<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    >

<channel>
    <title>Webmonkey &#187; Jon Brodkin &#8211; Ars Technica</title>
    <atom:link href="http://www.webmonkey.com/author/jon-brodkin-ars-technica/feed/" rel="self" type="application/rss+xml" />
    <link>http://www.webmonkey.com</link>
    <description>The Web Developer&#039;s Resource</description>
    <lastBuildDate>Mon, 06 May 2013 17:29:19 +0000</lastBuildDate>
    <language>en-US</language>
    <sy:updatePeriod>hourly</sy:updatePeriod>
    <sy:updateFrequency>1</sy:updateFrequency>
    <generator>http://wordpress.org/?v=3.4.2</generator>
    
    <item>
        <title>Google&#8217;s New Privacy Policy: What Has Changed and What You Can Do About It</title>
        <link>http://www.webmonkey.com/2012/03/googles-new-privacy-policy-what-has-changed-and-what-you-can-do-about-it/</link>
        <comments>http://www.webmonkey.com/2012/03/googles-new-privacy-policy-what-has-changed-and-what-you-can-do-about-it/#comments</comments>
        <pubDate>Thu, 01 Mar 2012 19:14:39 +0000</pubDate>

                <dc:creator>Jon Brodkin - Ars Technica</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=54701</guid>
        		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Google]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2012/03/google-privacy-changes-w.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2012/03/google-privacy-changes-w.jpg" alt="Google&#8217;s New Privacy Policy: What Has Changed and What You Can Do About It" /></div>Today's the day Google's new privacy policy takes effect. It's too late to pull out your data now, but there are still some not-completely-foolproof ways to hide from Google.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><a href="http://arstechnica.com/tech-policy/news/2012/03/googles-new-privacy-policy-what-has-changed-and-what-you-can-do-about-it.ars"><img src="http://www.webmonkey.com/wp-content/uploads/2010/07/ars-technica1.jpg" /></a>Today&#8217;s the day Google&#8217;s broad new privacy policy goes into effect. European regulators are <a href="http://arstechnica.com/tech-policy/news/2012/03/google-privacy-change-taking-effect-today-is-illegal-eu-officials-say.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">claiming it violates data protection laws</a>, but it&#8217;s here and it may be here to stay. </p>
<p>There are some not-completely-foolproof ways to hide from Google, but first let&#8217;s talk about what&#8217;s changed. Prior to today, Google had more than 70 privacy policies for its various products. But with the company trying to create a seamless experience across search, Gmail, Google+, Google Docs, Picasa, and much more, Google is consolidating the majority of its policies down into just one document covering most of its products. This will make it easier for Google to track users for the purpose of serving up personalized ads. </p>
<p><!--page 1--></p>
<p>&#8220;The main change is for users with Google Accounts,&#8221; <a href="http://googleblog.blogspot.com/2012/01/updating-our-privacy-policies-and-terms.html">Google said</a> at the time of its January announcement. &#8220;Our new Privacy Policy makes clear that, if you&#8217;re signed in, we may combine information you&#8217;ve provided from one service with information from other services. In short, we&#8217;ll treat you as a single user across all our products, which will mean a simpler, more intuitive Google experience.&#8221;</p>
<p>An example? Google search results can already bring up Google+ posts or photos that have been shared with the user. &#8220;But there&#8217;s so much more that Google can do to help you by sharing more of your information with &#8230; well, you,&#8221; Google said. &#8220;We can make search better&#8212;figuring out what you really mean when you type in Apple, Jaguar or Pink. We can provide more relevant ads too. For example, it&#8217;s January, but maybe you&#8217;re not a gym person, so fitness ads aren&#8217;t that useful to you. We can provide reminders that you&#8217;re going to be late for a meeting based on your location, your calendar and an understanding of what the traffic is like that day. Or ensure that our spelling suggestions, even for your friends&#8217; names, are accurate because you&#8217;ve typed them before.&#8221;</p>
<p>Today, Google&#8217;s <a href="http://googleblog.blogspot.com/2012/02/googles-new-privacy-policy.html">official blog</a> reminded users of the change, saying it had been the subject of &#8220;a fair amount of chatter and confusion.&#8221;&nbsp;</p>
<p>The <a href="http://www.google.com/policies/privacy/">updated policy can be read online</a>, and describes how Google collects device information, search queries, cellphone-related data, location information, and collects and stores information on users&#8217; devices with the use of HTML5 technology, browser storage, application data caches, and cookies and other &#8220;anonymous identifiers.&#8221;</p>
<p>Before the changes, Google was &#8220;restricted in our ability to combine your YouTube and Search histories with other information in your account,&#8221; Google Privacy Director Alma Whitten wrote in the company blog. Now Google can provide a simpler, easier-to-understand privacy policy to users, and improve its products &#8220;in ways that help our users get the most from the web,&#8221; Whitten wrote. </p>
<p>Google recently promised to follow Do Not Track guidelines in an <a href="http://arstechnica.com/tech-policy/news/2012/02/can-do-not-track-tame-the-webs-cookie-monsters.ars">agreement with the White House</a>, but those changes won&#8217;t take effect until sometime later in the year. With Google&#8217;s expanded ability to serve up personalized ads, the company makes certain privacy promises. For example, &#8220;when showing you tailored ads, we will not associate a cookie or anonymous identifier with sensitive categories, such as those based on race, religion, sexual orientation or health.&#8221;</p>
<p>The policy <a href="http://arstechnica.com/business/news/2012/01/new-google-privacy-policy-wont-affect-apps-for-business-government.ars">does not affect most business customers</a>, those who have a signed contract with Google to use Google Apps for Government, Business, or Education. Those of us with free accounts will be affected, and while there are ways to anonymize your Google usage they&#8217;re not universally effective. Google&#8217;s privacy policy notes that &#8220;You may also set your browser to block all cookies, including cookies associated with our services, or to indicate when a cookie is being set by us.&#8221; However, Google was recently found to be serving up advertising cookies to users of <a href="http://arstechnica.com/tech-policy/news/2012/02/google-hit-with-ftc-complaint-says-circumventing-safari-privacy-features-accidental.ars">Safari</a> and Internet Explorer using methods of circumventing the browsers&#8217; default privacy settings. </p>
<p>So what else can you do? Most browsers today have private surfing modes that you can select. You can visit Google&#8217;s &#8220;<a href="http://www.dataliberation.org/">Data Liberation Front</a>&#8221; website for instructions in exporting data out of Google products. The Electronic Frontier Foundation also has <a href="https://www.eff.org/deeplinks/2012/02/how-remove-your-google-search-history-googles-new-privacy-policy-takes-effect">instructions on removing your Google search history</a> from your account. However, even this is not as simple as it sounds. Disabling Web History in your Google account &#8220;will not prevent Google from gathering and storing this information and using it for internal purposes,&#8221; the EFF notes. </p>
<p>Google does hand over user data in response to government requests on a regular basis, as noted in the company&#8217;s <a href="http://www.google.com/transparencyreport/governmentrequests/">Transparency Report</a>. The EFF notes that disabling Web History &#8220;does not change the fact that any information gathered and stored by Google could be sought by law enforcement.&#8221;</p>
<p>If your account has Web History enabled, Google will keep the records indefinitely. &#8220;With it disabled, they will be partially anonymized after 18 months, and certain kinds of uses, including sending you customized search results, will be prevented,&#8221; the EFF states. </p>
<p>For those who are really willing to put some work into staying anonymous, downloading a <a href="https://www.torproject.org/">Tor client</a> may be the right step. Tor encrypts your web traffic and sends it through a randomly selected series of computers, preventing shadowy third parties from learning what sites you visit or where you&#8217;re located. The Tor Project even played a role in <a href="http://arstechnica.com/tech-policy/news/2012/02/tors-latest-project-helps-iran-get-back-online-amidst-internet-censorship-regime.ars">helping Iranians get back online</a> after a recent government crackdown on Internet usage.</p>
<p><em>This article originally appeared on <a href="http://www.arstechnica.com/">Ars Technica</a>, Wired&#8217;s sister site for in-depth technology news.</em></p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2012/03/googles-new-privacy-policy-what-has-changed-and-what-you-can-do-about-it/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>Google Tricks Internet Explorer into Accepting Tracking Cookies, Microsoft Claims</title>
        <link>http://www.webmonkey.com/2012/02/google-tricks-internet-explorer-into-accepting-tracking-cookies-microsoft-claims/</link>
        <comments>http://www.webmonkey.com/2012/02/google-tricks-internet-explorer-into-accepting-tracking-cookies-microsoft-claims/#comments</comments>
        <pubDate>Tue, 21 Feb 2012 13:59:35 +0000</pubDate>

                <dc:creator>Jon Brodkin - Ars Technica</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=54497</guid>
        		<category><![CDATA[Browsers]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[IE]]></category>
        <description><![CDATA[Last week Google was caught bypassing Safari's cookie blocking mechanisms, now Microsoft claims Google is doing something similar to Internet Explorer users. This time, however, Google isn't the only one; it turns out numerous websites bypass IE's cookie protections.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><a href="http://arstechnica.com/tech-policy/news/2012/02/google-tricks-internet-explorer-into-accepting-tracking-cookies-microsoft-claims.ars"><img src="http://www.webmonkey.com/wp-content/uploads/2010/07/ars-technica1.jpg" /></a>Google was caught last week bypassing default privacy settings in the Safari browser in order to serve up tracking cookies. The company <a href="http://arstechnica.com/tech-policy/news/2012/02/google-hit-with-ftc-complaint-says-circumventing-safari-privacy-features-accidental.ars">claimed</a> the situation was an accident and limited only to the Safari web browser, but today Microsoft claimed Google is doing much the same thing with Internet Explorer.</p>
<p>In a blog post titled &#8220;<a href="http://blogs.msdn.com/b/ie/archive/2012/02/20/google-bypassing-user-privacy-settings.aspx">Google bypassing user privacy settings</a>&#8221; Microsoft&#8217;s IE Corporate Vice President Dean Hachamovitch states that &#8220;When the IE team heard that Google had bypassed user privacy settings on Safari, we asked ourselves a simple question: is Google circumventing the privacy preferences of Internet Explorer users too? We&#8217;ve discovered the answer is yes: Google is employing similar methods to get around the default privacy protections in IE and track IE users with cookies.&#8221;</p>
<p>Hachamovitch explains that IE&#8217;s default configuration blocks third-party cookies unless presented with a &#8220;P3P (Platform for Privacy Preferences Project) Compact Policy Statement&#8221; indicating that the site will not use the cookie to track the user. Microsoft accuses Google of sending a string of text that tricks the browser into thinking the cookie won&#8217;t be used for tracking. &#8220;By sending this text, Google bypasses the cookie protection and enables its third-party cookies to be allowed rather than blocked,&#8221; Microsoft said. </p>
<p>The text allegedly sent by Google actually reads &#8220;This is not a P3P policy&#8221; and includes a link to a <a href="http://support.google.com/accounts/bin/answer.py?hl=en&amp;answer=151657">Google page</a> which says cookies used to secure and authenticate Google users are needed to store user preferences, and that the P3P protocol &#8220;was not designed with situations like these in mind.&#8221;</p>
<p>Microsoft said it has contacted Google to ask the company to &#8220;commit to honoring P3P privacy settings for users of all browsers.&#8221; Microsoft also updated the Tracking Protection Lists in IE9 to prevent the tracking described by Hachamovitch in the blog post. Ars has contacted Google to see if the company has any response to the Microsoft allegations, and we&#8217;ll update this post if we hear back. </p>
<p><strong>UPDATE</strong>: It turns out Facebook and many other sites are using an almost identical scheme to override Internet Explorer&#8217;s privacy setting, according to&nbsp;<a href="http://www.techpolicy.com/Cranor_InternetExplorerPrivacyProtectionsBeingCircumvented-by-Google.aspx">privacy researcher Lorrie Faith Cranor</a> at Carnegie Mellon University. &#8220;Companies have discovered that they can lie in their [P3P policies] and nobody bothers to do anything about it,&#8221; Cranor wrote in a recent blog post. </p>
<p><strong>UPDATE 2</strong>: Google has gotten back to us with a lengthy reply, arguing that Microsoft&#8217;s reliance on P3P forces outdated practices onto modern websites, and points to a <a href="http://bits.blogs.nytimes.com/2010/09/17/a-loophole-big-enough-for-a-cookie-to-fit-through/">study</a> conducted in 2010 (the <a href="http://www.cylab.cmu.edu/files/pdfs/tech_reports/CMUCyLab10014.pdf">Carnegie Mellon research</a> from Cranor and her colleagues) that studied 33,000 sites and found about a third of them were circumventing P3P in Internet Explorer. </p>
<p>&#8220;Microsoft uses a &#8216;self-declaration&#8217; protocol (known as &#8216;P3P&#8217;) dating from 2002 under which Microsoft asks websites to represent their privacy practices in machine-readable form,&#8221; Google Senior VP of Communications and Policy Rachel Whetstone says in a statement e-mailed to Ars. &#8220;It is well known&#8212;including by Microsoft&#8212;that it is impractical to comply with Microsoft&#8217;s request while providing modern web functionality.&#8221; </p>
<p>Facebook&#8217;s &#8220;Like&#8221; button, the ability to sign into websites using your Google account &#8220;and hundreds more modern web services&#8221; would be broken by Microsoft&#8217;s P3P policy, Google says. &#8220;It is well known that it is impractical to comply with Microsoft&#8217;s request while providing this web functionality,&#8221; Whetstone said. &#8220;Today the Microsoft policy is widely non-operational.&#8221;</p>
<p>That 2010 research even calls out Microsoft&#8217;s own msn.com and live.com for providing invalid P3P policy statements. The research paper further states that &#8220;Microsoft&#8217;s support website recommends the use of invalid CPs as a work-around for a problem in IE.&#8221; </p>
<p><em>This article originally appeared on <a href="http://www.arstechnica.com/">Ars Technica</a>, Wired&#8217;s sister site for in-depth technology news.</em></p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2012/02/google-tricks-internet-explorer-into-accepting-tracking-cookies-microsoft-claims/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>Future Chrome Version May Choose Your Passwords, and Change Them When You&#8217;ve Been Hacked</title>
        <link>http://www.webmonkey.com/2012/02/future-chrome-version-may-choose-your-passwords-and-change-them-when-youve-been-hacked/</link>
        <comments>http://www.webmonkey.com/2012/02/future-chrome-version-may-choose-your-passwords-and-change-them-when-youve-been-hacked/#comments</comments>
        <pubDate>Mon, 20 Feb 2012 18:24:51 +0000</pubDate>

                <dc:creator>Jon Brodkin - Ars Technica</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=54475</guid>
        		<category><![CDATA[Browsers]]></category>
		<category><![CDATA[chrome]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2012/02/chrome_suggestion-200x100.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2012/02/chrome_suggestion.jpg" alt="Future Chrome Version May Choose Your Passwords, and Change Them When You&#8217;ve Been Hacked" /></div>Google is experimenting with a security system that automatically generates passwords for users of its Chrome web browser. Eventually the system might even be smart enough to change all your passwords if it detects that your account has been hijacked.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><a href="http://arstechnica.com/business/news/2012/02/first-look-mozillas-boot2gecko-mobile-platform-and-gaia-ui.ars"><img src="http://www.webmonkey.com/wp-content/uploads/2010/07/ars-technica1.jpg" /></a>Google&#8217;s Chrome development team is working on a system to automatically generate passwords, which would help users secure their online identities with passwords that would be diversified across different sites, and are randomized and thus harder to guess. Detailed in developer documentation on the <a href="https://sites.google.com/a/chromium.org/dev/developers/design-documents/password-generation">Chromium Project site</a>, the system would detect account sign-up pages and &#8220;add a small UI element to the password field&#8221; giving the user the option of letting Chrome manage the password for them. </p>
<p>Initial versions of the system would create passwords on an individual basis, at the user&#8217;s request. But Google&#8217;s development team states that &#8220;At some point in the future it might also be possible for us to automatically change all of a user&#8217;s passwords when we realize that their account is hijacked.&#8221; The developer documentation notes that the feature would make Google &#8220;a higher value hijacking target,&#8221; than it already is, although &#8220;Google is already a high value target so this shouldn&#8217;t change much.&#8221; </p>
<p>Chrome can already store passwords, a common feature in modern browsers, and it&nbsp;<a href="http://support.google.com/chrome/bin/answer.py?hl=en&amp;answer=165139">syncs them across computers</a>, with the passwords encrypted in transit and at rest in Google data centers. The idea of auto-generating passwords is not new, either. Password management software such as 1Password and LastPass can already generate passwords and automatically input them into web forms. But these tools cost money and require additional software downloads. Although it&#8217;s not clear when it will become available, Google&#8217;s scheme would make storing and generating passwords a pre-installed feature of the browser.</p>
<div id="attachment_54479" class="wp-caption aligncenter" style="width: 590px"><img src="http://www.webmonkey.com/wp-content/uploads/2012/02/chrome_suggestion.jpg" alt="" title="chrome_suggestion" width="580" height="423" class="size-full wp-image-54479" /><p class="wp-caption-text">Mockup of a potential future version of Chrome which would auto-generate passwords. Image from the Chromium Project.</p></div>
<p>The first challenge noted by the Chrome development team is detecting sign-up pages, which is accomplished by looking for elements such as &#8220;an account name field and two password fields.&#8221; Next, the Chrome password generator must come up with a secure password that meets the site&#8217;s requirements&#8212;many sites require digits, special characters or certain lengths. Because the password generator may choose a password that doesn&#8217;t meet the site&#8217;s requirements, the user is given a chance to review the suggested password before selecting it. </p>
<p>&#8220;If they accept the prompt then we pop up a small box which is prepopulated with what we think is an acceptable random password,&#8221; the Chromium development document says. &#8220;The reason we don&#8217;t just choose a password for them is that many sites have requirements (e.g. must have one digit, must be alphanumeric, must be between 6 and 20 characters) some of which may be contradictory between sites. So we will choose a default generator that will work on most sites, but users may need to change our password if it doesn&#8217;t work.&#8221;</p>
<p>The Chromium team is still looking for a &#8220;way to authenticate to the browser to enable this feature,&#8221; and will have to find a workaround for sites that have autocomplete turned off.</p>
<p>&#8220;Any website that has autocomplete turned off will not be able to be protected,&#8221; the document states. &#8220;Going by current phishing attacks, this means that 40-70% of phishing pages can&#8217;t be protected against. Once this feature is rolled out we probably want to see if we can get around this problem. Maybe we can get users to re-authenticate to the browser before logging into such sites.&#8221;</p>
<h3>How much do you trust Google?</h3>
<p>Google is often criticized for <a href="http://arstechnica.com/tech-policy/news/2012/02/google-hit-with-ftc-complaint-says-circumventing-safari-privacy-features-accidental.ars">invading users&#8217; privacy</a>, as the company makes much of its revenue by serving up personalized ads to users based on their web browsing habits and even the <a href="https://support.google.com/mail/bin/answer.py?hl=en&amp;answer=6603&amp;from=1217362&amp;rd=1">contents of their e-mail</a>. However, the development of technology to generate more secure passwords seems like a good-faith effort to protect users from online attacks, and isn&#8217;t so far removed from the already-existing practice of browsers storing passwords.</p>
<p> Google&#8217;s password-generator will likely be appealing to many because of the sheer convenience of it. But users will have to decide for themselves just how much of their online activities they want to trust with Google. </p>
<p>In the long run, Chrome developers say the solution should be browser sign-in coupled with the OpenID authentication standard. However, &#8220;getting most sites on the Internet to use OpenID will take a while,&#8221; the Chrome team states. &#8220;In the meantime it would be nice to have a way to achieve the same affect of having the browser control authentication.&#8221; Since many people re-use passwords across sites, randomization will go a long way toward better security, making it harder for attackers to steal a user&#8217;s entire online identity. </p>
<p><em>This article originally appeared on <a href="http://www.arstechnica.com/">Ars Technica</a>, Wired&#8217;s sister site for in-depth technology news.</em></p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2012/02/future-chrome-version-may-choose-your-passwords-and-change-them-when-youve-been-hacked/feed/</wfw:commentRss>
        <slash:comments>1</slash:comments>

        
    </item>
    
    <item>
        <title>Mozilla Building Metro Version of Firefox for Windows 8</title>
        <link>http://www.webmonkey.com/2012/02/mozilla-building-metro-version-of-firefox-for-windows-8/</link>
        <comments>http://www.webmonkey.com/2012/02/mozilla-building-metro-version-of-firefox-for-windows-8/#comments</comments>
        <pubDate>Mon, 13 Feb 2012 18:48:11 +0000</pubDate>

                <dc:creator>Jon Brodkin - Ars Technica</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=54353</guid>
        		<category><![CDATA[Browsers]]></category>
		<category><![CDATA[firefox]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2012/02/firefox-orange-w.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2012/02/firefox-orange-w.jpg" alt="Mozilla Building Metro Version of Firefox for Windows 8" /></div>Mozilla is planning to build a dramatically different version of Firefox for Windows 8, one that will take advantage of the coming touch-friendly “Metro” user interface in Microsoft's next operating system.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><a href="http://arstechnica.com/microsoft/news/2012/02/mozilla-building-metro-version-of-firefox-for-windows-8.ars"><img src="http://www.webmonkey.com/wp-content/uploads/2010/07/ars-technica1.jpg" /></a>Mozilla developers are planning to build a dramatically different version of Firefox for Windows 8, a change necessitated by Microsoft&#8217;s use of the touch-friendly &#8220;Metro&#8221; user interface for PCs and tablets. </p>
<p>Mozilla describes its <a href="https://wiki.mozilla.org/Windows8">Windows 8 plans</a> as part of a <a href="https://wiki.mozilla.org/Firefox/Roadmap">2012 Strategy &amp; Roadmap</a> document updated yesterday. A technology proof-of-concept demonstrating the feasibility of Firefox in Windows 8 is planned for the second quarter of this year, with timing dependent on the release of Microsoft&#8217;s Windows 8 <a href="http://arstechnica.com/microsoft/news/2012/02/windows-8-consumer-preview-coming-29th-february.ars">consumer preview</a> and developer documentation. A Metro version may be necessary for Firefox to avoid being shut out of Windows 8 tablets <a href="http://arstechnica.com/microsoft/news/2012/02/windows-8-on-arm-the-desktop-is-there-sos-office-but-not-much-more.ars">running on ARM</a>, which will have only a limited &#8220;traditional&#8221; Windows desktop. But Mozilla is apparently planning Firefox builds both for the traditional Windows desktop environment and Metro. </p>
<p>&#8220;Windows 8 contains two application environments, &#8216;Classic&#8217; and &#8216;Metro,&#8217;&#8221; Mozilla notes. &#8220;Classic is very similar to the Windows 7 environment at this time, it requires a simple evolution of the current Firefox Windows product. Metro is an entirely new environment and requires a new Firefox front end and system integration points.&#8221;</p>
<p>Metro Firefox will be a new Gecko-based browser focused on touch interactions, with both full-screen and partial-screen modes, with the possibility of a live tile so that users can see updates on the Start screen. There are several unanswered questions, such as which programming language to use for building the Metro front end. Firefox product manager Asa Dotzler further notes that &#8220;This proposal depends on Microsoft providing the same capabilities for Firefox as it does for IE&#8212;running at the Medium level integrity process that allows us the full use of the Win32 API and what we need from Metro, or a set of APIs that allow Mozilla to port Gecko to the WinRT. For the purposes of this feature proposal, I&#8217;m assuming we&#8217;ll get the first and we won&#8217;t have to port the bulk of Gecko and instead will use the win32 dlls from within Metro.&#8221;</p>
<p>Firefox accounts for <a href="http://arstechnica.com/business/news/2012/02/2001-all-over-again-internet-explorer-6-share-grows-and-chrome-falls.ars">about 20 percent</a> of worldwide desktop browser market share, but has lost ground to Google Chrome over the past year. Chrome will presumably have a Metro version for Windows 8 as well, but Google has made no official announcement.</p>
<p><em>This article originally appeared on <a href="http://www.arstechnica.com/">Ars Technica</a>, Wired&#8217;s sister site for in-depth technology news.</em></p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2012/02/mozilla-building-metro-version-of-firefox-for-windows-8/feed/</wfw:commentRss>
        <slash:comments>1</slash:comments>

        
    </item>
    
    <item>
        <title>Protesting SOPA: How to Make Your Voice Heard</title>
        <link>http://www.webmonkey.com/2012/01/protesting-sopa-how-to-make-your-voice-heard/</link>
        <comments>http://www.webmonkey.com/2012/01/protesting-sopa-how-to-make-your-voice-heard/#comments</comments>
        <pubDate>Wed, 18 Jan 2012 14:06:12 +0000</pubDate>

                <dc:creator>Jon Brodkin - Ars Technica</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=53793</guid>
        		<category><![CDATA[Web Basics]]></category>
		<category><![CDATA[SOPA]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2012/01/stopsopa-200x100.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2012/01/stopsopa.jpg" alt="Protesting SOPA: How to Make Your Voice Heard" /></div>This week, "call your Congressperson" is not just a cliche. It’s one of the most important things you can do to make your voice heard.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><a href="http://arstechnica.com/tech-policy/news/2012/01/protesting-sopa-what-you-can-do.ars"><img src="http://www.webmonkey.com/wp-content/uploads/2010/07/ars-technica1.jpg" /></a>This week, &#8220;call your Congressperson&#8221; is not just a cliché. It&#8217;s one of the most important things you can do to make your voice heard.</p>
<p><a href="http://arstechnica.com/tech-policy/news/2012/01/wikipedia-to-join-reddit-in-sopa-blackout-wednesday.ars">As Ars readers know</a>, Wikipedia, reddit, Craigslist, and others are blacking out their sites today in protest of the Stop Online Piracy Act (SOPA) and Protect IP Act (PIPA), antipiracy bills that protestors believe would give far too much power to rightsholders at the expense of the Internet as a whole. </p>
<p>Members of Congress are already <a href="http://arstechnica.com/tech-policy/news/2012/01/under-voter-pressure-members-of-congress-backpedal-on-sopa.ars">backpedaling on some of the provisions in SOPA and PIPA</a>, and Rep. Darrell Issa (R-CA) said Tuesday that he expects to have more co-sponsors for his alternative (and much saner) <a href="http://arstechnica.com/tech-policy/news/2011/12/censorship-foes-roll-out-antipiracy-plan-say-stop-butchering-the-internet.ars">OPEN Act</a> than &#8220;than SOPA has in the House.&#8221; </p>
<p>SOPA opponents say it is critical to block the bill now, because if it is turned into law website owners will be at risk of having payments blocked, or forced into lengthy and expensive litigation even if they&#8217;re not trying to enable piracy or profit from it. </p>
<p>&#8220;Scribd could not have come into existence in a world governed by SOPA,&#8221; said Scribd co-founder Jared Friedman during a conference call yesterday. Alexis Ohanian, co-founder of reddit (which shares a parent company with Ars Technica), said much the same thing about Internet entrepreneurs. &#8220;I&#8217;d hate to be the Congressperson who has to go back to his or her district and say, &#8216;You know what, maybe this is not the industry for you. Maybe you can try your luck in Canada.&#8217;&#8221;</p>
<p>Video hosting site Veoh found out the hard way what litigation can do to an Internet business, even when the law is on your side. Veoh was &#8220;litigated to death&#8221; before being <a href="http://arstechnica.com/tech-policy/news/2009/09/judge-safe-harbor-applies-to-veoh-umg-lawsuit-eviscerated.ars">finally cleared</a> in a lawsuit filed against the site by Universal Music Group. &#8220;The lawsuit dramatically impacted our company,&#8221; said founder Dmitry Shapiro. &#8220;It cost us millions of dollars to litigate. It took up a tremendous amount of executives&#8217; time. More importantly, it dramatically demotivated our 120 employees who were constantly concerned about what this meant and what would happen to them and their families.&#8221; </p>
<p>Veoh&#8217;s defense, that it was eligible for safe harbor protection under the Digital Millennium Copyright Act, <a href="http://arstechnica.com/tech-policy/news/2011/12/appeals-court-reaffirms-dmca-protection-for-user-generated-content.ars">was upheld on appeal</a>. But it was too late—Shapiro laid everyone off and sold the company in a fire sale. </p>
<p>Friedman said he&#8217;s grateful to Shapiro, because Veoh&#8217;s &#8220;success&#8221; in defending itself helped Scribd fend off its own legal threats. But SOPA would weaken safe harbor protections and give copyright owners a &#8220;private right of action&#8221; to go after money and ad networks, making it even more difficult for future Veohs to gain traction. </p>
<p>You don&#8217;t have to be a digital pirate to oppose SOPA, Issa added. &#8220;We don&#8217;t want people taking brand-new movies and putting them online and prospering while the actual creator of the art is denied,&#8221; Issa said. But OPEN, by focusing on the money supply through the International Trade Commission, would target the vast majority of abuses that SOPA intends to prevent without resorting to censorship, he argued. &#8220;We think we can do 80 percent of the good with almost no trauma.&#8221;</p>
<p>&#8220;It is a great time to contact your members of Congress, make sure they know there is an alternative, and that there is a reason to slow down and get it right,&#8221; Issa added.</p>
<h3>Contact your senator or representative</h3>
<p>Sending a message to our elected leaders&#8217; underlings has never been easier. Old-fashioned phone calls count for a lot; they take effort to make, and so they indicate opposition in a way that a mass form e-mail never will. The <a href="http://www.senate.gov/general/contact_information/senators_cfm.cfm">official Senate site</a> lists the phone numbers and links to contact forms for all senators, while the <a href="https://writerep.house.gov/writerep/welcome.shtml">House</a> has a handy tool that lets you search for your representative by ZIP code and state.</p>
<p>If you&#8217;re having trouble thinking of something to say, various anti-SOPA and anti-PIPA organizations can help. <a href="http://www.publicknowledge.org/e-parasite-stop-online-piracy-act">Public Knowledge</a>&nbsp;has a form for sending letters to senators describing why PIPA is &#8220;overbroad &#8230; ripe for abuse &#8230; [and] speeds fragmentation of the Internet.&#8221; The Electronic Frontier Foundation is providing a <a href="https://wfc2.wiredforchange.com/o/9042/p/dia/action/public/?action_KEY=8173">similar service</a> for contacting both senators and representatives, as is <a href="http://AmericanCensorship.org">AmericanCensorship.org</a>.</p>
<p>You can also sign several petitions. <a href="https://wwws.whitehouse.gov/petitions/!/petition/veto-sopa-bill-and-any-other-future-bills-threaten-diminish-free-flow-information/g3W1BscR">This one</a> urges President Barack Obama to veto SOPA should it ever come to his desk and has more than 51,000 signatures; it led to the <a href="http://arstechnica.com/tech-policy/news/2012/01/obama-administration-joins-the-ranks-of-sopa-skeptics.ars">Obama administration criticizing portions of SOPA</a>, saying that the administration &#8220;will not support legislation that reduces freedom of expression, increases cybersecurity risk, or undermines the dynamic, innovative global Internet.&#8221; </p>
</p>
<p>
<p>Another petition backed by Craigslist and reddit is <a href="http://act.boldprogressives.org/survey/survey_sopa_reddit/?source=inf">aimed at Congress and has 117,000 supporters</a>. Want to go further and convince your fellow humans that SOPA is bad? If you&#8217;re already an expert on SOPA or PIPA, another site lets you volunteer to to <a href="http://www.explainsopa.com/">explain it to newbies</a> on the phone or in person.</p>
<h3>Black out your website</h3>
<p>Many of you have your own personal websites. Just because you&#8217;re not as big as Wikipedia and reddit doesn&#8217;t mean you can&#8217;t join the blackout brigade or &#8220;<a href="http://sopastrike.com/">SOPA strike</a>,&#8221; as some are calling it. <a href="https://github.com/zachstronaut/stop-sopa">On GitHub</a>, one SOPA opponent is providing HTML that can be used to change a website&#8217;s homepage to a black screen which lights up when you move your cursor over the middle, revealing a <a href="http://www.zachstronaut.com/lab/text-shadow-box/stop-sopa.html">message of protest</a>:</p>
<div id="attachment_53799" class="wp-caption aligncenter" style="width: 590px"><img src="http://www.webmonkey.com/wp-content/uploads/2012/01/stopsopa.jpg" alt="" title="stopsopa" width="580" height="326" class="size-full wp-image-53799" /><p class="wp-caption-text">Your own website could look like this today—if you download a bit of code from GitHub</p></div>
<p>If you have a WordPress site, you can choose from <a href="http://wpmu.org/7-wordpress-plugins-to-fight-sopa-pipa/">several plugins</a> to make your point, including one that <a href="http://wordpress.org/extend/plugins/sopa-blackout-plugin/">lets you customize</a> which dates the blackout message appears and whether users see it on only their first visit or on all visits. <a href="http://americancensorship.org/modal/call-form-moz.html">Widgets</a> can also direct visitors to anti-SOPA or anti-PIPA petitions. For those who can&#8217;t or don&#8217;t want to go completely dark, there are &#8220;<a href="http://www.hellobar.com/pipa/">Stop PIPA</a>&#8221; bars to put at the top of your site, while one &#8220;SEO-friendly&#8221; protest tool created by <a href="https://www.cloudflare.com/apps/stop_censorship">CloudFlare</a>&nbsp;blacks out any word longer than five characters, making your site look like a redacted government document. Mucking with a site carries some danger of Google&#8217;s web-crawling bots not seeing it properly, but luckily a Google employee has posted a <a href="https://plus.google.com/115984868678744352358/posts/Gas8vjZ5fmB">handy guide</a> on what not to do.</p>
<h3>Boycott SOPA supporters</h3>
<p>If you&#8217;ve contacted your Congressperson, blacked out your website, and are still itching for more protest action, you can identify SOPA supporters and take the fight to them directly&#8212;or boycott their goods and services. One extension for Google Chrome, <a href="https://chrome.google.com/webstore/detail/gagmjmoimnkgoijihaaeodbefhcapjcj?utm_source=chrome-ntp-icon">called No SOPA</a>, warns you when you visit the website of a company that supports the legislation. &#8220;Boycott? Nasty letter time? You decide,&#8221; writes the maker of the extension.</p>
<p>There&#8217;s also quite an extensive <a href="http://judiciary.house.gov/issues/Rogue%20Websites/List%20of%20SOPA%20Supporters.pdf">list of SOPA supporters</a> on the website of chief SOPA backer Rep. Lamar Smith (R-TX). (GoDaddy was removed from this list after it was the victim of a successful boycott of the company.) </p>
<h3>The Internet speaks</h3>
<p>&#8220;This is the first time we&#8217;ve seen an Internet-based action,&#8221; Ohanian said yesterday. &#8220;There were no leaders of this movement.&#8221; But people from numerous political persuasions lined up in agreement that &#8220;this was terrible legislation that looked a lot more like lobbyist dollars at work. If you don&#8217;t believe this is an election issue already, it is already happening.&#8221; In fact, several &#8220;real life&#8221; protests and rallies are <a href="http://gigaom.com/2012/01/17/sopa-pipa-city-protests-rally-meetups/">happening today</a> in the streets of San Francisco, New York City, Seattle and perhaps other cities.&nbsp;</p>
<p>
<p>Just because SOPA and PIPA have plenty of opponents doesn&#8217;t mean they can&#8217;t pass. The bills still have sizable support from music and movie industry groups. Former US Senator Chris Dodd, now CEO of the Motion Picture Association of America, fired off a press release yesterday calling the SOPA blackout &#8220;<a href="http://arstechnica.com/tech-policy/news/2012/01/sopa-livesand-mpaa-calls-protests-an-abuse-of-power.ars">yet another gimmick</a>, albeit a dangerous one, designed to punish elected and administration officials who are working diligently to protect American jobs from foreign criminals.&#8221;</p>
<p>If you&#8217;re among those who disagree with Dodd, what are your plans now that SOPA blackout day is upon us? If you have any interesting protest ideas, feel free to share them in the comments.</p>
<p><em>This article originally appeared on <a href="http://www.arstechnica.com/">Ars Technica</a>, Wired&#8217;s sister site for in-depth technology news.</em></p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2012/01/protesting-sopa-how-to-make-your-voice-heard/feed/</wfw:commentRss>
        <slash:comments>5</slash:comments>

        
    </item>
    
    <item>
        <title>Worm Steals 45,000 Facebook Login Credentials, Infects Victims&#8217; Friends</title>
        <link>http://www.webmonkey.com/2012/01/worm-steals-45000-facebook-login-credentials-infects-victims-friends/</link>
        <comments>http://www.webmonkey.com/2012/01/worm-steals-45000-facebook-login-credentials-infects-victims-friends/#comments</comments>
        <pubDate>Thu, 05 Jan 2012 18:08:18 +0000</pubDate>

                <dc:creator>Jon Brodkin - Ars Technica</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=53491</guid>
        		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social]]></category>
		<category><![CDATA[facebook]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2012/01/facebook-logo-w.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2012/01/facebook-logo-w.jpg" alt="Worm Steals 45,000 Facebook Login Credentials, Infects Victims&#8217; Friends" /></div>Ramnit, a worm first discovered in April 2010, has made the leap from Windows to Facebook, where it's using stolen login credentials to spread itself through the social networking site.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><a href="http://arstechnica.com/business/news/2012/01/worm-steals-45000-facebook-login-credentials-infects-victims-friends.ars"><img src="http://www.webmonkey.com/wp-content/uploads/2010/07/ars-technica1.jpg" /></a>A worm previously used to commit financial fraud is now stealing Facebook login credentials, compromising at least 45,000 Facebook accounts with the goals of transmitting malicious links to victims&#8217; friends and gaining remote access to corporate networks.</p>
<p>The security company Seculert has been <a href="http://blog.seculert.com/2012/01/ramnit-goes-social.html">tracking the progress of Ramnit</a>, a worm first discovered in April 2010, and <a href="http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Win32/Ramnit">described by Microsoft</a> as &#8220;multi-component malware that infects Windows executable files, Microsoft Office files and HTML files&#8221; in order to steal &#8220;sensitive information such as saved FTP credentials and browser cookies.&#8221; Ramnit has previously been used to &#8220;bypass two-factor authentication and transaction signing systems, gain remote access to financial institutions, compromise online banking sessions and penetrate several corporate networks,&#8221; Seculert says.</p>
<p>Recently, Seculert set up a sinkhole and discovered that 800,000 machines were infected between September and December. Moreover, Seculert found that more than 45,000 Facebook login credentials, mostly in the UK and France, were stolen by a new variant of the worm.</p>
<p>&#8220;We suspect that the attackers behind Ramnit are using the stolen credentials to log-in to victims&#8217; Facebook accounts and to transmit malicious links to their friends, thereby magnifying the malware&#8217;s spread even further,&#8221; Seculert said. &#8220;In addition, cybercriminals are taking advantage of the fact that users tend to use the same password in various web-based services (Facebook, Gmail, Corporate SSL VPN, Outlook Web Access, etc.) to gain remote access to corporate networks.&#8221;</p>
<p>Facebook fraud, of course, is nothing new. <a href="http://arstechnica.com/gadgets/news/2011/10/facebook-sees-600000-compromised-logins-per-day006-of-all-logins.ars">Facebook itself has acknowledged seeing 600,000 compromised logins each day</a>, although that accounts for just 0.06 percent of the one billion Facebook logins each day.</p>
<p><em>This article originally appeared on <a href="http://www.arstechnica.com/">Ars Technica</a>, Wired&#8217;s sister site for in-depth technology news.</em></p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2012/01/worm-steals-45000-facebook-login-credentials-infects-victims-friends/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    </channel>
</rss>
