorship of parts of internet are heard routinely in the media and in legislative chambers. Internet giants are under tremendous political and social pressure to self-censor their content. And many, including Facebook, YouTube, and Apple, are doing so. And so, one of the bedrocks of liberalism’s soft power—free speech—has fallen from favor.

    Now, hard power is everywhere. The United States is no doubt the biggest player in this game: Fire and fury to North Korea, trade wars on everyone, gutting the WTO, and using domestic laws to punish foreign companies for doing business with a third country. The list goes on. For its part, Europe looks like a deer in headlights. As some, including German Chancellor Angela Merkel, call for standing firm against Trump, others, including French President Emmanuel Macron, are looking for peace.

    And, of course, there is Russia. By adroitly using its limited but still considerable hard power, Russia achieved the most significant territorial gain by force since the end of World War II, taking Crimea from Ukraine. Meanwhile, Moscow’s forceful actions in Syria changed the course of the civil war there to its favor.

    [...]

    There is little doubt, in other words, that the era of soft power has given way to an era of hard power—and that is dangerous. For centuries, hard power politics resulted in immeasurable human suffering. Just in the 20th century alone, hard power drove two world wars and a long Cold War that threatened to annihilate mankind.

    It is possible to aspire to something better this time. And this is where China may come in.

    [...]

  • Google Employees Protest Secret Work on Censored Search Engine for China - The New York Times
    https://www.nytimes.com/2018/08/16/technology/google-employees-protest-search-censored-china.html

    Hundreds of #Google employees, upset at the company’s decision to secretly build a censored version of its search engine for China, have signed a letter demanding more transparency to understand the ethical consequences of their work.

    In the letter, which was obtained by The New York Times, employees wrote that the project and Google’s apparent willingness to abide by China’s censorship requirements “raise urgent moral and ethical issues.” They added, “Currently we do not have the information required to make ethically-informed decisions about our work, our projects, and our employment.”

    The letter is circulating on Google’s internal communication systems and is signed by about 1,400 employees, according to three people familiar with the document, who were not authorized to speak publicly.

    The internal activism presents another obstacle for Google’s potential return to China eight years after the company publicly withdrew from the country in protest of censorship and government hacking. China has the world’s largest internet audience but has frustrated American tech giants with content restrictions or outright blockages of services including Facebook and Instagram.

    #GAFA

  • Google Staff Tell Bosses China Censorship is “Moral and Ethical” Crisis
    https://theintercept.com/2018/08/16/google-china-crisis-staff-dragonfly

    Google employees are demanding answers from the company’s leadership amid growing internal protests over plans to launch a censored search engine in China. Staff inside the internet giant’s offices have agreed that the censorship project raises “urgent moral and ethical issues” and have circulated a letter saying so, calling on bosses to disclose more about the company’s work in China, which they say is shrouded in too much secrecy, according to three sources with knowledge of the matter. The (...)

    #Google #Dragonfly #censure #surveillance #web

  • (Your password iochow99)

    It seems that, iochow99, is your password. You may not know me and you are probably wondering why you are getting this e mail, right?

    actually, I setup a malware on the adult vids (porno) web-site and guess what, you visited this site to have fun (you know what I mean). While you were watching videos, your internet browser started out functioning as a RDP (Remote Desktop) having a keylogger which gave me accessibility to your screen and web cam. after that, my software program obtained all of your contacts from your Messenger, FB, as well as email.

    What did I do?

    I created a double-screen video. 1st part shows the video you were watching (you’ve got a good taste haha . . .), and 2nd part shows the recording of your web cam.

    exactly what should you do?

    Well, in my opinion, $1000 is a fair price for our little secret. You’ll make the payment by Bitcoin (if you do not know this, search “how to buy bitcoin” in Google).

    BTC Address:

    1Bb446YF8AZK3nKchPJQ3T5KwPGRHRARJ5

    (It is cAsE sensitive, so copy and paste it)

    Important:
    You have one day in order to make the payment. (I’ve a unique pixel in this e mail, and at this moment I know that you have read through this email message). If I do not get the BitCoins, I will certainly send out your video recording to all of your contacts including relatives, coworkers, and so on. Having said that, if I receive the payment, I’ll destroy the video immidiately. If you need evidence, reply with “Yes!” and I will certainly send out your video recording to your 6 contacts. It is a non-negotiable offer, that being said don’t waste my personal time and yours by responding to this message.

    • (Part num your Hacked phone. +XX XXXXX7766)

      It seems that, +XX XXXXX7766, is your phone. You may not know me and you are probably wondering why you are getting this e mail, right?

      actually, I setup a malware on the adult vids (porno) web-site and guess what, you visited this site to have fun (you know what I mean). While you were watching videos, your internet browser started out functioning as a RDP (Remote Desktop) having a keylogger which gave me accessibility to your screen and web cam. after that, my software program obtained all of your contacts from your Messenger, FB, as well as email.

      What did I do?

      I backuped phone. All photo, video and contacts.
      I created a double-screen video. 1st part shows the video you were watching (you’ve got a good taste haha . . .), and 2nd part shows the recording of your web cam.

      exactly what should you do?

      Well, in my opinion, $1000 is a fair price for our little secret. You’ll make the payment by Bitcoin (if you do not know this, search “how to buy bitcoin” in Google).

      BTC Address:

      1GYNGXLEUGkkQjHo19dHDnGE87WrAiGLLB

      (It is cAsE sensitive, so copy and paste it)

      Important:
      You have 48 hour in order to make the payment. (I’ve a unique pixel in this e mail, and at this moment I know that you have read through this email message). If I do not get the BitCoins, I will certainly send out your video recording to all of your contacts including relatives, coworkers, and so on. Having said that, if I receive the payment, I’ll destroy the video immidiately. If you need evidence, reply with “Yes!” and I will certainly send out your video recording to your 6 contacts. It is a non-negotiable offer, that being said don’t waste my personal time and yours by responding to this message.

      Variante. De toute évidence, une base de données commerciale a été volée. Les 4 chiffres transmis correspondent à un vrai numéro que le destinataire possède...

    • LEP : [xxx@xxx.com] 19-08-2018 03:58:09 You can easily get off

      Ticкet Detаils: LEP-334-34033
      Email: xxx@xxx.com
      Camera ready,Notification: 19-08-2018 03:58:09
      Status: Waiting for Reply 53xuAaTy6A2d12wInNmOkG6ReW9Yy07Bu1_Priority: Normal

      **********************************************************************

      Hi,

      If you were more attentive while playing with yourself, I wouldn’t write dis message. I don’t think that playing with yourself is extremely awful, but when all colleagues, relatives and friends get video record of it- it is obviously for you.

      I placed virus on a web-site for adults (with porn) which was visited by you. When the object click on a play button, device begins recording the screen and all cameras on your device starts working.

      Moreover, soft makes a dedicated desktop supplied with keylogger function from the system , so I was able to save all contacts from ur e-mail, messengers and other social networks. I’ve chosen this e-mail cuz It’s your working address, so you will read it.

      In my opinion 730 usd is pretty enough for this little false. I made a split screen vid(records from screen (u have interesting tastes ) and camera ohh... its funny AF)

      So its your choice, if u want me to delete this сompromising evidence use my Bitсоin wAllet aDdrеss- 1KLV9CDNtfy1XV1CEABDdShQMYWKhUuUNH
      You have one day after opening my message, I put the special tracking pixel in it, so when you will open it I will know.If ya want me to show u the proofs, reply on this letter and I will send my creation to five contacts that I’ve got from ur device.

      P.S.. You are able to complain to cops, but I don’t think that they can help, the investigation will last for 5 month- I’m from Estonia - so I dgf LOL

      Je n’ai toujours pas reçu la dite vidéo. Ça me stresse...

    • LKO : [xxx@xxx.com] 19-08-2018 06:53:42 Your life can be destroyed

      Tiсkеt Detаils: LKO-529-93365
      Email: xxx@xxx.com
      Camera ready,Notification: 19-08-2018 06:53:42
      Status: Waiting for Reply 99xuFady0A0f96wZnEmMkV1PrO5Ty05Iu8_Priority: Normal

      =-=—=-=-=—=-=-=-=-=-=-=-=—=-=-=—=-=-=-=-=-=—=-=-=—=-=-=-=-=-=-=-=—=-=-=-=-=-=-=-=-=

      Hello,

      If u were more scrutiny while caress yourself, I wouldn\’t worry you. I don\’t think that playing with yourself is extremely awful, but when all your friends, relatives, сolleagues receive video record of it- it is certainly for u.

      I adjusted malisious soft on a porn site which you have visited. When the object click on a play button, device starts recording the screen and all cameras on ur device begins working.

      Moreover, my virus makes a remote desktop supplied with key logger function from the device , so I was able to get all contacts from ya e-mail, messengers and other social networks. I\’m writing on dis e-mail cuz It\’s your corporate address, so you will read it.

      I suppose that 870 usd is pretty enough for this little false. I made a split screen vid(records from screen (u have interesting tastes ) and camera ohh... its funny AF)

      So its your choice, if u want me to delete this сompromising evidence use my BitcOin wAllеt aDdrеss- 1PcCBv4wvErq7TSTq44wnPM3xDZ9uE8QHH
      You have one day after opening my message, I put the special tracking pixel in it, so when you will open it I will know.If ya want me to share proofs with ya, reply on this letter and I will send my creation to five contacts that I\’ve got from ur contacts.

      P.S.. U are able to complain to police, but I don\’t think that they can help, the inquisition will last for several months- I\’m from Ukraine - so I dgf lmao

      Les adresses BTC changent d’un mail à l’autre...

    • Deux adresses mails spécifiques, un n° de téléphone particulier. Ces 3 éléments ont un point commun particulier : je les utilise pour mes accès aux services Microsoft. Ça me donne l’impression que c’est Microsoft qui se serait fait piquer sa base de comptes « live.com »... pas plus de preuves que ça... et aucune référence sur Internet à ce sujet évidemment.

  • #Webmentions: Enabling Better Communication on the Internet · An A List Apart Article
    https://alistapart.com/article/webmentions-enabling-better-communication-on-the-internet

    While the specification has only recently become a broad recommendation for use on the internet, there are already an actively growing number of content management systems (CMSs) and platforms that support Webmentions, either natively or with plugins.If you’re working with WordPress, there’s a simple Webmention plugin that will allow you to begin using Webmentions—just download and activate it. (For additional functionality when displaying Webmentions, there’s also the recommended Semantic Linkbacks plugin.) Other CMSs like Drupal, ProcessWire, Elgg, Nucleus CMS, Craft, Django, and Kirby also have plugins that support the standard.

    https://wordpress.org/plugins/webmention
    https://wordpress.org/plugins/semantic-linkbacks

    #spip #todo

  • #Google_Maps Says ‘the East Cut’ Is a Real Place. Locals Aren’t So Sure.

    For decades, the district south of downtown and alongside #San_Francisco Bay here was known as either #Rincon_Hill, #South_Beach or #South_of_Market. This spring, it was suddenly rebranded on Google Maps to a name few had heard: the #East_Cut.

    The peculiar moniker immediately spread digitally, from hotel sites to dating apps to Uber, which all use Google’s map data. The name soon spilled over into the physical world, too. Real-estate listings beckoned prospective tenants to the East Cut. And news organizations referred to the vicinity by that term.

    “It’s degrading to the reputation of our area,” said Tad Bogdan, who has lived in the neighborhood for 14 years. In a survey of 271 neighbors that he organized recently, he said, 90 percent disliked the name.

    The swift rebranding of the roughly 170-year-old district is just one example of how Google Maps has now become the primary arbiter of place names. With decisions made by a few Google cartographers, the identity of a city, town or neighborhood can be reshaped, illustrating the outsize influence that Silicon Valley increasingly has in the real world.

    The #Detroit neighborhood now regularly called #Fishkorn (pronounced FISH-korn), but previously known as #Fiskhorn (pronounced FISK-horn)? That was because of Google Maps. #Midtown_South_Central in #Manhattan? That was also given life by Google Maps.

    Yet how Google arrives at its names in maps is often mysterious. The company declined to detail how some place names came about, though some appear to have resulted from mistakes by researchers, rebrandings by real estate agents — or just outright fiction.

    In #Los_Angeles, Jeffrey Schneider, a longtime architect in the #Silver_Lake_area, said he recently began calling the hill he lived on #Silver_Lake_Heights in ads for his rental apartment downstairs, partly as a joke. Last year, Silver Lake Heights also appeared on Google Maps.

    “Now for every real-estate listing in this neighborhood, they refer to it,” he said. “You see a name like that on a map and you believe it.”

    Before the internet era, neighborhood names developed via word of mouth, newspaper articles and physical maps that were released periodically. But Google Maps, which debuted in 2005, is updated continuously and delivered to more than one billion people on their devices. Google also feeds map data to thousands of websites and apps, magnifying its influence.

    In May, more than 63 percent of people who accessed a map on a smartphone or tablet used Google Maps, versus 19.4 percent for the Chinese internet giant Alibaba’s maps and 5.5 percent for Apple Maps, according to comScore, which tracks web traffic.

    Google said it created its maps from third-party data, public sources, satellites and, often most important, users. People can submit changes, which are reviewed by Google employees. A Google spokeswoman declined further comment.

    Yet some submissions are ruled upon by people with little local knowledge of a place, such as contractors in India, said one former Google Maps employee, who declined to be named because he was not authorized to speak publicly. Other users with a history of accurate changes said their updates to maps take effect instantly.

    Many of Google’s decisions have far-reaching consequences, with the maps driving increased traffic to quiet neighborhoods and once almost provoking an international incident in 2010 after it misrepresented the boundary between Costa Rica and Nicaragua.

    The service has also disseminated place names that are just plain puzzling. In #New_York, #Vinegar_Hill_Heights, #Midtown_South_Central (now #NoMad), #BoCoCa (for the area between Boerum Hill, Cobble Hill and Carroll Gardens), and #Rambo (Right Around the Manhattan Bridge Overpass) have appeared on and off in Google Maps.

    Matthew Hyland, co-owner of New York’s Emily and Emmy Squared pizzerias, who polices Google Maps in his spare time, said he considered those all made-up names, some of which he deleted from the map. Other obscure neighborhood names gain traction because of Google’s endorsement, he said. Someone once told him they lived in Stuyvesant Heights, “and then I looked at Google Maps and it was there. And I was like, ‘What? No. Come on,’” he said.

    In Detroit, some residents have been baffled by Google’s map of their city, which is blanketed with neighborhood monikers like NW Goldberg, Fishkorn and the Eye. Those names have been on Google Maps since at least 2012.

    Timothy Boscarino, a Detroit city planner, traced Google’s use of those names to a map posted online around 2002 by a few locals. Google almost identically copied that map’s neighborhoods and boundaries, he said — down to its typos. One result was that Google transposed the k and h for the district known as Fiskhorn, making it Fishkorn.

    A former Detroit city planner, Arthur Mullen, said he created the 2002 map as a side project and was surprised his typos were now distributed widely. He said he used old books and his local knowledge to make the map, approximating boundaries at times and inserting names with tenuous connections to neighborhoods, hoping to draw feedback.

    “I shouldn’t be making a mistake and 20 years later people are having to live with it,” Mr. Mullen said.

    He admitted some of his names were questionable, such as the Eye, a 60-block patch next to a cemetery on Detroit’s outskirts. He said he thought he spotted the name in a document, but was unsure which one. “Do I have my research materials from doing this 18 years ago? No,” he said.

    Now, local real-estate listings, food-delivery sites and locksmith ads use Fishkorn and the Eye. Erik Belcarz, an optometrist from nearby Novi, Mich., named his new publishing start-up Fishkorn this year after seeing the name on Google Maps.

    “It rolls off the tongue,” he said.

    Detroit officials recently canvassed the community to make an official map of neighborhoods. That exercise fixed some errors, like Fiskhorn (though Fishkorn remains on Google Maps). But for many districts where residents were unsure of the history, authorities relied largely on Google. The Eye and others are now part of that official map.

    In San Francisco, the East Cut name originated from a neighborhood nonprofit group that residents voted to create in 2015 to clean and secure the area. The nonprofit paid $68,000 to a “brand experience design company” to rebrand the district.

    Andrew Robinson, executive director of the nonprofit, now called the East Cut Community Benefit District (and previously the Greater Rincon Hill Community Benefit District), said the group’s board rejected names like Grand Narrows and Central Hub. Instead they chose the East Cut, partly because it referenced an 1869 construction project to cut through nearby Rincon Hill. The nonprofit then paid for streetlight banners and outfitted street cleaners with East Cut apparel.

    But it wasn’t until Google Maps adopted the name this spring that it got attention — and mockery.

    “The East Cut sounds like a 17 dollar sandwich,” Menotti Minutillo, an Uber engineer who works on the neighborhood’s border, said on Twitter in May.

    Mr. Robinson said his team asked Google to add the East Cut to its maps. A Google spokeswoman said employees manually inserted the name after verifying it through public sources. The company’s San Francisco offices are in the neighborhood (as is The New York Times bureau), and one of the East Cut nonprofit’s board members is a Google employee.

    Google Maps has also validated other little-known San Francisco neighborhoods. Balboa Hollow, a roughly 50-block district north of Golden Gate Park, trumpets on its website that it is a distinct neighborhood. Its proof? Google Maps.

    “Don’t believe us?” its website asks. “Well, we’re on the internet; so we must be real.”

    https://www.nytimes.com/2018/08/02/technology/google-maps-neighborhood-names.html
    #toponymie

  • The Bullshit Web
    https://pxlnv.com/blog/bullshit-web

    My home computer in 1998 had a 56K modem connected to our telephone line; we were allowed a maximum of thirty minutes of computer usage a day, because my parents — quite reasonably — did not want to have their telephone shut off for an evening at a time. I remember webpages loading slowly: ten to twenty seconds for a basic news article.

    At the time, a few of my friends were getting cable internet. It was remarkable seeing the same pages load in just a few seconds, and I remember thinking about the kinds of the possibilities that would open up as the web kept getting faster.

    And faster it got, of course. When I moved into my own apartment several years ago, I got to pick my plan and chose a massive fifty megabit per second broadband connection, which I have since upgraded.

    So, with an internet connection faster than I could have thought possible in the late 1990s, what’s the score now? A story at the Hill took over nine seconds to load; at Politico, seventeen seconds; at CNN, over thirty seconds. This is the bullshit web.

    #Internet #Web #bullshit #économie_de_l'attention #bande_passante

    • Je blackliste quelques fermes à scripts ou à pub sur le routeur. Cela accélère sensiblement, ou alors ça casse... Mais je le sais immédiatement...

  • Mozilla executive claims that Google has made YouTube slower on Edge and Firefox - Neowin
    https://www.neowin.net/news/mozilla-executive-claims-that-google-has-made-youtube-slower-on-edge-and-fir

    Comment les détails techniques peuvent jouer sur la question de la neutralité de l’internet...

    Early last year, YouTube received a design refresh with Google’s own Polymer library which enabled “quicker feature development” for the platform. Now, a Mozilla executive is claiming that Google has made YouTube slower on Edge and Firefox by using this framework.

    In a thread on Twitter, Mozilla’s Technical Program Manager has stated that YouTube’s Polymer redesign relies heavily on the deprecated Shadow DOM v0 API, which is only available in Chrome. This in turn makes the site around five times slower on competing browsers such as Microsoft Edge and Mozila Firefox. He went on to say that:

    The executive has also mentioned a couple of workarounds for users on Edge and Firefox, which involve the use of extensions to restore the pre-Polymer version of YouTube.

    Peterson has also suggested that another way to fix the problem would be to offer the older version of YouTube to users on affected browsers, which is what Google does for Internet Explorer 11.

    Another rather interesting aspect to note is that Polymer’s latest versions support both Shadow DOM v0 and v1 APIs, but for some reason, Google still uses Polymer 1.0 with the deprecated API. Google is yet to comment on these claims.

    #YouTube #Neutralité_internet #Google

  • #augur is Live: Here’s Why It’s a Big Deal
    https://hackernoon.com/augur-is-live-heres-why-it-s-a-big-deal-ce2dd3b544d7?source=rss----3a814

    It’s July 9th, 2018. The highly anticipated decentralized app Augur has finally launched on the Ethereum Mainnet after over 4 years in development. Enduring many challenges including the need to rewrite the entire smart contract in a new language, port over their ERC20 token (REP) to a new language & contract, and ride the wave of Ethereum security issues that plagued projects like The DAO and Parity Wallet (twice), it’s finally here. Augur was the first ICO on the Ethereum platform, and it sparked the wave of excitement for decentralized apps. But what is it and why is it such a big deal?Augur is a decentralized prediction market. It allows anyone, anywhere in the world with an Internet connection and cryptocurrency to create a market on the future outcome of an event. It then gives (...)

    #crypto #market-prediction #blockchain #decentralized-predictions

  • #internet #privacy Guide — Keeping Your Data Safe Online
    https://hackernoon.com/internet-privacy-guide-keeping-your-data-safe-online-be3d823f05f5?source

    Why Is Privacy Important?So you think you have nothing to hide…think again. If you truly don’t see the value in keeping your data private, consider this: Post all your credit card numbers, bank account numbers, social #security numbers, medical records and text messages on Facebook.Are you willing to do this? Probably not.But if you aren’t careful or are targeted by a hacker or another malicious actor, this could happen. Your data could be stolen and posted publicly on the internet, despite your own objection. The problem with privacy is that people don’t see its value until they lose control of their personal data, and then it’s too late.If you take precautions to protect all your information, responsible privacy practices will become second nature for you.Why Is Internet Privacy A (...)

    #internet-privacy #internet-privacy-guide

  • #Facebook recruiting map experts to help map the world

    https://www.cnbc.com/2018/06/25/facebook-hiring-map-experts-to-help-map-world.html

    Facebook has been looking for contractors who can help it interpret mapping data to deliver internet access to remote parts of the world, according to job listings and people approached by the company.

    The company has been seeking editors and quality analysts for its Maps team, whose jobs would focus on improving internet access in rural areas and finding areas that may need disaster relief. According to the job listings, the hires would analyze and check data from OpenStreetMap, a project that uses crowdsourced information to provide a map of the world.

    #cartographie