Roxon has paused data retention plans, says SMH

It’s not often you hear words of common sense emanating from Federal Attorneys-General with relation to technological issues — normally they’re far more interested in holding secret Internet piracy meetings without consumer representation, developing plans to monitor all Australian communications, avoiding pesky Freedom of Information requests; you know, the usual humdrum day to day stuff.

But according to the Sydney Morning Herald, the current AG Nicola Roxon may have come to see the light on the unpopularity of her department’s current wide-reaching surveillance package currently before the Federal Parliament’s Joint Committee on Intelligence and Security. The newspaper reports (we recommend you click here for the full article):

A controversial internet security plan to store the web history of all Australians for up to two years has been stalled by the federal government until after the next election — via redwolf.newsvine.com

Make An Emergency Flash Drive

You lost your wallet in Jakarta. You got hit by a car in Paris. You need to get online in a sketchy internet cafe in Reno. Getting stuck in a strange city with no ID, no money, no credit cards, and no medical or insurance documents can be inconvenient. In a medical emergency, it can be life-threatening. So have a backup plan: a secure flash drive loaded with your most vital documents and details. Here’s how to build your own — via Gizmodo Australia

Telstra 12Mbps wireless to surpass NBN: Liberal MP

A Liberal Member of Parliament inaccurately claimed this week on national television that Telstra would launch a 12Mbps wireless broadband service which would surpassthe National Broadband Network’s 100Mbps fibre to the home service, meaning there was no need to proceed with a project he said was a “white elephant”.

The ABC’s Capital Hill program on Wednesday ran an extensive debate between Liberal MP Don Randall and Labor MP Mike Kelly on the NBN, following the Government’s release of NBN Co’s new corporate plan to cover the years until 2015. You can view the full clip on YouTube here or on the ABC’s website. And thanks to Terry Green for first highlighting this issue on his blog.

Speaking on the program, Randall said Telstra will beat the NBN at their own game with competitive wireless broadband infrastructure. Thanks to the $11 billion the NBN’s giving Telstra, they are rolling out wireless, at a cheaper cost, 12 megabits per second, to people in outer areas of Australia, said Randall — via redwolf.newsvine.com

Force Mac OSX to Automatically Reconnect to VPN

A VPN (Virtual Private Network) is a great way to browse the web securely, and OS X has a VPN option built right into it. The problem is that it doesn’t always automatically connect when you boot up your computer, or after it disconnects for some reason. A simple Applescript over on Stack Exchange solves this problem — via Lifehacker

Hotkey EVE

EVE helps you to learn shortcuts, in order to increase your productivity with MAC OS X. Every time you execute an action using the mouse, EVE will show you the matching shortcut

Whirlpool more accurate than AFR, says Conroy

Communications Minister Stephen Conroy has delivered a fiery tirade against the media for constantly repeating misconceptions about Labor’s National Broadband Network project, singling out the Financial Review newspaper for particular ridicule and recommending that those interested in accuracy read broadband forum Whirlpool.

The Labor Senator opened a press conference held in Sydney yesterday to release NBN Co’s latest corporate plan by speaking in detail about what he said were a series of “misconceptions” regularly repeated in the media with respect to the NBN.

You often think if Malcolm Turnbull put out a press release saying ‘Cost blowout in the NBN due to the Earth being flat’, it’d probably lead the front page of the Fin Review lately, Conroy told the audience, which was composed of technology journalists from mainstream publications such as The Australian, The Financial Review and technology vertical outlets such as Communications Day, ZDNet and iTNews.

For those that are interested in a comprehensive discussion of these issues, I can recommend to you the Whirlpool website, particularly the thread entitled ‘fighting the FUD’, Conroy added. It is a very informative thread, and I would encourage you to take a look at it. because it does address quite a few of the issues which we debate regularly — via redwolf.newsvine.com

For flock’s sake: Scared sheep send SMSes to Swiss shepherds

Swiss boffins have been testing SMS-equipped sheep to see if they can send a warning text message when the big, bad wolf approaches, and it looks like they can.

The sheep don’t voluntarily send the message, but a heart-rate monitor fitted to a sheep’s collar can detect when the animal is stressed, and automatically sends an SMS message when that stress gets high enough, hopefully allowing swift intervention from the shepherd.

The trials, reported by the AFT, involved only 10 sheep who were fitted with collars and threatened with wolfdogs. Even the muzzled hounds were able to send the sheep into enough of a panic to trigger the text message, and the plan is to run (literal) field trials early next year — via redwolf.newsvine.com

Game of Thrones: How not to distribute content

The incredibly popular HBO series Game of Thrones is a fascinating case study. Not only in terms of constructing and maintaining dramatic tension in a TV series, but also in how not to distribute content.

It’s proof that content distribution needs a new model. The show has become not only one of the most successful series aired on the US subscription network, but more notably, it is the most pirated TV show of all time.

Moments after each episode screened on HBO in the US, record numbers of people were downloading the program on torrent sites. It averaged around 3m downloads per episode, a high proportion of them in Australia — via redwolf.newsvine.com

Watchdog clamps down on Facebook

A landmark ruling that Facebook is an advertising medium — and not just a way to communicate — will force companies to vet comments posted by the public to ensure they are not sexist, racist or factually inaccurate.

In a move that could change the nature of the social networking site forever, companies could be fined or publicly shamed for the comments that appear on their Facebook brand pages.

Last month the advertising industry watchdog issued a judgement in which it said comments made by fans of a vodka brand’s Facebook page were ads and must therefore comply with industry self-regulatory codes and therefore consumer protection laws — via redwolf.newsvine.com

Encrypt almost any disk in Mountain Lion

With Mountain Lion, you can now use the OS to encrypt disks other than the startup volume, assuming they are in GUID format. This includes USB flash drives and external Firewire/USB/ThunderBolt drives.

In the Finder, open a new window. Find your mounted (GUID) drive in the sidebar.

Control-click on the drive in the sidebar, then choose Encrypt. You are now prompted for your password and a hint (which is required). You will get no feedback, so wait for a few minutes; the time depends on the size of the drive.

The drive should unmount and mount again. Once this happens, your drive is encrypted — via Mac OSX Hints

OSX Command Line Tricks

OSX Mountain Lion changes a lot of small things with the way the operating system works. It also locks down a lot of default behaviours that many people were used to in OSX Lion. Thankfully, a group over at Github has compiled a huge list of the command line tricks that still work in Mountain Lion — via github

Does Cybercrime Really Cost $1 Trillion?

These estimates have been cited on many occasions by government officials, who portray them as evidence of the threat against America. They are hardly the only cyberstatistics used by officials, but they are recurring ones that get a lot of attention. In his first major cybersecurity speech in 2009, President Obama prominently referred to McAfee’s $1 trillion estimate. Sen. Joseph Lieberman, I-Conn., and Sen. Susan Collins, R-Maine, the main sponsors of the Cybersecurity Act of 2012 that is expected to be voted on this week, have also mentioned $1 trillion in cybercrime costs. Last week, arguing on the Senate floor in favor of putting their bill up for a vote, they both referenced the $250 billion estimate and repeated Alexander’s warning about the greatest transfer of wealth in history.

A handful of media stories, blog posts and academic studies have previously expressed skepticism about these attention-getting estimates, but this has not stopped an array of government officials and politicians from continuing to publicly cite them as authoritative. Now, an examination of their origins by ProPublica has found new grounds to question the data and methods used to generate these numbers, which McAfee and Symantec say they stand behind.

One of the figures Alexander attributed to Symantec — the $250 billion in annual losses from intellectual property theft — was indeed mentioned in a Symantec report, but it is not a Symantec number and its source remains a mystery.

McAfee’s trillion-dollar estimate is questioned even by the three independent researchers from Purdue University whom McAfee credits with analysing the raw data from which the estimate was derived. I was really kind of appalled when the number came out in news reports, the trillion dollars, because that was just way, way large, said Eugene Spafford, a computer science professor at Purdue — via redwolf.newsvine.com

Welcome to Qantas, please hold – for 15 hours

How long is too long to wait on hold? Thirty minutes? One hour? Try 15 hours, 40 minutes and one second.

That’s how long Adelaide businessman Andrew Kahn waited on hold on his mobile for Qantas from Wednesday night to yesterday morning — and his call was never answered.

Mr Kahn phoned Qantas at 7.22pm on Wednesday, trying to confirm his travel arrangements for a trip to New York on Sunday. He finally hung up at 11.01am yesterday, not having spoken to anyone. Why?

I hung up in the end simply because I had had enough, he told The Age.

But why wait so long? Well, the recorded message said someone would be with him as soon as possible — I wanted to find out what exactly they meant would be as soon as possible. And after a certain time, he did not want to give up his spot in the queue. The time on hold would easily allow for a flight from Melbourne to Los Angeles — via redwolf.newsvine.com

Expat Shield VPN Delivers UK IP Addresses

NBC has absolutely botched the coverage of the Olympics. As much as it’s possible to achieve universal agreement on anything, it seems that tape-delayed coverage and the inclusion of Ryan Seacrest have combined to accomplish the impossible. Unfortunately, for law abiding Americans who choose not to or are not aware of how to view illegal online streaming coverage, there would seem to be few other options for enjoying the once-every-four-years spectacle.

Fortunately, AnchorFree, maker of the popular traveller’s VPN (Virtual Private Network) HotSpot Shield offers another solution. The company’s little discussed niche VPN product Expat Shield gives users a UK-based IP address: BOOM, live streaming BBC coverage of the Olympics in all its suspense-filled, NBC-free glory — via redwolf.newsvine.com

Twitter suspends British journalist critical of NBC’s Olympics coverage

Twitter has brought down a hail of critical tweeting on its own head by suspending the account of a British newspaper’s Los Angeles correspondent following his acerbic reporting of NBC’s coverage of the Olympics.

The social media network hummed with the indignation of thousands of its users after the Twitter feed of Guy Adams of the Independent disappeared. The paper’s deputy editor, Archie Bland, confirmed the suspension, calling it heavy-handed.

NBC said it had complained to Twitter after Adams published the email address of one of its senior bosses. We filed a complaint with Twitter because a user tweeted the personal information of one of our executives. According to Twitter, this is a violation of their privacy policy. Twitter alone levies discipline.

Rachael Horwitz, a spokeswoman for the San Francisco-based firm, confirmed that it does not actively monitor users’ accounts, and added that it was company policy not to comment on individual users — via redwolf.newsvine.com

Reverse-Engineered Irises Fool Eye-Scanners

New research being released this week at the Black Hat security conference by academics in Spain and the US may make that possible.

The academics have found a way to recreate iris images that match digital iris codes that are stored in databases and used by iris-recognition systems to identify people. The replica images, they say, can trick commercial iris-recognition systems into believing they’re real images and could help someone thwart identification at border crossings or gain entry to secure facilities protected by biometric systems.

The work goes a step beyond previous work on iris-recognition systems. Previously, researchers have been able to create wholly synthetic iris images that had all of the characteristics of real iris images — but weren’t connected to real people. The images were able to trick iris-recognition systems into thinking they were real irises, though they couldn’t be used to impersonate a real person. But this is the first time anyone has essentially reverse-engineered iris codes to create iris images that closely match the eye images of real subjects, creating the possibility of stealing someone’s identity through their iris.

The idea is to generate the iris image, and once you have the image you can actually print it and show it to the recognition system, and it will say ‘okay, this is the [right] guy’, says Javier Galbally, who conducted the research with colleagues at the Biometric Recognition Group-ATVS, at the Universidad Autonoma de Madrid, and researchers at West Virginia University — via redwolf.newsvine.com

Meet the ‘bots’ that edit Wikipedia

Wikipedia is written and maintained by tens of thousands of volunteers across the world. Those, in turn, are assisted by hundreds of bots — autonomous computer programmes that keep the encyclopaedia running.

Penis is the male sex organ, the Wikipedia page in question read.

While that statement is undeniably true and thus may merit inclusion in Wikipedia, it belongs nowhere in the site’s article on national supreme courts and their legal roles.

When an anonymous Wikipedia reader in South Carolina offered that contribution to the globally popular online encyclopaedia last week, it took just seconds for the blemish to be discovered and deleted.

The vandalism was caught not by a reader, but by a simple artificial intelligence programme called a bot — short for robot — via redwolf.newsvine.com

Twitter Working on Way to Retrieve Old Tweets

Twitter is working on a tool that would let users export every tweet they’ve ever made on the site, the company’s chief executive, Dick Costolo, told The New York Times.

But why would someone want all their tweets — possibly going all the way back to 2006, when Twitter was first launched?

Facebook already lets you download a personal archive that includes a list of every message you’ve ever sent to someone, a list of every friend you have on the network, copies of any photos or videos you have ever uploaded to the site, and much more. I recently fetched mine and was surprised at the amount of data I’ve shared — packaged up by Facebook into 46MB worth of files and folders — and I consider myself a light user.

Now imagine data from Twitter’s 140 million users who are firing off 140-character tweets throughout the day, every day, whether about their own personal trivia, or their thoughts on current news as it unfolds — via redwolf.newsvine.com

Foot-Powered Washing Machine

About a year ago, two design students named Alex Cabunoc and Ji A You travelled from their homes in Los Angeles to Cerro Verde, a 30,000 person slum outside of Lima. As students in the celebrated Design Matters program at Art Centre College of Design, which focuses on social innovation, they had come to Cerro Verde as part of a special studio called Safe Agua Peru. Their goal? Develop a commercial product that alleviates issues related to water poverty, targeted at people who earn between $4 and $10 a day.

The students spent two weeks in Cerro Verde, working closely with inhabitants to prototype co-created products at a break-neck speed. Since returning, nearly half of the students have won International Design Excellence Awards, and a student-made documentary about the trip called Hands in the Mist has been shortlisted for a Young Directors Award at Cannes. Cabunoc and You’s design–a manually powered washer and dryer that costs less than $40 called GiraDora–has drawn special attention — via redwolf.newsvine.com