There is an entire industry of add-ons that are designed to keep your cellphone screen from cracking. And yet broken screens are the main reason cellphones fail. But one Japanese researcher may have solved the problem. VOA’s Kevin Enochs reports.
…
All posts by MTechnology
Bitcoin’s Roller-coaster Ride May Get Wilder
What’s a bitcoin worth? Lately nobody knows for sure, but after a wild ride Friday, it’s worth a good deal less than it was Thursday.
After losses over the last few days, the digital currency fell as much as 30 percent overnight in Asia, and the action became so frenzied that the website Coinbase suspended trading. It later made up much of that ground, and slumped 9.5 percent to $14,042 Friday, according to the tracking site CoinDesk.
Experts are warning that bitcoin is a bubble about to burst, but things might get crazier before it does: A lot of people have heard of bitcoin by now, but very few people own it.
“Bubbles burst when the last buyers are in,” said Brett Ewing, chief market strategist for First Franklin. “Who are the last buyers? The general public, unfortunately.”
1,000 people own 40 percent
Ewing said 40 percent of bitcoin belongs to just 1,000 people, and hedge funds and other major investors are going to start buying it soon. But those funds may buy bitcoin and also protect themselves by placing bets that it will fall. Retail investors may just buy it only to see it fall.
“I think investors should approach it with caution and I think many people will dive into it not understanding what it is,” he said.
As bitcoin skyrocketed this month, the volume of trading was unprecedented as investors hoping to catch a ride up piled in. Prices have risen so fast, the fall on Friday returned the price of bitcoin only to where it was trading two weeks ago.
From tea to blockchain overnight
The volatility has created a circuslike atmosphere. Some companies that have added the word “bitcoin” or related terms to their names to get in on the action. The craziest thing is, it’s worked.
Long Island Iced Tea Corp. until this week had been known for its peach-, raspberry-, guava-, lemon- and mango-flavored drinks. Then, on Thursday, the company announced a radical rebranding. It’s changing its name to Long Blockchain Corp., shifting its primary focus from iced tea to “the exploration of and investment in opportunities that leverage the benefits of blockchain technology.”
Blockchain is a ledger where transactions of digital currencies, like bitcoin, are recorded.
Shares in Long Island Iced Tea soared 200 percent in one day.
The Hicksville, New York, company did what investors are doing, hitching a ride on a currency that raced from less than $10,000 at the end of November to almost $20,000 on Sunday. And it cost less than $1,000 at the beginning of the year.
Crash every three months
The rise of price of bitcoin, which is still difficult to use if you actually want to buy something, has led to heated speculation about when the bubble might burst.
The currency has been, if nothing else, highly elastic, bouncing back every time it crashes, which occurs about once every quarter.
It fell 11.5 percent over two days in early December and 21.5 percent over five days in November.
Curiosity has now driven bitcoin to the futures market, where investors bet on which direction it will go.
Bitcoin futures started trading on two major exchanges, the Cboe and CME, this month. Those futures fell about 8 percent Friday.
Investor beware
If people get burned, it won’t be because they were not warned.
The Securities and Exchange Commission put out a statement last week warning investors to be careful with bitcoin and other digital currencies. The Commodities Futures Trading Commission has proposed regulating bitcoin like a commodity, similar to gold or oil.
Financial Industry Regulatory Authority, a financial watchdog, issued a similar warning recently.
…
Rocket’s Arc Across California Sky Stops Traffic
A reused SpaceX rocket carried 10 satellites into orbit from California on Friday, leaving behind a trail of mystery and wonder as it soared into space.
The Falcon 9 booster lifted off from coastal Vandenberg Air Force Base, carrying the latest batch of satellites for Iridium Communications.
The launch in the setting sun created a shining, billowing streak that was widely seen throughout Southern California and as far away as Phoenix.
Calls came in to TV stations as far afield as San Diego, more than 200 miles south of the launch site.
Cars stopped on freeways in Los Angeles so drivers and passengers could take pictures and video.
The Los Angeles Fire Department issued an advisory that the “mysterious light in the sky” was from the rocket launch.
Jimmy Golen, a sports writer for The Associated Press in Boston who was in Southern California for the holidays, said he and other tourists saw the long, glowing contrail while touring Warner Bros. studio in the Los Angeles suburb of Burbank.
“People were wondering if it had something to do with movies, or TV or a UFO,” he said. “It was very cool.”
The same rocket carried Iridium satellites into orbit in June. That time, the first stage landed on a floating platform in the Pacific Ocean. This time, the rocket was allowed to plunge into the sea.
It was the 18th and final launch of 2017 for SpaceX, which has contracted to replace Iridium’s system with 75 updated satellites. SpaceX has made four launches and expects to make several more to complete the job by mid-2018.
The satellites also carry payloads for global real-time aircraft tracking and a ship-tracking service.
…
Researchers Date Parts of Jesus’ Tomb to Time of Constantine
Over the next month, Christians of all kinds will celebrate the birth of Jesus. The world has been wondering about the reality of his existence, his life, death, and the question of his divinity for thousands of years. But the place considered to be his tomb has been dated to the time he is believed to have walked the earth. VOA’s Kevin Enochs reports.
…
Lawsuit: Apple Slowed iPhones, Forcing Owners to Buy New Ones
IPhone owners from several states sued Apple Inc. for not disclosing sooner that it issued software updates deliberately slowing older-model phones so aging batteries lasted longer, saying Apple’s silence led them to wrongly conclude that their only option was to buy newer, pricier iPhones.
The allegations were in a lawsuit filed Thursday in Chicago federal court on behalf of five iPhone owners from Illinois, Ohio, Indiana and North Carolina, all of whom say they never would have bought new iPhones had Apple told them that simply replacing the batteries would have sped up their old ones. The suit alleges Apple violated consumer fraud laws.
A similar lawsuit was filed Thursday in Los Angeles. Both suits came a day after Apple confirmed what high-tech sleuths outside the company already observed: The company had deployed software to slow some phones. Apple said it was intended as a fix to deal with degraded lithium-ion batteries that could otherwise suddenly die.
“Our goal is to deliver the best experience for customers, which includes overall performance and prolonging the life of their devices,” an Apple statement said. It said it released the fix for iPhone 6, iPhone 6s and iPhone SE and later extended it to iPhone 7. Apple didn’t respond to a message Friday seeking comment.
The Chicago lawsuit suggests Apple’s motive may have been sinister, though it offers no evidence in the filing.
“Apple’s decision to purposefully … throttle down these devices,” it says, “was undertaken to fraudulently induce consumers to purchase the latest” iPhone.
Plaintiff Kirk Pedelty, of North Carolina, contacted Apple as his frustration grew. However, the lawsuit says: “Nobody from Apple customer support suggested that he replace his battery to improve the performance of his iPhone. … Frustrated by slowdowns and intermittent shutdowns of his iPhone 7, Pedelty purchased an iPhone 8.”
The lawsuit seeks class-action status to represent thousands of iPhone owners nationwide.
Creative Strategies analyst Carolina Milanesi said she believes the tech giant was seeking to help consumers extend the lives of the older phones — though it would have been better to disclose what it was doing and why right away.
“Even if you are trying to do something good for your customers, it is going to be perceived as you are sneaking around behind their backs if you don’t tell them about it first,” she said.
…
Russian Hackers Targeted More Than 200 Journalists Globally
Russian television anchor Pavel Lobkov was in the studio getting ready for his show when jarring news flashed across his phone: Some of his most intimate messages had just been published to the web.
Days earlier, the veteran journalist had come out live on air as HIV-positive, a taboo-breaking revelation that drew responses from hundreds of Russians fighting their own lonely struggles with the virus. Now he’d been hacked.
“These were very personal messages,” Lobkov said in a recent interview, describing a frantic call to his lawyer in an abortive effort to stop the spread of nearly 300 pages of Facebook correspondence, including sexually explicit messages. Even two years later, he said, “it’s a very traumatic story.”
The Associated Press found that Lobkov was targeted by the hacking group known as Fancy Bear in March 2015, nine months before his messages were leaked. He was one of at least 200 journalists, publishers and bloggers targeted by the group as early as mid-2014 and as recently as a few months ago.
The AP identified journalists as the third-largest group on a hacking hit list obtained from cybersecurity firm Secureworks, after diplomatic personnel and U.S. Democrats. About 50 of the journalists worked at The New York Times. Another 50 were either foreign correspondents based in Moscow or Russian reporters like Lobkov who worked for independent news outlets. Others were prominent media figures in Ukraine, Moldova, the Baltics or Washington.
The list of journalists provides new evidence for the U.S. intelligence community’s conclusion that Fancy Bear acted on behalf of the Russian government when it intervened in the U.S. presidential election. Spy agencies say the hackers were working to help Republican Donald Trump. The Russian government has denied interfering in the American election.
Previous AP reporting has shown how Fancy Bear — which Secureworks nicknamed Iron Twilight — used phishing emails to try to compromise Russian opposition leaders, Ukrainian politicians and U.S. intelligence figures, along with Hillary Clinton campaign chairman John Podesta and more than 130 other Democrats.
Lobkov, 50, said he saw hacks like the one that turned his day upside-down in December 2015 as dress rehearsals for the email leaks that struck the Democrats in the United States the following year.
“I think the hackers in the service of the Fatherland were long getting their training on our lot before venturing outside.”
‘Classic KGB tactic’
New Yorker writer Masha Gessen said it was also in 2015 — when Secureworks first detected attempts to break into her Gmail — that she began noticing people who seemed to materialize next to her in public places in New York and speak loudly in Russian into their phones, as if trying to be overheard. She said this only happened when she put appointments into the online calendar linked to her Google account.
Gessen, the author of a book about Russian President Vladimir Putin’s rise to power, said she saw the incidents as threats.
“It was really obvious,” she said. “It was a classic KGB intimidation tactic.”
Other U.S.-based journalists targeted include Josh Rogin, a Washington Post columnist, and Shane Harris, who was covering the intelligence community for The Daily Beast in 2015. Harris said he dodged the phishing attempt, forwarding the email to a source in the security industry who told him almost immediately that Fancy Bear was involved.
In Russia, the majority of journalists targeted by the hackers worked for independent news outlets like Novaya Gazeta or Vedomosti, though a few — such as Tina Kandelaki and Ksenia Sobchak — are more mainstream. Sobchak has even launched an improbable bid for the Russian presidency.
Investigative reporter Roman Shleynov noted that the Gmail hackers targeted was the one he used while working on the Panama Papers, the expose of international tax avoidance that implicated members of Putin’s inner circle.
Fancy Bear also pursued more than 30 media targets in Ukraine, including many journalists at the Kyiv Post and others who have reported from the front lines of the Russia-backed war in the country’s east.
Nataliya Gumenyuk, co-founder of Ukrainian internet news site Hromadske, said the hackers were hunting for compromising information.
“The idea was to discredit the independent Ukrainian voices,” she said.
The hackers also tried to break into the personal Gmail account of Ellen Barry, The New York Times’ former Moscow bureau chief.
Her newspaper appears to have been a favorite target. Fancy Bear sent phishing emails to roughly 50 of Barry’s colleagues at The Times in late 2014, according to two people familiar with the matter. They spoke on condition of anonymity to discuss confidential data.
The Times confirmed in a brief statement that its employees received the malicious messages, but the newspaper declined to comment further.
Some journalists saw their presence on the hackers’ hit list as vindication. Among them were CNN security analyst Michael Weiss and Brookings Institution visiting fellow Jamie Kirchick, who took the news as a badge of honor.
“I’m very proud to hear that,” Kirchick said.
The Committee to Protect Journalists said the wide net cast by Fancy Bear underscores efforts by governments worldwide to use hacking against journalists.
“It’s about gaining access to sources and intimidating those journalists,” said Courtney C. Radsch, the group’s advocacy director.
In Russia, the stakes are particularly high. The committee has counted 38 murders of journalists there since 1992.
Many journalists told the AP they knew they were under threat, explaining that they had added a second layer of password protection to their emails and only chatted over encrypted messaging apps like Telegram, WhatsApp or Signal.
Fancy Bear target Ekaterina Vinokurova, who works for regional media outlet Znak, said she routinely deletes her emails.
“I understand that my accounts may be hacked at any time,” she said in a telephone interview. “I’m ready for them.”
‘I’ve seen what they could do’
It’s not just whom the hackers tried to spy on that points to the Russian government.
It’s when.
Maria Titizian, an Armenian journalist, immediately found significance in the date she was targeted: June 26, 2015.
“It was Electric Yerevan,” she said, referring to protests over rising energy bills that she reported on. The protests that rocked Armenia’s capital that summer were initially seen by some in Moscow as a threat to Russian influence.
Titizian said her outspoken criticism of the Kremlin’s “colonial attitude” toward Armenia could have made her a target.
Eliot Higgins, whose open source journalism site Bellingcat repeatedly crops up on the target list, said the phishing attempts seemed to begin “once we started really making strong statements about MH17,” the Malaysian airliner shot out of the sky over eastern Ukraine in 2014, killing 298 people. Bellingcat played a key role in marshaling the evidence that the plane was destroyed by a Russian missile — Moscow’s denials notwithstanding.
The clearest timing for a hacking attempt may have been that of Adrian Chen.
On June 2, 2015, Chen published a prescient expose of the Internet Research Agency, the Russian “troll factory” that won fresh infamy in October over revelations that it had manufactured make-believe Americans to pollute social media with toxic rhetoric.
Eight days after Chen published his big story, Fancy Bear tried to break into his account.
Chen, who has regularly written about the darker recesses of the internet, said having a lifetime of private messages exposed to the internet could be devastating.
“I’ve covered a lot of these leaks,” he said. “I’ve seen what they could do.”
…
Is That Toy Spying on You?
The toys your kids unwrap this Christmas could invite hackers into your home.
That Grinch-like warning comes from the FBI, which said earlier this year that toys connected to the internet could be a target for crooks who may listen in on conversations or use them to steal a child’s personal information.
The bureau did not name any specific toys or brands, but it said any internet-connected toys with microphones, cameras or location tracking might put a child’s privacy or safety at risk. That could be a talking doll or a tablet designed for kids. And because some of the toys are being rushed to be made and sold, the FBI said, security safeguards might be overlooked.
Security experts say the only way to prevent a hack is to not keep the toy. But if you decide to let a kid play with it, there are ways to reduce the risks:
Do your research
Before opening a toy, search for it online and read reviews to see whether there are any complaints or past security problems. If there have been previous issues, you may want to rethink keeping it.
Reputable companies will also explain how information is collected from the toy or device, how the data are stored and who has access to the data. Usually that type of information is found on the company’s website, typically under its privacy policy. If you can’t find it, call the company. If there isn’t a policy, that’s a bad sign.
“You shouldn’t use it,” said Behnam Dayanim, a partner at the Paul Hastings law office in Washington and co-chair of its privacy and cybersecurity practice.
Companies can change their privacy policies, so read them again if you’re notified of a change.
Use secure Wi-Fi
Make sure the Wi-Fi the toy will be connected to is secure and has a hard-to-guess password. Weak passwords make it easier for hackers to access devices that use the network. Never connect the toy to free Wi-Fi that’s open to the public. And if the toy itself allows you to create a password, do it.
Power it off
When the toy is not being used, shut it off or unplug it so it stops collecting data.
“They become less of an attractive target,” said Alan Brill, who is a cybersecurity and investigations managing director at consulting firm Kroll in Secaucus, New Jersey.
If the item has a camera, face it toward a wall or cover it with a piece of tape when it’s not being used. Toys with microphones can be thrown in a chest or drawer where it’s harder to hear conversations, Brill said.
Register, but don’t give away info
A software update may fix security holes, and you don’t want to miss that fix, Brill said.
But when registering, be stingy with the information you hand over; all they need is contact information to let you know about the update. If they require other information, such as a child’s birthday, make one up. “You’re not under oath,” said Brill. “You can lie.”
Be vigilant
If the toy or device allows kids to chat with other people playing with the same toy or game, explain to children that they can’t give out personal information, said Liz Brown, a business law professor at Bentley University in Waltham, Massachusetts, who focuses on technology and privacy law.
Discussions are not enough; check the chat section to make sure children aren’t sending things they shouldn’t be, Brown said. People could be pretending to be kids to get personal information. “It can get creepy pretty fast,” said Brown.
Reputable companies that make toys with microphones will offer ways for parents to review and delete stored information. Take advantage of that.
Report breaches
If a toy was compromised by a hacker, the FBI recommends reporting it online through its internet crime complaint center at IC3.gov.
…
Smart Traffic Lights Coming to US Cities
If you are a driver you know how frustrating it feels when traffic lights seem to make traffic worse. According to a recent study done at Texas A&M University, each year average Americans spend 38 hours sitting in traffic jams. But scientists who study traffic patterns say the situation can be improved with smart stop lights. VOA’s George Putic talked with one of them.
…
A Shoe James Bond Would Be Proud Of
For every person who just loves James Bond, it’s the perfect gift. A very nice, stylish pair of shoes, that just happen to be full of high-tech hidden compartments. VOA’s Kevin Enochs reports.
…
EU Court Rules Uber Should be Regulated Like Taxi Service
The European Court of Justice ruled Wednesday that ride-hailing company Uber should be regulated like a taxi service instead of a technology firm, a decision that limits its business operations in Europe.
The decision was handed down in response to a complaint from a Barcelona taxi drivers association, which tried to prevent Uber from expanding into the Spanish city. The drivers maintained that Uber drivers should be subject to authorizations and license requirements and accused the company of engaging in unfair competition.
The San Francisco-based Uber contends it should be regulated as an information services provider because it is based on a mobile application that links passengers to drivers.
The European Union’s highest court said services provided by Uber and similar companies are “inherently linked to a transport service” and therefore must be classified as “a service in the field of transport” under EU law.
The decision will impact ride-hailing companies in the 28-nation EU, where national governments can now regulate them as transportation services.
Uber attempted to downplay the decision, saying it only affects its operations in four countries and that it will move forward with plans to expand in Europe. But the company was previously forced to abandon its peer-to-peer service in several EU countries that connect freelance drivers with riders.
…
Facebook to Notify Users When Photos of Them Are Uploaded
Facebook Inc said on Tuesday it would begin using facial recognition technology to tell people on the social network when others upload photos of
them, if they agree to let the company keep a facial template on file.
The company said in a statement it was making the feature optional to allow people to protect their privacy, but that it thought some people would want to be notified of pictures they might not otherwise know about.
The feature would not immediately be available in Canada and the European Union, Facebook said. Privacy laws are generally stricter in those jurisdictions, though the company said it was hopeful about implementing the feature there in the future.
Tech companies are putting in place a variety of functions using facial recognition technology, despite fears about how the facial data could be used. In September, Apple Inc revealed that users of its new iPhone X would be able to unlock the device using their face.
Facial recognition technology has been a part of Facebook since at least 2010, when the social network began offering suggestions for whom to tag in a photo. That feature also is optional.
For those who have opted in, Facebook creates what it calls a template of a person’s face by analyzing pixels from photos where the person is already tagged. It then compares newly uploaded images to the template.
Facebook deletes the template of anyone who then opts out, Rob Sherman, Facebook’s deputy chief privacy officer, said in a statement.
Under the new feature, people who have opted in would get a notification from Facebook if a photo of them has been uploaded, although only if the photo is one they have access to.
The company plans to add an “on/off” switch to allow users to control all Facebook features related to facial recognition, Sherman said. “We thought it was important to have a really straightforward way of controlling facial recognition technology,” he said.
Facebook said it also plans to use facial recognition technology to notify users if someone else uploads a photo of them as their profile picture, which the company said may help reduce impersonations, as well as in software that describes photos in words for people who have vision loss, so that they
can tell who is in a photo.
Reporting by David Ingram; Editing by Leslie Adler.
…
Meet CryptoKitties, Digital Kittens on the Blockchain
CryptoKitties, an online game and marketplace featuring virtual kittens, has become an entry point for curious outsiders looking to dabble in cryptocurrencies – decentralized digital monies that rely on blockchain technology to enable peer-to-peer transactions.
…
US Blames North Korea for Global Cyber Attack
The United States is publicly blaming North Korea for unleashing a cyber attack that crippled hospitals, banks and other companies across the globe earlier this year.
In an op-ed piece posted on the Wall Street Journal website Monday night, Homeland Security Adviser Tom Bossert said that North Korea was “directly responsible” for the WannaCry ransomware attack, and that Pyongyang will be held accountable for it.
“The attack was widespread and cost billions, and North Korea is directly responsible,” Bossert writes. “North Korea has acted especially badly, largely unchecked, for more than a decade, and its malicious behavior is growing more egregious.”
Bossert says President Donald Trump’s administration will continue to use its “maximum pressure strategy to curb Pyongyang’s ability to mount attacks, cyber or otherwise.”
Pyongyang has previously denied being responsible for the attack.
But, the U.S. government has assessed with a “very high level of confidence” that a hacking entity known as Lazarus Group, which works on behalf of the North Korean government, carried out the WannaCry attack, senior officials told Reuters.
…
Facebook Reveals Data on Copyright and Trademark Complaints
Facebook announced Monday that it removed nearly 3 million posts, including videos, ads and other forms of content, from its services during the first half of 2017 following complaints of counterfeiting and copyright and trademark infringement.
The worldwide data on intellectual property-related takedowns is a new disclosure for Facebook as part of its biannual “Transparency Report,” Chris Sonderby, a deputy general counsel at the firm, said in a blog post.
“We believe that sharing information about (intellectual property) reports we receive from rights holders is an important step toward being more open and clear about how we protect the people and businesses that use our services,” Sonderby wrote.
Transparency report
The ninth Facebook transparency report also showed that government requests for information about users increased 21 percent worldwide compared with the second half of 2016, from 64,279 to 78,890.
For intellectual property disputes, Facebook offers monitoring tools that alert rights holders to suspected copies of their videos and songs on Facebook and use of their brand.
Rights holders can send takedown requests for unauthorized uses to a team of Facebook content analysts.
Entertainment and media industry groups have long expressed frustration with the process, contending that they bear too much of the internet policing burden and that online services should be more proactive about stemming infringement.
377,400 complaints
Facebook did not supply data about earlier periods or release individual requests, a level of detail that advertising rival Alphabet Inc provides for requests to remove Google search results.
Aggregate data shows Facebook received about 377,400 complaints from January through June, with many referencing multiple posts. About 60 percent of the reports related to suspected copyright violations on Facebook.
A “small fraction” of requests were excluded because they were not sent through an official form, Facebook said.
The company removed user uploads in response to 81 percent of filings for counterfeiting, 68 percent for copyrights and 47 percent for trademarks, according to its report. The percentages were roughly similar for Instagram.
…
Twitter to Put Warnings Before Swastikas, Other Hate Images
Twitter Inc said on Monday it would begin putting a warning in front of pictures that show Nazi swastikas and other items it determines are hateful imagery, as well as ban their use in any profile photos on the social media network.
The step is one of several that Twitter said it would take to crack down on white nationalists and other violent or hateful groups, which have become unwelcome on a service that once took an absolutist view of free speech.
It said it would also remove tweets that it determined celebrate violence or glorify people who commit violence.
Twitter, a San Francisco company founded in 2006, had called itself “the free speech wing of the free speech party” and tried to stay out of battles among users. But that has changed as persistent harassers have driven some women and minorities off Twitter, limiting their ability to express themselves.
A rise in white nationalism in the United States has also changed tech industry standards. In August, social media networks began removing white nationalists after hundreds gathered in Charlottesville, Virginia, and one of them was charged with murdering a 32-year-old woman by running her down in a car.
In October, Twitter vowed to toughen rules on online sexual harassment, bullying and other forms of misconduct.
It said it would also remove tweets that it determined celebrate violence or glorify people who commit violence.
Twitter, a San Francisco company founded in 2006, had called itself “the free speech wing of the free speech party” and tried to stay out of battles among users. But that has changed as persistent harassers have driven some women and minorities off Twitter, limiting their ability to express themselves.
A rise in white nationalism in the United States has also changed tech industry standards. In August, social media networks began removing white nationalists after hundreds gathered in Charlottesville, Virginia, and one of them was charged with murdering a 32-year-old woman by running her down in a car.
In October, Twitter vowed to toughen rules on online sexual harassment, bullying and other forms of misconduct.
Internet Giants Told: Accept Cyber Curbs to Be Welcome in China
Google and Facebook will have to accept China’s censorship and tough online laws if they want access to its 751 million internet users, Chinese regulators told a conference in Geneva on Monday.
Google and Facebook are blocked in China, along with Twitter Inc and most major Western news outlets.
“That’s a question maybe in many people’s minds, why Google, why Facebook are not yet working and operating in China,” said Qi Xiaoxia, director general of the Bureau of International Cooperation at the Cyberspace Administration of China (CAC). In Google’s case, it left China of its own accord in 2010.
“If they want to come back, we welcome,” Qi told the Internet Governance Forum at the U.N.’s European headquarters.
“The condition is that they have to abide by Chinese law and regulations. That is the bottom line. And also that they would not do any harm to Chinese national security and national consumers’ interests.”
China’s Communist Party has tightened cyber regulation in the past year, formalizing new rules that require firms to store data locally and censor tools that allow users to subvert the Great Firewall that blocks sites including Facebook and Google.
Their rival Apple operates subject to strict censorship, having removed dozens of popular messaging and virtual private network (VPN) apps from its China App Store this year to comply with government requests.
In June, China introduced a new national cybersecurity law that requires foreign firms to store data locally and submit to data surveillance measures.
“We are of the idea that cyberspace is not a space that is ungoverned. We need to administer, or supervise, or manage, the internet according to law,” Qi said.
“Can you guess the number of websites in China? We have five million websites. That means that the Chinese people’s rights of speech and rights of expression are fully ensured.”
It was not clear what her figure of five million was based on. According to the website internetlivestats.com, there are 1.3 billion websites on the World Wide Web, defining a website as a unique hostname which can be resolved, using a name server, into an IP address.
Reporting by Tom Miles, additional reporting by Cate Cadell in Beijing, Editing by William Maclean.
…
Families Field Test Autonomous Vehicles
It’s all fun and games until a family gets behind the wheel. That’s the whole idea behind Volvo’s Drive Me project. Automated vehicles are now being test driven by families as part of a multi-stage experiment that’s taking place in Norway. VOA’s Steve Redisch reports.
…
New Kind of Retirement Community: A Little India in Silicon Valley
With people coming from around the world to work in Silicon Valley, some struggle with the best ways to care for their aging parents.
Increasingly, the solution is an “affinity” retirement community, where older people from places like India and China can live near — but not with — their adult children. These communities break from traditional custom that parents and children live together.
“The children are so busy these days, they are all the time working, taking care of their kids, so we do not want to interfere in their lives,” said Asha RaoRane, an Indian national who wanted to move to the U.S. to be near her three daughters who had immigrated to San Francisco.
Her daughters started exploring the idea of a traditional senior retirement community, but were having trouble finding an American community they thought their mother would fit into.
In July, RaoRane, 70, moved into Priya Living, an affinity-living community, meaning it caters to people with similar interests, such as yoga and meditation.
Arun Paul founded Priya Living as a place for his parents to live. The couple moved from Los Angeles four years ago and are still in a ground floor apartment.
“In living here in America, as the son of immigrants, I’ve realized that there’s very unique needs that immigrants have,” said Paul, a real-estate developer.
“That old system was based on a different time when women were in the house, really taking care, in many cultures, of their husband’s parents,” Paul said. “Obviously the role of women in society has changed globally.”
New friends
For Bhagyashree RaoRane, 38, finding Priya Living for her mother has been a dream come true.
“We walked in and instantly it was like walking into an Indian community in India,” said RaoRane, a filmmaker. “Even the building is painted the same color as so many of the buildings in India are painted.”
This type of independent senior community came as a shock to Nagendra Prasad, 62, and Manjula Neelakantaiah, 53, who came to Priya on a two-month visit from Bangalore, India, to see their daughter, an intern at Google.
“Really, in the beginning we were surprised,” Neelakantaiah said. “In India the younger people, they definitely take care of the aged people.”
Not always a good fit
For a few residents, Priya is not the perfect fit. Dr. Byravan Viswanathan and his wife, Lakshmi, were born and raised in India but spent much of their adult lives in a small town in Pennsylvania.
“We had oodles and oodles of good friends and they were not Indians — regular Americans,” he said. “We had become so Westernized, we have to adapt to Indian living again. Look around. There are six different Indian languages spoken right now at this table, languages I have never spoken or haven’t spoken in decades.” Viswanathan’s daughter is looking into finding a more American community for them.
All are welcome
While the vast majority of residents are from India, Paul stressed that Priya Living welcomes people of all backgrounds. There are a few non-Indians who call Priya home.
Carlos McCann, an 89-year-old WW II veteran, has been living in the complex for almost 20 years, long before it was purchased and remodeled to become the primarily Indian community.
“Everything has sort of come together at this location it’s like it’s the center of the world,” he said.
…
Indian Retirees Maintain Independence, Fun and Freedom Later in Life
Young people come from around the world to work in Silicon Valley, California. As these workers build a life away from home, many struggle with how to bring their aging parents to their new community. But what happens to foreign parents entering their later years in a new country? VOA’s Deana Mitchell visits a unique community in Silicon Valley that caters to retirees from India.
…
Facebook Highlights Dangers of Using Facebook
With nearly 2 billion users, Facebook’s survival depends on people continuing to use its service.
That’s why observers were surprised by an unusual company blog post Friday that highlighted some of the potential harm of using the social media service.
Titled Hard Questions: Is Spending Time on Social Media Bad for Us?,
the company cited studies that suggested some of the possible downsides of using social media.
In one study, people who passively read about others’ lives reported feeling worse about themselves. One possibility is “negative social comparison” when reading about others online, the company said, because “people’s posts are often more curated and flattering” than how they are in their real, offline lives.
But there’s a potential solution, according to Facebook, which reported $10 billion in revenue — its highest ever — in the last quarter: Don’t be a bystander to others’ lives. Use Facebook more and with friends and family.
Facebook users who spend more time on Facebook — actually post and interact with close friends — experienced more positive effects, according to a company study conducted with Carnegie Mellon University.
“Simply broadcasting status updates wasn’t enough,” the post said. “People had to interact one-on-one with others in their network.”
New features
The Facebook post came as some former top executives have spoken about Facebook’s potential negative effects on society and individuals. Facebook exploits a “vulnerability in human psychology,” Sean Parker, Facebook’s founding president, said recently.
To aid in supporting people’s well-being while using its service, the company recently tweaked its News Feed — what people see when they sign on — to promote friendships and demote what the firm called “clickbait headlines.”
Also, it launched a new feature called “Snooze” that lets a user hide a person, Facebook page or group for 30 days without having to “unfollow.” It gives a Facebook user more control of what he or she sees, the company said.
Effects on kids
The company acknowledged that people are worried about the short- and long-term effects of Facebook use on young people. It pledged $1 million toward research to “better understand the relationship between media technologies, youth development and well-being.”
Observers praised the company for acknowledging that using social media may have unintended, negative consequences, but noted that it was unusual for a corporation, one that typically presents itself as a force for good, to point out some of the risks of using its service.
One unanswered question is whether Facebook with new features and tweaks can offset potential negative effects.
Or will people put a Snooze button on Facebook?
…
US Prosecutors Move to Cash in on $8.5M in Seized Bitcoin
U.S. attorneys in Utah prosecuting a multimillion-dollar opioid drug-ring are moving quickly to sell seized bitcoin that’s exploded in value to about $8.5 million since the alleged ringleader’s arrest a year ago.
The U.S. Attorney’s Office for Utah cites the digital currency’s volatility in court documents pressing for the sale. The bitcoin cache was worth less than $500,000 when Aaron Shamo was arrested on drug charges, but the value of the digital currency has skyrocketed since then.
Bitcoin was created as a digital alternative to the traditional banking system, and is prone to swings in value based on what people believe its worth.
For federal prosecutors in Utah, sales of seized assets like cars are routine, but bitcoin is new territory, spokeswoman Melodie Rydalch said Thursday.
Shamo is accused of selling pills containing the powerful opioid fentanyl on the dark web — an area of the internet often used for illegal activity — to thousands of people all over the U.S., at one point raking in $2.8 million in less than a year.
The 500,000-pill bust ranked among the largest of its kind in the country, and authorities also found $1 million of cash stuffed into trash bags.
Shamo has pleaded not guilty to a dozen charges.
The proceeds of the bitcoin sale will be held until the case is resolved, and then decisions will be made about where the money goes, Rydalch said. Seized asset sale proceeds usually goes to the agency that investigated, like the Drug Enforcement Administration.
Defense attorney Greg Skordas is not contesting the sale of his client’s bitcoins.
Although there’s no global consensus over the status of bitcoin — debate rages whether the virtual money is an asset or a currency — that hasn’t stopped officials in the U.S. and elsewhere from cashing in on the digital hauls seized from cybercriminals.
In 2014 the U.S. Marshals Service announced the auction of nearly 30,000 bitcoins seized from notorious dark web drug marketplace Silk Road. Other seizures have since netted the American government millions of dollars in a series of sales.
Other governments — from Australia to South Korea — have set up similar auctions over the years.
Associated Press writer Raphael Satter in London contributed to this report.
…
German Government Says It Backs ‘Open and Free Internet’
The German government says it backs an “open and free internet” following the U.S. decision to repeal net neutrality rules.
A spokeswoman for the Economy Ministry said Friday that Germany had “taken note” of the U.S. move but declined to comment directly on it.
However, spokeswoman Beate Baron said the German government supports rules introduced across the European Union last year forbidding discriminatory access to the internet.
Baron told reporters in Berlin that “an open and free internet is indispensable for the successful development of a digital society that everyone wants to take part in.”
The Republican-controlled U.S. Federal Communications Commission on Thursday repealed Obama-era rules requiring all web traffic to be treated equally.
…
Scientists Working on Writing Five-day Forecast for Solar Storms
Charged particles from the sun are responsible for the brilliant auroras at the earth’s poles. But there can be cases of too much of a good thing. When huge solar storms push massive waves of energized particles into Earth’s path, they can wreak havoc on our satellites and electric grid. That is why researchers are trying to figure out what causes solar storms. VOA’s Kevin Enochs reports.
…
What Is Net Neutrality?
“Net neutrality” regulations, designed to prevent internet service providers like Verizon, AT&T, Comcast and Charter from favoring some sites and apps over others, have been repealed. On Thursday, the Federal Communications Commission voted to dismantle Obama-era rules that have been in place since 2015, but will forbid states to put anything similar in place.
Here’s a look at what the developments mean for consumers and companies.
What is net neutrality?
Net neutrality is the principle that internet providers treat all web traffic equally, and it’s pretty much how the internet has worked since its creation. But regulators, consumer advocates and internet companies were concerned about what broadband companies could do with their power as the pathway to the internet — blocking or slowing down apps that rival their own services, for example.
What did the governments do about it?
The FCC in 2015 approved rules, on a party-line vote, that made sure cable and phone companies don’t manipulate traffic. With them in place, a provider such as Comcast can’t charge Netflix for a faster path to its customers, or block it or slow it down.
The net neutrality rules gave the FCC power to go after companies for business practices that weren’t explicitly banned as well. For example, the Obama FCC said that “zero rating” practices by AT&T violated net neutrality. The telecom giant exempted its own video app from cellphone data caps, which would save some consumers money, and said video rivals could pay for the same treatment. Pai’s FCC spiked the effort to go after AT&T, even before it began rolling out a plan to undo the net neutrality rules entirely.
A federal appeals court upheld the rules in 2016 after broadband providers sued.
The telcos
Big telecom companies hated net neutrality’s stricter regulation and have fought them fiercely in court. They said the regulations could undermine investment in broadband and introduced uncertainty about what were acceptable business practices. There were concerns about potential price regulation, even though the FCC had said it won’t set prices for consumer internet service.
Silicon Valley
Internet companies such as Google have strongly backed net neutrality, but many tech firms were more muted in their activism this year. Netflix, which had been vocal in support of the rules in 2015, said in January that weaker net neutrality wouldn’t hurt it because it’s now too popular with users for broadband providers to interfere.
What happens next
With the rules repealed, net-neutrality advocates say it will be harder for the government to crack down on internet providers who act against consumer interests and will harm innovation in the long-run. Those who criticize the rules say the repeal is good for investment in broadband networks.
But advocates aren’t sitting still. Some groups plan lawsuits to challenge the FCC’s move, and Democrats — energized by public protests in support of net neutrality — think it might be a winning political issue for them in 2018 congressional elections.
…