All posts in Technology

Twitter Makes Its I.P.O. Plans Known

Twitter has taken the cover off its initial public offering, making public its prospectus and setting the clock on one of the most anticipated stock sales of the year, Vindu Goel and Michael J. de la Merced report.

Twitter’s prospectus — whose filing was initially disclosed in a 135-character post on its own service last month — offers the fullest look yet at the privately held company. But while its growth is as high as had been anticipated in some ways, the document reflects a company that is still relatively small compared to its rivals.

Based on an internal valuation of its shares from Aug. 5, Twitter is worth about $9.7 billion.

Google Alters Search Algorithm to Handle More Complex Queries

Google on Thursday announced one of the biggest changes ever to its search engine, a rewriting of its algorithm to handle more complex queries that affects 90 percent of all searches.

The change represents a new approach to search for Google and required the biggest changes to the company’s search algorithm since 2000. Now, the world’s most popular search engine will focus more on trying to understand the meanings of things and the relationships among them, as opposed to the company’s original strategy of matching keywords.

The company made the changes, executives said, because Google users are asking increasingly long and complex questions and they are searching Google more often on mobile phones with voice search.

Google’s Gmail Keyword Scanning Might Violate Wiretap Law, Judge Finds

A federal judge today found that Google may have breached federal and California wiretapping laws for machine-scanning Gmail messages as part of its business model to create user profiles and provide targeted advertising.

The decision by U.S. District Judge Lucy Koh was rendered in a proposed class-action alleging Google wiretaps Gmail as part of its business model. Google sought to have the federal case in California dismissed under a section of the Wiretap Act that authorizes email providers to intercept messages if the interception facilitated the message’s delivery or was incidental to the functioning of the service in general.

Google Begs Court to Reconsider Ruling That Wi-Fi Sniffing Is Wiretapping

Google is asking a federal appeals court to reconsider a recent ruling finding Google potentially liable for wiretapping when it secretly intercepted data on open Wi-Fi routers.

The Mountain View-based company said the September 10 decision by the 9th U.S. Circuit Court of Appeals will create “confusion” (.pdf) about which over-the-air signals are protected by the Wiretap Act, including broadcast television.

The case concerns nearly a dozen combined lawsuits seeking damages from Google for eavesdropping on open Wi-Fi networks from its Street View mapping cars. The vehicles, which rolled through neighborhoods around the world, were equipped with Wi-Fi–sniffing hardware to record the names and MAC addresses of routers to improve Google location-specific services. But the cars also gathered snippets of content.

The search giant petitioned the San Francisco-based appeals court to reconsider its decision that allowed the case to proceed at trial — a ruling that upended Google’s defense.

Google claimed it is was legal to intercept data from unencrypted, or non-password-protected Wi-Fi networks. Google said open Wi-Fi networks are “radio communications” like AM/FM radio, citizens’ band and police and fire bands, and are “readily accessible” to the general public and exempt from the Wiretap Act — a position the appeals court rejected.

How a Crypto ‘Backdoor’ Pitted the Tech World Against the NSA

In August 2007, a young programmer in Microsoft’s Windows security group stood up to give a five-minute turbo talk at the annual Crypto conference in Santa Barbara.

It was a Tuesday evening, part of the conference’s traditional rump session, when a hodge-podge of short talks are presented outside of the conference’s main lineup. To draw attendees away from the wine and beer that competed for their attention at that hour, presenters sometimes tried to sex up their talks with provocative titles like “Does Bob Go to Prison?” or “How to Steal Cars – A Practical Attack on KeeLoq” or “The Only Rump Session Talk With Pamela Anderson.”

Dan Shumow and his Microsoft colleague Niels Ferguson titled theirs, provocatively, “On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng.” It was a title only a crypto geek would love or get.

Seven Principles for Big Data and Resilience Projects

The following is a draft “Code of Conduct” that seeks to provide guidance on best practices for resilience building projects that leverage Big Data and Advanced Computing. These seven core principles serve to guide data projects to ensure they are socially just, encourage local wealth- & skill-creation, require informed consent, and be maintainable over long timeframes. This document is a work in progress, so we very much welcome feedback. Our aim is not to enforce these principles on others but rather to hold ourselves accountable and in the process encourage others to do the same. Initial versions of this draft were written during the 2013 PopTech & Rockefeller Foundation workshop in Bellagio, August 2013.

German Hackers Crack iPhone’s New Fingerprint Scanner

Just a few days after Apple unveiled its new iPhone with a fingerprint ID scanner, German researchers say they’ve cracked the scanner using a fake rubber print.

The researchers, with the Chaos Computer Club, posted a video on their website showing members of the group’s biometric team defeating Apple’s Touch ID with a fabricated fingerprint created from a photo of a print.

They photographed the print from a glass surface, laser-printed the fingerprint image on a transparency sheet, then smeared it with latex. A similar method was used in 2002 by researchers in Japan to demonstrate the security weaknesses of fingerprint scanners using a gel fingerprint.

“We hope that this finally puts to rest the illusions people have about fingerprint biometrics. It is plain stupid to use something that you can’t change and that you leave everywhere every day as a security token,” Frank Rieger, spokesperson for the CCC, said on the group’s website.

The Great Shift in Search

Search is evolving to fit the needs of users who don’t just want a web site, but the actual answer to the question driving the search. To stay on top semantic search technologies are key.

The ongoing list of failed search engine companies is deep and wide. Remember the likes of Excite, Lycos, or AskJeeves? Search companies that have evolved with the times and requests of their users, have thrived while those long-dead companies failed due to lost profits or because of acquisitions that changed the framework of their original offerings.

Did you know that Google’s founders were willing to sell the company to Excite’s CEO at the time for less than $1 million? An offer he happened to refuse. Would search have transitioned to a primary topic in the board room had that offer gone through?

Although Google is one of the world’s largest companies with close to a 70 percent market share in search, it must still continue to evolve lest it join the search dead pool. Looking at it and at Microsoft, we can clearly see where search technology is going from here.

RSA Tells Its Developer Customers: Stop Using NSA-Linked Algorithm

Amidst all of the confusion and concern over an encryption algorithm that may contain an NSA backdoor, RSA Security released an advisory to developer customers today noting that the algorithm is the default in one of its toolkits and strongly advising them to stop using the algorithm.

The advisory provides developers with information about how to change the default to one of a number of other random number generator algorithms RSA supports and notes that RSA has also changed the default on its end in BSafe and in an RSA key management system.

The company is the first to go public with such an announcement in the wake of revelations by theNew York Times that the NSA may have inserted an intentional weakness in the algorithm — known as Dual Elliptic Curve Deterministic Random Bit Generation (or Dual EC DRBG) — and then used its influence to get the algorithm added to a national standard issued by the National Institute of Standards and Technology.

Data Protection: This Tweet Will Self-Destruct In…

The permanence of social media such as tweets presents an important challenge for data protection and privacy. This is particularly true when social media is used to communicate during crises. Indeed, social media users tend to volunteer personal identifying information during disasters that they otherwise would not share, such as phone numbers and home addresses. They typically share this sensitive information to offer help or seek assistance. What if we could limit the visibility of these messages after their initial use?