Nov 26 16:32

Bitcoin Investors may not actually own the digital currency because many courts don't recognise them as property, legal expert warns

Investors in Bitcoin may not technically own them as English courts don't recognise the cryptocurrency as possessions, a legal expert has warned.

Dave Michels, a research associate at Queen Mary University of London, says the level of legal protection is unclear.

Mr Michels and his team recently completed research which shows that courts in England and Wales are unlikely to identify digital tokens like Bitcoin as property.

The same law is likely to apply in other common law jurisdictions such as the United States, Hong Kong, Singapore, most of India and elsewhere.

Nov 26 16:25

US Postal Service admits a 'catastrophic' flaw in its system exposed exactly what mail 60 million users were getting delivered

The US Postal Service has patched a 'catastrophic' security flaw that exposed the data of 60 million customers.

Security investigator KrebsOnSecurity discovered a vulnerability on USPS' website that allowed anyone to see online users' street addresses, usernames, phone number and other personal information.

Worryingly, an independent security researcher notified USPS of the flaw more than a year ago, but the service didn't take action until this week after it was contacted by Krebs.

Nov 26 08:11

Facebook spooked after MPs seize documents for privacy breach probe

British MPs have made unprecedented use of Parliamentary powers to send a serjeant at arms to the hotel where the boss of a US software biz was staying to seize potentially damaging documents on Facebook.

The cache allegedly shows internal messages – including from Mark Zuckerberg – that demonstrate the social network actively exploited a loophole in its policies on access to users' friends' data that allowed Cambridge Analytica to walk away with info on 87 million people.

The decision to seize the documents marks a major escalation in what was, until now, mostly a war of words between the parties. Zuck has flatly refused MPs' requests that he give evidence in their inquiry.

The chairman of the much-snubbed Digital, Culture, Media and Sport Committee, Damian Collins, said the group had taken the extraordinary step because it had thus far "failed to get answers" from the firm directly.

Nov 23 15:37

The Planned Obsolescence of Health Under the 5G Grid

When your stuff is designed to break down, that’s ‘planned obsolescence.’ In fourteen short years, we have gone from 2G wifi (2004) to 5G, from flip phone to smart phone. By design. Are we smarter? Healthier?

Nov 23 10:48

Blockchain Systems are Tracking Food Safety and Origins

By Nir Kshetri, University of North Carolina – Greensboro

When a Chinese consumer buys a package labeled “Australian beef,” there’s only a 50-50 chance the meat inside is, in fact, Australian beef. It could just as easily contain rat, dog, horse or camel meat – or a mixture of them all. It’s gross and dangerous, but also costly.

In researching blockchain for more than three years, I have become convinced that this technology’s potential to prevent fraud and strengthen security could fight agricultural fraud and improve food safety...

Nov 22 11:46

French govt offices ditch Google for local search engine Qwant in another possible anti-US move

The French National Assembly and the French Army Ministry have set Qwant as their default search engine, leaving Google in the dust.

Nov 22 09:31

Did you hear? There's a critical security hole that lets web pages hijack computers. Of course it's Adobe Flash's fault

Adobe has emitted software updates to address a critical vulnerability in Flash Player for Windows, Mac, and Linux.

PC owners and admins will want to upgrade their copies of Flash to version or later in order to get the patch – or just dump the damn thing all together.

The November 20 security update addresses a single flaw, designated CVE-2018-15981. It is a type confusion bug that can be exploited to achieve remote code execution. Basically, an attacker could slip the exploit code into a Flash .swf file, put it on a web page, and covertly install malware on any vulnerable machine that visits the page.

Nov 22 09:29

Groundhog Day comes early as Intel Display Drivers give Windows 10 the silent treatment

The Windows 10 October 2018 Update woes continued for Microsoft last night with the announcement that Redmond had slammed the brakes for users of certain Intel display drivers.

Microsoft appears to have confused Groundhog Day with Thanksgiving, as issues with Intel drivers contributed to the fiasco that was the original attempt to unleash 1809. And here we are again.

This time around the problems are less severe, but the Windows gang has stopped the update for affected users, just in case.

Nov 21 19:24

Now it’s Office’s turn to have a load of patches pulled

On November's Patch Tuesday two weeks ago, Microsoft released a bunch of updates for Office to update its Japanese calendars. In December 2017, Emperor Akihito announced that he would abdicate and that his son Naruhito would take his role as emperor. Each emperor has a corresponding era name, and calendars must be updated to reflect that new name. The Office patches offer updates to handle this event.

Two of these updates, KB2863821 and KB4461522, both for Office 2010, are apparently very broken, causing application crashes. The company has suspended delivery of the patches, but the problem is so severe that Microsoft is recommending that anyone who has installed the updates already should uninstall them pronto (see instructions for KB2863821 here and for KB4461522 here).

Nov 21 19:14

Lexus' new AI-written TV ad, and the rise of emotionally manipulative algorithms

Using a script written by IBM's Watson supercomputer, trained with a long list of award-winning luxury brand commercials and human emotional response data, Lexus has shot a TV ad digitally designed to make you feel things. Does it work? Well, kind of.

Nov 21 19:00

Linus Torvalds: After big Linux performance hit, Spectre v2 patch needs curbs

Patch is causing as much as a 50 percent drop in performance in some Linux workloads.

Nov 21 18:57

Talk about a cache flow problem: This JavaScript can snoop on other browser tabs to work out what you're visiting

Oren and Yarom say their work shows that efforts to defend against side-channel attacks by reducing access to precision timing have been for naught.

"In this work we show that the whole approach is futile – we simply do not need high-resolution timers for the attack," they said. "Similarly, some approaches for protecting from Spectre segregate sites into multiple processes. We show that this is not sufficient. We show that we can spy from one browser tab on another and even from one browser on other browsers running on the computer."

The takeaway, they contend, is that anything short of running a single browser tab at any one point in time poses a privacy risk: if you open a second tab, JavaScript in it can snoop on the other tab. Disabling JavaScript completely will kill off the attack, but also kill off a lot of websites, which rely on JS functionality to work.

Nov 21 16:53

Mojeek Search Engine - Independent and Unbiased Search Results

So why do we still need another search engine when there are other options, for example, DuckDuckGo and Startpage? Although we very much respect these alternative engines (usually due to our overlapping ethos), they still rely upon a mainstream engine to provide them with their organic search results, which in turn come complete with the bias already present within those results or engine. When you use Mojeek you don't have to worry about first or second hand bias, our index has been created from the ground up, and our results are ranked according to our own algorithms and no-one elses. Our algorithm ranks pages on what it thinks is the most relevant to the keywords you searched for, it doesn't take into account what you've previously searched for, the sites you've visited, or even what we ourselves consider to be true or false.

Nov 21 16:45


Previously, Rowhammer was understood to impact typical random access memory used in many off-the-shelf computers. Rowhammer has also been shown to threaten the memory in Android phones. But on Wednesday, researchers in the VUSec research group at Vrije Universiteit in Amsterdam published details of a next-generation Rowhammer ambush that can target what's known as "error-correcting code" memory. ECC memory was previously thought to preempt Rowhammer's data manipulations, because it has redundancies and self-correcting mechanisms that deal with data corruption. ECC memory is used in systems need exceptional reliability and can't tolerate inaccuracies, like financial platforms.

Nov 21 16:32


From Facebook’s earliest days, Zuckerberg has followed the same pattern: take two steps forward, only to be pushed one step backward and land exactly where he wanted to be.

Nov 21 16:31

Amazon exposed customer names and emails in a 'technical error'

In a statement, Amazon said, "We have fixed the issue and informed customers who may have been impacted."

Despite the exposure, Amazon told the affected customers they did not need to change their passwords. But even with just their names and emails exposed, people could attempt to reset their accounts or target their emails for phishing attacks.

Amazon did not answer questions about how many customers were affected by the error nor about how long information was exposed. Amazon's website and systems were not breached, an Amazon spokesperson told CNBC. The company did not say where the customer information was visible.

Nov 21 16:29

3 New Code Execution Flaws Discovered in Atlantis Word Processor

Talos researchers responsibly reported all the vulnerabilities to the developers of the affected software, who have now released an updated version that addresses the issues.

If you haven’t yet, you are highly advised to update your word processing software to the latest version and security enthusiasts who are interested in learning more about these issues can head on to Talos blog for technical details.

The easiest way to prevent yourself from being a victim of attacks leveraging such vulnerabilities is never to open any document provided in an email from unknown or untrusted sources.

Nov 21 13:55

A browser for thenext-generation Web

Beaker brings peer-to-peer publishing to the Web, turning the browser into a supercharged tool for sharing websites, files, apps, and more.

Webmaster's Commentary: 

Getting around web censorship?

Nov 21 13:32

The Social Concentration Camp

This madness and abnormality is clear to me. I can’t understand why it isn’t clear to others. Am I mad? Am I the one who is abnormal? How can so many millions of people be oblivious to the facts and reality of our situation? They just seem to sleepwalk through life believing what they are told, thinking the way their keepers want them to think, doing what they are told to do, not questioning authority figures, and fulfilling their infinite appetite for distractions with their technological gadgets. As Huxley predicted in the late 1950s, the fact people have adjusted to this profoundly abnormal society is a measure of their mental sickness. Being normal today is considered abnormal.

Nov 21 12:22

Malware Posing As Innocent Games Downloaded By Millions Of Android Users

It seems like Google’s crackdown on developers and refining the Play Store was only a drop in the bucket; the problem seems much bigger than anticipated.

Today, a security researcher at ESET, Lukas Stefanko, called out thirteen Google Play Store apps which were originally malware disguising themselves under the name of the driving game for Android.

The Android apps which ranked on the Google Play Store with installs more than 580,000 were removed by Google as soon as the news the broke out.

Nov 21 12:07

FLASHBACK - Judicial Watch: New Clinton Emails Uncovered, Reveal Additional Mishandling of Classified Information

Judicial Watch today released 1,617 new pages of documents from the U.S. Department of State revealing numerous additional examples of classified information being transmitted through the unsecure, account of Huma Abedin, former Secretary of State Hillary Clinton’s deputy chief of staff, as well as many instances of Hillary Clinton donors receiving special favors from the State Department.

The documents included 97 email exchanges with Clinton not previously turned over to the State Department, bringing the known total to date to at least 627 emails that were not part of the 55,000 pages of emails that Clinton turned over, and further contradicting a statement by Clinton that, “as far as she knew,” all of her government emails had been turned over to department.

Webmaster's Commentary: 

"No, no, no, no, no, no, NO!!!!!! Look at Ivanka's use of private email, not Hillary's!!!!!!!!!!!" -- Hitlery

Nov 21 11:42

Young tech whiz kid hacked Silicon Valley executives' phones to steal cryptocurrency - and one victim watched as his cell went black and $1MILLION disappeared from his accounts

A young Manhattan man allegedly stole $1million from a Silicon Valley executive by hacking into his phone and stealing his cryptocurrency.

Nicholas Truglia, 27, faces 21 felony counts after he allegedly went on a hacking spree that targeted six victims.

Authorities said Truglia successfully hacked into six victims' phones, but was only able to steal money from Robert Ross.

Nov 21 09:55


CPAP units, heart monitors, blood glucose meters and lifestyle apps generate information that can be used in ways patients don’t necessarily expect. It can be sold for advertising or even shared with insurers, who may use it to deny reimbursement.

Medical devices are gathering more and more data from their users, whether it’s their heart rates, sleep patterns or the number of steps taken in a day. Insurers and medical device makers say such data can be used to vastly improve health care.

But the data that’s generated can also be used in ways that patients don’t necessarily expect. It can be packaged and sold for advertising. It can anonymized and used by customer support and information technology companies. Or it can be shared with health insurers, who may use it to deny reimbursement. Privacy experts warn that data gathered by insurers could also be used to rate individuals’ health care costs and potentially raise their premiums.

Webmaster's Commentary: 

Expect every and any data any which these devices process, to be sent, sold, or analyzed,in ways which never even occurred to you, as the end user.

Nov 21 09:41

Your Medical Devices Are Not Keeping Your Health Data to Themselves

By Derek Kravitz and Marshall Allen

CPAP units, heart monitors, blood glucose meters and lifestyle apps generate information that can be used in ways patients don’t necessarily expect. It can be sold for advertising or even shared with insurers, who may use it to deny reimbursement...

Nov 20 16:12

Facebook hosted an auction for a CHILD BRIDE: Site under fire for allowing online sale where South Sudanese girl, 17, was exchanged for 500 cows, three cars and $10,000 in cash

An auction for a South Sudanese child bride was hosted on Facebook on October 25, unbeknownst to the social networking site for over two weeks.

The father who benefited from the sale secured 500 cows, three cars and $10,000 in exchange for his 17-year-old daughter's hand in marriage, from the highest bidder out of five men, some of whom are high-ranking government officials, according to a child's rights organization called Plan International.

Facebook found out about the post on November 9, took it down and permanently disabled the account that posted the auction, but the daughter had already been married by that time.

'This barbaric use of technology is reminiscent of latter-day slave markets,' George Otim, Country Director of Plan International South Sudan, said.

'That a girl could be sold for marriage on the world’s biggest social networking site in this day and age is beyond belief.'

Nov 20 16:09

Tesla rolls out update that makes it harder for thieves to steal cars by hacking the key fob

Tesla is making it much harder for thieves to run off with your Model 3.

A new software update for the electric sedan will let vehicle owners and police track stolen cars.

The move comes after a shocking video showed criminals stealing a $75,000 Model S by remotely hacking the car's key fob.

Nov 20 12:08

You can't make this shit up

flashback -Twitter co-founder ‘sorry’ if social media site helped elect Donald Trump, decries online free speech

Nov 20 11:36

Facebook is on track to post its longest losing streak ever as tech stocks drag down the market

The social media giant sank 5.7 per cent to $131.55 - its lowest level since February 2017.

This will also likely be the third consecutive month that Facebook will record a loss in its share price - the longest down period in its history.

Nov 20 11:08

Linux kernel Spectre V2 defense fingered for massively slowing down unlucky apps on Intel Hyper-Thread CPUs

The specific Spectre V2 mitigation in this case was added to Linux 4.20 and backported to Linux 4.19.2. It's called STIBP (Single Thread Indirect Branch Predictors), and prevents the processor's branch prediction engine from being exploited by malware on a computer to steal passwords, encryption keys, and other secrets out of memory it shouldn't have access to.

The defense mechanism turns out to be such a drag on performance that Torvalds believes it should not be enabled by default in all cases.

"When performance goes down by 50 per cent on some loads, people need to start asking themselves whether it was worth it," Torvalds wrote in a message to the Linux kernel mailing list on Sunday. "It's apparently better to just disable SMT entirely, which is what security-conscious people do anyway."

Nov 20 10:39

'Always Listening' - Amazon's Alexa Stores Everything You Say To It; Here's How To Delete

If you're one of the millions of people who own a device with Amazon Alexa, the company's mobile spying device helpful personal assistant, whatever you say may be recorded - especially if someone in the house is named Alexis, Alex, or Lexi.

According to Amazon's Alexa terms of use, the company collects and stores most of what you say to Alexa - including the geolocation of the product along with your voice instructions, reports CNBC's Todd Haselton.

Your messages, communication requests (e.g., "Alexa, call Mom"), and related instructions are "Alexa interactions," as described in the Alexa Terms of Use. Amazon processes and retains your Alexa Interactions and related information in the cloud in order to respond to your requests (e.g., "Send a message to Mom"), to provide additional functionality (e.g., speech to text transcription and vice versa), and to improve our services. -Amazon Terms of Use

Nov 20 10:03

‘Sexbots are coming’: Scientists say ‘digisexuals’ inevitable as more people bond with robots

Academics are arguing that many people will soon be identifying as “digisexuals” and taking their sexual identity from having sex with robots.
While sex robots are currently quite primitive, a new report published in the Journal of Sexual and Relationship Therapy argues that before long they will be able to look, speak and act like real people - and will be specifically designed to fulfill a person’s desires.

Webmaster's Commentary: 

I think someone screwed up my order!

Nov 20 09:34

Tom Fitton on WMAL: Hillary Clinton ORDERED by Court to Answer Key Questions on Email Server

November 19, 2018- JW President Tom Fitton appeared on “Mornings on the Mall” on WMAL Radio to discuss U.S. District Court Judge Emmet G. Sullivan ruled that within 30 days Clinton must answer under oath two additional questions about her controversial email system.

Nov 20 09:33


Explaining their work, the soldiers used phrases I had heard countless times from digital marketers: “key influencers", “reach", “traction". You normally hear such words at viral advertising studios and digital research labs. But the skinny jeans and wax moustaches were here replaced by the crisply ironed shirts and light patterned camouflage of the British Army. Their surroundings were equally incongruous – the 77th’s headquarters were a mix of linoleum flooring, long corridors and swinging fire doors. More Grange Hill than Menlo Park. Next to a digital design studio, soldiers were having a tea break, a packet of digestives lying open on top of a green metallic ammo box. Another sign on the wall declared, “Behavioural change is our USP [unique selling point]”. What on Earth was happening?

Webmaster's Commentary: 

IF the Brits are out there, "digitally"marketing" wars and military campaigns, we, in the Peace Movement, need to be marketing the case for peace ever more gently and intelligently than ever.

Nov 20 09:28


More than 5,700 kilometres of the Atlantic Ocean separate the coastlines of France and Virginia. But in 2020 they will be directly connected for the first time by the Dunant submarine cable which will boost internet capacity between Europe and the east coast of the US.

When Dunant becomes operational it will join more than 428 submarine cables, spanning thousands of kilometres, that makeup the backbone of the internet. But this cable is unlike any other.

Named after the Henry Dunant, the founder of the Red Cross and winner of the first Nobel Peace Prize, the cable is owned by Google. It's the first transatlantic submarine cable that has been privately financed and deployed by one of the big tech firms.

Webmaster's Commentary: 

This acquisition and building of sub-sea cables, will give Google even more control over content; be able to offer it to the highest bidder, and suppress independent media even more than it already does through its algorithms.

Remember what happened in pre-World War II, right after Hitler came to power in Germany??!?

He established control of all German media. He could spin any story in any direction he wanted, and did so with impunity.

Nov 20 09:22


But the dream of extractive rentierism still haunts the managerial classes.

Take Ford CEO Jim Hackett, whose recent Freakonomics Radio appearance celebrated his company's shift from a car business to a debt-issuance business, with Ford Credit now accounting for a third of the company's profits. Hackett vowed to increase that share by using the leverage he could exert over his debtors to force them to let him spy on them (for example, by doubling down on GM's car radio surveillance), and then cross-referencing this data on the data borrowers are forced to supply in order to buy their cars, and with data-sets from corporate acquisitions like the scooter company Spin.

Nov 20 09:19


U.S. adults have begun to turn on social media giants like Facebook and Twitter, and a majority believes that these social media platforms have done more to hurt democracy and free speech than help.

Last year, 43 percent of U.S. adults thought social media hurt society, but that increased to 57 percent in 2018, according to an Axios poll conducted through mid November.

Both Democrats and Republicans have soured on social media, as Republicans have claimed censorship of conservative voices, and Democrats have complained about the use of targeted ads that they say can be used to discriminate against minorities.

Nine percent more Democrats believe social media hurts free speech than last year, and 17 percent more Republicans feel that way, the poll said.

Nov 20 08:23


The Russian Defense Ministry is set to educate officers and soldiers on how to behave online in order to protect state-level secrets. The military also intends to tighten legislation punishing leakers of sensitive data.
The military will launch obligatory courses on the protection of state secrets starting next year, Izvestia newspaper reported, citing the ministry’s press service. The servicemen are set to get insights into what they are allowed to post on the internet, how to use social media safely, what should – and should not – be told to strangers, and other guidance.

The courses will be obligatory for all the servicemen, despite the majority of soldiers not even having clearance for state secrets. Personnel lacking clearance will actually get longer lectures on the matter, since others have already undertaken obligatory secrecy training.

Webmaster's Commentary: 

Too danged bad that the US didn't have something in place like that before Hillary Clinton was appointed Secretary of State!! :-)

Nov 19 12:08

Threat of Wifi and EMF the Subject of International Scientist Appeal

Increasing numbers of scientists around the world are producing research data demonstrating the immediate threat posed to human health by saturation coverage of wi-fi, smart meters, and EMF in general.

Nov 19 11:14

Will our smart devices become a massive surveillance network?

The rise of the digital era has brought with it many wondrous changes to our daily lives, not least of which the fact that we now carry digital assistants with us everywhere we go in the form of smartphones, tablets, and laptop computers. The rapid proliferation of everyday digital devices and the rise of new smart devices, which are more capable than ever before, carries with it worrying connotations about surveillance just as equally as it does positive ones of progress.

Will our smart devices become a massive surveillance network? You need not look to the future with dystopian fears when it comes to your smart devices – governments are already using them to spy on you today.

Webmaster's Commentary: 

Is this a trick question?

Nov 19 11:12

Trump signs bill that creates the Cybersecurity and Infrastructure Security Agency

US President Donald Trump signed today a bill into law, approving the creation of the Cybersecurity and Infrastructure Security Agency (CISA).

The bill, known as the CISA Act, reorganizes and rebrands the National Protection and Programs Directorate (NPPD), a program inside the Department of Homeland Security (DHS), as CISA, a standalone federal agency in charge of overseeing civilian and federal cybersecurity programs.

The NPPD, which was first established in 2007, has already been handling almost all of the DHS' cyber-related issues and projects.

Nov 19 10:54

FLASHBACK: Hillary Clinton’s State Department Ignored Julian Assange’s Warning About Leaked Cables

Hillary Clinton’s office ignored Julian Assange’s warnings about leaked U.S. State Department cables in 2011, according to footage obtained at the time by documentary filmmaker Laura Poitras.

The Department of Justice has obtained sealed charges against Assange for his decision to publish classified U.S. government material, as confirmed by Reuters.

Yet the DOJ has done nothing to hold former Secretary of State Clinton to account, either for her apparent negligence in ignoring Assange’s warnings about the leaked material nor for her uploading sensitive government information to an insecure private email server.

Nov 19 10:37


When the GDPR was being debated, we warned that it would be a disaster for free speech. Now that it's been in effect for about six months, we're seeing that play out in all sorts of ways. We've talked about how it was used to disappear public court documents for an ongoing case, and then used to disappear a discussion about that disappearing court document. And we wrote about how it's been used against us to hide a still newsworthy story (and that leaves out one other GDPR demand we've received in an attempt to disappear a story that I can't even talk about yet).

Nov 19 10:35


U.S. adults have begun to turn on social media giants like Facebook and Twitter, and a majority believes that these social media platforms have done more to hurt democracy and free speech than help.

Nov 19 09:42

Vision Direct hack puts customers' money at risk

Vision Direct says a hack attack has exposed thousands of its customers' personal data including payment card numbers, expiry dates and CVV codes.

The contact lens retailer said anyone who had entered their details into its site between 3 and 8 November could be affected.

It added that it had identified 16,300 people as being at risk.

It said a fake Google Analytics script placed within its websites' code was the apparent cause.

Nov 19 08:57

Inside Judicial Watch: Court ORDERS Hillary Clinton to Testify UNDER OATH about Private Email Server!

Judicial Watch announced that U.S. District Court Judge Emmet G. Sullivan ruled that within 30 days Hillary Clinton must answer under oath two additional questions about her controversial email system.

In 2016, Clinton was required to submit under oath written answers to Judicial Watch’s questions. Clinton objected to and refused to answer questions about the creation of her email system; her decision to use the system despite warnings from State Department cybersecurity officials; and the basis for her claim that the State Department had “90-95%” of her emails.

After a lengthy hearing on Wednesday, Judge Sullivan ruled that Clinton must address two questions that she refused to answer under-oath:

Nov 18 19:23

MGTOW Channels Attacked- Whats The Next Step?

I recorded this at 3AM. Sorry if I sound lame.
We pretty much all know by now Youtube attacked all MGTOW related channels. Here are some ideas on how we can respond. We are under attack simply for being men, this goes beyond MGTOW. Tomorrow it might be illegal to have a penis. We need to fight back.

Nov 18 10:16

'Facebook is behaving like it's a special snowflake': Investors call on Mark Zuckerberg to resign as chairman following damaging report that social media giant employed PR firm to smear its critics

Investors are calling on Facebook CEO Mark Zuckerberg to step down following a report a conservative consulting firm used 'black ops' style techniques to deflect criticism from the social networking giant.

Jonas Kron, senior vice president at Trillium Asset Management which owns an £8.5m stake in Facebook, called on Zuckerberg to step down as board chairman, telling The Telegraph: 'Facebook is behaving like it's a special snowflake. It's not. It is a company and companies need to have a separation of chair and CEO.'

Nov 18 10:05

Doyouthinkhesaurus? Privacy fears over £90 talking dinosaur toy programmed to 'spy' on children

It's the cute toy tipped to be a Christmas hit, but there are fears ‘Dino’ the dinosaur may be vulnerable to hackers who could steal information about its young owners.

The ‘smart toy’, which is able to ‘learn’, answer questions and read bedtime stories, is among a series of technology gifts that have failed to win approval from the Mozilla Foundation, a not- for-profit organisation that campaigns for better internet accessibility and safety.

The group said it had been unable to determine if Dino – an internet-connected toy made by CogniToys and priced at £89.99 on Amazon – uses sufficient encryption to guard against hackers.

Nov 17 17:36

FYI, Saying ‘Men Aren’t Women’ Now Qualifies as ‘Hateful Conduct’ on Twitter

Twitter’s crusade against “hate speech” has vanquished yet another meany face. A prominent Canadian feminist says that the company flagged a tweet she wrote which meekly suggested that men aren’t women. Isn’t Twitter fun?

Nov 17 10:14


Police have unveiled their new weapon – a camera that can produce clear images of people inside a car almost a mile away and dubbed ‘The Long Ranger’.

The massive camera has been showcased at the launch of a pilot project called Operation Indemnis.

Police in Gloucester are using the whopping camera to tackle motoring offences such as speeding, tailgating and using a mobile phone while driving.

Speed guns have been able to detect how fast cars travel but the new camera produces clear video footage and still photographs of the people inside them.

Martin Surl, Police and Crime Commissioner for Gloucestershire where the kit is being tested, said he hoped that it would catch people using their mobile phones.

When contacted by Mail Online, his office claimed the new camera could produce clear images at twice the distance of a normal one.

Webmaster's Commentary: 

I would tend to think that this new camera is not really about safety at all, but about building revenues from fines.

Nov 16 19:45

Controversial Facebook patent would use family photos to work out who you live with to sell ads

The social media giant has filed a patent for technology that would look at your family photos to determine who else lives in your household.

In turn, it would allow Facebook to serve up targeted ads to the whole family.

Nov 16 19:42

Have YOUR text messages been read by hackers? Massive security breach exposes 26 MILLION SMS messages containing private customer information

A massive data breach has exposed tens of millions of SMS text messages.

The breach involved a database of 26 million text messages, some of which included private customer data like password reset information, shipping notifications and two-factor authentication codes,TechCrunch reported.

The database was operated by Voxox, a California-based communications firm.

Making matters worse, the database wasn't even password protected, according to Sebastian Kaul, a Berlin-based security researcher who discovered the vulnerability.

Nov 16 17:30

Hillary Clinton Ordered To Answer Additional Questions Under Oath About Private Email Server

"A federal court ordered Hillary Clinton to answer more questions about her illicit email system – which is good news," said Judicial Watch President Tom Fitton. "It is shameful that Judicial Watch attorneys must continue to battle the State and Justice Departments, which still defend Hillary Clinton, for basic answers to our questions about Clinton’s email misconduct."

Nov 16 11:17

FYI, saying ‘men aren’t women’ now qualifies as ‘hateful conduct’ on Twitter

Twitter’s crusade against “hate speech” has vanquished yet another meany face. A prominent Canadian feminist says that the company flagged a tweet she wrote which meekly suggested that men aren’t women. Isn’t Twitter fun?

Meghan Murphy, editor of Canada’s leading feminist news portal, Feminist Current, was recently informed by Twitter that two of her tweets had violated the platform’s rules against “hateful conduct.”

One of the offending tweets stated that “men aren’t women,” while the other asked: “How are transwomen not men?”