TikTok Users In China Temporarily Banned For Speaking Their Own Cantonese Language

Found on Techdirt on Saturday, 04 April 2020
Browse Censorship

A person who manages a Douyin account promoting Cantonese culture to its 230,000 followers said he had received two bans and multiple warnings for using Cantonese. Clearly, using Mandarin instead of Cantonese would nullify the whole point of the account.

There are around 68 million native speakers of Cantonese -- more than most languages around the world -- notably in Hong Kong. Moreover, Cantonese is not merely a "dialect" of Mandarin, as Douyin implies when it talks of "languages and dialects": they are quite separate languages that derive independently from Middle Chinese.

In order to create a unified culture, Eastasia needs to weed out any differences.

Zoom's end-to-end encryption isn't actually end-to-end at all

Found on The Register on Friday, 03 April 2020
Browse Software

Most notably, the company has been forced to admit that although it explicitly gives users the option to hold an “end-to-end encrypted” conversation and touts end-to-end encryption as a key feature of its service, in fact it offers no such thing.

E2E ensures all communications are encrypted between devices so that not even the organization hosting the service has access to the contents of the connection. With TLS, Zoom can intercept and decrypt video chats and other data.

Zoom granted itself the right to mine your personal data and conference calls to target you with ads, and seemed to have a "creepily chummy" relationship with tracking-based advertisers.

Personal information gathered by the company included, but was not limited to, names, addresses and any other identifying data, job titles and employers, Facebook profiles, and device specifications. It also included "the content contained in cloud recordings, and instant messages, files, whiteboards ... shared while using the service."

Another day, another failure day for Zoom. Do yourself and everybody else a favor and drop this insecure spyware.

Zoom is Leaking Peoples' Email Addresses and Photos to Strangers

Found on Vice on Thursday, 02 April 2020
Browse Software

The issue lies in Zoom's "Company Directory" setting, which automatically adds other people to a user's lists of contacts if they signed up with an email address that shares the same domain.

"I just had a look at the free for private use version of Zoom and registered with my private email. I now got 1000 names, email addresses and even pictures of people in the company Directory. Is this intentional?," one user tweeted last week along with a screenshot.

Last week, Zoom updated the iOS version of its app after Motherboard found it was sending analytics data to Facebook. On Monday a user filed a class action lawsuit against Zoom for the data transfer. On the same day the New York Attorney General sent a letter to Zoom asking what security measures the company had put in place as the app has sky-rocketed in popularity.

It's just getting worse and worse for them. Whenever one hears abou Zoom, it's about pricavy problems, spying and tracking. It feels like you could just install malware instead of it.

Cloudflare Launches a DNS-Based Parental Control Service

Found on Bleeping Computer on Wednesday, 01 April 2020
Browse Internet

During the coming months, Cloudflare is also working on developing and providing users with additional configuration settings for the 1.1.1.1 for Families service.

"This year, while many of us are sheltering in place, protecting our communities from COVID-19, and relying on our home networks more than ever it seemed especially important to launch 1.1.1.1 for Families," Prince added.

Well, censorship is coming with the excuse of protecting the children. Who would have thought that?

Microsoft corrects '775 per cent cloud usage surge' claim

Found on The Register on Tuesday, 31 March 2020
Browse Various

The software giant has now updated the post - and published a correction with the US Securities and Exchange Commission - that made the claim with new data, namely: "We have seen a 775 per cent increase in Teams' calling and meeting monthly users in a one month period in Italy, where social distancing or shelter in place orders have been enforced."

Microsoft has at least been classy enough to apply a strikethrough tag to the mistake, rather than dropping it into an Orwellian memory hole.

You can always try to make it look bigger than it is.

Grsecurity maker finally coughs up $300k to foot open-source pioneer Bruce Perens' legal bill

Found on The Register on Monday, 30 March 2020
Browse Legal-Issues

Spengler and OSS sued Perens for a June 2017 blog post in which Perens ventured the opinion that grsecurity, Open Source Security's Linux kernel security enhancements, could expose customers to potential liability under the terms of the General Public License (GPL).

OSS says that customers who exercise their rights to redistribute its software under the GPL will no longer receive software updates – the biz wants to be paid for its work, a problem not really addressed by the GPL. Perens, the creator of the open-source definition, pointed out that section six of the GPLv2 prohibits modifications of the license terms.

That lawsuit sure backfired. They should have just accepted the GPL terms without trying to wiggle around and ignore the fine print.

From Gmail to Gfail: Google's G-Suite topples over for unlucky netizens, rights itself

Found on The Register on Sunday, 29 March 2020
Browse Internet

The outage affected Gmail, Drive, Docs, Sheets, Slides, Hangouts Chat, and Meet services. The G-Suite admin console and Classroom services were also down. Basically, Google said users reported being unable to access its platforms.

"Some of our users experienced a service disruption ... as a result of a significant router failure in one of our data centers in the South Eastern US, causing network congestion," the web giant said.

It's rather strange that a router failure would cause such an downtime, considering marketing never fails to point out how many redundancy systems are in place.

China Goes Back to Work as the Coronavirus Rages On Elsewhere

Found on Wired on Saturday, 28 March 2020
Browse Various

Three months after the novel coronavirus was first reported in Wuhan, China appears to have successfully dampened the rate of new infections—even allowing for some fudging in the official numbers. The government of Hubei, the province that is home to Wuhan and bore the brunt of the outbreak, said Tuesday it would remove travel restrictions, allowing residents, except those in Wuhan, to again move freely. In some places, like Shenzhen, the manufacturing hub in the south, and Hangzhou, a tech hot spot on the east coast, residents say restaurants and malls are starting to refill.

It's pretty surprising how fast infections went down again in China.

I Got My File From Clearview AI, and It Freaked Me Out

Found on OneZero on Friday, 27 March 2020
Browse Various

The Times, not usually an institution prone to hyperbole, wrote that Clearview could “end privacy as we know it.” According to the exposé, the company scrapes public images from the internet. These can come from news articles, public Facebook posts, social media profiles, or multiple other sources. Clearview has apparently slurped up more than 3 billion of these images.

Clearview packages this database into an easy-to-query service (originally called Smartcheckr) and sells it to government agencies, police departments, and a handful of private companies.

Expect your request to take up to two months to process. Be persistent in following up. And remember that once you receive your data, you have the option to demand that Clearview delete it or amend it if you’d like them to do so.

That's exactly why you have to be careful with all the data you put online. At first it might seem unimportant, and nobody but your friends should be interested in your snapshots, but then some company comes in and digs through all that to prepare it for easy stalking.

HPE fixes another SAS SSD death bug: This time, drives will conk out after 40,000 hours of operation

Found on The Register on Thursday, 26 March 2020
Browse Hardware

HPE has told customers that four kinds of solid-state drives (SSDs) in its servers and storage systems may experience failure and data loss at 40,000 hours, or 4.5 years, of operation.

If you're getting deja-vu, you're not alone. HPE separately warned of certain SAS SSDs dying after their 32,768th hour of operation in November last year.

Using 15 bits only?