National Pecan Pie Day Shortbread

Eight is Enough

  1. C|Net has RIAA’s sales numbers: A closer look
  2. 9 to 5 Mac: New Mac Pros and MacBook Airs to launch this week with OS X Lion
  3. Expreview: Specs of Intel Xeon E5 Sandy Bridge-EP CPUs surfaced
  4. Fudzilla reports Bulldozer performance figures are in

    and AMD’s triple-core Llano gets tested and

    retailers dumping GTX 480 boards for €200

  5. The Register: ARM daddy simulates human brain with million-chip super
  6. Netbooknews: Solar-powered Samsung NC215s netbook up for preorder at $399
  7. AppleInsider: Apple issues iOS beta 3 with notifications, AirPlay mirroring fixes
  8. Microsoft makes it official: New beta of Windows Intune 2.0 available for download

National Pecan Pie Day

  1. DoJ: We can force you to decrypt that laptop – C|Net
  2. TUAW reports W3C goes after Apple on HTML5 patenting
  3. TechFlash reports U.S. & Canadian judges approve $4.5B Nortel patent sale

    and Amazon-backed LivingSocial closing in on $1B IPO and

    Microsoft, Parallels invest $5M in cloud-based medical data system

    and RealNetworks invests in social video service ClipSync

  4. The Official hp Palm Blog: Next steps for hp webOS
  5. All About Microsoft: Why Microsoft CEO Steve Ballmer is so bullish on Bing

    and what’s on Steve Ballmer’s Microsoft priority list now?

  6. Ars Technica: AntiSec targets learn the hard way that whitelists > blacklists

    and judge rules “locker” site is not direct copyright infringer and

    ISPs flip-flop: why do they now support “six strikes” plan?

  7. WinBeta reports PayPal predicts the end of the wallet by 2015

Hardware news

  1. PCWorld: Malware comes with many gadgets, Homeland Security admits
  2. VR-Zone reports Sapphire’s Pure Platinum Z68 almost here
  3. Ars Technica reports next-generation memory tech outperforms flash
  4. TC Magazine: PQI introduces 1TB H567L/V portable hard drives

    and Scythe rockin’ new 3.5″ and 5.25″ multi-purpose racks

  5. StorageReview reports Addonics releases 1:11 HDD duplicator
  6. VR-Zone reports 1Gbit/s 802.11ac Wi-Fi demoed by NTT
  7. Dealzon’s deals: $120 off 15.6” Asus A52F-XE4 Pentium, $150 coupon for 14.5”

    hp Envy 14 Beats Edition Sandy Bridge, $30 coupon 21.5” hp Omni 200xt all-in-

    one PC, and $32 off Logitech K750 wireless solar keyboard


  1. Ars Technica: 28% of U.S. smartphone owners use them as primary ‘net connection
  2. Media tablet sales lag optimistic first quarter targets,

    but forecast remains strong, according to IDC

  3. Microsoft CEO: Windows Phone 7 not successful yet – PCWorld
  4. TUAW: GetJar responds to Apple’s cease-and-desist over App Store term
  5. CNNMoney: Apple users buying 61% more apps, paying 14% more per app
  6. PreCentral reports head of webOS Ari Jaaksi responds to TouchPad reviewers
  7. Notebook Italia spots 3G Asus Eee Pad Transformer (in Italian)
  8. Android Developers Blog: New mode for apps on large screens
  9. VR-Zone: HTC to start unlocking devices via firmware updates this August

    and Gingerbread update for HTC Desire to arrive by the end of July and

    Motorola XT531 Domino+ touchscreen Android smartphone to launch in

    August and Samsung Nexus S goes to space on NASA’s final space shuttle

  10. Fudzilla reports LG Optimus 2X to get Gingerbread in July
  11. HuffPost Tech reports Philadelphia Media Network to sell

    Android tablets featuring preloaded newspaper content

  12. TC Magazine: iRiver Story HD e-reader packs Google eBooks support, to debut this week
  13. SuperSite for Windows looks back at Zune, Zune 2 & Zune 2.5


  1. Wired on how digital detectives deciphered Stuxnet, the most menacing malware in history
  2. Win Rumors: Microsoft has sold 100 million copies of Office 2010 since launch
  3. Microsoft’s ‘Aurora’ hybrid cloud server is available, but Office 365 add-on not until fall
  4. SuperSite for Windows looks back at Windows Home Server
  5. AppleInsider: Apple says Mac OS X Lion due soon, invites developers to submit apps
  6. KDE shows second release candidate of summer release
  7. CentOS 6.0 release notes
  8. Firefox 8 is 20% faster than Firefox 5, matches Chrome 14
  9. Chromium 14.0.818.0
  10. wPrime 2.05 multithreaded benchmark


  1. Shacknews reports Left 4 Dead 2 ‘Dead Air’ will unlock early

    and Star Wars Galaxies’ closure explained and

    Batman: Arkahm City trailer showcases Riddler

    and DC Universe Online getting Green Lantern DLC

    and Saints Row: The Third offers pre-order DLC, teases ‘Season Pass’

  2. Joystiq reports Fallout New Vegas: Old World Blues trailer is a big ol’ pile of crazy
  3. Fudzilla reports no XP support for Battlefield 3
  4. Ars Technica on how a $60 in-game item almost destroyed Eve Online

    and developer-led Xbox Live Indies promotion returns

  5. Expreview’s Obutto gaming cockpit review
  6. VR-Zone’s Alice: Madness Returns PC game review
  7. Shacknews reports Space Invaders movie optioned

    and Play for Japan album available on iTunes

  8. Steam summer camp sale – last last day (deals end this morning)


  1. TR alum Dustin Sklavos on CyberPower’s Compal PBL21: The shark’s new teeth
  2. AnandTech’s Gigabyte Z68X-UD3H-B3 review
  3. The SSD Review on ASRock Z68 Extreme 4
  4. Futurelooks posts Asus Sabertooth P67 (B3 revision) review
  5. Hi Tech Legion’s Asus F1A75-V Pro motherboard review
  6. TweakTown reviews 64GB Patriot Supersonic Magnum USB 3.0 drive
  7. Hi Tech Legion posts Duke Nukem Forever benchmarks:

    3D Vision tested on all Nvidia 500 series video cards

  8. Hardware Canucks review HIS HD 6970 IceQ Turbo & HD 6950 IceQ X Turbo X
  9. [H]ard|OCP’s Gigabyte GTX 560 Ti OC video card review
  10. Funky Kit reviews Rasurbo Xange gaming case
Comments closed
    • BenBasson
    • 8 years ago

    [quote<]C|Net has RIAA's sales numbers: A closer look[/quote<] ... who the hell bought music on 8-track in 2010?

    • ClickClick5
    • 8 years ago

    “IV. Fudzilla reports Bulldozer performance figures are in…”

    Still with a grain of salt, but at least this is SOMETHING.
    The day Scott throws up an actual review…TR will need a new server just to hold the traffic for that page.

    • willmore
    • 8 years ago

    [b<]wPrime 2.05 multithreaded benchmark [/b<] Ronald, love the shortbreads, but can I ask one thing? When there are links like this for new versions of software, they tend to be to download sites. Sites which rarely tell you what the program does. Sure, GIYF, but could we have a stock list of homepages for some of these programs so that we can answer for lazy people (like me) "why would I care that a new version of FoorBar2 is available?" Pretty please?

      • Ronald
      • 8 years ago

      Not sure what you mean here since this is in fact wPrime’s home page:

      [url<][/url<] [url<][/url<] [url<][/url<] [url<][/url<] (wPrime build log)

        • willmore
        • 8 years ago

        You’re quite right, I picked a horrible example. I’ll be quiet and go stand in this corner over here.

    • WillBach
    • 8 years ago

    [quote<]The Register: ARM daddy simulates human brain with million-chip super[/quote<] I'm a regular reader of "The Reg" but I really dislike their British tendency to exaggerate wildly in headlines. Steve "ARM daddy" Furber hasn't simulated a human brain. He hasn't taped out the processors he wants to use. He hasn't even decided on how many cores said processor should have. And when he does decide, tape out, order, build, debug, and simulate, he'll be simulating 1% of a human brain. It's cool research, and a cool application, but it's not a brain simulation today.

    • willmore
    • 8 years ago

    [b<]VR-Zone reports 1Gbit/s 802.11ac Wi-Fi demoed by NTT [/b<] I'm not even sure what the author of this article is even trying to say. Between the writing style and the technical issues, I'm not even sure where to begin. Let's just review some facts. The draft of 802.11ac came out a couple of months ago. The final version isn't expected for *two more years*. That's sort of a long time in this industry. Yes, things are expected to improve in that time. Six antennas is not a lot. If you're trying to do spatial stream multiplexing and/or beamforming *and* support multiple users, then six really doesn't seem like a lot at all. Considering that the wavelengths are half the size of those at 2.4GHz, more antennas are easier to support. Looking at the spec, it supports up to 8 spatial streams and that could easily mean eight or more antennas for an AP. Stations can have much fewer--depending on how much BW they need. I just wish they hadn't used 'ac' as the suffix as that's going to get people confused with the data-over-power devices.

    • Arag0n
    • 8 years ago

    Firefox 8? WOW

    what an stupid way to increase their version number in a short time!

      • indeego
      • 8 years ago

      So now we have two very popular stupid browsers?

      I must admit I’ve been in the beta channel for Firefox for some time and I just dipped out because it was getting annoying approving extensions that were not compatible with the beta. Several did NOT work properly even with compatibility checking disabled (greasemonkey scripts, Reddit Enhancement Suite.)

      At work I’ve had to deal with some users whining about older extensions that worked fine under 4 breaking on 5 due to lack of maintenance. One user just went back to IE9 “cause it works”. I think Mozilla may want to reconsider this if people are leaving your browser for IE.

        • sweatshopking
        • 8 years ago

        i left FF for opera, and haven’t looked back. If opera has issues, i jump to ie9. FF isn’t even installed on my computer anymore, and it’s been there for almost a decade…

      • oldog
      • 8 years ago

      Haven’t the Firefox folks figured out that the browser wars are over?

      It is almost impossible to live without two or three browsers due to internet wonkiness and almost everyone has one go to favorite and two browsers for those frustrating times when only one specific browser seems to work well on a specific site.

      I say, bring back the good ol’ days. Three cheers for the simple world of XP and IE6.

    • NeelyCam
    • 8 years ago

    [quote<]C|Net has RIAA's sales numbers: A closer look[/quote<] A ~50% revenue reduction in five years... no wonder they are freaking out.

    • StuG
    • 8 years ago

    DoJ: We can force you to decrypt that laptop – C|Net

    Couldn’t the person simply say “Oh sorry, I forgot it. Was meaning to reformat the computer anyway” and be totally free of this mess? I mean, they can’t harass you for a pass-phrase you forgot.

      • NeelyCam
      • 8 years ago

      Next up: “Forgetting is now a class-C felony.”

      • mesyn191
      • 8 years ago

      Judge can rule you in contempt of court and you spend time in lock up until you give in.

      • destroy.all.monsters
      • 8 years ago

      Chances are excellent they’ll jail you. If they want you bad enough they may torture you like they are Manning. They might want to screw you hard just because a) they can, and b) intimidation is one of the primary methods of compliance in law enforcement. All of this under the auspices of “this oughta help you remember buddy”.

      Not to mention that it’ll be the FBI knocking on your door – not the DOJ. FBI has been a network of thugs since its inception.

      You’re probably better off just destroying the drive (depending on what you’re accused of) and doing the time for that (which will likely be minimal). If you’re looking for an alternative I don’t know of one. Frankly something like a deadhand switch would be ideal. Then the hilarious part of it would be that the feds destroy the data themselves.

      You might be held in contempt for awhile though.

      As to the original post – I’ll be interested if this sets a precedent on how the 5th amendment is going to be interpreted. I’m in agreement with the EFF on this.

      • Hattig
      • 8 years ago

      The better option is an encryption mechanism that utilised a duress code. When the person gives up the duress code (instead of the passphrase) the encryption program decrypts an alternative hidden partition/file/portion of the encrypted data instead of the actual encrypted data. It could even wipe the actual encrypted data for what that is worth.

      To the investigator, it looks like they’ve unlocked the file and they have data (the data being anything of yours that doesn’t incriminate you, but looks worth encrypting – bill statements, etc). It’s not obvious like deleting the file when the duress code is entered – a pointless measure.

      One thing is that re-encrypting the de-crypted duress data with the same password has to generate the same file as before. I.e., the encryption program has to truly mask that there was ever any other data in that file. I’m sure that there are ways to do this, but I’m not a security/cipher expert. Better ask Bruce Schneier or other renowned security experts.

      For small amounts of data (think kilobytes rather than megabytes) you might be better off using steganography (along with encryption). Hiding that data within your desktop background image(s), you can at least have an internal chuckle that the investigators are looking at the data all the time without knowing. And with desktop backgrounds being so large (e.g., multi-monitor could be 7680×1600 = 12288000 pixels or 49MB of raw data – allowing you to hide over a MB of hidden data within each desktop background file). And heaven knows what you could hide within some raw home movies…

        • NeelyCam
        • 8 years ago

        [quote<]It could even wipe the actual encrypted data for what that is worth.[/quote<] I would say that constitutes "obstruction of justice"...

          • destroy.all.monsters
          • 8 years ago

          They still have to prove it though. Depending on what you’re accused of you really might want to destroy rather than have to rely on the 5th amendment. Contempt generally is 2 years or less – and in minimum security.

            • NeelyCam
            • 8 years ago

            I see – we’re discussing how to minimize the punishment for being evil.. My mistake; I thought we were talking about what is legal, and how to make sure evildoers are punished.

            • destroy.all.monsters
            • 8 years ago

            Evil is a relative term. The government is prosecuting whistleblowers at an unprecedented rate at the moment. If Bradley Manning had been less talkative and created more plausible deniability for himself he might be in a better position.

            It isn’t about “being evil”. There is plenty evil that you can do legally.

            If you were accused of something – even if you didn’t do it – that doesn’t mean that you want to give all your information to a prosecutor whose only interest is in your being a notch in their belt.

            You do realize that innocent people go to prison all the time, right? And that you neither get recompense or the years you spent inside back.

            • NeelyCam
            • 8 years ago

            All true. I should’ve been more clear, and not bring up the ultimately arbitrary term “legal”.

            I would say there is “right” and “wrong”, and although the lines blur somewhat in the middle, there are rather clear extremes. What I was talking about is protecting oneself from getting persecuted for doing something “wrong” on a legality like the 5th amendment.

            Nonetheless, whatever can be considered evil or just depends entirely on the point of view. “Stealing” music from RIAA while they are raping artists? Killing civilians in the name of “collateral damage” when battling “terrorists” in a country far away? Hacking off someone’s arm off because he took your food (to feed his family), resulting in you not being able to feed your family?

            I wish everyone could be open and honest about everything without worrying about wrongful persecution… but that’s not how things are in our world today. Someone would just simply take advantage of that. Lying and being evil, selfish and greedy gives one an advantage. The justice system is trying to balance that out… failing miserably.

            Selfishness and greed are the underlying sources of all that’s wrong in all the societies today. I know that’s what evolution “tells” us to do, but that’s far away from a stable Nash Equilibrium sort of state. So no: greed is [b<]not[/b<] good.

          • Hattig
          • 8 years ago

          Hence ‘for what that is worth’. They’re going to have bit-level copies of your hard drive anyway. Deleting the data is the bullheaded option that is easily detectable. You want to avoid detection. Hence you provide alternative data to the investigator that looks reasonable. Hell, stick some mildly naughty stuff in there and then claim that the search was a fishing expedition if they ever try to use that instead.

          Sure, it’s obstruction of justice … but if it’s unprovable… and when the sentence for that is a fraction of the sentence for the actual crime it might be worthwhile even if it was proven.

          That doesn’t stop the real-world investigation efforts of course. If they have you on camera/tape doing the physical side of whatever crime you were meant to be doing then you’re out of luck. But in that case the computer data would have been icing on the cake anyway.

          Hell, store the data on a homeplug embedded somewhere very hard to find (plastered into the wall, etc). Make it non-discoverable unless you know the IP address, and even then accessing the data requires passwords, getting past encryption, steganography, etc.

        • destroy.all.monsters
        • 8 years ago

        I like this duress code idea. Pretty smart. I don’t know of disk encrypter that does that though.

        • indeego
        • 8 years ago

        The investigators all work off imaged data. Destroying the filesystem would be a shrug and they attack from a different angle. When they go to decrypt the disk/data they can see changes in the filesystem that would clue them off to what the defendant was trying to accomplish. Destruction of evidence might as well have a guilty charge with it in our current judicial environment.

        The EFF is right on this, stay silent and hold your ground, innocent or guilty.

          • mutarasector
          • 8 years ago

          “Destruction of evidence might as well have a guilty charge with it in our current judicial environment.”

          In addition to evidence tampering, it could also be used to prove to a jury a ‘conciousness of guilt’, even though it may purely circumstantial.

          The dumb thing of it is it would be more likely to convict you than if you were to murder your kid, and dump the remains in some Florida swamp, and then lie to investigators about it…

            • dashbarron
            • 8 years ago

            I still think her parents are screwy and mixed up in it.

      • NeelyCam
      • 8 years ago

      Overall, I find this case very fascinating. I can understand the arguments on both sides – it will be interesting to see how this one plays out.

      • Krogoth
      • 8 years ago

      Prosecution wants the easy way out.

      The most they can do is charge her with obstruction of justice, provided they have sufficent circumstantial evidence.

      Otherwise, they can piss off.

      Kids, this is why the 4th and 5th amendments exist. Then again, there are certain parties that want to do away with them under dubious jusifications, “WE GOTTA FIND T3H TERRORIST AND PEDOBEARS!”

        • NeelyCam
        • 8 years ago

        [quote<]Kids, this is why the 4th and 5th amendments exist.[/quote<] Why exactly? So people could break the law without getting punished? It's like saying search warrants should not be allowed because there might be some private things in one's home..?

          • destroy.all.monsters
          • 8 years ago

          I don’t know about you, but I expect the prosecution and the police to expend enough effort to do their job correctly. They should be able to prove the case without the contents of the drive anyway. If they can’t their case is weak.

          The smart thing to do is find someone that is good at decrypting or cracking passcodes and working from there. That would put the defense at a real disadvantage as to why the evidence should not be admitted.

          People break the law all kinds of ways, all of the time. People are also, at the same time, falsely accused and convicted all the time. We should be allowed the greatest amount of leeway in our privacy possible. As the EFF and the article stated this is primarily a 5th amendment issue. Do you disagree with that?

            • NeelyCam
            • 8 years ago

            I disagree with a lot of that. It’s exceedingly expensive to crack someone’s exceedingly solid encryption on a hard drive. Hacking it may already be too difficult or unfeasible to do with the current law enforcement budgets? Would your solution be increasing taxes to fund these efforts, or just let all those criminals be without any chance of prosecution?

            Far cheaper (and more feasible) would be to require the hard drive owner to decrypt the drive, or be thrown in jail for some to-be-determined amount of time. This should act as some sort of a deterrent for those who would otherwise do something “bad” with computers.

            The facts that “people break the law all kinds of ways” and “people are also….falsely accused and convicted” are very unfortunate… That’s the society we’re living in. For such a society, the justice system needs to find a difficult balance between the protection of citizens from wrongful convictions and protection of citizens from being abused by their selfish/greedy fellows. In that sense, no, we should [b<]not[/b<] allow the "greatest amount of leeway in our privacy as possible" - that would only incentivize further evil behavior as the deterrents are weakened. In my opinion, though, a better solution would be to try to figure out what exactly in our society pushes people to do "evil" things. Desperation because one can't feed himself/herself or the family? Worry about not being able to pay for health care? (you know, not paying those bills is also "criminal"...) This is why I personally think a northern european socialist states are better and more stable because the greed and desperation don't play such big roles in the way society works as they do here in the U.S.

          • mutarasector
          • 8 years ago

          Search warrants have been distorted into becoming a “fishing rod” tools. The point of SWs was to enable law enforcement investigators to go in a seize >specifically< enumerated/listed items. In a day an age where the legal profession and courts think >anything< can be indicted, including a ‘ham sandwich’, it’s rather obvious we’ve reached the Orwellian milestone, where the government/courts respect an individual’s 5th amendment rights no more. The State’s right to know, and take absurd and extreme measures (might make right) now reigns supreme with thinly veiled security imperatives. The courts have given the broadest interpretation to what constitutes ‘evidence’, to mean ‘anything that exists, and can be found’, and now expect defendants to reveal not only personal data, but to do the prosecuter’s work for them..

          We can thank Bush for the rapid acceleration of this, and Obama for its continuation with the Patriot Act & OHS expansion (Actually it really began in earnest back before that – the TCA of 1996, and DMCA).

          I can hardly wait to see how fast prosecutors try to make generalizations that the very act of encrypting personal data in the first place illustrates an automatic indication of ‘conciousness of guilt’ in front of juries, and withholding a password to decrypt files will practically cement this impression in juries’ minds.

Pin It on Pinterest

Share This