Normal view

There are new articles available, click to refresh the page.
Yesterday — 31 May 2024Main stream

Andrea Chénier review – Pappano ends on a high with this sensational, thrilling revival

31 May 2024 at 08:43

Royal Opera House, London
David McVicar’s 2015 staging of Giordano’s French Revolution opera is the final production of Antonio Pappano’s tenure as music director of the Royal Opera. With leads Jonas Kaufmann and Sondra Radvanovsky, it is an exciting, affecting evening

Antonio Pappano’s final production as the Royal Opera’s music director is a revival of David McVicar’s 2015 staging of Andrea Chénier, Umberto Giordano’s 1896 examination of the relationship between desire and fanaticism, set during the French Revolution. It’s a thrilling account of an often remarkable work that sends you out into the street feeling elated and slightly jittery.

Pappano’s interpretation has shifted with time. What in 2015 was a slow burn has now become a thing of extremes, magnificently shaped, the high emotional pitch relentlessly sustained. Grand passions and political fervour are repeatedly elided in this music, as crowds acclaim revolutionary leaders with an uneasy rapture not far removed from the sensuality of lovers’ meetings. Elsewhere the ancien régime dies to mock Rameau, its faded elegance replaced by the revolutionary Ça Ira hurled out by the brass with terrifying exhilaration. Pappano is unsparing with it all, by turns lyrical and furiously energetic, and the playing can only be described as sensational.

Continue reading...

💾

© Photograph: Mark Brenner

💾

© Photograph: Mark Brenner

Before yesterdayMain stream

Washing machine chime scandal shows how absurd YouTube copyright abuse can get

30 May 2024 at 14:28
Washing machine chime scandal shows how absurd YouTube copyright abuse can get

Enlarge (credit: Bloomberg / Contributor | Bloomberg)

YouTube's Content ID system—which automatically detects content registered by rightsholders—is "completely fucking broken," a YouTuber called "Albino" declared in a rant on X (formerly Twitter) viewed more than 950,000 times.

Albino, who is also a popular Twitch streamer, complained that his YouTube video playing through Fallout was demonetized because a Samsung washing machine randomly chimed to signal a laundry cycle had finished while he was streaming.

Apparently, YouTube had automatically scanned Albino's video and detected the washing machine chime as a song called "Done"—which Albino quickly saw was uploaded to YouTube by a musician known as Audego nine years ago.

Read 35 remaining paragraphs | Comments

Cybercriminals Abuse StackOverflow to Promote Malicious Python Package – Source:thehackernews.com

cybercriminals-abuse-stackoverflow-to-promote-malicious-python-package-–-source:thehackernews.com

Views: 0Source: thehackernews.com – Author: . May 29, 2024NewsroomSoftware Security / Supply Chain Cybersecurity researchers have warned of a new malicious Python package that has been discovered in the Python Package Index (PyPI) repository to facilitate cryptocurrency theft as part of a broader campaign. The package in question is pytoileur, which has been downloaded 316 […]

La entrada Cybercriminals Abuse StackOverflow to Promote Malicious Python Package – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

TinyPod wants to turn Apple Watches into minimalist phones that feel like iPods

29 May 2024 at 15:22
Image of a TinyPod, with text in an Apple-evoking font reading

Enlarge / The font styling is very intentional. (credit: TinyPod)

I traded in my Series 5 Apple Watch last week to Apple after the battery couldn't make it through most evenings. There wasn't much resale incentive on the open market, because the screen was far from pristine and the battery was nearly 5 years old. You can replace the battery yourself, but, already having a lot of fix projects on the shelf, I opted to send it off, take a gift card, and move on.

If I get a chance, though, I'm going to ask Apple for that watch back. Apple can keep its estimated $90. I am cautiously but earnestly optimistic that the tinyPod can give me more value than a gift card number I plow into some future iPhone upgrade. In fact, the tinyPod, according to its creator, should go on sale for around that $90 mark after a more detailed reveal in June.

This summer. Live different pic.twitter.com/7qvu5Sm3Xv

— 𝘁𝗶𝗻𝘆𝖯𝗈𝖽 (@thetinypod) May 24, 2024

No electronics, just a lefty-oriented Apple Watch case

The tinyPod is essentially an iPod-like case, complete with circular-scrolling clickwheel, into which a strapless Apple Watch can be snapped in. Once inside the case, the scroll wheel function is "entirely analog and physically rotates the watch crown," according to tinyPod founder Newar, better known as "Sentry" on X (formerly Twitter) and in jailbreaking circles. The crown-moving mechanism and general case enhancements to the Watch are patent-pending, Newar wrote by email. More on the scroll wheel will be shown next month, he wrote, at a "proper launch."

Read 10 remaining paragraphs | Comments

Massive Google Leak Exposes Search Algorithm Secrets

Massive Google Leak Exposes Search Algorithm Secrets

For over two decades, Google search rankings have functioned as the internet's invisible puppeteer, dictating which websites rise to the top of search results and influencing the online landscape in profound ways. SEO professionals have tirelessly analyzed Google's every move, piecing together cryptic clues to optimize websites for coveted top rankings. But the inner workings of this algorithmic behemoth have largely remained a mystery – until now. A recent massive leak of internal Google documents has sent shockwaves through the SEO community and beyond. The trove, titled "Google API Content Warehouse" and exceeding 2,500 pages with 14,014 attributes, offers an unprecedented look at Google's search API and the intricate web of factors that influence search results. [caption id="attachment_72485" align="aligncenter" width="406"]Google Search Source: X[/caption] Google has now pulled down its documentation, which specified the parameters that the company has been using for generating and ranking Search results, after accidentally publishing it on GitHub. The American technology giant published the “Google API Content Warehouse” documentation on the GitHub platform on March 27, 2024, and pulled it back on May 7. An anonymous source, who has now revealed himself as Erfan Azimi, CEO and director of SEO for digital marketing agency EA Eagle Digital, had shared the leak with SEO veteran Rand Fishkin. It promises to be a potential goldmine of information. However, Fishkin cautioned that it's not a straightforward recipe for guaranteed SEO success. “The sheer volume of information, with some components potentially outdated, presents a complex puzzle for SEO professionals to decipher,” he cautioned. While the documents’ leak shed light on what Google might consider, they don't reveal the specific ranking hierarchy. This missing piece makes it difficult to prioritize optimization efforts and leaves room for interpretation. The leak has also ignited debate regarding Google's past pronouncements on SEO.  Fishkin suggests discrepancies between the leaked documents and previous statements from Google employees, particularly concerning "domain authority" – a website's overall ranking power. The documents seem to suggest that domain authority carries more weight than Google has publicly acknowledged. Google, as of yet, has maintained a stony silence regarding the leak's authenticity. This lack of response has fueled speculation within the SEO community. However, it's important to consider the leak within the context of Google's recent algorithmic update prioritizing "helpful content." This update reflects Google's ongoing battle against manipulative SEO tactics and its commitment to elevating content that genuinely serves user needs.

Potential Implications of the Google Search Ranking Leak

The ramifications of the leak extend far beyond the realm of SEO. Here are some key areas potentially impacted: Transparency and Trust: The leak raises questions about Google's transparency regarding its search algorithms. Inconsistent messaging between leaked documents and public statements can erode trust with website owners and content creators. Evolving Search Landscape: The leaked documents offer valuable insights into Google's current approach to search ranking. However, search algorithms are constantly evolving, and the information may not hold true for extended periods. The Future of SEO: While the leak provides a valuable snapshot, it shouldn't be misconstrued as a definitive SEO guide. SEO professionals still need to adapt to Google's ongoing algorithmic changes and prioritize creating high-quality content that resonates with users.

Industry Buzzing with Reactions on Social Media over Google Search Algorithm

There have been multiple reactions from stakeholders on social media over the leak. Rand Fishkin declared the leak the biggest ever on the mysteries of Google ranking algorithms: “In the last quarter century, no leak of this magnitude or detail has ever been reported from Google’s search division. If you're in SEO, you should probably see this.” [caption id="attachment_72507" align="aligncenter" width="723"]Google Search Ranking Source: X[/caption] iPullRank founder and CEO Mic King has acknowledged the leak as a newsworthy event but advises caution. He suggested that the leaked documents might be incomplete or outdated and may not reveal the entire picture of Google's ranking factors. He also suggested that website owners shouldn't drastically alter their SEO strategies based solely on this leak. “This leak is another indication that you should be taking in the inputs and experimenting with them to see what will work for your website. It’s not enough to look at anecdotal reviews of things and assume that’s how Google works. If your organization does not have an experimentation plan for SEO, now is a good time to start one,” he said. [caption id="attachment_72525" align="alignnone" width="741"]Google Search Ranking Source: X[/caption] SEO Consultant Aleyda Solis has raised concerns about the leak's potential to erode trust between Google and website owners. She said that transparency was a major concern in SEO, and if there were discrepancies between what Google said and what the leaked documents revealed, it could damage trust.   [caption id="attachment_72531" align="alignnone" width="678"]Google Search Source: X[/caption]

Google Yet to React to Document Leak

Even though this leaked data reveals the factors that Google Search might consider when ranking search results, it doesn't reveal how important each factor is or how much "weight" it carries in the final ranking decision. The data could be helpful for SEO professionals who constantly adapt their strategies to keep pace with Google Search's ranking changes and strive for higher rankings. Upon reviewing these documents, many stakeholders claimed to have found discrepancies between what Google has publicly stated about how Search works and what the leaked information suggests. Google has not yet issued a public statement regarding the leak. The company announced its most recent major Search update in March, focusing on surfacing more authentic content that is demonstrably "helpful." This update involved modifications to Google's core ranking systems to identify pages that were "created for search engines instead of people." Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

A tantalizing glimpse of a fully armed and operational weed scene

By: chavenet
28 May 2024 at 16:01
We walk into the smoking area next door, which is as peaceful and quiet as a library, if it was a library where you can borrow bongs, which you actually can. Most of the tables are full. A lot of people are on laptops. A TV above plays YouTube cat videos on a loop. Sure. We grab a booth and spark up. Immediately, I'm both thirsty and hungry, which provides irrefutable evidence that weed cafes are a good idea. from I got high in an SF weed lounge and these should be everywhere mannnnn by Drew Magary

RansomHub Claims Responsibility for Christie’s Cyberattack

By: Alan J
28 May 2024 at 10:17

cyberattack on Christie's auction house

The notorious ransomware gang RansomHub has claimed responsibility for a recent cyberattack on Christie's auction house, disrupting its website just days before its marquee spring sales and leaking data to back up its claims. The group posted a message on its dark web leak site claiming to have gained access to compromised information about the world's wealthiest art collectors. Christie's officials downplayed the seriousness of the breach, however, and said that no financial or transactional data was compromised in the attack.

RansomHub Claims Cyberattack on Christie's Auction House

The attack, which occurred two weeks ago, had brought down Christie's official website, forcing the auction firm to switch to methods such as an alternative domain to reach potential buyers and sellers ahead of its highly anticipated spring sales after the company announced it would proceed with the sales despite setbacks. The sales were scheduled to occur at multiple locations such as New York and Geneva, and estimated to fetch 850 million dollars from buyers. The RansomHub ransomware gang has now claimed responsibility for the attack on its leak site, stating that it had compromised about 2GB of data from the the auction giant during the initial network compromise. The details were said to include BirthPlace, MRZFull, DocumentNumber, BirthDate, ExpiryDate, FirstName, LastName, IssueDate, IssuingAuthority, DocumentCategory, DocumentType and NationalityName. [caption id="attachment_71548" align="alignnone" width="751"]Christie's RansomHub Auction House 2 Source: X.com (@AlvieriD)[/caption] The threat actor group said they had attempted to come to a "reasonable solution," but that Christie's had ceased communications midway and failed to pay the demanded ransom. The threat group shared an alleged sample of the stolen data. [caption id="attachment_71550" align="alignnone" width="725"]RansomHub Christie's Auction House Ransomware 33 Source: X.com (@AlvieriD)[/caption] The hackers warned that Christie's would face heavy fines under the EU's General Data Protection Regulation (GDPR) and face reputation damage among its clients. The General Data Protection Regulation (GDPR) mandates that EU companies disclose security incidents that compromise client data, with non-compliance potentially leading to fines up to $22 million. Cybersecurity experts describe RansomHub as a powerful ransomware group with possible ties to ALPHV, a network of Russian-speaking extortionists.

Christie's Auction House Downplays Data Leak

Christie’s acknowledged the cyberattack on Christie's Auction House and unauthorized access, with spokesman Edward Lewine stating that the auction house is investigating the incident. The preliminary findings indicate that the hackers obtained a limited amount of personal client data but stopped short of compromising financial or transactional records. Christie CEO Guillaume Cerutti also stated in a recent interview with CNBC that there was no evidence that any transaction or financial data has been impacted or leaked in the incident. The company appeared to downplay the impact of the incident earlier, describing it as a "technology security incident." However, employees privately reported a sense of panic, with limited information shared about the breach by top leaders. Several prominent buyers and sellers also indicated to the New York Times that they were in the dark about the impact, and were not alerted to the hack until a reporter had reached out to them. Lewine stated that the auction house was now in the process of notifying privacy regulators and government agencies, and would also be notifying affected clients shortly. Despite the attack, the spring sales concluded with $528 million in revenue, suggesting the incident did not significantly deter bidding activities. Following the sales, Christie's regained control of its website. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Like Lifting Up the Floorboards and Finding an Oil Well That's Ready to

28 May 2024 at 06:54
The Money In Menopause Supplements I created Dr. Jen's Menopause Taming Turmeric Supplements to find out just how much. As influencers and podcasters all suddenly have their own menopause supplements, OBGYN Dr. Jen Gunter went through the steps of getting quotes to do the math on just how profitable selling a cheap turmeric pill with good marketing and no science can be. (Please note: She is not a crook. She is not selling anything. She just did the math.)

Follow-up: The Trouble with Turmeric A deep dive into the most popular spice/supplement be marketed without a shred of evidence that it is effective in its natural form, which is barely absorbed in the body, or that it is safe in forms that enhance absorption, when it seems to be pretty bad for your liver.

Jen and Dan chatting about work

By: hippybear
27 May 2024 at 21:32
Jen Psaki with Dan Pfeiffer: Lessons from the White House [1h6m, Commonwealth Club] is a great conversation about being White House Press Secretary between that Press Secretary and Obama's Communications Director. They're both really personable and full of anecdotes; it's a great talk.

More than 300m children victims of online sexual abuse every year

26 May 2024 at 19:01

First global study of its kind exposes ‘staggering scale’ of crime, with one in nine men in the US admitting to the offence

More than 300 million children across the globe are victims of online sexual exploitation and abuse each year, research suggests.

In what is believed to be the first global estimate of the scale of the crisis, researchers at the University of Edinburgh found that 12.6% of the world’s children have been victims of nonconsensual talking, sharing and exposure to sexual images and video in the past year, equivalent to about 302 million young people.

Continue reading...

💾

© Photograph: Dominic Lipinski/PA

💾

© Photograph: Dominic Lipinski/PA

A social media ban won’t keep my teenagers safe – it just takes away the place they love | Anna Spargo-Ryan

26 May 2024 at 11:00

Even with a ban, gen alpha will find a way to connect with people online. It’s up to the platforms – and grownups – to ensure a safer internet

In the olden days, I sat in front of an enormous CRT monitor and waited for my 14,400-baud modem to connect. For a few hours I talked to my friends via internet relay chat (“online”). When I was finished I stood up, left the family room and hung out with my cats (“offline”).

The distinction between online and off has changed a lot since then. Relationships moved from LiveJournal to IRL. We had to use email for work. Banks closed their physical branches in favour of apps. Slowly but surely, our “online life” just became life. Society now straddles the two worlds, with the same terrible people gathering in dog parks and neighbourhood Facebook groups.

Continue reading...

💾

© Photograph: Mint Images/Tim Robbins/Getty Images/Mint Images RF

💾

© Photograph: Mint Images/Tim Robbins/Getty Images/Mint Images RF

Leo Cullen needs to shift focus to attack if Leinster are to end final pain | Robert Kitson

26 May 2024 at 09:59

Champions Cup defeat against Toulouse was another Leinster near miss and the time is right to obsess slightly less on defence

In 2022 it was the Boulevard Michelet in Marseille. Last year it was Lansdowne Road in Dublin. On Saturday evening it was the slightly grittier backdrop of Tottenham High Road, but the post-match pain on the faces of Leinster supporters was wearily familiar. Three points, one point, an extra-time defeat: the margins are desperately slim but the sense of deja vu is growing stronger.

Mix in Ireland’s World Cup quarter-final defeat by the All Blacks and the so‑near‑yet‑so‑far pattern is impossible to ignore. Irish rugby still boasts plentiful talent but the uncomfortable losses are stacking up. As Leo Cullen, Leinster’s director of rugby, acknowledged, not all the postmortems will be sympathetic. “The lads are going to need to show a bit of character now,” he said. “You get a sense of what’s coming ... you lose another final and we’ve got to be able to deal with that.”

Continue reading...

💾

© Photograph: Ashley Western/Colorsport/REX/Shutterstock

💾

© Photograph: Ashley Western/Colorsport/REX/Shutterstock

Thunderous final proves we are living in a golden age of club rugby | Michael Aylwin

Leinster and Toulouse delivered an exhilarating spectacle that more than lived up to this match’s billing as a battle for the ages

For the third time in nigh on 30 years, a European final goes to extra-time. For a third time in four years a final features a red card. For the third time in a row Leinster lose in the final. And, for the sixth time, Toulouse win.

There was a feeling before this match that we might be witnessing two of the great club sides of modern times. That feeling was no less palpable by the end of another breathtaking event to decorate this remarkable era of exhilarating rugby.

Continue reading...

💾

© Photograph: Brendan Moran/Sportsfile/Getty Images

💾

© Photograph: Brendan Moran/Sportsfile/Getty Images

Third time unlucky for Leinster as Toulouse win European Champions Cup

  • Final: Leinster 22-31 Toulouse (aet)
  • Irish side condemned to third final defeat in a row

There are plenty of decent teams out there but, at club level, the force is unquestionably with Toulouse. By winning a dramatic sixth Champions Cup title they have propelled themselves another giant step beyond their biggest European rivals and remain a formidable side in anybody’s language.

Club rugby occasions do not come bigger or more tense and nothing was remotely guaranteed with the scores tied at 15-15 at the end of normal time and the atmosphere increasingly gladiatorial. Cometh the hour, cometh les hommes. Three minutes into the first period of extra time, with James Lowe in the sin-bin, the French giants stretched Leinster’s depleted defence wide on the left and Matthis Lebel scorched over for the game-breaking try.

Continue reading...

💾

© Photograph: Andrew Boyers/Action Images/Reuters

💾

© Photograph: Andrew Boyers/Action Images/Reuters

At home with the pronatalists

By: Wordshore
25 May 2024 at 11:29
[CW: eugenics, racism, violent child abuse incident] Guardian: "His little brother, two-year-old Torsten Savage, is on his iPad somewhere upstairs. Simone, 36, in an apron that strains across her belly, has her daughter, 16-month-old Titan Invictus, strapped to her back. The imminent arrival of their fourth child, a girl they plan to name Industry Americus Collins, turns out to be only the first in a string of surprises – and one really shocking thing – that I will encounter during my day with the pronatalists." [Previously: November 2022, You say 'Eugenics' like it's a bad thing (it is)]

Leinster v Toulouse: Champions Cup final goes to extra time – live

25 May 2024 at 11:51

“If Toulouse can deal with Leinster’s Bok tune up thanks to Nienaber, the faster line speed & aggressive blitz, then the difference will be Dupont. He is a big game player ‘big game players make big time plays when it matters’,” John McEnery has said. “Savage battle incoming. Too close to call.”

I completely agree John, it is definitely hard to predict who will win today. Today will see momentum play a huge part, if teams can capitalise while they have it that could be the difference. If they let it breeze past them, as Gloucester did last night, it may be costly.

Continue reading...

💾

© Photograph: Andrew Boyers/Action Images/Reuters

💾

© Photograph: Andrew Boyers/Action Images/Reuters

MPs urge under-16s UK smartphone ban and statutory ban in schools

Commons education committee chair says online world poses serious dangers and parents face uphill struggle

MPs have urged the next government to consider a total ban on smartphones for under 16-year-olds and a statutory ban on mobile phone use in schools as part of a crackdown on screen time for children.

Members of the House of Commons education committee made the recommendations in a report into the impact of screen time on education and wellbeing, which also called on ministers to raise the threshold for opening a social media account to 16.

Continue reading...

💾

© Photograph: Westend61/Getty Images

💾

© Photograph: Westend61/Getty Images

Small Press Economies & Roundup

24 May 2024 at 14:44
"There's a vague, deliberately unexamined idea that the goodness of art and literature will transcend the complicity of the structures art 'has to' use to reach people. And sometimes they can transcend; sometimes they can destabilize culture generatively, even using corporate-owned pathways. But more often, of course, challenging work is not going to make it through those pathways. It's going to be excluded, and readers are not going to encounter it and be changed by it. This is a political problem." From Small Press Economies: A Dialogue by Hilary Plum and Matvei Yankelevich.

Bonus content: a roundup of 28 of just such challenging books from small presses (previously): Akmaral by Judith Lindbergh (Regal House Publishing, 7 May 2024): Drawn from legends of Amazon women warriors from ancient Greece and recent archaeological discoveries in Central Asia, Akmaral is a sweeping tale about a powerful woman who must make peace with making war. (Amazon; Bookshop) As the Andes Disappeared by Caroline Dawson, trans. Anita Anand (Book*hug Press, 14 Nov 2023): Caroline is seven years old when her family flees Pinochet's regime, leaving Chile for Montreal on Christmas Eve, 1986. An expansive coming-of-age autobiographical novel on the 2024 Adult First Novel Category Shortlist. (Amazon; Bookshop) Atlas of an Ancient World by Violeta Orozco (Black Lawrence Press, Apr 2024): A poetry collection that embodies the threshold between Mesoamerican and Chicanx mythologies, the book rewrites the sacred relationship brown and black folks have fostered with nature and land in the Americas.This is a world haunted by diaspora, the violence and beauty of cities and borderlands. (only from the publisher) Bad Seed by Gabriel Carle, trans. Heather Houde (Feminist Press, 7 May 2024): A vibrant debut short story collection depicting the disillusionment that comes with being young and queer in Puerto Rico. (Amazon; Bookshop) The Black Antifascist Tradition: Fighting Back From Anti-Lynching to Abolition by Jeanelle K. Hope and Bill V. Mullen (Haymarket Books, 2 Apr 2024): The story of the fight against fascism across the African diaspora, revealing that Black antifascism has always been vital to global freedom struggles. (Amazon; Bookshop) Blotter: The Untold Story of an Acid Medium by Erik Davis (The MIT Press, 30 Apr 2024): A richly illustrated exploration of the history, art, and design of printed LSD blotter tabs. (Amazon; Bookshop) Counting Feminicide: Data Feminism in Action by Catherine D'Ignazio (The MIT Press, 30 Apr 2024): Why grassroots data activists in Latin America count feminicide—and how this vital social justice work challenges mainstream data science. (Amazon; Bookshop) Defund: Conversations Toward Abolition by Calvin John Smiley (Haymarket Books, 21 May 2024): A collection of illuminating interviews with leading abolitionist organizers and thinkers, reflecting on the uprisings of summer 2020, the rise of #defund, and the work ahead of bridging the divide between reform and abolition. (Amazon; Bookshop) Disobedience by Daniel Sarah Karasik (Book*hug Press, 21 May 2024): Shael lives in a vast prison camp, a monstrosity developed after centuries of warfare and environmental catastrophe. As a young transfeminine person, they risk abject violence if their identity and love affair with Coe, an insurrectionary activist, are discovered. But desire and rebellion flare, and soon Shael escapes to Riverwish, a settlement attempting to forge a new way of living that counters the camp's repression. (Amazon; Bookshop) Dispersals: On Plants, Borders, and Belonging by Jessica J. Lee (Catapult, 12 Mar 2024): A prize-winning memoirist and nature writer turns to the lives of plants entangled in our human world to explore belonging, displacement, identity, and the truths of our shared future. (Amazon; Bookshop) Dozer by Sara Potocsny (Bull City Press, 28 May 2024): A 14 page chapbook of short stories including "Last Queer on Earth" and "Frozen Pigeon. " (only from the publisher) Grandma's Hair Is Ankle Length / El cabello de Abuela le llega hasta los tobillos by Adriana Camacho-Church, ill. Carmen Lop (Arte Público Press, 31 May 2024): This bilingual picture book highlights the loving relationship between a child and her elder and the beauty of the natural world. (Amazon; Bookshop) Also from the same press is another bilingual picture book, about divorce and extended family, It Feels Like Family / Se siente como familia by Diane de Anda, ill. Roberta Collier-Morales. (Amazon; Bookshop) Halfway Home: Thoughts from Midlife by Christina Myers (House of Anansi, 21 May 2024): Award-winning author Christina Myers navigates the uncharted territory of midlife in a time of rapid social, cultural, and environmental change. (Amazon; Bookshop) How We Named the Stars by Andrés N. Ordorica (Tin House, 30 Jan 2024): Set between the United States and México, Andrés N. Ordorica's debut novel is a tender and lyrical exploration of belonging, grief, and first love—a love story for those so often written off the page. Best Book of January at The Washington Post, Kirkus Reviews, and Alta Journal. (Amazon; Bookshop) I Hate It Here, Please Vote For Me: Essays on Rural Political Decay by Matthew Ferrence (West Virginia University Press, 1 Aug 2024): When a progressive college professor runs for the Pennsylvania House of Representatives in a deeply conservative rural district, he loses. That's no surprise. But the story of how Ferrence loses and, more importantly, how American political narratives refuse to recognize the existence and value of non-conservative rural Americans offers insight into the political morass of our nation. (Amazon) Insurgent Labor: The Vermont AFL-CIO 2017–2023 by David Van Deusen (PM Press, 30 July 2024): Insurgent Labor tracks the trials and tribulations of bringing a formerly stagnant labor council into national relevance with an unapologetically left-wing agenda. (Amazon; Bookshop) Juice: A History of Female Ejaculation by Stephanie Haerdle, trans. Elisabeth Lauffer (The MIT Press, 23 Apr 2024): The fascinating, little-known history of female sex fluids through the millennia. (Amazon; Bookshop) Log Off: Why Posting and Politics (Almost) Never Mix by Katherine Cross (LittlePuss Press, June 2024): A blistering, informed, and hilarious argument on how social media and political activism are fated never to intertwine. (Amazon) Lost in Living by Halyna Kruk, trans. Ali Kinsella and Dzvinia Orlowsky (Lost Horse Press, 25 May 2024): Kruk's unpublished work from the immediate "pre-invasion" years when life in Ukraine was marked by turmoil but full-scale war was not yet normalized. Part of the Lost Horse Press Contemporary Poetry Series. (Amazon; Bookshop) A Question of Belonging: Crónicas by Hebe Uhart, trans. Anna Vilner (Archipelago Books, 28 May 2024): "It was a year of great discovery for me, learning about these people and their homes, " Hebe Uhart writes in the opening story of A Question of Belonging, a collection of texts that traverse Argentina, Paraguay, Brazil, Spain, and beyond. Discoveries sprout and flower throughout Uhart's oeuvre, but nowhere more so than in her crónicas, Uhart's preferred method of storytelling by the end of her life. (Amazon; Bookshop) Remembering Che: My Life with Che Guevara by Aleida March, trans. Pilar Aguilar (Seven Stories Press, 25 June 2024): Che Guevara's widow remembers a great revolutionary romance tragically cut short by Che's assassination in Bolivia. (Amazon; Bookshop) The Story Game: A Memoir by Shze-Hui Tjoa (Tin House, 21 May 2024): A memoir that reenacts, in tautly novelistic fashion, the process of healing that author Shze-Hui Tjoa moved through to recover memories lost to complex PTSD and, eventually, reconstruct her sense of self. Stunning in its originality and intimacy, The Story Game is a piercing tribute to selfhood and sisterhood, a genre-shattering testament to the power of imagination, and a one-of-a-kind work of art. (Amazon; Bookshop) These Letters End In Tears by Musih Tedji Xaviere (Catapult, 12 Mar 2024): Set in a country where being gay is punishable by law, this is the heart-wrenching forbidden love story of a Christian girl with a rebellious heart and a Muslim girl leading a double life. (Amazon; Bookshop) Unbuild Walls: Why Immigrant Justice Needs Abolition by Silky Shah (Haymarket Books, 7 May 2024): Drawing from over twenty years of activism on local and national levels, this striking book offers an organizer's perspective on the intersections of immigrant rights, racial justice, and prison abolition. (Amazon; Bookshop) Uncle Rabbit and the Wax Doll by Silvestre Pantaleón Esteva, trans. Jonathan D. Amith (Deep Vellum, 7 May 2024): Follow the classic tale of the trickster Brer Rabbit in a one-of-a-kind trilingual edition, featuring Nahuatl, Spanish, and English languages alongside traditional amate bark paintings. (Amazon; Bookshop) We Speak Through the Mountain by Premee Mohamed (ECW Press, 18 June 2024): The enlivening follow-up to the award-winning sensation The Annual Migration of Clouds. Traveling alone through the climate-crisis-ravaged wilds of Alberta's Rocky Mountains, 19-year-old Reid Graham battles the elements and her lifelong chronic illness to reach the utopia of Howse University. But life in one of the storied "domes" — the last remnants of pre-collapse society — isn't what she expected. (Amazon; Bookshop) What Every Radical Should Know about State Repression: A Guide for Activists by Victor Serge (Seven Stories Press, 28 May 2024): This classic 1926 manual on repression by revolutionary activist Victor Serge offers fascinating anecdotes about the tactics of police provocateurs and an analysis of the documents of the Tsarist secret police in the aftermath of the Russian revolution. (Amazon; Bookshop) I'm not aware of MeFi having an affiliate membership with Bookshop, so I've set the affiliate link to the Community of Literary Magazines and Presses (CLMP).

Leinster must stem the Toulouse tide to taste Champions Cup glory again

24 May 2024 at 14:00

Toulouse, with the peerless Antoine Dupont, are in form but will it be third time lucky for Leinster?

If this long and eventful rugby season has had a common theme it is that the cream rises to the top eventually. Leinster and Toulouse are not in this weekend’s Investec Champions Cup final by accident and the team sheet is sprinkled with more than enough quality to match the soaring backdrop that is Tottenham Hotspur Stadium. The FA Cup final at Wembley is far from the only big show in town.

As the two sides went through their eve-of-game motions on the most pristine surface imaginable – no stray dandelions or daisies here – it was hard to recall a potentially glossier club rugby finale. The showdown between the respective powerhouses of Ireland and France is set to attract the biggest attendance at this fixture for 10 years and the tingle of collective anticipation has rarely been stronger.

Continue reading...

💾

© Photograph: Dan Sheridan/INPHO/REX/Shutterstock

💾

© Photograph: Dan Sheridan/INPHO/REX/Shutterstock

Joey Barton calling Jeremy Vine a ‘bike nonce’ was defamatory, judge rules

24 May 2024 at 12:33

High court rules abuse could defame broadcaster who sued ex-footballer after he also called him a ‘pedo defender’

The former footballer and manager Joey Barton calling the broadcaster Jeremy Vine a “bike nonce” on social media was defamatory, a high court judge has ruled.

The high court ruled on Friday that 11 social media posts could defame Vine, the radio and TV presenter who is suing Barton after he called him a “bike nonce” and a “pedo defender” on X, formerly known as Twitter, between January and March.

Continue reading...

💾

© Photograph: Jordan Pettitt/PA

💾

© Photograph: Jordan Pettitt/PA

Dupont or Gibson-Park at scrum-half in my fantasy team? There’s no contest | Ugo Monye

By: Ugo Monye
24 May 2024 at 09:44

The Frenchman is the world’s best No 9 and can prove it when his Toulouse side take on Leinster in the Champions Cup final

If there is a debate as to whether Antoine Dupont or Jamison Gibson-Park is the leading scrum-half in the world, I would ask myself which one I’d prefer to play alongside and in my opinion there is no contest. Dupont is the best player in the world. I have to go back to Dan Carter and the performances he produced during the 2005 British & Irish Lions tour for the last time I saw such a complete player.

Whether it is his passing, his immaculate box-kicking off both feet, the assists, the breaks, the tries, his jackalling … World Rugby has even had to change a law named after him. And he continues to do it in a season on the back of a World Cup and in which he has transferred to sevens.

Continue reading...

💾

© Composite: Mike Egerton/PA Images

💾

© Composite: Mike Egerton/PA Images

Fate of Retired Research Chimps Still in Limbo

23 May 2024 at 05:03
The National Institutes of Health, which owns the chimps at the Alamogordo Primate Facility in New Mexico, has no plans to move the animals to sanctuary, despite a ruling from a federal judge.

© Emil Lippe for The New York Times

Carlee, a chimpanzee living in Chimp Haven, a 200-acre sanctuary in Louisiana that serves as the designated retirement home for federally owned chimps.

Leinster warned to fear ‘alien’ Dupont as Toulouse seek sixth Champions Cup

21 May 2024 at 20:00
  • ‘He’s not from earth, he’s an alien,’ says teammate Meafou
  • Teams meet for Europe’s premier club trophy on Saturday

Toulouse are warning Leinster to beware the man they call “The ­Martian” as the French champions seek to reinforce their reputation as the world’s pre-eminent club side. Even Antoine Dupont’s own teammates cannot believe their scrum-half’s extraordinary ability and reckon the opposition will struggle to subdue him in the Champions Cup final on Saturday.

The world’s best player is also due to showcase his talents for France at the Olympics this summer but his first priority is to help Toulouse to become the first club to lift Europe’s premier club trophy for a sixth time.

Continue reading...

💾

© Photograph: David Rogers/Getty Images

💾

© Photograph: David Rogers/Getty Images

Neil Gaiman’s Coraline to become ‘dark, spangly’ stage musical

21 May 2024 at 19:01

Playwright Zinnie Harris and composer Louis Barabbas’s adaptation of the novel will open at Leeds Playhouse and tour in 2025

Neil Gaiman’s award-winning novella Coraline is to be turned into a musical that will tour the UK in 2025. The children’s fable, which found a new audience 15 years ago as a stop-motion animation by Henry Selick, has been adapted by playwright Zinnie Harris and composer Louis Barabbas.

Harris fell in love with Gaiman’s dark fantasy when reading it to her children and quickly saw its potential for the stage. Over a 12-year period, she has developed the script with James Brining, artistic director of Leeds Playhouse. They recruited Barabbas, the Skye-based frontman of the Bedlam Six, to write songs that Harris described as “dark, spangly, clever, quirky and beautifully melodic”.

Continue reading...

💾

© Photograph: Photo Credit: Courtesy of Focus

💾

© Photograph: Photo Credit: Courtesy of Focus

“CSAM generated by AI is still CSAM,” DOJ says after rare arrest

21 May 2024 at 13:20
“CSAM generated by AI is still CSAM,” DOJ says after rare arrest

Enlarge (credit: SewcreamStudio | iStock / Getty Images Plus)

The US Department of Justice has started cracking down on the use of AI image generators to produce child sexual abuse materials (CSAM).

On Monday, the DOJ arrested Steven Anderegg, a 42-year-old "extremely technologically savvy" Wisconsin man who allegedly used Stable Diffusion to create "thousands of realistic images of prepubescent minors," which were then distributed on Instagram and Telegram.

The cops were tipped off to Anderegg's alleged activities after Instagram flagged direct messages that were sent on Anderegg's Instagram account to a 15-year-old boy. Instagram reported the messages to the National Center for Missing and Exploited Children (NCMEC), which subsequently alerted law enforcement.

Read 31 remaining paragraphs | Comments

The Breakdown | Dupont, Lowe and other stars align for dazzling Champions Cup final

21 May 2024 at 06:00

Big is not always beautiful but no European clubs currently have the talent and pulling power of Leinster and Toulouse

Occasionally in sport the planets align. The two best golfers in the world teeing off together in the final round of an Open Championship, for example, or two exceptional thoroughbreds thundering neck and neck up the straight at Ascot. The champion deserves to be hailed as special but, in truth, the quality is so collectively good that everybody wins.

It could just be one of those pluperfect days in rugby union this weekend. Toulouse and Leinster have already featured in a record seven Champions Cup finals apiece and have won the club game’s ultimate trophy nine times between them. The French aristocrats possess the world’s best player in Antoine Dupont and ooze class and pedigree in equal amounts. Leinster will be represented at Tottenham Hotspur Stadium bymost of the Ireland squad who have ruled the Six Nations.

Continue reading...

💾

© Photograph: Valentine Chapuis/AFP/Getty Images

💾

© Photograph: Valentine Chapuis/AFP/Getty Images

Farm Animals Are Hauled All Over the Country. So Are Their Pathogens.

20 May 2024 at 08:27
Tens of millions of farm animals cross state lines every year, traveling in cramped, stressful conditions that can facilitate the spread of disease.

© Rory Doyle for The New York Times

The exact number of chickens, cows and pigs being transported on trucks, ships, planes and trains within the United States is difficult to pinpoint because there is no national system for tracking the movement of livestock.

Fair Use Still Protects Histories and Documentaries—Even Tiger King

15 May 2024 at 16:28

Copyright’s fair use doctrine protects lots of important free expression against the threat of ruinous lawsuits. Fair use isn’t limited to political commentary or erudite works – it also protects popular entertainment like Tiger King, Netflix’s hit 2020 documentary series about the bizarre and sometimes criminal exploits of a group of big cat breeders. That’s why a federal appeals court’s narrow interpretation of fair use in a recent copyright suit threatens not just the producers of Tiger King but thousands of creators who make documentaries, histories, biographies, and even computer software. EFF and other groups asked the court to revisit its decision. Thankfully, the court just agreed to do so.

The case, Whyte Monkee Productions v. Netflix, was brought by a videographer who worked at the Greater Wynnewood Exotic Animal Park, the Oklahoma attraction run by Joe Exotic that was chronicled in Tiger King. The videographer sued Netflix for copyright infringement over the use of his video clips of Joe Exotic in the series. A federal district court in Oklahoma found Netflix’s use of one of the video clips—documenting Joe Exotic’s eulogy for his husband Travis Maldonado—to be a fair use. A three-judge panel of the Court of Appeals for the Tenth Circuit reversed that decision and remanded the case, ruling that the use of the video was not “transformative,” a concept that’s often at the heart of fair use decisions.

The appeals court based its ruling on a mistaken interpretation of the Supreme Court’s opinion in Andy Warhol Foundation for the Visual Arts v. Goldsmith. Warhol was a deliberately narrow decision that upheld the Supreme Court’s prior precedents about what makes a use transformative while emphasizing that commercial uses are less likely to be fair. The Supreme Court held that commercial re-uses of a copyrighted work—in that case, licensing an Andy Warhol print of the artist Prince for a magazine cover when the print was based on a photo that was also licensed for magazine covers—required a strong justification. The Warhol Foundation’s use of the photo was not transformative, the Supreme Court said, because Warhol’s print didn’t comment on or criticize the original photograph, and there was no other reason why the foundation needed to use a print based on that photograph in order to depict Prince. In Whyte Monkee, the Tenth Circuit honed in on the Supreme Court’s discussion about commentary and criticism but mistakenly read it to mean that only uses that comment on an original work are transformative. The court remanded the case to the district court to re-do the fair use analysis on that basis.

As EFF, along with Authors Alliance, American Library Association, Association of Research Libraries, and Public Knowledge explained in an amicus brief supporting Netflix’s request for a rehearing, there are many kinds of transformative fair uses. People creating works of history or biography frequently reproduce excerpts from others’ copyrighted photos, videos, or artwork as indispensable historical evidence. For example, using sketches from the famous Zapruder film in a book about the assassination of President Kennedy was deemed fair, as was reproducing the artwork from Grateful Dead posters in a book about the band. Software developers use excerpts from others’ code—particularly declarations that describe programming interfaces—to build new software that works with what came before. And open government organizations, like EFF client Public.Resource.Org, use technical standards incorporated into law to share knowledge about the law. None of these uses involves commentary or criticism, but courts have found them all to be transformative fair uses that don’t require permission.

The Supreme Court was aware of these uses and didn’t intend to cast doubt on their legality. In fact, the Supreme Court cited to many of them favorably in its Warhol decision. And the Court even engaged in some non-commentary fair use itself when it included photos of Prince in its opinion to illustrate how they were used on magazine covers. If the Court had meant to overrule decades of court decisions, including its own very recent Google v. Oracle decision about software re-use, it would have said so.

Fortunately, the Tenth Circuit heeded our warning, and the warnings of Netflix, documentary filmmakers, legal scholars, and the Motion Picture Association, all of whom filed briefs. The court vacated its decision and asked for further briefing about Warhol and what it means for documentary filmmakers.

The bizarre story of Joe Exotic and his friends and rivals may not be as important to history as the Kennedy assassination, but fair use is vital to bringing us all kinds of learning and entertainment. If other courts start treating the Warhol decision as a radical rewriting of fair use law when that’s not what the Supreme Court said at all, many kinds of free expression will face an uncertain future. That’s why we’re happy that the Tenth Circuit withdrew its opinion. We hope the court will, as the Supreme Court did, reaffirm the importance of fair use.

Christie’s Auction Website Hacked Just Before Major Sales

By: Alan J
13 May 2024 at 06:27

Christie’s Auction House

Just days before its highly anticipated spring art auctions, Christie's, the renowned auction house, had fallen victim to a cyberattack, taking its website offline and raising concerns about the security of client data. The Christie's auction house cyberattack has sent shockwaves through the art world, with collectors, advisers, and dealers scrambling to adapt to the sudden disruption. Christie's is a British auction house founded in 1766 by James Christie, offering around 350 different auctions annually in over 80 categories, such as decorative and fine arts, jewelry, photographs, collectibles, and wine. The auction house has a global presence in 46 countries, with 10 salerooms worldwide, including London, New York, Paris, Geneva, Amsterdam, Hong Kong, and Shanghai. The company provided a temporary webpage after its official website was taken down and later notified that the auctions would proceed despite the setbacks caused by the cyberattack.

Christie’s Auction House Cyberattack Occurs Ahead of Major Auctions

[caption id="attachment_68140" align="alignnone" width="1000"]Christie’s Auction House Cyberattack Source: Shutterstock[/caption] The cyberattack came at an inopportune time for Christie's, with several high-stakes auctions estimated at around $850 million in worth scheduled to take place in New York and Geneva. Art adviser Todd Levin highlighted the significance of the timing, expressing concern that the cyberattack was happening during a pivotal moment before the spring sales when buyers confirm their interest in artworks. He raised a pressing question: "How can potential bidders access the catalog?" The auctions will include works by Warhol, Basquiat, and Claude Monet, and pieces from the Rosa de la Cruz Collection, that are expected to generate hundreds of millions of dollars in revenue. Christie's website was taken offline following the hack which affected some of its systems. Despite the setback, Christie's has assured clients that the auctions will proceed as planned, with bidders able to participate in person, by phone, or through Christie's Live platform. Despite the hack, Christie's CEO Guillaume Cerutti assured clients that all eight live auctions in New York and Geneva would proceed as scheduled, with the exception of the Rare Watches sale, which was postponed to May 14th. In a statement, Cerutti elaborated: "I want to assure you that we are managing this incident according to our well-established protocols and practices, with the support of additional experts. This included, among other things, the proactive protection of our main website by taking it offline."

Growing Cybersecurity Concerns in the Art World

The incident is a sobering reminder of the increasing threat of cyberattacks in the art world. In recent years, several museums and art market platforms have fallen victim to hacking, highlighting the need for vigilance in protecting sensitive client information amidst slumbering sales. Earlier in January, a service provider managing the online collections of several prominent museums had been targeted, affecting institutions like The Museum of Fine Arts in Boston, the Rubin Museum of Art in New York, and the Crystal Bridges Museum of American Art. Last year in 2023, Christie's had another security incident come to light when it was discovered inadvertently exposing the GPS location and co-ordinates of several art pieces purchased by some of the world’s biggest and wealthiest collectors, revealing their exact whereabouts.  In 2017, hackers employed an email scam to intercept payments between dealers and clients, siphoning sums ranging from £10,000 to £1 million. These incidents underscore the art world's vulnerability to similar threats as the market becomes increasingly digital, auction houses and museums must take proactive steps to to invest in stronger defenses against a rapidly evolving cyber threat landscape and the risks it may pose to the art industry. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Why Your VPN May Not Be As Secure As It Claims

6 May 2024 at 10:24

Virtual private networking (VPN) companies market their services as a way to prevent anyone from snooping on your Internet usage. But new research suggests this is a dangerous assumption when connecting to a VPN via an untrusted network, because attackers on the same network could force a target’s traffic off of the protection provided by their VPN without triggering any alerts to the user.

Image: Shutterstock.

When a device initially tries to connect to a network, it broadcasts a message to the entire local network stating that it is requesting an Internet address. Normally, the only system on the network that notices this request and replies is the router responsible for managing the network to which the user is trying to connect.

The machine on a network responsible for fielding these requests is called a Dynamic Host Configuration Protocol (DHCP) server, which will issue time-based leases for IP addresses. The DHCP server also takes care of setting a specific local address — known as an Internet gateway — that all connecting systems will use as a primary route to the Web.

VPNs work by creating a virtual network interface that serves as an encrypted tunnel for communications. But researchers at Leviathan Security say they’ve discovered it’s possible to abuse an obscure feature built into the DHCP standard so that other users on the local network are forced to connect to a rogue DHCP server.

“Our technique is to run a DHCP server on the same network as a targeted VPN user and to also set our DHCP configuration to use itself as a gateway,” Leviathan researchers Lizzie Moratti and Dani Cronce wrote. “When the traffic hits our gateway, we use traffic forwarding rules on the DHCP server to pass traffic through to a legitimate gateway while we snoop on it.”

The feature being abused here is known as DHCP option 121, and it allows a DHCP server to set a route on the VPN user’s system that is more specific than those used by most VPNs. Abusing this option, Leviathan found, effectively gives an attacker on the local network the ability to set up routing rules that have a higher priority than the routes for the virtual network interface that the target’s VPN creates.

“Pushing a route also means that the network traffic will be sent over the same interface as the DHCP server instead of the virtual network interface,” the Leviathan researchers said. “This is intended functionality that isn’t clearly stated in the RFC [standard]. Therefore, for the routes we push, it is never encrypted by the VPN’s virtual interface but instead transmitted by the network interface that is talking to the DHCP server. As an attacker, we can select which IP addresses go over the tunnel and which addresses go over the network interface talking to our DHCP server.”

Leviathan found they could force VPNs on the local network that already had a connection to arbitrarily request a new one. In this well-documented tactic, known as a DHCP starvation attack, an attacker floods the DHCP server with requests that consume all available IP addresses that can be allocated. Once the network’s legitimate DHCP server is completely tied up, the attacker can then have their rogue DHCP server respond to all pending requests.

“This technique can also be used against an already established VPN connection once the VPN user’s host needs to renew a lease from our DHCP server,” the researchers wrote. “We can artificially create that scenario by setting a short lease time in the DHCP lease, so the user updates their routing table more frequently. In addition, the VPN control channel is still intact because it already uses the physical interface for its communication. In our testing, the VPN always continued to report as connected, and the kill switch was never engaged to drop our VPN connection.”

The researchers say their methods could be used by an attacker who compromises a DHCP server or wireless access point, or by a rogue network administrator who owns the infrastructure themselves and maliciously configures it. Alternatively, an attacker could set up an “evil twin” wireless hotspot that mimics the signal broadcast by a legitimate provider.

ANALYSIS

Bill Woodcock is executive director at Packet Clearing House, a nonprofit based in San Francisco. Woodcock said Option 121 has been included in the DHCP standard since 2002, which means the attack described by Leviathan has technically been possible for the last 22 years.

“They’re realizing now that this can be used to circumvent a VPN in a way that’s really problematic, and they’re right,” Woodcock said.

Woodcock said anyone who might be a target of spear phishing attacks should be very concerned about using VPNs on an untrusted network.

“Anyone who is in a position of authority or maybe even someone who is just a high net worth individual, those are all very reasonable targets of this attack,” he said. “If I were trying to do an attack against someone at a relatively high security company and I knew where they typically get their coffee or sandwich at twice a week, this is a very effective tool in that toolbox. I’d be a little surprised if it wasn’t already being exploited in that way, because again this isn’t rocket science. It’s just thinking a little outside the box.”

Successfully executing this attack on a network likely would not allow an attacker to see all of a target’s traffic or browsing activity. That’s because for the vast majority of the websites visited by the target, the content is encrypted (the site’s address begins with https://). However, an attacker would still be able to see the metadata — such as the source and destination addresses — of any traffic flowing by.

KrebsOnSecurity shared Leviathan’s research with John Kristoff, founder of dataplane.org and a PhD candidate in computer science at the University of Illinois Chicago. Kristoff said practically all user-edge network gear, including WiFi deployments, support some form of rogue DHCP server detection and mitigation, but that it’s unclear how widely deployed those protections are in real-world environments.

“However, and I think this is a key point to emphasize, an untrusted network is an untrusted network, which is why you’re usually employing the VPN in the first place,” Kristoff said. “If [the] local network is inherently hostile and has no qualms about operating a rogue DHCP server, then this is a sneaky technique that could be used to de-cloak some traffic – and if done carefully, I’m sure a user might never notice.”

MITIGATIONS

According to Leviathan, there are several ways to minimize the threat from rogue DHCP servers on an unsecured network. One is using a device powered by the Android operating system, which apparently ignores DHCP option 121.

Relying on a temporary wireless hotspot controlled by a cellular device you own also effectively blocks this attack.

“They create a password-locked LAN with automatic network address translation,” the researchers wrote of cellular hot-spots. “Because this network is completely controlled by the cellular device and requires a password, an attacker should not have local network access.”

Leviathan’s Moratti said another mitigation is to run your VPN from inside of a virtual machine (VM) — like Parallels, VMware or VirtualBox. VPNs run inside of a VM are not vulnerable to this attack, Moratti said, provided they are not run in “bridged mode,” which causes the VM to replicate another node on the network.

In addition, a technology called “deep packet inspection” can be used to deny all in- and outbound traffic from the physical interface except for the DHCP and the VPN server. However, Leviathan says this approach opens up a potential “side channel” attack that could be used to determine the destination of traffic.

“This could be theoretically done by performing traffic analysis on the volume a target user sends when the attacker’s routes are installed compared to the baseline,” they wrote. “In addition, this selective denial-of-service is unique as it could be used to censor specific resources that an attacker doesn’t want a target user to connect to even while they are using the VPN.”

Moratti said Leviathan’s research shows that many VPN providers are currently making promises to their customers that their technology can’t keep.

“VPNs weren’t designed to keep you more secure on your local network, but to keep your traffic more secure on the Internet,” Moratti said. “When you start making assurances that your product protects people from seeing your traffic, there’s an assurance or promise that can’t be met.”

A copy of Leviathan’s research, along with code intended to allow others to duplicate their findings in a lab environment, is available here.

Congress Should Just Say No to NO FAKES

29 April 2024 at 16:21

There is a lot of anxiety around the use of generative artificial intelligence, some of it justified. But it seems like Congress thinks the highest priority is to protect celebrities – living or dead. Never fear, ghosts of the famous and infamous, the U.S Senate is on it.

We’ve already explained the problems with the House’s approach, No AI FRAUD. The Senate’s version, the Nurture Originals, Foster Art and Keep Entertainment Safe, or NO FAKES Act, isn’t much better.

Under NO FAKES, any person has the right to sue anyone who has either made, or made available, their “digital replica.” A replica is broadly defined as “a newly-created, computer generated, electronic representation of the image, voice or visual likeness” of a person. The right applies to the person themselves; anyone who has a license to use their image, voice, or likeness; and their heirs for 70 years after the person dies. It’s retroactive, meaning the post-mortem right would apply immediately to the heirs of, say, Prince, Tom Petty, or Michael Jackson, not to mention your grandmother.

Boosters talk a good game about protecting performers and fans from AI scams, but NO FAKES seems more concerned about protecting their bottom line. It expressly describes the new right as a “property right,” which matters because federal intellectual property rights are excluded from Section 230 protections. If courts decide the replica right is a form of intellectual property, NO FAKES will give people the ability to threaten platforms and companies that host allegedly unlawful content, which tend to have deeper pockets than the actual users who create that content. This will incentivize platforms that host our expression to be proactive in removing anything that might be a “digital replica,” whether its use is legal expression or not. While the bill proposes a variety of exclusions for news, satire, biopics, criticism, etc. to limit the impact on free expression, interpreting and applying those exceptions is even more likely to make a lot of lawyers rich.

This “digital replica” right effectively federalizes—but does not preempt—state laws recognizing the right of publicity. Publicity rights are an offshoot of state privacy law that give a person the right to limit the public use of her name, likeness, or identity for commercial purposes, and a limited version of it makes sense. For example, if Frito-Lay uses AI to deliberately generate a voiceover for an advertisement that sounds like Taylor Swift, she should be able to challenge that use. The same should be true for you or me.

Trouble is, in several states the right of publicity has already expanded well beyond its original boundaries. It was once understood to be limited to a person’s name and likeness, but now it can mean just about anything that “evokes” a person’s identity, such as a phrase associated with a celebrity (like “Here’s Johnny,”) or even a cartoonish robot dressed like a celebrity. In some states, your heirs can invoke the right long after you are dead and, presumably, in no position to be embarrassed by any sordid commercial associations. Or for anyone to believe you have actually endorsed a product from beyond the grave.

In other words, it’s become a money-making machine that can be used to shut down all kinds of activities and expressive speech. Public figures have brought cases targeting songs, magazine features, and even computer games. As a result, the right of publicity reaches far beyond the realm of misleading advertisements and courts have struggled to develop appropriate limits.

NO FAKES leaves all of that in place and adds a new national layer on top, one that lasts for decades after the person replicated has died. It is entirely divorced from the incentive structure behind intellectual property rights like copyright and patents—presumably no one needs a replica right, much less a post-mortem one, to invest in their own image, voice, or likeness. Instead, it effectively creates a windfall for people with a commercially valuable recent ancestor, even if that value emerges long after they died.

What is worse, NO FAKES doesn’t offer much protection for those who need it most. People who don’t have much bargaining power may agree to broad licenses, not realizing the long-term risks. For example, as Jennifer Rothman has noted, NO FAKES could actually allow a music publisher who had licensed a performers “replica right” to sue that performer for using her own image. Savvy commercial players will build licenses into standard contracts, taking advantage of workers who lack bargaining power and leaving the right to linger as a trap only for unwary or small-time creators.

Although NO FAKES leaves the question of Section 230 protection open, it’s been expressly eliminated in the House version, and platforms for user-generated content are likely to over-censor any content that is, or might be, flagged as containing an unauthorized digital replica. At the very least, we expect to see the expansion of fundamentally flawed systems like Content ID that regularly flag lawful content as potentially illegal and chill new creativity that depends on major platforms to reach audiences. The various exceptions in the bill won’t mean much if you have to pay a lawyer to figure out if they apply to you, and then try to persuade a rightsholder to agree.

Performers and others are raising serious concerns. As policymakers look to address them, they must take care to be precise, careful, and practical. NO FAKES doesn’t reflect that care, and its sponsors should go back to the drawing board. 

How to protect yourself from online harassment

10 April 2024 at 15:19

It takes a little to receive a lot of online hate today, from simply working as a school administrator to playing a role in a popular movie or video game.

But these moments of personal crisis have few, immediate solutions, as the current proposals to curb and stem online harassment zero in on the systemic—such as changes in data privacy laws to limit the personal information that can be weaponized online or calls for major social media platforms to better moderate hateful content and its spread.

Such structural shifts can take years (if they take place at all), which can leave today’s victims feeling helpless.

There are, however, a few steps that everyday people can take, starting now, to better protect themselves against online hate and harassment campaigns. And thankfully, none of them involve “just getting off the internet,” a suggestion that, according to Leigh Honeywell, is both ineffective and unwanted.

“The [idea that the] answer to being bullied is that you shouldn’t be able to participate in public life—I don’t think that’s okay,” said Honeywell, CEO and co-founder of the digital safety consultancy Tall Poppy.

Speaking to me on the Lock and Code podcast last month, Honeywell explained that Tall Poppy’s defense strategies to online harassment incorporate best practices from Honeywell’s prior industry—cybersecurity.

Here are a few steps that people can proactively take to limit online harassment before it happens.

Get good at Googling yourself

One of the first steps in protecting yourself from online harassment is finding out what information about you is already available online. This is because, as Honeywell said, much of that information can be weaponized for abuse.

Picture an angry diner posting a chef’s address on Yelp alongside a poor review, or a complete stranger sending in a fake bomb threat to a school address, or a real-life bully scraping the internet for embarrassing photos of someone they want to harass.  

All this information could be available online, and the best way to know if it exists is to do the searching yourself.

As for where to start?

“First name, last name, city name, or other characteristics about yourself,” Honeywell said, listing what, specifically, to search online.

It’s important to understand that the online search itself may not bring immediate results, but it will likely reveal active online profiles on platforms like LinkedIn, X (formerly Twitter), Facebook, and Instagram. If those profiles are public, an angry individual could scrape relevant information and use it to their advantage. Even a LinkedIn profile could be weaponized by someone who calls in fake complaints to a person’s employer, trying to have them fired from their position.

In combing through the data that you can find about yourself online, Honeywell said people should focus on what someone else could do with that data.

“If an adversary was trying to find out information about me, what would they find?” Honeywell said. “If they had that information, what would they do with it?”

Take down what you can

You’ve found what an adversary might use against you online. Now it’s time to take it down.

Admittedly, this can be difficult in the United States, as Americans are not protected by a national data privacy law that gives them the right to request their data be deleted from certain websites, platforms, and data brokers.

Where Americans could find some help, however, is from online resources and services that streamline the data removal process that is enshrined in some state laws. These tools, like the iOS app Permission Slip, released by Consumer Reports in 2022, show users what types of information companies are collecting about them, and give user the opportunity to request that such data be deleted.

Separately, Google released on online tool in 2023 where users can request that certain search results that contain their personal information be removed. You can learn more about the tool, called “Results about you,” here.

When all else fails, Honeywell said that people shouldn’t be afraid to escalate the situation to their state’s regulators. That could include filing an official complaint with a State Attorney General, or with the Consumer Financial Protection Bureau, or the Federal Trade Commission.

“It sounds like the big guns,” Honeywell said, “but I think it’s important that, as individuals, we do what we can to hold the companies that are creating this mess accountable.”

Lock down your accounts

If an adversary can’t find your information through an online search, they may try to steal that information by hacking into your accounts, Honeywell said.

“If I’m mad at David, I’m going to hack into David’s email and share personal information,” Honeywell said. “That’s a fairly standard way that we see some of the worst online harassment attacks escalate.”

While hackers may have plenty of novel tools at their disposal, the best defenses you can implement today are the use of unique passwords and multifactor authentication.

Let’s first talk about unique passwords.

Each and every single one of your online accounts—from your email, to your social media profiles, to your online banking—should have a strong, unique password. And because you likely have dozens upon dozens of online accounts to manage, you should keep track of all those passwords with a devoted password manager.

Using unique passwords is one of the best defenses to company data breaches that expose user login credentials. Once those credentials are available on the dark web, hackers will buy those credentials so they can attempt to use them to gain access to other online accounts. You can prevent those efforts going forward by refusing to repeat passwords across any of your online accounts.

Now, start using multifactor authentication, if you’re not already.

Multifactor authentication is offered by most major companies and services today, from your bank, to your email, to your medical provider. By using multifactor authentication, also called MFA or 2FA, you will be required to “authenticate” yourself with more than just your password. This means that when you enter your username and password onto a site or app, you will also be prompted with entering a separate code that is, in many cases, sent to your phone via text or an app.

MFA is one of the strongest protections to password abuse, ensuring that, even if a hacker has your username and password, they still can’t access your account because they will not have the additional authentication that is required to complete a login.

In the world of cybersecurity, these two defense practices are among the gold standard in stopping cyberattacks. In the world of online harassment, they’re much the same—they work to prevent the abuse of your online accounts.

Here to help

Online harassment is an isolating experience, but protecting yourself against it can be quite the opposite. Honeywell suggested that, for those who feel overwhelmed or who do not know where to start, they can find a friend to help.

“Buddy up,” Honeywell said. “If you’ve got a friend who’s good at Googling, work on each other’s profile, identify what information is out there about you.”

Honeywell also recommended going through data takedown requests together, as the processes can be “extremely tedious” and some of the services that promise to remove your information from the internet are really only trying to sell you a service.

If you’re still wondering what information about you is online and you aren’t comfortable with your way around Google, Malwarebytes has a new, free tool that reveals what information of yours is available on the dark web and across the internet at large. The Digital Footprint Portal, released in April, provides free, unlimited scans for everyone, and it can serve as a strong first step in understanding what information of yours needs to be locked down.

To learn what information about you has been exposed online, use our free scanner below.

KDE 6 release: D-Bus and Polkit galore

3 April 2024 at 15:57

The SUSE security team restricts the installation of system wide D-Bus services and Polkit policies in openSUSE distributions and derived SUSE products. Any package that ships these features needs to be reviewed by us first, before it can be added to production repositories.

In November, openSUSE KDE packagers approached us with a long list of KDE components for an upcoming KDE6 major release. The packages needed adjusted D-Bus and Polkit whitelistings due to renamed interfaces or other breaking changes. Looking into this many components at once was a unique experience that also led to new insights, which will be discussed in this article.

For readers that are new to D-Bus and/or Polkit, the following sections offer a summary to get a better idea about these systems.

↫ Matthias Gerstner

You don’t get these kinds of in-depth looks at how a major new release like KDE 6 gets implemented in a popular distribution like openSUSE. What’s especially crazy is that this only really covers D-Bus and Polkit, and those are just two of the countless aspects of openSUSE affected by KDE 6.

Making the Law Accessible in Europe and the USA

14 March 2024 at 17:46

Special thanks to EFF legal intern Alissa Johnson, who was the lead author of this post.

Earlier this month, the European Union Court of Justice ruled that harmonized standards are a part of EU law, and thus must be accessible to EU citizens and residents free of charge.

While it might seem like common sense that the laws that govern us should be freely accessible, this question has been in dispute in the EU for the past five years, and in the U.S. for over a decade. At the center of this debate are technical standards, developed by private organizations and later incorporated into law. Before they were challenged in court, standards-development organizations were able to limit access to these incorporated standards through assertions of copyright. Regulated parties or concerned citizens checking compliance with technical or safety standards had to do so by purchasing these standards, often at significant expense, from private organizations. While free alternatives, like proprietary online “reading rooms,” were sometimes available, these options had their own significant downsides, including limited functionality and privacy concerns.

In 2018, two nonprofits, Public.Resource.Org and Right to Know, made a request to the European Commission for access to four harmonized standards—that is, standards that apply across the European Union—pertaining to the safety of toys. The Commission refused to grant them access on the grounds that the standards were copyrighted.   

The nonprofits then brought an action before the General Court of the European Union seeking annulment of the Commission’s decision. They made two main arguments. First, that copyright couldn’t be applicable to the harmonized standards, and that open access to the standards would not harm the commercial interests of the European Committee for Standardization or other standard setting bodies. Second, they argued that the public interest in open access to the law should override whatever copyright interests might exist. The General Court rejected both arguments, finding that the threshold for originality that makes a work eligible for copyright protection had been met, the sale of standards was a vital part of standards bodies’ business model, and the public’s interest in ensuring the proper functioning of the European standardization system outweighed their interest in free access to harmonized standards.

Last week, the EU Court of Justice overturned the General Court decision, holding that EU citizens and residents have an overriding interest in free access to the laws that govern them. Article 15(3) of the Treaty on the Functioning of the EU and Article 42 of the Charter of Fundamental Rights of the EU guarantee a right of access to documents of Union institutions, bodies, offices, and agencies. These bodies can refuse access to a document where its disclosure would undermine the protection of commercial interests, including intellectual property, unless there is an overriding public interest in disclosure.

Under the ECJ’s ruling, standards written by private companies, but incorporated into legislation, now form part of EU law. People need access to these standards to determine their own compliance. While compliance with harmonized standards is not generally mandatory, it is in the case of the toy safety standards in question here. Even when compliance is not mandatory, products that meet technical standards benefit from a “presumption of conformity,” and failure to conform can impose significant administrative difficulties and additional costs.

Given that harmonized standards are a part of EU law, citizens and residents of member states have an interest in free access that overrides potential copyright concerns. Free access is necessary for economic actors “to ascertain unequivocally what their rights and obligations are,” and to allow concerned citizens to examine compliance. As the U.S. Supreme Court noted in in 2020, “[e]very citizen is presumed to know the law, and it needs no argument to show that all should have free access” to it.

The Court of Justice’s decision has far-reaching effects beyond the four toy safety standards under dispute. Its reasoning classifying these standards as EU law applies more broadly to standards incorporated into law. We’re pleased that under this precedent, EU standards-development organizations will be required to disclose standards on request without locking these important parts of the law behind a paywall.

SXSW Tried to Silence Critics with Bogus Trademark and Copyright Claims. EFF Fought Back.

13 March 2024 at 19:01

Special thanks to EFF legal intern Jack Beck, who was the lead author of this post.

Amid heavy criticism for its ties to weapons manufacturers supplying Israel, South by Southwest—the organizer of an annual conference and music festival in Austin—has been on the defensive. One tool in their arsenal: bogus trademark and copyright claims against local advocacy group Austin for Palestine Coalition.

The Austin for Palestine Coalition has been a major source of momentum behind recent anti-SXSW protests. Their efforts have included organizing rallies outside festival stages and hosting an alternative music festival in solidarity with Palestine. They have also created social media posts explaining the controversy, criticizing SXSW, and calling on readers to email SXSW with demands for action. The group’s posts include graphics that modify SXSW’s arrow logo to add blood-stained fighter jets. Other images incorporate patterns evoking SXSW marketing materials overlaid with imagery like a bomb or a bleeding dove.

Graphic featuring parody of SXSW arrow logo and a bleeding dove in front of a geometric background, with the text "If SXSW wishes to retain its credibility, it must change course by disavowing the normalization of militarization within the tech and entertainment industries."

One of Austin for Palestine's graphics

Days after the posts went up, SXSW sent a cease-and-desist letter to Austin for Palestine, accusing them of trademark and copyright infringement and demanding they take down the posts. Austin for Palestine later received an email from Instagram indicating that SXSW had reported the post for violating their trademark rights.

We responded to SXSW on Austin for Palestine’s behalf, explaining that their claims are completely unsupported by the law and demanding they retract them.

The law is clear on this point. The First Amendment protects your right to make a political statement using trademark parodies, whether or not the trademark owner likes it. That’s why trademark law applies a different standard (the “Rogers test”) to infringement claims involving expressive works. The Rogers test is a crucial defense against takedowns like these, and it clearly applies here. Even without Rogers’ extra protections, SXSW’s trademark claim would be bogus: Trademark law is about preventing consumer confusion, and no reasonable consumer would see Austin for Palestine’s posts and infer they were created or endorsed by SXSW.

SXSW’s copyright claims are just as groundless. Basic symbols like their arrow logo are not copyrightable. Moreover, even if SXSW meant to challenge Austin for Palestine’s mimicking of their promotional material—and it’s questionable whether that is copyrightable as well—the posts are a clear example of non-infringing fair use. In a fair use analysis, courts conduct a four-part analysis, and each of those four factors here either favors Austin for Palestine or is at worst neutral. Most importantly, it’s clear that the critical message conveyed by Austin for Palestine’s use is entirely different from the original purpose of these marketing materials, and the only injury to SXSW is reputational—which is not a cognizable copyright injury.

SXSW has yet to respond to our letter. EFF has defended against bogus copyright and trademark claims in the past, and SXSW’s attempted takedown feels especially egregious considering the nature of Austin for Palestine’s advocacy. Austin for Palestine used SXSW’s iconography to make a political point about the festival itself, and neither trademark nor copyright is a free pass to shut down criticism. As an organization that “dedicates itself to helping creative people achieve their goals,” SXSW should know better.

EFF to Ninth Circuit: There’s No Software Exception to Traditional Copyright Limits

11 March 2024 at 18:31

Copyright’s reach is already far too broad, and courts have no business expanding it any further, particularly where that reframing will undermine adversarial interoperability. Unfortunately, a federal district court did just that in the latest iteration of Oracle v. Rimini, concluding that software Rimini developed was a “derivative work” because it was intended to interoperate with Oracle's software, even though the update didn’t use any of Oracle’s copyrightable code.

That’s a dangerous precedent. If a work is derivative, it may infringe the copyright in the preexisting work from which it, well, derives. For decades, software developers have relied, correctly, on the settled view that a work is not derivative under copyright law unless it is “substantially similar” to a preexisting work in both ideas and expression. Thanks to that rule, software developers can build innovative new tools that interact with preexisting works, including tools that improve privacy and security, without fear that the companies that hold rights in those preexisting works would have an automatic copyright claim to those innovations.

That’s why EFF, along with a diverse group of stakeholders representing consumers, small businesses, software developers, security researchers, and the independent repair community, filed an amicus brief in the Ninth Circuit Court of Appeals explaining that the district court ruling is not just bad policy, it’s also bad law.  Court after court has confronted the challenging problem of applying copyright to functional software, and until now none have found that the copyright monopoly extends to interoperable software absent substantial similarity. In other words, there is no “software exception” to the definition of derivative works, and the Ninth Circuit should reject any effort to create one.

The district court’s holding relied heavily on an erroneous interpretation of a 1998 case, Micro Star v. FormGen. In that case, the plaintiff, FormGen, published a video game following the adventures of action hero Duke Nukem. The game included a software tool that allowed players themselves to build new levels to the game and share them with others. Micro Star downloaded hundreds of those user-created files and sold them as a collection. When FormGen sued for copyright infringement, Micro Star argued that because the user files didn’t contain art or code from the FormGen game, they were not derivative works.

The Ninth Circuit Court of Appeals ruled against Micro Star, explaining that:

[t]he work that Micro Star infringes is the [Duke Nukem] story itself—a beefy commando type named Duke who wanders around post-Apocalypse Los Angeles, shooting Pig Cops with a gun, lobbing hand grenades, searching for medkits and steroids, using a jetpack to leap over obstacles, blowing up gas tanks, avoiding radioactive slime. A copyright owner holds the right to create sequels and the stories told in the [user files] are surely sequels, telling new (though somewhat repetitive) tales of Duke’s fabulous adventures.

Thus, the user files were “substantially similar” because they functioned as sequels to the video game itself—specifically the story and principal character of the game. If the user files had told a different story, with different characters, they would not be derivative works. For example, a company offering a Lord of the Rings game might include tools allowing a user to create their own character from scratch. If the user used the tool to create a hobbit, that character might be considered a derivative work. A unique character that was simply a 21st century human in jeans and a t-shirt, not so much.

Still, even confined to its facts, Micro Star stretched the definition of derivative work. By misapplying Micro Star to purely functional works that do not incorporate any protectable expression, however, the district court rewrote the definition altogether. If the court’s analysis were correct, rightsholders would suddenly have a new default veto right in all kinds of works that are intended to “interact and be useable with” their software. Unfortunately, they are all too likely to use that right to threaten add-on innovation, security, and repair.

Defenders of the district court’s approach might argue that interoperable software will often be protected by fair use. As copyrightable software is found in everything from phones to refrigerators, fair use is an essential safeguard for the development of interoperable tools, where those tools might indeed qualify as derivative works. But many developers cannot afford to litigate the question, and they should not have to just because one federal court misread a decades-old case.

Save Your Twitter Account

By: Rory Mir
25 January 2024 at 19:02

We're taking part in Copyright Week, a series of actions and discussions supporting key principles that should guide copyright policy. Every day this week, various groups are taking on different elements of copyright law and policy, addressing what's at stake and what we need to do to make sure that copyright promotes creativity and innovation.

Amid reports that X—the site formerly known as Twitter—is dropping in value, hindering how people use the site, and engaging in controversial account removals, it has never been more precarious to rely on the site as a historical record. So, it’s important for individuals to act now and save what they can. While your tweets may feel ephemeral or inconsequential, they are part of a greater history in danger of being wiped out.

Any centralized communication platform, particularly one operated for profit, is vulnerable to being coopted by the powerful. This might mean exploiting users to maximize short-term profits or changing moderation rules to silence marginalized people and promote hate speech. The past year has seen unprecedented numbers of users fleeing X, Reddit, and other platforms over changes in policy

But leaving these platforms, whether in protest, disgust, or boredom, leaves behind an important digital record of how communities come together and grow.

Archiving tweets isn’t just for Dril and former presidents. In its heyday, Twitter was an essential platform for activists, organizers, journalists, and other everyday people around the world to speak truth to power and fight for social justice. Its importance for movements and building community was noted by oppressive governments around the world, forcing the site to ward off data requests and authoritarian speech suppression

A prominent example in the U.S. is the movement for Black Lives, where activists built momentum on the site and found effective strategies to bring global attention to their protests. Already though, #BlackLivesMatter tweets from 2014 are vanishing from X, and the site seems to be blocking and disabling  tools from archivists preserving this history.

In documenting social movements we must remember social media is not an archive, and platforms will only store (and gate keep) user work insofar as it's profitable, just as they only make it accessible to the public when it is profitable to do so. But when platforms fail, with them goes the history of everyday voices speaking to power, the very voices organizations like EFF fought to protect. The voice of power, in contrast, remains well documented.

In the battleground of history, archival work is cultural defense. Luckily, digital media can be quickly and cheaply duplicated and shared. In just a few minutes of your time, the following easy steps will help preserve not just your history, but the history of your community and the voices you supported.

1. Request Your Archive

Despite the many new restrictions on Twitter access, the site still allows users to backup their entire profile in just a few clicks.

  • First, in your browser or the X app, navigate to Settings. This will look like three dots, and may say "More" on the sidebar.

  • Select Settings and Privacy, then Your Account, if it is not already open.

  • Here, click Download an archive of your data

  • You'll be prompted to sign into your account again, and X will need to send a verification code to your email or text message. Verifying with email may be more reliable, particularly for users outside of the US.

  • Select Request archive

  • Finally—wait. This process can take a few days, but you will receive an email once it is complete. Eventually you will get an email saying that your archive is ready. Follow that link while logged in and download the ZIP files.

2. Optionally, Share with a Library or Archive.

There are many libraries, archives, and community groups who would be interested in preserving these archives. You may want to reach out to a librarian to help find one curating a collection specific to your community.

You can also request that your archive be preserved by the Internet Archive's Wayback Machine. While these steps are specific to the Internet Archive. We recommend using a desktop computer or laptop, rather than a mobile device.

  • Unpack the ZIP file you downloaded in the previous section.
  • In the Data folder, select the tweets.js file. This is a JSON file with just your tweets. JSON files are difficult to read, but you can convert it to a CSV file and view them in a spreadsheet program like Excel or LibreOffice Calc as a free alternative.
  • With your accounts and tweets.js file ready, go to the Save Page Now's Google Sheet Interface and select "Archive all your Tweets with the Wayback Machine.”

  • Fill in your Twitter handle, select your "tweets.js" file from Step 2 and click "Upload."

  • After some processing, you will be able to download the CSV file.
  • Import this CSV to a new Google Sheet. All of this information is already public on Twitter, but if you notice very sensitive content, you can remove those lines. Otherwise it is best to leave this information untampered.
  • Then, use Save Page Now's Google Sheet Interface again to archive from the sheet made in the previous step.
  • It may take hours or days for this request to fully process, but once it is complete you will get an email with the results.
  • Finally, The Wayback Machine will give you the option to also preserve all of your outlinks as well. This is a way to archive all the website URLs you shared on Twitter. This is an easy way to further preserve the messages you've promoted over the years.

3. Personal Backup Plan

Now that you have a ZIP file with all of your Twitter data, including public and private information, you may want to have a security plan on how to handle this information. This plan will differ for everyone, but these are a few steps to consider.

If you only wish to preserve the public information you already successfully shared with an archive, you can delete the archive. For anything you would like to keep but may be sensitive, you may want to use a tool to encrypt the file and keep it on a secure device.

Finally, even if this information is not sensitive, you'll want to be sure you have a solid backup plan. If you are still using Twitter, this means deciding on a schedule to repeat this process so your archive is up to date. Otherwise, you'll want to keep a few copies of the file across several devices. If you already have a plan for backing up your PC, this may not be necessary.

4. Closing Your Account

Finally, you'll want to consider what to do with your current Twitter account now that all your data is backed up and secure.

(If you are planning on leaving X, make sure to follow EFF on Mastodon, Bluesky or another platform.)

Since you have a backup, it may be a good idea to request data be deleted on the site. You can try to delete just the most sensitive information, like your account DMs, but there's no guarantee Twitter will honor these requests—or that it's even capable of honoring such requests. Even EU citizens covered by the GDPR will need to request the deletion of their entire account.

If you aren’t concerned about Twitter keeping this information, however, there is some value in keeping your old account up. Holding the username can prevent impersonators, and listing your new social media account will help people on the site find you elsewhere. In our guide for joining mastodon we recommended sharing your new account in several places. However, adding the new account to one's Twitter name will have the best visibility across search engines, screenshots, or alternative front ends like nitter.

It's Copyright Week 2024: Join Us in the Fight for Better Copyright Law and Policy

22 January 2024 at 14:12

We're taking part in Copyright Week, a series of actions and discussions supporting key principles that should guide copyright policy. Every day this week, various groups are taking on different elements of copyright law and policy, addressing what's at stake and what we need to do to make sure that copyright promotes creativity and innovation.

Copyright law affects so much of our daily lives, and new technologies have only helped make everyone more and more aware of it. For example, while 1998’s Digital Millennium Copyright Act helped spur the growth of platforms for creating and sharing art, music and literature, it also helped make the phrase “blocked due to a claim by the copyright holder” so ubiquitous.

Copyright law helps shape the movies we watch, the books we read, and the music we listen to. But it also impacts everything from who can fix a tractor to what information is available to us to when we communicate online. Given that power, it’s crucial that copyright law and policy serve everyone.

Unfortunately, that’s not the way it tends to work. Instead, copyright law is often treated as the exclusive domain of major media and entertainment industries. Individual artists don’t often find that copyright does what it is meant to do, i.e. “promote the progress of science and useful arts” by giving them a way to live off of the work they’ve done. The promise of the internet was to help eliminate barriers between creators and audiences, so that voices that traditional gatekeepers ignored could still find success. Through copyright, those gatekeepers have found ways to once again control what we see.

12 years ago, a diverse coalition of Internet users, non-profit groups, and Internet companies defeated the Stop Online Piracy Act (SOPA) and the PROTECT IP Act (PIPA), bills that would have forced Internet companies to blacklist and block websites accused of hosting copyright-infringing content. These were bills that would have made censorship very easy, all in the name of copyright protection.

We continue to fight for a version of copyright that truly serves the public interest. And so, every year, EFF and a number of diverse organizations participate in Copyright Week. Each year, we pick five copyright issues to highlight and promote a set of principles that should guide copyright law and policy. This year’s issues are:

  • Monday: Public Domain
    The public domain is our cultural commons and a crucial resource for innovation and access to knowledge. Copyright should strive to promote, and not diminish, a robust, accessible public domain.
  • Tuesday: Device and Digital Ownership 
    As the things we buy increasingly exist either in digital form or as devices with software, we also find ourselves subject to onerous licensing agreements and technological restrictions. If you buy something, you should be able to truly own it – meaning you can learn how it works, repair it, remove unwanted features, or tinker with it to make it work in a new way.
  • Wednesday: Copyright and AI
    The growing availability of AI, especially generative AI trained on datasets that include copyrightable material, has raised new debates about copyright law. It’s important to remember the limitations of copyright law in giving the kind of protections creators are looking for.
  • Thursday: Free Expression and Fair Use 
    Copyright policy should encourage creativity, not hamper it. Fair use makes it possible for us to comment, criticize, and rework our common culture.
  • Friday: Copyright Enforcement as a Tool of Censorship
    Freedom of expression is a fundamental human right essential to a functioning democracy. Copyright should encourage more speech, not act as a legal cudgel to silence it.

Every day this week, we’ll be sharing links to blog posts and actions on these topics at https://www.eff.org/copyrightweek and at #CopyrightWeek on X, formerly known as Twitter.

❌
❌