Submission + - Everything We Know About Nintendo Switch (kotaku.com)
Submission + - Little Chicago (orderlittlechicago.com)
Submission + - Sourav Ganguly Receives Death Threat Through A Letter - Tollykata (tollykata.com)
Submission + - Nintendo Looks to Switch Fortunes With Hybrid Game Console (wsj.com)
Journal + - Journal: Intel Wifi Crashing 1
Note to future self.
I was fiddling around with my laptop and broke something. My WiFi kept disconnecting every couple of minutes. A quick look in dmesg showed the iwlwifi kernel module was segfaulting every couple of minutes.
This was new. WTF had I changed? Reminder to self -- don't fiddle with things that matter when really tired.
Submission + - Man Accused in Hospital Hacking Ends 100-Day Hunger Strike (nytimes.com)
From he article: A man awaiting trial in the 2014 hacking of a Boston hospital's computer network says he's ending a hunger strike after 100 days.
Martin Gottesfeld acknowledges he attacked the Boston Children's Hospital network. He was waging a hunger strike from prison to bring attention to the treatment of troubled youths by medical institutions and by prosecutors he considers overzealous.
In a statement read by his wife outside court Wednesday the 32-year-old Gottesfeld said he'll "continue to fight and defend those who cannot defend themselves."
Gottesfeld previously said he orchestrated the hospital computer attack to protest the treatment of Justina Pelletier, a Connecticut teenager at the center of a custody dispute based on conflicting medical diagnoses.
Justina was transferred to a medical facility but later was returned to her parents.
Submission + - Gramercy Park by City Developments (buynewlaunchnow.com)
Submission + - Chung c Vincity (toperland.vn)
Submission + - Norway Kills The FM Radio Star – Could It Happen Here? (audioholics.com)
Submission + - Is it time to hold police officers accountable for constitutional violations? (washingtonpost.com)
The doctrine of qualified immunity operates as an unwritten defense to civil rights lawsuits brought under 42 U.S.C. 1983. It prevents plaintiffs from recovering damages for violations of their constitutional rights unless the government official violated “clearly established law,” usually requiring a specific precedent on point. This article argues that the doctrine is unlawful and inconsistent with conventional principles of statutory interpretation.
Members of the Supreme Court have offered three different justifications for imposing such an unwritten defense on the text of Section 1983. One is that it derives from a common law “good faith” defense; another is that it compensates for an earlier putative mistake in broadening the statute; the third is that it provides “fair warning” to government officials, akin to the rule of lenity.
But on closer examination, each of these justifications falls apart, for a mix of historical, conceptual, and doctrinal reasons. There was no such defense; there was no such mistake; lenity ought not apply. And even if these things were otherwise, the doctrine of qualified immunity would not be the best response.
The unlawfulness of qualified immunity is of particular importance now. Despite the shoddy foundations, the Supreme Court has been reinforcing the doctrine of immunity in both formal and informal ways. In particular, the Court has given qualified immunity a privileged place on its agenda reserved for few other legal doctrines besides habeas deference. Rather than doubling down, the Court ought to be beating a retreat.
Government officials, especially those with the power that Law Enforcement officers have, should be held to a higher standard, not a lower one.
Submission + - Google's New Compression Tool Uses 75% Less Bandwidth (thenextweb.com)
Submission + - Open Source Codec Encodes Voice Into Only 700 Bits Per Second (rowetel.com)
Obviously there are other uses for recording voice at ultra-low-bandwidth. Many smartphones could record your voice for your entire life using their existing storage. A single IP packet could carry 15 seconds of speech. Ultra-low-bandwidth codecs don't help conventional VoIP, though. The payload size for low-latency voice is only a few bytes, and the packet overhead will be at least 10 times that size.
Submission + - Trump's cyber-guru Giuliani runs ancient, utterly hackable website (theregister.co.uk)
Giulianisecurity.com the website for Giuliani's eponymous infosec consultancy firm, runs Joomla! version 3.0, released in 2012, and since found to carry 15 separate vulnerabilities. More bugs and poor secure controls abound.
Submission + - What to expect from cyber-attacks in 2017 (cso.com.au)
Submission + - Yahoo's billion user breach could represent the new norm in data security
Submission + - User Trust Fail: Google Chrome and the Tech Support Scams (vortex.com)
These scam pages should not require massive AI power for Google to target.
And critically, it’s difficult to understand why Chrome still permits most of these crooked pages to completely lock up the user’s browser — often making it impossible for the user to close the related tab or browser through any means that most users could reasonably be expected to know about.