Tech Addicts

  • Red Hat and IBM Jointly File Another Amicus Brief In Google v. Oracle, Arguing APIs Are Not Copyrightable

    Monday Red Hat and IBM jointly filed their own amicus brief with the U.S. Supreme Court in the "Google vs. Oracle" case, arguing that APIs cannot be copyrighted. "That simple, yet powerful principle has been a cornerstone of technological and economic growth for over sixty years. When published (as has been common industry practice for over three decades) or lawfully reverse engineered, they have spurred innovation through competition, increased productivity and economic efficiency, and connec...

  • Slate Announces List of The 30 Most Evil Tech Companies

    An anonymous reader quotes Slate: Separating out the meaningful threats from the noise is hard. Is Facebook really the danger to democracy it looks like? Is Uber really worse than the system it replaced? Isn't Amazon's same-day delivery worth it? Which harms are real and which are hypothetical? Has the techlash gotten it right? And which of these companies is really the worst? Which ones might be, well, evil? We don't mean evil in the mustache-twirling, burn-the-world-from-a-secret-lair sense...

  • Microsoft's New Windows Terminal Preview Offers a Retro CRT Screen Effect

    "The release of the Windows Terminal preview v0.8 has arrived!" announces a post on Microsoft's Command Line blog: Search functionality has been added to the Terminal! The default key binding to invoke the search dropdown is {"command": "find", "keys": ["ctrl+shift+f"]}. Feel free to customize this key binding in your profiles.json if you prefer different key presses! The dropdown allows you to search up and down through the buffer as well as with letter case matching. You can search through ...

  • Exploit Fully Breaks SHA-1, Lowers the Attack Bar

    ThreatPost reported on some big research last week: A proof-of-concept attack has been pioneered that "fully and practically" breaks the Secure Hash Algorithm 1 (SHA-1) code-signing encryption, used by legacy computers to sign the certificates that authenticate software downloads and prevent man-in-the-middle tampering. The exploit was developed by Gaëtan Leurent and Thomas Peyrin, academic researchers at Inria France and Nanyang Technological University/Temasek Laboratories in Singapore...

  • Facial Recognition Database With 3 Billion Scraped Images 'Might End Privacy as We Know It'

    One police detective bragged that photos "could be covertly taken with a telephoto lens" then input into Clearview AI's database of more than three billion scraped images to immediately identify suspects. Long-time Slashdot reader v3rgEz writes: For the past year, government transparency non-profits and Open the Government have been digging into how local police departments around the country use facial recognition. The New York Times reports on their latest discovery: That a Peter Thiel-back...