Devastating remix of Ellen's lecture on befriending George W. Bush disappears after copyright takedown ... then reappears in force

Ellen DeGeneres's friendship with ex-President George W. Bush became controversial this week, in light of the progressive values she claims and the 600,000 corpses left by his occupation of Iraq. She delivered a monologue on her show in response, casting their friendship as an example of civility, overcoming political differences, and having "faith in America". So Rafael Shimunov added a simple backdrop of Iraq war scenes to her monolog, in the hopes DeGeneres might better understand the complaints. In response, copyright takedown notices flew and it was removed from the 'net, so it is at least getting under her skin.

Here's a copy, which I'll update if and when it disappears. Read the rest

Checkm8: an "unstoppable" Iphone jailbreaking crack

Last month, a developer called Axi0mx released an Iphone crack called Checkm8, which attacks a defect in the Ios bootrom, a low-level piece of code that has not been successfully attacked since 2010. The bootrom is read-only, making its defects effectively unpatchable, short of removing the chip and swapping it for one with more robust code (the attack also works on version 1, 2 and 3 Apple Watches). Read the rest

Apple reverses ban on HKmap.live app tracking Hong Kong protests & police

A bit of good news for pro-democracy protesters in Hong Kong, and the app developers trying to help them not get injured or killed by police. Read the rest

Adversarial Interoperability

“Interoperability” is the act of making a new product or service work with an existing product or service: modern civilization depends on the standards and practices that allow you to put any dish into a dishwasher or any USB charger into any car’s cigarette lighter. Read the rest

Apple bans an app because Hong Kong protesters might use it to avoid the murderous, out of control police

Hkmap Live is a crowdsourced app that uses reports from a Telegram group to track the locations of protesters, police, and traffic, as well as the use of antipersonnel weapons like tear gas, mass arrests of people wearing t-shirts associated with the protest movement, and mass transit closures in proximity to demonstrations (it's a bit like Sukey, the British anti-kettling app). Read the rest

A cycle of renewal, broken: How Big Tech and Big Media abuse copyright law to slay competition

As long we've had electronic mass media, audiences and creators have benefited from periods of technological upheaval that force old gatekeepers to compete with brash newcomers with new ideas about what constitutes acceptable culture and art. Those newcomers eventually became gatekeepers themselves, who then faced their own crop of revolutionaries. But today, the cycle is broken: as media, telecoms, and tech have all grown concentrated, the markets have become winner-take-all clashes among titans who seek to dominate our culture, our discourse and our communications. Read the rest

DOJ indicts man for paying AT&T employees to help him unlock millions of customers' phones

When Congress legalized phone unlocking in 2014, they added a bunch of carve-outs that let phone companies veto your attempt to unlock your phone, with the big one being that you couldn't unlock your phone while you were still in a contract that provided it to you at a reduced price. Read the rest

Debunking Microsoft's anti-Right-to-Repair FUD

Microsoft is no stranger to the use of "Fear, Uncertainty and Doubt" in the pursuit of monopolistic goals; the company perfected the tactic in the early 1990s as a way of scaring enterprise customers away from GNU/Linux; today, the company shows off its mastery of FUD in its filings to the Federal Trade Commission condemning proposals for Right-to-Repair rules. Read the rest

Felony Contempt of Business Model: Lexmark's anti-competitive legacy

In 2002, Lexmark was one of the leading printer companies in the world. A division of IBM—the original tech giant—Lexmark was also a pioneer in the now-familiar practice of locking customers in to expensive "consumables," like the carbon powder that laser-printers fuse to paper to produce printouts. Read the rest

Adversarial interoperability: reviving an elegant weapon from a more civilized age to slay today's monopolies

Today, Apple is one of the largest, most profitable companies on Earth, but in the early 2000s, the company was fighting for its life. Microsoft's Windows operating system was ascendant, and Microsoft leveraged its dominance to ensure that every Windows user relied on its Microsoft Office suite (Word, Excel, Powerpoint, etc). Apple users—a small minority of computer users—who wanted to exchange documents with the much larger world of Windows users were dependent on Microsoft's Office for the Macintosh operating system (which worked inconsistently with Windows Office documents, with unexpected behaviors like corrupting documents so they were no longer readable, or partially/incorrectly displaying parts of exchanged documents). Alternatively, Apple users could ask Windows users to export their Office documents to an "interoperable" file format like Rich Text Format (for text), or Comma-Separated Values (for spreadsheets). These, too, were inconsistent and error-prone, interpreted in different ways by different programs on both Mac and Windows systems. Read the rest

Americans believe that they should own the mountains of data produced by their cars, but they don't

Your car is basically a smartphone with wheels, and it gathers up to 25gb/hour worth of data on you and your driving habits -- everything from where you're going to how much you weigh. Cars gather your financial data, data on the number of kids in the back seat, and, once they're connected to your phone, data on who you call and text. Read the rest

Discovering whether your Iphone has been hacked is nearly impossible thanks to Apple's walled garden

This week, we learned that the notorious Israeli cyber-arms-dealer NSO Group had figured out how hijack your Iphone or Android phone by placing a simple Whatsapp call, an attack that would work even if you don't answer the call. Read the rest

Big Tech lobbyists and "open for business" Tories killed Ontario's Right-to-Repair legislation

In February, Liberal Party opposition MPP Michael Coteau introduced Right to Repair legislation after he was charged $400 to fix the cracked screen on his daughter's Samsung phone; that bill is now dead, as are dozens of Right to Repair bills introduced in US state houses, after Conservative MPs, heavily lobbied by US Big Tech firms, killed it before it could proceed to committee. Read the rest

Starz abuses the DMCA to remove EFF's tweet about Starz abusing the DMCA

Torrentfreak published an article disclosing the fact that screeners of American Gods had leaked online ahead of their air date (they did not make the screeners available, nor did they link to any of the places where the screeners could be downloaded from) and they tweeted about the story. Read the rest

Researchers find mountains of sensitive data on totalled Teslas in junkyards

Teslas are incredibly data-hungry, storing massive troves of data about their owners, including videos of crashes, location history, contacts and calendar entries from paired phones, photos of the driver and passengers taken with interior cameras, and other data; this data is stored without encryption, and it is not always clear when Teslas are gathering data, and the only way to comprehensively switch off data-gathering also de-activates over-the-air software updates for the cars, which have historically shipped with limited or buggy features that needed the over-the-air updates to fix them. Read the rest

A critical flaw in Switzerland's e-voting system is a microcosm of everything wrong with e-voting, security practice, and auditing firms

Switzerland is about to have a national election with electronic voting, overseen by Swiss Post; e-voting is a terrible idea and the general consensus among security experts who don't work for e-voting vendors is that it shouldn't be attempted, but if you put out an RFP for magic beans, someone will always show up to sell you magic beans, whether or not magic beans exist. Read the rest

Record label censors copyright lawyers' site by falsely claiming it infringes copyright

SpicyIP is arguably the leading blog for experts on India's copyright system, but links to it disappeared from Google's search index following a fraudulent claim of copyright infringement filed by Saregama, India's oldest record label. Read the rest

More posts