Feed aggregator
MasterCard-backed biometric ID system launched in Nigeria
Last week, Nigerian President Goodluck Jonathan was one of the first citizens to receive a National eID card, a biometric identification card that will be rolled out to 13 million Nigerians in the near future. Although a handful of countries already use biometric identification systems, Nigeria's will be unique as its pilot program will be branded with MasterCard logos. The program will eventually be expanded to encompass the rest of the country's adult population, and the BBC says that all Nigerians will be required to have such a card by 2019 if they wish to vote in the country's upcoming elections.
As MasterCard stated in a press release, the eID cards come equipped with an EMV chip that allows card carriers to access prepaid financial services backed by Nigeria's local Access Bank and MasterCard. The justification for intertwining identity documentation with financial services from a private company like MasterCard is that many of Nigeria's citizens have never set up a bank account and therefore tend to be excluded from loan qualification.
The Nigerian government says that putting a payment platform on the ID cards will eventually let citizens receive and spend money from government institutions. As MasterCard writes, “Using the card as a payment tool, Nigerians can deposit funds, receive social benefits, save, or engage in many other financial transactions that are facilitated by electronic payments with the extra security assurance that biometric verification provides. They can also pay for goods and services and withdraw cash at millions of merchants and ATMS that accept MasterCard payment cards in Nigeria and in more than 210 countries and territories globally.” MasterCard has a number of similar partnerships with government institutions in countries like Pakistan and Turkey, as well as the city of Toronto. They all use prepaid cards from Mastercard to dole out government funds.
Read 4 remaining paragraphs | Comments
First US appeals court hears argument to shut down NSA database
Six days after the first Snowden leak appeared on the front pages of newspapers worldwide, the American Civil Liberties Union filed a lawsuit to stop the mass surveillance by US intelligence agencies. A New York federal judge ruled against the ACLU in December. Today, ACLU lawyers made a second effort, making their case to a three-judge panel on the US Court of Appeals for the 2nd Circuit. It's the first time a US Appeals Court has considered whether the "bulk telephony" database is constitutional.
Oral arguments stretched on for nearly two hours this morning, an unusually long argument for the US Court of Appeals for the 2nd Circuit, which often gives just 10 or 15 minutes to each side for oral argument in an appeal case. C-SPAN was allowed to record and broadcast the full proceeding, another unusual step in an appeals court that's nearly always closed to cameras. The proceedings can be viewed on C-SPAN's website.
ACLU v. Clapper is one of three cases challenging mass surveillance that are now headed to appeals courts. Another case, Klayman v. Obama, was filed in Washington, DC federal courts just one day after the surveillance revelations. In that case, DC-based US District Judge Richard Leon ruled that the NSA's spying technology was "almost Orwellian" and likely unconstitutional.
Read 29 remaining paragraphs | Comments
VIDEO: No more Latinate plant descriptions
Home Depot investigates potential hacking of credit card data
Home Depot may be the latest victim of retail hackings of customer debit and credit card information.
The suspected breach, first reported on Tuesday by journalist and security researcher Brian Krebs, may involve all 2,200 US stores and has some of the hallmarks of the group that compromised Target, Sally Beauty, and P.F. Chang's, according to Krebs. Home Depot is currently looking into the fraud anomalies and promised to notify customers as soon as it has evidence of a breach.
"At this point, I can confirm that we’re looking into some unusual activity and we are working with our banking partners and law enforcement to investigate," Home Depot spokesman Paula Drake said in a statement to Ars. "Protecting our customers’ information is something we take extremely seriously, and we are aggressively gathering facts at this point while working to protect customers."
Read 4 remaining paragraphs | Comments
VIDEO: Cockatoos teach tool-making tricks
VIDEO: Beslan school siege: Ten years on
VIDEO: The snail farm in my spare bedroom
VIDEO: Apple: Celebrity accounts hacked
VIDEO: Ashya parents freed from prison
VIDEO: Islamic State 'kills US journalist'
VIDEO: Moment Ashya's parents released
Death Valley’s famous moving stones, caught in the act
Mario is just a video game, and rocks don’t have legs. Both of these things are true. Yet, like the Mario ghosts that advance only when your back is turned, there are rocks that we know have been moving—even though no one has ever seen them do it.
The rocks in question occupy a spot called Racetrack Playa in Death Valley. Playas are desert mudflats that sometimes host shallow lakes when enough water is around. Racetrack Playa gets its name from long furrows extending from large rocks sitting on the playa bed—tracks that make it look as if the rocks had been dragged through the mud. The tracks of the various rocks run parallel to each other, sometimes suggesting that the rocks had made sharp turns in unison, like dehydrated synchronize swimmers.
Many potential explanations have been offered up (some going back to the 1940s) for this bizarre situation, as the rocks seem to only move occasionally and had never been caught in the act. One thing everyone could agree on was that it must occur when the playa is wet and the muddy bottom is slick. At first, suggestions revolved around especially strong winds. One geologist went as far as to bring out a propeller airplane to see how much wind it would take.
Read 9 remaining paragraphs | Comments
Apple confirms celebrities’ accounts breached in “highly targeted” attack
An Apple spokesperson has issued a statement on the company’s investigation of the hacking of female celebrities’ cloud accounts and the theft of photos from their accounts. And Apple is, in essence, blaming the victims. Or at least, their security questions and passwords.
“We wanted to provide an update to our investigation into the theft of photos of certain celebrities,” the statement reads. “When we learned of the theft, we were outraged and immediately mobilized Apple’s engineers to discover the source. Our customers’ privacy and security are of utmost importance to us."
Initial reports from security sources suggested that an exploit of a weakness in Apple's "Find My iPhone" API that allowed a brute force password attack. Apple has discounted those reports, and it blames the success of the attacker on what amounts to social engineering of the accounts—by trying to use personal data to guess passwords or answers to security questions for the accounts in question. "After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords, and security questions, a practice that has become all too common on the Internet. None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud® or Find my iPhone. We are continuing to work with law enforcement to help identify the criminals involved.”
Read 1 remaining paragraphs | Comments
Phase change memory lets a single bit act as different logic gates
Phase change materials can switch between two forms depending on how quickly they're cooled. Cool them quickly and you get an amorphous form, which provides significant resistance to the flow of electrons. Cool them slowly and they will allow electrons to flow more readily. Once cooled, these two forms remain stable, locking the differences in conduction in place.
This difference has been exploited to create a type of storage called phase change memory that's as fast as standard RAM but retains its contents between power cycles. So far, phase change memory hasn't been a commercial success. But some researchers are now experimenting with the idea of building processors out of the technology.
The efforts started out with a simple arrangement of resistors and phase change bits that operated like a logic gate, allowing AND, OR, and NOT operations. But a new paper shows that by carefully controlling how the phase change bits are set in the first place, it's possible to have a single bit perform different logic operations, acting as a NOT, NOR, or NAND gate. Regardless of the operation's output, it's stored even if power is shut down.
Read 9 remaining paragraphs | Comments
VIDEO: Escaped Ebola patient recaptured
September 2014 Issue of Linux Journal: HOW-TOs
Judge mulls contempt charges in Microsoft’s e-mail privacy fight with US
A federal judge is mulling whether to hold Microsoft in contempt of court for defying orders to give the US government e-mails stored on an overseas server.
The case is the nation's first testing the Obama administration's position that any company with operations in the US must comply with valid warrants for data, even if the content is stored overseas. The US believes the e-mail on a Microsoft server in Dublin, Ireland is associated with narcotics trafficking.
Microsoft on Tuesday reiterated its position that it was talking with US District Judge Loretta Preska, the judge who sided with the Obama administration on Friday. "We will not be turning over the e-mail," Microsoft said in a statement.
Read 11 remaining paragraphs | Comments
Apple explains why your iOS app keeps getting rejected
If you've ever developed an app for the iPhone or iPad, you've had to deal with Apple's App Store Review Guidelines. The lengthy list of rules encompasses many different areas, and Apple has just published a new page to explain what rules are broken the most often—and what developers can do to avoid rejection.
Apple's graph (which reports app rejections for the week leading up to August 28) shows that "incomplete information" is the most frequent reason for rejection—this includes providing demo account credentials for apps that require an account, failure to adequately explain any special settings needed for evaluation, and failure to provide an accompanying demo video for apps that only work under specific circumstances (when attached to a particular piece of hardware, for example). In short, tell Apple what it needs to know to evaluate your app, because the company isn't going to take extra time to do research if your app isn't self-explanatory.
Bugginess is another big reason for app rejections, as is failure to comply with Apple's Developer Program License Agreement. A fuzzier problem that takes down six percent of apps is a "complex or less than very good" user interface, which could mean that the interface is too cramped or not finger-friendly—Apple provides many UI explainers to developers, and failure to take them into account can get your app thrown out even if it's otherwise useful. The chart above and the page itself explains how to comply to these guidelines as well as the others on the list, though they won't help you much if your app was one of the 42 percent rejected for "other reasons."
Read 1 remaining paragraphs | Comments
OneDrive starting to sync files bigger than 2GB
While Microsoft has increased the amount of free space in its OneDrive cloud storage service and made it cheaper to buy more space, filling the cloud with data has always been a little annoying, since the company's sync apps have been limited to a maximum file size of 2GB. Anything larger won't get synced, and this limitation has provoked no end of complaints and frustration from OneDrive users.
It appears that the restriction is being lifted. Over the weekend, posters on reddit noticed that their large files were being synchronized between local and cloud storage.
Not everyone appears to be able to upload large files, with a Microsoft spokesman saying the company had started rolling out large file support, and that it would have a public announcement on the OneDrive blog at a later date.
Read 2 remaining paragraphs | Comments