Copy Link
Add to Bookmark
Report

Atari Online News, Etc. Volume 17 Issue 20

eZine's profile picture
Published in 
Atari Online News Etc
 · 5 years ago

  

Volume 17, Issue 20 Atari Online News, Etc. May 29, 2015


Published and Copyright (c) 1999 - 2015
All Rights Reserved

Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor


Atari Online News, Etc. Staff

Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"


With Contributions by:

Fred Horvat



To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.

To download A-ONE, set your browser bookmarks to one of the
following sites:

http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org


Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/



=~=~=~=



A-ONE #1720 05/29/15

~ Sweden Busts Pirate Bay ~ People Are Talking! ~ View Retro Graphics!
~ Silk Roader Gets Life! ~ Hack United Airlines! ~ AdBlock Plus Legal!
~ Witcher 3: Wild Hunt! ~ Happy 35th, Pac-Man! ~ Web Domain Rush!
~ 4 Billion Still Offline ~ UK Anti-hacking Laws! ~ Web Access Subsidy?

-* First First-person Shooter! *-
-* US Senate Votes Down USA Freedom Act *-
-* US Stuxnet-style Attack on N. Korea Failed *-



=~=~=~=



->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""



Well, we've missed another issue last week, due to an extremely shortage
of material. This is the second time that this has occurred in about a
month. We've run "short" issues in the past, but not anything to the
levels we faced over the past month or so! Hopefully, this situation
will not become a "regular" problem!

Anyway, a belated unofficial beginning of summer greeting to you all!
Finally, we can look ahead rather than face any reminders of this past
dreadful winter! Temps in the 80's here as of late has been a welcome
change - although I have to admit that I'd certainly prefer to see temps
in the 60's and 70's!

Lots of interesting articles this week, especialy a number of them that
pertain to some enjoyable reading on some "retro" topics. It's always
nice to find stories that remind me/us of days of old! Keep reading,
and I'm sure that you'll agree!

Until next time...



=~=~=~=



View Hundreds of Retro Graphics Formats with RECOIL


Viewing images is easy these days. No matter which platform you’re on, or
what application you’re running, just about everyone uses the same
standard formats, and these can typically be displayed on your device’s
native viewer, with no need to install anything else.

In the early days of computing, 30+ years ago, it was different. There was
no JPG, no PNG, so companies like Atari and Commodore had their own
graphic formats. Even these weren’t fixed, with new variations all the
time, which makes it very difficult if you’d like to view any of them on
a modern computer.

RECOIL - Retro Computer Image Library – is a free collection of tools
which can display hundreds of formats from all the major computers of the
day: Amiga, Amstrad CPC, Apple II, Atari 8-bit, Atari Portfolio, Atari ST,
Atari Falcon, BBC Micro, Commodore 16, Commodore 64, Macintosh 128K, MSX,
SAM Coupé, ZX81 and ZX Spectrum.

Installing the package on a PC gets you a simple GUI viewer, RECOILWin.
This is extremely basic - no thumbnail browsing, no rotation or anything
else - but there’s the core functionality you need: back/ next, zoom in
and out, and - if you’d like to use the image elsewhere - the ability to
copy pictures to the clipboard or save them as PNGs.

A bundled thumbnail provider for Windows Explorer means you’re able to
see previews of supported formats without loading RECOILWin directly.

There are also plugins for many other image viewing and processing tools
(Paint.NET, ImageMagick, XnView, Imagine), along with a portable command
line image converter, an HTML 5-based viewer, an Android application and
more.

The core RECOIL engine is available itself in the "Formats" IrfanView
plugin, so if you’ve installed that already you probably don’t need the
stand-alone build. But otherwise this is a great collection of tools for
viewing early computer graphics. Recommended.



=~=~=~=



->In This Week's Gaming Section - ‘The Witcher 3: Wild Hunt’ Casts A Mean Spell!
""""""""""""""""""""""""""""" EA Reboots 'Need For Speed'
Happy 35th Birthday, Pac-Man!
And much more!



=~=~=~=



->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""



‘The Witcher 3: Wild Hunt’ Casts A Mean Spell


The problem with trying to review The Witcher 3: Wild Hunt is that it
requires you to stop playing The Witcher 3: Wild Hunt long enough to
write a review.
This is not easy.

It’s The Lord of the Rings by way of A Game of Thrones, an immense,
mature, character-driven fantasy that balances its ridiculously long
script with plenty of sword-swinging, spell-flinging action. It requires
time, patience, and more than a few reminders to your spouse that when
she said she would love you unconditionally, it was letting you play The
Witcher 3 every night until the crack of dawn for a month that you had
in mind.

What makes The Witcher 3 most remarkable, however, isn’t its potential to
derail your marriage; it’s how the game manages to be both intimate and
vast at the same time. A massive, open-world game with a great story?
Believe it. The Witcher 3 is one of the best role-playing games in years.

You once again play as the titular witcher, Geralt of Rivia, a gray-haired
monster-hunter tasked to track not a beast but his powerful protégé, Ciri.
She’s the closest thing Geralt has to a daughter (despite our hero’s
raging libido, witchers are infertile), and she’s being hunted by a group
of deadly, otherworldly knights.

If the names don’t ring a bell, you didn’t play the two prior Witcher
games (or read the half-dozen Polish novels on which they’re based), and
that’s fine. The developers at CD Projekt Red have done an admirable job
of keeping the game’s complex politics and character relationships
contained just enough to give you a flavor of the lore without drowning
you in it. You’ll doubtlessly be lost from time to time — Geralt did
what to whom, when? — but it’s never a deal breaker. The Witcher 3 keeps
its core plot focused and understandable at all times.

I can’t overstate how important this is. The Witcher 3’s story is meaty
and engaging, a gripping detective drama wrapped in a weathered cuirass.
The writing is superb, smoothly transitioning between dialogue options
despite an impossibly huge narrative tree. Choices abound in The
Witcher 3. Decisions you make in even the most innocuous quest can
potentially affect the way the broader story unfolds. It’s as though
you’re helping craft the story, not just simply thumbing through its
pages.

An example: During one of the many optional “Witcher Contract” quests,
which require you to track and kill a terrible beast, I made a few
questionable decisions regarding the fate of an evil presence lurking
inside a great tree. Should I kill it? Set it free? A dozen gameplay
hours later, tragedy struck a character in the main quest because of my
decision. I didn’t see it coming. This kind of path branching isn’t
exclusive to The Witcher 3, but I can’t remember another game that
handled it as seamlessly.

Unfortunately, like most games of this nature, The Witcher 3 can’t quite
figure out how to wrap itself up. The third act loses focus, running you
around the world in an awkwardly long goodbye.

But even managing to charge through the main plot is a feat in itself
because of the sheer number of things to do. You can follow the story
quests, pick up literally hundreds of side quests, or head toward the
nearest “Point of Interest” question mark and get into all kinds of
trouble. Or just wander: Head into the woods and pick some herbs for
potions, or dive into a lake and see if anything useful is buried at the
bottom. It’s even got its own collectible card game; you can waste hours
simply trying to win new cards from innkeepers. There are so many things
to do in The Witcher 3 that you’ll occasionally zone out while staring
at its busy map.

At times, the game world’s size can prove problematic. A moderately
helpful fast-travel system alleviates the strain of incessantly
criss-crossing the world, but invariably you’ll find yourself stuck in
the middle of nowhere and having to hoof it back to civilization … only
to find out once you get there that you have to return to wherever you
were to cue another quest. Note to future open-world game designers: How
about a better quest planner? I go to Target, I swing by Starbucks, I
stop by the dry cleaner, then I go home. I don’t race back and forth
like an idiot. Can’t I sketch out my video game quest schedule too?

The upside to roaming the treacherous world of Temeria is that it’s
gorgeous. Gripped in an unforgiving war, the land is teeming with life
and death. Frosty mountain passes, sun-drenched wheat fields, smoking
battlefields, glistening water lapping at the shore of a mysterious
island — the views are breathtaking. It’s also impressively detailed.
Every tree and rickety shack and random boulder looks as if it’s been
placed there by hand. The Witcher 3 is a master class in world-building.

The voice work, traditionally a bit hit or miss in games of this size, is
just as spot-on. From the haughty English of the Nilfgardian emperor
(played by Thrones’ Charles Dance) to the warm brogue of the Viking-like
Skelligers, I couldn’t find a voice actor I didn’t like.

Geralt’s beard even grows over time. You can shave it. It grows back.
Follicular simulation! This is a beautiful video game.

And a deadly one. Combat in The Witcher 3 is straightforward but
satisfying, featuring attack-and-parry swordplay alongside a handful of
upgradable battle spells. Smashing away can be effective on grunts, but
when you face a tougher foe, you can resort to the comprehensive bestiary
to get tips on what potions, spells, and bombs might work best. The magic
in particular gives you a real sense of power; watching wisps of flame
arc from your fingertips never gets old.

You’ll tangle with all kinds of wildly creative, grotesque enemies, but
it’s the big, scary ones that stand out. Whether it’s grounding an
archgriffon with a crossbow bolt, leaping in and out of range with your
sword as it lunges at you with its razor-sharp talons, or flanking a
cyclops and deftly dodging its earth-shaking fists, The Witcher 3
provides no shortage of heart-stopping melee moments.

At times, however, you’ll be fighting with the controls. The loose
auto-locking means you’re often stuck swinging at the wrong enemy.
Cliffside walks are unnecessarily harrowing, thanks to Geralt’s fidgety
walk. Simply standing in the right place to trigger the “Press X to
interact” signal can take an inordinate number of tries. The game’s
mechanics aren’t quite as polished as its world.

The good news is that you’ll calibrate to these nuances within a few
hours, which means you’ll be pretty comfy for the remaining 195 or so.
But The Witchers 3's size isn’t the reason you should play it. Play it
for its world, its craftsmanship, its startling ambition, and its
tremendous delivery. Play it because games of this quality and scope
don’t come along often. Just play it.



On the Road Again: EA Reboots 'Need For Speed'


After a year off, Electronic Arts racing franchise Need For Speed is back
on the road.

The video game publisher announced a new Need For Speed game will launch
this fall for PC, PlayStation 4 and Xbox One. The game is being developed
by Ghost Games, which created the last title in the franchise's library:
2013's Need For Speed Rivals.

Like Rivals, the revamped Need For Speed will feature an open world
structure, allowing players drive to any location and complete missions
in any order.

"There's a very strong element of narrative in this game, and something
that pulls you through the experience," says Marcus Nilsson, Ghost Games
executive producer, adding the game will also give players "the ability
to shape your car into what you want it to be and kind of develop that
emotional connection to it."

EA says it will reveal more details during the Electronic Entertainment
Expo in Los Angeles next month.



Blizzard Removes StarCraft Cigar - Guess Why


Blizzard's cross-franchise multiplayer online battle arena (MOBA) game
Heroes of the Storm is now available in open beta, and fans have noticed
that Tychus Findlay - originally from StarCraft - no longer has his
signature cigar.

In a recent post on Reddit, Blizzard explained that this is due to
varying criteria for a "teen" age rating in different regions.

Blizzard said there was a magnitude of guidelines the company had to
follow and decided to prioritise making Heroes and Skins as utilitarian
as possible by using a single character model for all regions.

"In the case of Tychus' cigar there were regions where he wouldn't be
allowed to smoke," Blizzard wrote. "We have two options.

According to Blizzard, removing Tychus' cigar from was a better use of
resources than making two versions of his character model.

"Making 2 versions means more data management, multiple duplicates of the
asset (if we update an animation, it has to propagate to all versions)
such as the the death ragdoll model, the facial animations, his morph
into the Odin, and apply that process to every skin as well. This
mountain of work affects multiple departments and has to be addressed
every time we'd adjust Tychus.

"Or: Remove the cigar. Put the development time into more content instead
of bloating the management of one character. This is a decision based on
productivity. The appeal of Tychus should not hinge on a cigar anyways,
and we have no issue with that aspect of his character."

Blizzard also faced trouble with other character aspects but chose to
spend time differenting them for seperate regions, such as removing the
character of Skelethur in some regions because of guidelines about the
depiction of human remains.

"It is a full time job managing those exceptions, and the less we have to
manage, the more time we can spend making more game!" Blizzard said.

Heroes of the Storm officially launches on June 3, but it's currently
going through a open beta testing phase. The game uses a similar model to
other MOBAs like League of Legends and DOTA 2: the game is free, and
players have access to a rotating roster of free characters, but can
optionally purchase permanent access on a per-character basis, as well as
additional skins.



=~=~=~=



->A-ONE Gaming Online - Online Users Growl & Purr!
"""""""""""""""""""



Happy 35th Birthday, Pac-Man!


The pellet-muching icon who helped transform gaming into a pop-culture
juggernaut is gobbling his way towards middle age. Pac-Man turns 35.

First released in Japan on May 22, 1980, the coin-op classic quickly
became a phenomenon, raking in over $1 billion worth of quarters over the
decade. He appeared on the cover of Time Magazine. He's adorned cereal
boxes, starred in a Saturday morning cartoon, and appeared on virtually
every gaming platform to have ever been released.

Credit Pac-Man's popularity to great timing, simple gameplay, and
instantly recognizable graphics, but according to creator Toru Iwatani,
Pac-Man's widespread appeal was entirely by design.

“The reason I created Pac-Man was because we wanted to attract female
gamers,” he said at a 2010 panel on the game. “Back then, there were no
home games. People had to go to the arcade center to play games. That was
a playground for boys. It was dirty and smelly. So we wanted to include
female players, so it would become cleaner and brighter.”

Pac-Man went on to become the world's best-known video game character,
beating out even Mario in a 2008 poll. But while you've undoubtedly spent
some time racing around a maze with him, you might not know him as well
as you think you do. Read on for a few little known Pac-facts.

Over 10 billion served?In the late 90s, Twin Galaxies, an organization
that tracks video game world record scores, visited used game auctions
and counted how many times the average Pac-Man machine had been played.
Multiplying those figures by the total number of machines that were
manufactured, they estimated over 10 billion plays in the 20th century.

Ghost protocol?The ghosts that chase Pac-Man around the maze have their
own quirks. Blinky, the red ghost, pursues Pac-Man most aggressively and
will even speed up slightly after you eat a certain number of dots. Pinky
tries to predict where Pac-Man will go and meet him there. The blue
ghost, Inky, will continually try to get right in front of Pac-Man,
while Clyde, the orange ghost, moves completely at random.

The First Lady?A few years years after Pac-Man stormed arcades, Namco
added a bow and lipstick and released Ms. Pac-Man, technically the first
playable female character in any video game.

He’s a life saver?Two Swedish airports have installed Ms. Pac-Man machines
to help travelers with spare time - and spare change - keep themselves
amused between flights. All of the money raised in the machines is donated
to the Red Cross and its operations.

There is such a thing as a perfect Pac-Man score. You'll need to eat every
dot, fruit, power pellet and ghost on the first 256 levels. At that point,
the game crashes to what’s commonly calld the “kill screen” and can’t be
played any further. Play it perfectly, and you'll end up with a score of
3,333,360.

Interested in playing it? You can do that for free in a few places. Google
honored Pac-Man's 30th birthday with a playable version of the game, and
it's still live. If you prefer to play it on a small screen, you can check
out Pac-Man Lite, a free iOS version that includes all 256 original
levels.



It Took 26 Years, But This PC Classic Now Has a Sequel on Steam


Nearly three decades after its predecessor debuted on platforms like
Atari Lynx and MS-DOS, Chip's Challenge 2 is now available on Steam.

As announced last month, the previously unreleased game is finally
launching after its release was prevented due to rights issues in the
early '90s. These are briefly detailed in a "History" section on the
game's Steam page, which I can't remember seeing before.

With those issues sorted out, you can now buy the standalone game on
Steam for $5. Alternatively, you can pick up a bundle that includes it,
the original, and a level editor ($3 on its own) for that same $5 price.
The new game is comprised of 200 new levels, and allows you to play as
either the titular Chip or Melinda.

The first Chip's Challenge debuted in 1989, making this wait comparable
to that of Wasteland 2, which came out last year as the sequel to the
1988 original. Length of the wait aside, the two situations are different
in that Chip's 2 had already been developed, whereas Wasteland 2 was a
new project made possible thanks to Kickstarter.

Being a game that was originally created so long ago, virtually any
computer is capable of running it; you need only a Pentium 486- - a
processor as old as the original Chip's Challenge- - 16 MB of RAM, and
100 MB of storage space. Water-cooling is optional.



The First First-person Shooter


How a group of college students made gaming history at the dawn of
personal computing and computer networks.

It started as an experiment. Steve Colley had just figured out how to
rotate a cube on the screen when Howard Palmer suggested they could make
a three-dimensional maze.

The year was 1973. They were high school seniors in a work-study program
with NASA, tasked with testing the limits of the Imlac PDS-1 and PDS-4
minicomputers. Their maze program flickered into life with simple
wireframe graphics and few of the trappings of modern games. You could
walk around in first person, looking for a way out of the maze, and
that's about it. There were no objects or virtual people. Just a maze.

But Maze would evolve over the summer and the years that followed. Soon
two people could occupy the maze together, connected over separate
computers. Then they could shoot each other and even peek around corners.
Before long, up to eight people could play in the same maze, blasting
their friends across the ARPANET — a forebear to the internet. Two
decades before id Software changed the game industry with
Wolfenstein 3D and Doom, Colley, Palmer and MIT students Greg Thompson
and Dave Lebling invented the first-person shooter.

This is the story of Maze, the video game that lays claim to perhaps
more "firsts" than any other — the first first-person shooter, the first
multiplayer networked game, the first game with both overhead and
first-person view modes, the first game with modding tools and more.

Greg Thompson was always more interested in electronics than medicine,
which his anesthesiologist father had tried to push him into. He had just
the right mentor, John McCollum, who was the electronics teacher at
Homestead High School and who Thompson believes is the unsung hero of
Silicon Valley. Perhaps most notably, Apple co-founders Steve Wozniak
and Steve Jobs (who was a year above Thompson) learned the skills they
required to build the Apple I computer from McCollum.

In the summer of 1972, McCollum got Thompson into a college-level
work-study program at NASA's Ames Research Center. There Thompson met
fellow Bay Area high schoolers Steve Colley and Howard Palmer. They
worked in the computer graphics lab at NASA Ames, which was doing
research into computational fluid dynamics to help design future
spacecraft.

The lab had several Imlacs. These were programmable minicomputers with
graphical displays — sort of the high-end personal computer of the time
with enough memory to handle one person running what passed then for one
decent-sized program.
Colley, Palmer, Thompson and the rest of the group were tasked with
exploring the capabilities of these systems — to experiment and push the
boundaries. Being teenagers, this, of course, led to them mostly making
games. They started with 2-D games like Pong and duplications of other
early arcade titles such as Drop Zone, which they regularly played at
their local Togo's sandwich shop in hopes of getting a score high
enough to win a free sandwich.

In 1973 Colley figured out how to rotate a wireframe cube on the screen
without the lines at the back showing. Up to this point, Colley and
Palmer, the senior members in the group, had refrained from making any
games. Their focus was on serious, "useful" software. But one day while
thinking about how to make something fun, they came up with the idea of
creating a networked, multiplayer maze game. Palmer thought it would be
cool in 3-D, but Colley doubted it was possible until Palmer noted that
it could work if the maze had nothing but 90-degree angles. Colley got
excited and returned the next day with an implementation that Thompson
says was, effectively, a bunch of cubes stacked next to each other. The
cubes that were "there" formed the walls while the rest acted as
hallways. From that, Thompson continues, "You basically got a maze. You
could see corridors you could walk down."

The maze was small, sized 16 squares by 32. Thompson says that its
graphics provided a sense of being in a space, and the three of them
enjoyed wandering around its halls looking for the way out. But Colley,
writing in a retrospective on DigiBarn Computer Museum, notes that it
got boring soon enough. You could solve the maze, and that was it. Then
one of the trio had an idea: What if there were something else in that
maze? Colley added a little extra code and connected two Imlacs
directly with a serial cable. "It just seemed natural that you could
potentially communicate to another machine," Thompson says when asked
how they came up with the idea.

“"It just seemed natural that you could potentially communicate to
another machine."”

Suddenly you could have two people walking around the maze together each
with a one to eight character floating username and a simple graphical
indication to show each person's location and orientation — two dots for
eyes if they're facing you, arrows if they're looking left or right,
nothing if they're moving away.

To make things even more interesting, they added bullets. Now you could
not only see a second person but shoot the person as well. And as a final
contribution, Colley added the ability to peek around corners before
stepping into a new corridor. Your viewpoint would shift around the
corner so long as you held the key down, but you couldn't do anything
else while peeking.

Maze wasn't drawing much attention outside of its three creators at this
point, but that quickly changed after they graduated high school. In the
fall of 1973, Colley went to Caltech and Palmer to Stanford while
Thompson took Maze and the rest of their Imlac programs with him to MIT.
And at MIT he got involved with Project MAC, which later became the
college's computer science laboratory, and he met the dynamic modelling
group — which was making games of its own.

Dave Lebling may be the last person you'd expect to have been involved
with inventing the first-person shooter. He was co-founder of Infocom,
which was a company that made adventure games for personal computers
before adventure games had graphics. Infocom's imaginative text-only
games dominated the industry in the first half of the 1980s, before
graphic adventures rose to prominence. And Lebling cowrote the first and
perhaps most famous of those: Zork, an adventure that he's surprised and
delighted to see is still a beloved source of inspiration for many
creative minds. But before he did any of that, Dave Lebling helped
expand Maze into a livelier experience.

Lebling doesn't recall the version of Maze that Thompson brought to MIT
having shooting in it. "You wandered around in a maze, and that was it,"
he says.

Regardless of whether the shooting was added before or shortly after Maze
reached MIT, Lebling and Thompson soon teamed up. Thompson focused on the
Imlac side of things since he knew the machine better, and Lebling said
that he would work on the PDP-10 mainframe — the big computer upstairs
that the Imlacs were all connected to.

At NASA Ames, each Imlac ran its own version of Maze and calculated
positions locally — a quirk that could lead to discrepancies over whether
someone was shot or not. With the mainframe, they could offload this work
to a central machine that would coordinate all moves and broadcast them
to all players.

“"You wandered around in a maze, and that was it."”

"It took a certain amount of debugging," Lebling recalls, "but it worked,
and it was really cool." With Lebling's help, Maze gained the ability to
handle up to eight players on a network. Thompson added code to keep
track of scores and graphics that would show missiles travelling down a
corridor. And Lebling also wrote a maze editor, which allowed players to
create new maps.

"It was very simple," he explains. "You called up a text editor and you
created a grid of — I forget what character we used, but it may have been
any character other than space. You just created a grid of text
characters that had 1s where there were walls and 0s where there weren't
once it was processed."

"People would try various bizarre ideas for mazes," Lebling says. But the
standard maze got the most use. "It had some very twisty parts and it had
some long hallways, so you could potentially duck out into the hallway
and shoot at someone who was quite far away and then duck back and they
would die."

Word got around in the lab, which had eight Imlacs. "People started
playing and it was an enormous — it was a viral thing in today's sense,"
Lebling says, "because we weren't the only research group in the lab."

People came from other levels in the building just to play Maze. "The
Imlacs were sufficiently scarce that we actually had to sign up to use
them," Lebling says. "So people would come in the middle of the night to
play and they would shoot each other and run around and there'd be a
running score and so forth." Thompson says that any MIT student or
professor could set up an account on the system, so word quickly spread
around campus. Twenty years before Doom death matches took over local
networks in college dorm rooms, MIT students were doing the same thing
on computers meant for cutting-edge research.

Spurred on by this popularity, the pair kept adding new features. They
enjoyed playing Maze, but their true passion was making it better,
learning more and impressing their friends. Thompson's grades started to
slip, too. "I probably spent a lot of time coding and getting it working
because I was intrigued by it," he says. "I wanted to, and I was
learning." Lebling's driving motivation differed slightly: "Writing
[games] and watching other people enjoy them was, I think, more fun than
playing them," he says.

They added a top-down view that you could switch into to see the whole
maze and better plan your routes, but the caveat was that, while you were
looking at that, someone could sneak up on you fairly easily. Thompson
added cheats that made it possible to pass through walls while Lebling
wrote robot players.

“"People started playing and it was an enormous — it was a viral thing
in today's sense."”

"There weren't always enough people to make it interesting," Lebling says,
"so I decided to write a little really stupid — artificial stupidity
rather than artificial intelligence — robot program. You could start up
a bunch of robots. If you wanted to play by yourself with seven robots
you could have done it. And people would do that and the robots would
wander around the maze and shoot you."

The robots were too good for many players. "We had to make them move
slower than they normally could have," Lebling says. "They adaptively
decided they had beaten you too much and made themselves stupider, or if
you beat them too much, they would make themselves smarter. There was a
bit of feedback going on there."

Nevertheless, Lebling notes, the robots were no substitute for human
players. They were simply a fun option for if you were "bored and wanted
to play by yourself," he says.

The very best Maze player, Ken Harrenstein, soon rewrote much of the
program on the mainframe to make it more efficient, while Charles
Frankston did the same on the Imlacs portion. This made it more feasible
for two or more simultaneous Maze games to run through the PDP-10
mainframe.

Meanwhile, another man in their research group, Tak To, wrote a program
called Maze Watcher, which allowed people to watch matches on an Evans
and Sutherland LDS-1 graphics display computer. "You could sit in the lab
that the display for the graphics computer was in and you could cheer on
your friends as they played," Lebling recalls, mimicking "Go go go! Oh
no! He's around the corner!"

Maze's popularity didn't stay just within MIT's walls. They shared the
source code across the country via the ARPANET. Lebling believes that the
first game of Maze played over the ARPANET was between students at MIT
and the University of California, Santa Cruz. It was slow — the ARPANET
of the time was only a 50-kilobit network, which is a few orders of
magnitude slower than the megabytes and even gigabytes that a fast
internet connection manages today. But it was wonderful.

Perhaps even a little too wonderful. Legend has it that Maze was later
banned for a period by the Defense Advanced Research Projects Agency
(DARPA), which ran the ARPANET, because half of all packets (data,
essentially) being sent over the network each month were flying between
MIT and Stanford. Lab directors J. C. R. Licklider and Al Vezza worried
well before then that Maze would be seen as too frivolous. They
discouraged Maze play in the lab, which was funded by DARPA, to keep
things serious and to keep the Imlacs available for serious work.

“"Maze clogged up the Imlacs, which were a very scarce resource."”

"[Maze] clogged up the Imlacs, which were a very scarce resource,"
Lebling says. "To run Maze, you had to load the Maze program in instead
of the usual terminal program because these things only had 8K of memory,
[so] people would load the Maze program in and then forget to reload the
terminal program, or it would crash or something and they wouldn't know
how to reboot an Imlac, which wasn't all that complicated but was more
difficult than rebooting a personal computer today."

To combat this, the directors banned Maze. (Despite that they had been
spotted on multiple occasions playing and enjoying the game, too.) It was
a futile endeavor. The computers were on a network, so people would simply
copy it over from another machine or hide away some code that would
download the program again. Things soon escalated, and someone added a
daemon program — a program that runs in the background to look for
instances of Maze and crash them.

This Maze Guncher could be easily defeated by either recompiling the Maze
code with a different signature or by taking advantage of the fact that
the system had no security whatsoever to disable the Guncher daemon. "It
was just this hackers versus nonhackers thing," Lebling says. "This
little war going on back and forth."

In the fall of 1976 Greg Thompson, Mark Horowitz and George Woltman
enrolled in an electrical engineering digital hardware design class
together. For their class project, Thompson suggested they make a system
designed to run just Maze.

"I thought it would be fun, and then we started thinking about how to do
it and build it. It seemed like a pretty complicated and exciting thing,
but talking about it we thought we could figure out how we could actually
implement it," says Horowitz. "We told the TAs in the class that we were
going to do it, and they told us that basically they didn't think it was
a good idea but if we wanted to we could go ahead and try."

The trio determined that it would be easier to build the game if they
made it more complicated. Whereas the original Maze was effectively a
two-dimensional maze that was drawn in line segments, the new version
was fully 3-D. In the hardware version of Maze, you could turn in any
direction inside a 16 by 16 by 16 cube that had four floors in each
dimension.

"The reason we did that was it made the game completely symmetric,"
Horowitz explains. "It turned out, from a hardware perspective, it was
way easier to do that because there were less specialized surfaces. So
you were walking in a maze with no gravity, essentially. You could turn
left, right, or you could turn up or down."

It was about as confusing as it sounds, but they found it exhilarating.
Then Woltman added robot players. "They played so much better than we did
because they never were confused," Horowitz recalls. "They just followed
some pretty simple rules and just looked around for people, and when they
saw them, they shot them."

Horowitz, meanwhile, would be too busy trying to remember where he was in
the maze. "[I was] trying to remember which end was up," he says. "They
didn't care. They just walked through and found openings and continued
moving forward."

Like in the Imlac version of Maze, you could make the robots play better
or worse, but in this case it was entirely a matter of changing the clock
rate on the processor. "If you wanted it to play faster you'd just turn
up the clock rate and run the whole system a little bit faster," explains
Thompson.

As for the display, without a graphics processor they had to get creative.
"We ended up deciding to use oscilloscopes because they were in the labs
to help you to debug your hardware," says Horowitz. "We used it in X-Y
mode and I used the display as a vector draw display. So instead of doing
raster scan, which is how all displays are today, I actually drew lines
on the screen."

Horowitz also drew bullets that you could see flying down the screen,
gradually getting bigger as they came closer or smaller as they moved
away.

The game was so impressive that the trio earned near-perfect marks for the
project and the lab kept hardware Maze around for a year or two as an
example game to show other students. And Horowitz, for his part, is
surprised not only that people still care about the project today, but
also that he can remember it all. "I have a really bad memory," he says.
"I don't remember what I did two weeks ago let alone 40 years ago. But
the truth is, I remember the maze game. I remember what it was like. What
the graphics looked like and how it all worked and I just remember how
exciting it was trying to build it."

Maze's many creators each went off in separate directions. Lebling and a
few of his dynamic modelling group cohorts founded Infocom while Thompson
flitted around the technology industry as a consultant, engineer and
designer for the likes of Digital Equipment Corporation, nCube and Cisco.
Steve Colley founded nCube, which became a leader in the early video on
demand industry. Horowitz became director of Stanford University's
computer systems lab. And George Woltman went on to discover several of
the largest known prime numbers.

Maze carried on, mutating and spreading throughout the computing world.
Jim Guyton rewrote the Imlac version for the raster displays of Xerox's
Alto and Star personal computers, renaming it Maze War and adding the
minimap to the bottom of the main display. Two members of the early
Macintosh team at Apple saw this version and wrote their own for testing
purposes — Gene Tyacke's Bus'd Out, which was leaked out at an alpha
level of completion, tested an early version of the AppleTalk networking
protocol, while Burt Sloane's Maze Wars demonstrated a file transfer and
messaging server.

Sloane's Maze Wars was reworked and expanded by MacroMind as the first
commercial version of Maze with the 1986 Mac release Maze Wars+, and that
later led to Callisto Corporation making a more sophisticated and
fleshed-out (not to mention 256-color) version called Super Maze Wars in
1993 — also for the Mac.

Maze popped up on several other platforms as well. Xanth Software put it
on Atari ST as MIDI Maze in 1987. Their title refers to the use of MIDI
cables to string computers together for multiplayer matches. "We just
passed joystick data around the ring," programmer Michael Park explains
via email, "then each machine updated its world state and redrew the
screen, then repeated. Everyone had to wait on the slowest machine
(whichever took the longest to render its display)."

They also wrote an Atari 8-bit version that was finished but never
released, and a German group led by coder Markus Fritz reverse engineered
MIDI Maze so they could update it and fix bugs for MIDI Maze 2. Fritz says
that that version only sold around 200 copies, but it nonetheless
developed a cult following around the world with players still getting
together today for semiregular tournaments.

Maze also made it onto Game Boy, retitled Faceball 2000, and several other
early '90s games consoles and handhelds, along with Palm OS, NEXTSTEP and
yet more platforms.

Its original creators seem somewhat bemused by Maze's longevity and
legacy. "It's just kind of a small contribution that I and the people
around me helped to make in pushing technology into a fun area," says
Thompson. "We've had games since probably the days of the Stone Age. It's
just been implemented in different ways. And the nice things about
computers and the network is that you can be connected; you can play with
other people. You don't have to be physically together, and you can play
with an experience of kind of looking like you're inside a building that
you're not actually in."

Lebling was surprised to see Maze spread, and he believes that the
first-person shooter genre that dominates games now is at least partially
indebted to Maze. But "that doesn't mean that they wouldn't exist if Maze
hadn't existed," he notes. "It's like the thing they used to say in
science fiction, which is that steam engines come when it's steam engine
time. There was a confluence of technical development and ideas and
culture that made something like Maze seem like a good idea."

Lebling and his Infocom cohort could well have become a first-person
shooter company, too — rather than the text adventure company. They
founded Infocom before deciding what to develop, and one idea was to make
Maze for the arcades. Nothing ever came of it because too many people who
heard about the idea as a way to raise money for the fledgling company
raised concerns that "nerds have no friends."

"I think it would have been a cool game to play," says Lebling, noting
that arcades were in fact very social places. "You could have bragging
rights and fights and drunken brawls in the arcade with 'You shot me!'"

In any case, nobody expected Maze to live on — let alone to foreshadow a
revolution in gaming that would occur 20 years later. "I think it was just
a combination of enough bright people had come across it at MIT and then
reimplemented at other platforms," says Thompson. "Because it's fun,
because it's enjoyable and at the time it was pushing the state of the
art. It was a good test tool. You could justify it however you wanted to
justify it, but you kind of built it because you could show off some of
the neat things you could do."



=~=~=~=



A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson



Senate Votes Down USA Freedom Act,
Putting Bulk Surveillance Powers in Jeopardy


In a midnight session, the Senate has voted down the USA Freedom Act,
putting one of the legal bedrocks of the NSA's bulk surveillance programs
into jeopardy. The Patriot Act is set to expire at the end of the month,
and the USA Freedom Act would have extended large portions of the act in
modified form. Tonight's failure to arrive at a vote makes it likely that
many of those powers will automatically expire, although Senate Majority
Leader McConnell (R-KY) scheduled a last-minute session on May 31st for
one last shot at passing the bill.

In particular, the USA Freedom Act would have modified the Section 215
of the Patriot Act, a clause that allows the FBI to secretly order the
collection of "tangible things" that could help in a national security
investigation. Since its passage, Section 215 has been interpreted
loosely — and likely illegally — by intelligence agencies. As
whistleblower Edward Snowden revealed in 2013, the definition of both
"tangible things" and "investigation" was broad enough to let NSA build
a large database of American phone records for an ongoing, expansive
national security effort.

After the program was discovered, President Obama ordered the NSA to get
approval before searching the database, but the phone metadata orders
have still been renewed every three months. Government reports have said
that there's little evidence the phone records program foiled any
terrorist plots, however, and a recent court decision found that it
wasn't legal at all by the standards of Section 215.

The provision has also been used for tracking more than phone records.
This week, the Justice Department's Office of the Inspector General
released a review of Section 215. While it's partially redacted, the
document describes FBI requests for records that "range from
reproductions of hard copy reproductions of business ledgers and
receipts to gigabytes of metadata and other electronic information,"
including email records. This might not necessarily be problematic in
itself, but the report notes that requests could cover "groups composed
of unknown members" and people who weren't actually associated with
investigations, with the justification that they were still relevant to
the investigation.

Originally, the USA Freedom Act was a relatively broad reform bill,
tightening the language of national security rules and adding more
transparency requirements. Since its introduction, though, it had been
revised several times — a watered-down version passed the House last
year, and a stronger version died in the Senate. The House brought a new
version of bill back and passed it earlier this month, but the bill
faced significant opposition in the Senate. Most notably, Rand Paul has
staged a series of non-procedural filibusters in symbolic opposition to
the bill, including a speech today that pushed the Senate vote past
midnight.



U.S. Tried Stuxnet-style Campaign Against North Korea But Failed


The United States tried to deploy a version of the Stuxnet computer virus
to attack North Korea's nuclear weapons programme five years ago but
ultimately failed, according to people familiar with the covert campaign.

The operation began in tandem with the now-famous Stuxnet attack that
sabotaged Iran's nuclear programme in 2009 and 2010 by destroying a
thousand or more centrifuges that were enriching uranium. Reuters and
others have reported that the Iran attack was a joint effort by U.S. and
Israeli forces.

According to one U.S. intelligence source, Stuxnet's developers produced
a related virus that would be activated when it encountered
Korean-language settings on an infected machine.

But U.S. agents could not access the core machines that ran Pyongyang's
nuclear weapons program, said another source, a former high-ranking
intelligence official who was briefed on the program.

The official said the National Security Agency-led campaign was stymied
by North Korea's utter secrecy, as well as the extreme isolation of its
communications systems. A third source, also previously with U.S.
intelligence, said he had heard about the failed cyber attack but did
not know details.

North Korea has some of the most isolated communications networks in the
world. Just owning a computer requires police permission, and the open
Internet is unknown except to a tiny elite. The country has one main
conduit for Internet connections to the outside world, through China.

In contrast, Iranians surfed the Net broadly and had interactions with
companies from around the globe.

A spokeswoman for the NSA declined to comment for this story. The spy
agency has previously declined to comment on the Stuxnet attack against
Iran.

The United States has launched many cyber espionage campaigns, but North
Korea is only the second country, after Iran, that the NSA is now known
to have targeted with software designed to destroy equipment.

Washington has long expressed concerns about Pyongyang's nuclear program,
which it says breaches international agreements. North Korea has been hit
with sanctions because of its nuclear and missile tests, moves that
Pyongyang sees as an attack on its sovereign right to defend itself.

U.S. Secretary of State John Kerry said last week that Washington and
Beijing were discussing imposing further sanctions on North Korea, which
he said was "not even close" to taking steps to end its nuclear program.

Experts in nuclear programs said there are similarities between North
Korea and Iran's operations, and the two countries continue to
collaborate on military technology.

Both countries use a system with P-2 centrifuges, obtained by Pakistani
nuclear scientist A.Q. Khan, who is regarded as the father of Islamabad's
nuclear bomb, they said.

Like Iran, North Korea probably directs its centrifuges with control
software developed by Siemens AG that runs on Microsoft Corp's Windows
operating system, the experts said. Stuxnet took advantage of
vulnerabilities in both the Siemens and Microsoft programs.

Because of the overlap between North Korea and Iran's nuclear programs,
the NSA would not have had to tinker much with Stuxnet to make it capable
of destroying centrifuges in North Korea, if it could be deployed there.

Despite modest differences between the programs, "Stuxnet can deal with
both of them. But you still need to get it in," said Olli Heinonen,
senior fellow at Harvard University's Belfer Center for Science and
International Affairs and former deputy director general of the
International Atomic Energy Agency.

NSA Director Keith Alexander said North Korea's strict limitations on
Internet access and human travel make it one of a few nations "who can
race out and do damage with relative impunity" since reprisals in
cyberspace are so challenging.

When asked about Stuxnet, Alexander said he could not comment on any
offensive actions taken during his time at the spy agency.

David Albright, founder of the Institute for Science and International
Security and an authority on North Korea's nuclear program, said U.S.
cyber agents probably tried to get to North Korea by compromising
technology suppliers from Iran, Pakistan or China.

"There was likely an attempt" to sabotage the North Korean program with
software, said Albright, who has frequently written and testified on the
country's nuclear ambitions.

The Stuxnet campaign against Iran, code-named Olympic Games, was discovered
in 2010. It remains unclear how the virus was introduced to the Iranian
nuclear facility in Natanz, which was not connected to the Internet.

According to cybersecurity experts, Stuxnet was found inside industrial
companies in Iran that were tied to the nuclear effort. As for how Stuxnet
got there, a leading theory is that it was deposited by a sophisticated
espionage program developed by a team closely allied to Stuxnet's authors,
dubbed the Equation Group by researchers at Kaspersky Lab.

The U.S. effort got that far in North Korea as well. Though no versions of
Stuxnet have been reported as being discovered in local computers,
Kaspersky Lab analyst Costin Raiu said that a piece of software related to
Stuxnet had turned up in North Korea.

Kaspersky had previously reported that the software, digitally signed with
one of the same stolen certificates that had been used to install Stuxnet,
had been submitted to malware analysis site VirusTotal from an electronic
address in China. But Raiu told Reuters his contacts had assured him that
it originated in North Korea, where it infected a computer in March or
April 2010.

Some experts said that even if a Stuxnet attack against North Korea had
succeeded, it might not have had that big an impact on its nuclear weapons
program. Iran's nuclear sites were well known, whereas North Korea
probably has at least one other facility beyond the known Yongbyon
nuclear complex, former officials and inspectors said.

In addition, North Korea likely has plutonium, which does not require a
cumbersome enrichment process depending on the cascading centrifuges that
were a fat target for Stuxnet, they said.

Jim Lewis, an advisor to the U.S. government on cybersecurity issues and a
senior fellow at the Center for Strategic and International Studies, said
there are limitations to cyber offense.

A cyber attack "is not something you can release and be sure of the
results," Lewis said.



Ulbricht Sentenced in Silk Road Case


A federal judge gave convicted Silk Road darknet mastermind Ross Ulbricht
two terms of life in prison and three lesser sentences Friday for
founding and operating a criminal version of eBay that made buying
illegal drugs almost as easy as clicking a computer mouse.

After the 31-year-old Texas native apologized for his deeds and asked for
leniency, U.S. District Judge Katherine Forrest ordered Ulbricht to serve
far more than the mandatory minimum 20-year term he faced for his
February conviction on charges of operating a continuing criminal
enterprise and related allegations.

The punishment matched the life term called for under federal sentencing
guidelines and recommended by a government probation report.

Forrest also imposed a nearly $184 million forfeiture order on Ulbricht.
"It wasn't a game, and you knew that," said Forrest, who said Silk Road
was "your opus."

"I don't think you did something thoughtless. I think you did something
very thoughtful," the judge added.

Ulbricht, dressed in a black detention top and pants, appeared as if he
were trying to hold back tears as he addressed the judge. "I had a desire
to, I wanted to empower people to make choices in their lives for
themselves and have privacy and anonymity," he said. "I'm not a
self-centered sociopathic person who wanted to express inner badness."

Pronouncing himself "a little wiser" and "more humbled," Ulbricht said he
was "so sorry for the families" who lost loved ones to Silk Road-related
drug deaths.

Ulbricht did not testify during the more than three-week federal court
trial that ended with a jury of six women and six men finding him guilty
after barely three hours of deliberations.

The trial featured evidence Ulbricht used the nom de Net "Dread Pirate
Roberts" — drawn from The Princess Bride novel and movie — to run Silk
Road from 2011-2013 as an encrypted electronic bazaar. The site matched
buyers and sellers around the world for billions of dollars of deals
featuring heroin, cocaine, LSD, methamphetamine, phony IDs and
computer-hacking programs.

Silk Road operated on a hidden area of the Internet, and required all
deals to be paid for in bitcoins, an electronic currency that preserved
the anonymity of its denizens. Trial evidence showed Ulbricht reaped
bitcoins worth roughly $18 million.

With the swiftness of their verdict, jurors rejected defense arguments
that Ulbricht founded Silk Road but quickly turned it over to
unidentified others who lured him back to take the fall as federal
investigators closed in on the fast-growing operation.

Lead defense attorney Joshua Dratel, had argued that the man who in
boyhood reached Eagle Scout status was a loving family member and
remorseful entrepreneur who deserved leniency. In pre-sentence filings,
he cited a declaration by Fernando Caudevilla, a Spanish physician who
used the name "Doctor X" and provided expert advice on drug use on Silk
Road's safety forum.

Paying Caudevilla $500 a week to provide that advice showed Ulbricht was
not an unfeeling businessman, argued Dratel, who is separately expected
to pursue an appeal of the conviction.

Forrest shot down that argument, calling Caudevilla an "enabler," and his
behavior "breathtakingly irresponsible."

Federal prosecutors, however Ulbricht deserved far more than the 20-year
minimum sentence. In support of their argument that he merited an
enhanced sentence, Assistant U.S. Attorneys Serrin Turner and Timothy
Howard gave Forrest details of six drug-overdose deaths involving Silk
Road drug buyers, and stressed trial evidence that showed Ulbricht's
involvement in murder-for-hire plots to protect the operation.

Dratel objected, arguing in part that prosecutors failed to show
sufficient evidence showing the deaths were directly linked to Silk Road
drug buys. He also noted that prosecutors did not seek such a major
sentence enhancement for a Silk Road worker who was sentenced to the
equivalent of a 14-month prison sentence on Tuesday.

Forrest, however, said the issues should be considered in sentencing. She
heard deeply emotional statements from two parents whose children died
from Silk Road drug overdoses.

One victim, an athletic young kayaker identified in a prosecution filing
only by his first name, Bryan, was an employee of a small money
management firm in Boston. He was found dead in his apartment in early
October 2013, within days of Ulbricht's arrest in San Francisco.

Bryan's father, Richard, addressed the court and described how his son
apparently tried heroin during his senior year in college, then spent the
final two years of his life battling drug urges.

The grieving father also wrote in a victim impact statement that Bryan
used his computer to connect with Silk Road, an operation that
"eliminated every obstacle that would keep serious drugs away from
anyone who was tempted."

"Clearly my son made a horrible choice in electing to try heroin in the
first place," wrote Richard.

However, he told the court that Ulbricht's Silk Road business had none of
the theoretical, political or socially redeeming characteristics claimed
by Ulbrich' and his supporters.

"All Ross Ulbricht cared about was his growing pile of bitcoins," the
father said in the hushed court room as he called for "the most severe
sentence the law allowed."

"This is the behavior of a sociopath," he concluded.



Sweden Seizes Pirate Bay Web Domains


A Stockholm court on Tuesday seized the Swedish web domains of
file-sharing site The Pirate Bay over repeated copyright violations in a
bid to end the site's activities.

This was the first time a Swedish prosecutor had requested that an
internet address be taken off the web permanently, according to the
online edition of Swedish paper of reference Dagens Nyheter.

However, it was unclear what effect the Swedish court's decision would
have. Several hours after the ruling, users typing the addresses
piratebay.se and thepiratebay.se were simply redirected to other Pirate
Bay sites.

"For criminal activities there's always a way to get around the rules.
Sweden has done what it can to show that it doesn't accept this type of
activity," Sara Lindback, a lawyer at the anti-piracy Rights Alliance,
told news agency TT.

Founded in 2003, The Pirate Bay allows users to dodge copyright fees and
share music, film and other files using bit torrent technology, or
peer-to-peer links offered on the site.

The two domains belonged to a Thai woman, Supadavee Trakunroek, 25, whom
the Stockholm district court identified as the business partner of one of
the Pirate Bay's founders, 37-year-old Fredrik Neij.

Neij had criticised the trial as an attack on freedom of expression.

Sweden has repeatedly tried to put an end to The Pirate Bay's activities,
to no avail.

Swedish courts have already handed down prison sentences and heavy fines
to its founders Carl Lundstroem, Fredrik Neij, Gottfrid Svartholm Warg
and Peter Sunde.

Servers hosting the site were seized in a Stockholm suburb in early
December, but the site reappeared in late January.



UK Government Rewrites Laws To Let GCHQ Hack Into Computers Legally


The UK Government has quietly changed the Anti-Hacking Laws quietly that
exempt GCHQ, police, and other electronic intelligence agencies from
criminal prosecution for hacking into computers and mobile phones and
carrying out its controversial surveillance practices.

The details of the changes were disclosed at the Investigatory Powers
Tribunal, which is currently hearing a challenge to the legality of
computer hacking by UK law enforcement and its intelligence agencies.

About a year ago, a coalition of Internet service providers teamed up
with Privacy International to take a legal action against GCHQ for its
unlawful hacking activities.

However, the Government amended the Computer Misuse Act (CMA) two months
ago to give GCHQ and other intelligence agencies more protection through
a little-noticed addition to the Serious Crime Bill.

The change was introduced on June 6, just weeks after the complaint was
filed by Privacy International that GCHQ had conducted computer hacking
to gather intelligence that was unlawful under the CMA.

The bill that would allow GCHQ and other intelligence officers to hack
without any criminal liability was passed into law on March 3, 2015 and
became effective on 3rd of this month.

Privacy International notified this change in the CMA law only on
Thursday. They complained that the legislative change occurred during
the case under that very legislation was ongoing. Thus, they should have
been informed.

"It appears no regulators, commissioners responsible for overseeing the
intelligence agencies, the Information Commissioner's Office, industry,
NGOs or the public were notified or consulted about the proposed
legislative changes," according to Privacy International. "There was no
public debate."

"Instead, the government is continuing to neither confirm nor deny the
existence of a capability it is clear they have, while changing the law
under the radar, without proper parliamentary debate."

The complaint was filed by the charity Privacy International following
the revelations from former NSA contractor Edward Snowden, who revealed
the United States and British agencies’ capabilities to carry out global
surveillance on a much wider scale.

Snowden also claimed that the National Security Agency (NSA) and its
British counterpart GCHQ had the ability to monitor Internet traffic,
listen to phone calls and infect Millions of computer and mobile handsets
with malicious software.

According to Privacy International, the change made to the Computer
Misuse Act "grants UK law enforcement new leeway to

  
potentially conduct
cyber attacks within the UK."

However, the Home Office has rejected all the claims made by Privacy
International and said there have been no changes made to the CMA that
would affect the scope of spy agencies.

"There have been no changes made to the Computer Misuse Act 1990 by the
Serious Crime Act 2015 that increase or expand the ability of the
intelligence agencies to carry out lawful cyber crime investigation,"
said the spokesman. "It would be inappropriate to comment further while
proceedings are ongoing."



United Airlines: Hack Our Site for Free Miles
(Just Don't Mess With Onboard Systems)


United Airlines is offering up to 1 million free air miles in a new bug
bounty program that rewards hackers who discover security flaws in the
airline's websites, apps and databases.

The program is the "first of its kind within the airline industry," United
proclaims on its website.

Bug bounties, which reward security researchers for responsible disclosure
of vulnerabilities, are offered by many tech companies such as Facebook,
Google and Microsoft.

The bounties usually come in the form of cash: Google even offers up to
"infinity dollars" in its program, although most bounties are far less.

United's bug bounty program, however, offers rewards in the form of air
miles - ranging from 50,000 free miles for low-level bugs (cross-site
request forgery, bugs in third party software affecting United), to
1 million miles for the highest level kind of bug - remote code
execution.

To qualify for a reward, hackers need to be signed up as members of the
airline's MileagePlus reward program - and they need to comply with a
strict set of eligibility rules.

Some security flaws that aren't permissible include tampering with
aircraft systems such as in-flight Wi-Fi or entertainment.

Hackers could end up in a heap of trouble for trying certain types of
attacks, United warns, resulting "possible criminal and/or legal
investigation."

Do not attempt:

Attempting any of the following will result in permanent disqualification
from the bug bounty program and possible criminal and/or legal
investigation.

* Brute-force attacks?* Code injection on live systems?* Disruption or
denial-of-service attacks?
* The compromise or testing of MileagePlus accounts that are not your
own?
* Any testing on aircraft or aircraft systems such as inflight
entertainment or inflight Wi-Fi?
* Any threats, attempts at coercion or extortion of United employees,
Star Alliance member airline employees, other partner airline employees,
or customers?
* Physical attacks against United employees, Star Alliance member airline
employees, other partner airline employees, or customers?
* Vulnerability scans or automated scans on United servers

Maybe United has had this in the works for a while, but the announcement
of the bug bounty program comes just a few weeks after the airline banned
a security researcher from flying on United after he tweeted that he
could hack onboard systems to deploy oxygen masks.

United cited its existing policies in banning the researcher, Chris
Roberts, and preventing him from boarding his United flight from Colorado
to San Francisco (where he was scheduled to speak at the RSA Conference
about security vulnerabilities in transportation).

Recently, US government agencies have launched investigations into the
security of systems such as avionics (onboard computers that control
communication and navigation), and the antiquated air traffic control
system that directs millions of flights annually across the US.

The findings of a US Government Accountability Office (GAO) report has
raised the level of scrutiny on airlines by lawmakers, regulators, the
media and general public.

Despite all of this attention on aircraft security, and presumably for
reasons of aircraft safety, the United bug bounty program is limited to
the security of its websites.

United, who has previously struggled to keep customer data secure, is
stepping up its website security in other ways, too - just last week the
airline announced the beta launch of a brand new united.com.

While United is touting upgrades to its website design like easier search
and filtering of flight information, one unsung feature is the switch to
default SSL encryption across the entire website (shown by the "HTTPS"
part of the web address).

You can see on the homepage of the beta.united.com site that it has a
security certificate telling you that this is really United's website, as
vouched for by the certificate authority GeoTrust.

The current united.com website doesn't have that extra layer of security.

Let's hope the other airlines follow United in taking proactive steps to
protect customer data.



AdBlock Plus Declared Legal (Again) by a German Court


For the second time in two months a German court has ruled that Adblock
Plus, the browser extension for filtering ads, is legal.

On Wednesday the Munich Regional Court ruled against media companies
ProSiebenSat1 and IP Deutschland, the company behind media group RTL. The
companies sued Eyeo, the company behind Adblock Plus, and wanted the
court to ban the distribution of the free ad-blocking software, claiming
it hurts their ad-based business model.

Adblock Plus lets users block annoying ads. It does however let some
“acceptable ads” through the filter, a practice the company has been
criticized for because it lets companies like Amazon, Google and
Microsoft pay to get on the filter’s white list. The plugin lets users
block all ads if they want to, though.

The Munich court ruled that making and distributing ad-blocking software
is not anticompetitive, since users decide on their own to install the
software.

What’s more, media company’s copyrights are not violated when individual
users visit freely available websites while blocking advertising, the
court said. Copyrights are not infringed even if the site owner does not
agree with the use of ad-blockers, it ruled.

It also found antitrust laws were not violated because Adblock Plus has
no dominant market position.

Eyeo’s victory follows an April decision by the Hamburg Regional Court,
which ruled that it is legal to make software to block ads. It dismissed
complaints from German newspapers Zeit Online and Handelsblatt, which had
also argued that Adblock Plus illegally interfered with their ad-based
online business models.

Eyeo’s spokesman Ben Williams called the Munich court’s decision “another
win for every Internet user.” It confirms that each individual has the
right to block annoying ads, protect their privacy and, by extension,
determine his or her own Internet experience, he added.

The company said it will keep working with publishers, advertisers and
others to encourage the use of non-intrusive ads.

ProSiebenSat1 called it a sad day for Internet users. “AdBlock Plus
jeopardizes the financing options for all free internet sites,” it said.

The company still feels ad blocking is inadmissible under copyright and
antitrust laws and maintained that the practice is an anticompetitive
attack on media diversity and freedom of the press. It will review its
options for an appeal and further legal action against Eyeo, it added.



Google Reveals the Problem With Password Security Questions


Google analyzed hundreds of millions of password security questions and
answers, revealing how startlingly easy it is for would-be hackers to get
into someone else's account.

Case in point: What's your favorite food?

Using one guess, an attacker has a 19.7 percent chance of guessing an
English speaking user loves pizza, according to Google's findings, which
looked at hundreds of millions of questions and answers for account
recovery claims.

While the questions are meant to provide an extra layer of security,
Google found easy-to-guess answers were a problem around the world.

With ten guesses, an attacker would have a near one in four chance of
guessing the name of an Arabic speaker's first teacher. Ten guesses gave
cyber criminals a 21 percent chance of guessing the middle name of a
Spanish speaker's father.

South Korean users were most vulnerable with the question "What is your
city of birth?" With ten guesses, attackers would have a 39 percent chance
of getting into a person's account.

While the study shows how alarmingly easy it is to crack a person's
password security questions, Google said the solution shouldn't be to add
more questions.

Google's security researchers instead recommend users make sure their
account recovery information is current by going through a security
checkup. Adding a phone number or back-up email address can help
circumvent the issue of someone trying to penetrate your account via the
secret questions.



Dot-com to .pizza: Welcome to the Web Domain Rush


The Internet's long-restricted virtual real estate market is open for
business.

Hundreds of new so-called top-level domains (TLDs) like .photography,
.expert and .pizza are available now that the Internet Corporation for
Assigned Names and Numbers (ICANN), which oversees the domain name
system, has expanded access to suffixes.

A handful of companies that prepared years ago to take advantage of this
land grab are in a position to profit handsomely for years to come.

The new opening will also be a boost for brands looking to strengthen
their online presence, but have been thwarted by domain-name squatters
charging top dollar for the last remains of the dot-com universe.

One business, the sports training group Fast Twitch, jumped on the trend
early. The company's three elite training facilities in South Florida
attract major league pitchers, pro boxers and all-star football players.
But try finding the company online at fasttwitch.com and you'll land on a
generic website telling you the domain is for sale.

The dot-com game is too pricy for Fast Twitch Chief Development Officer
James Meder. As a small business operator on a tight budget, he refuses
to plop down $20,000 for a domain.

Fortunately for Meder, the new level of TDL suffixes means he no longer
has to. Early this year, for an annual fee of about $40, Meder launched
his website using the brand new address fasttwitch.training.

"Being a training company, this is a catchy, quick way to brand
ourselves," said Meder, whose Miami-based company operates in partnership
with sports apparel and accessories provider Under Armour. "It's another
piece of trying to do something unique."

Other currently live pages include beingamom.life, a website for mothers,
and any.business, a small business content site. Donuts, a major buyer of
new TLDs, calls it the "Not Com Revolution," because the past 30 years on
the Web have been a dot-com circus.

The original .com suffix, short for commercial, is the default method for
establishing a corporate address, while .org has been the go-to extension
for nonprofits and .edu for colleges and universities. According to
Verisign, which manages .com websites, 115.6 million of the 288 million
domains registered across the globe end in .com.

"It's a very saturated name space," said Bhavin Turakhia, founder and CEO
of Radix, the owner of rights to new suffixes including .website, .space
and .site. "You really can't find any good, short, easy-to-remember
names."

To get around the shortage, U.S. start-ups have turned to using country
codes like .ly (Libya), .me (Montenegro) and .tv (Tuvalu) in building
their online presence.

In June 2011, ICANN announced the plan to increase the number of TLDs to
let organizations "market their brand, products, community or cause in
new and innovative ways." A bidding process took place in early 2012, and
by January 2014, new addresses started coming online.

More than 600 new TLDs have been purchased, and about 350 of those are
available today, according to nTLDStats. Some 5.6 million new addresses
are live, with .xyz, .science and .club ranking as the most popular
English suffixes.

The domain boom is breathing life into a historically quiet corner of the
Internet.

It's certainly not a corner that Meder knew or cared much about until
2013, when he stumbled upon a Twitter conversation about a company
called 1and1.

The tweets caught his eye because Fast Twitch had been struggling for
years with various dot-com iterations, like FT-PT.com and
AreYouFastTwitch.com. Meder did some research on 1and1 and found that a
wealth of new addresses would soon be available for purchase.

He settled on fasttwitch.training as the official site, purchased the
address from 1and1, and migrated over from the dot-com world at the
beginning of this year.

While Meder is excited about the URL's potential, he's encountered some
frustrations in being an early adopter. One is the difficulty in using
his email address when registering with online businesses, because many
websites aren't yet recognizing the new domain extensions.

Consumers, like machines, have to adapt to an all new Internet. Millions
of new sites are certain to create some level of chaos and abuse. And
with the mass transition to mobile apps, it's not even clear how
important URLs will be in the future.

But the publicity opportunities for Fast Twitch more than outweigh the
risks, according to Meder.

"It's a conversation piece," he said. "It gives us the chance to talk
about it."

Stories like Meder's give 1and1 punchy anecdotes for its own marketing
efforts. The German company is among thousands of domain name registrars,
or entities that act as Web address retailers. They sit between the
registries like Verisign, Donuts and Radix and domain buyers like Fast
Twitch.

GoDaddy is the biggest registrar in the market, with 59 million domains,
compared with 19 million for 1and1. GoDaddy sold shares to the public in
April and is valued at $4.1 billion.

Recenty released TLDs already account for about 15 percent of 1and1's new
business, according to Thomas Keller, the company's head of domains. It's
lucrative, too, with the new TLDs selling for about $40 a year on
average, more than double the typical .com addresses.

More importantly, companies finally have options and aren't forced to pay
ridiculous prices to domain hoarders. According to Keller, 90 percent of
searches on the 1and1 site for .com names show that the address is not
available.

"It puts an end to the scarcity of the dot-com names," he said. "It will
have a huge influence over time."

For .training alone, there are about 16,000 registered names. Every time
1and1, GoDaddy or another registrar sells an address with that extension,
Donuts gets a substantial share of the revenue, because the Bellevue,
Washington-based company owns its exclusive rights.

Donuts is an Internet registry, a designation that gives it the unique
ability to buy TLDs after a thorough vetting by ICANN. In that market,
Donuts owns the most unique suffixes and competes with companies including
global Internet powerhouses Google and Amazon.com along with Radix,
Afilias and Rightside.

Donuts was founded in 2010 by a four-person team betting that ICANN would
soon open up the TLD universe. Over the past five years, the company has
raised $150 million from venture investors and private equity funds,
mostly to load up on suffixes.

When ICANN initiated bidding in 2012, Donuts went on a spending spree,
applying for more than 300 names. A nonrefundable application fee of
$185,000 was required for every TLD the company wanted to pursue. For
Donuts, that added up to $58 million.

"We went through an amazing amount of data in terms of how words are used
commercially," said Richard Tindal, Donuts' co-founder and chief
operating officer. "We picked the 300 we viewed as the most commercially
marketable, through a combination of art and science."

If more than one registry applied for a given suffix, the process went to
an auction and the winner was determined by the highest bidder. Google
spent a hefty $25 million for control of .app, while .tech, owned by
Radix, was purchased for $6.8 million, according to ICANN.

Donuts has about 165 suffixes on the market now and is in the process of
rolling out 15 more. The company expects to end up with about 200, in
many cases spending several million dollars for a single TLD.

If its wagers pay off, millions of sites will be paying Donuts $20, $50,
$100 a year and more.

For .training, Donuts paid only the $185,000 application fee, because no
other bidders emerged. The name has already been profitable three times
over, Tindal said.

"It's a really great business," Tindal said. "The more your product gets
seen the more people like it."

While most of the .training names will retail for about $30 a year, Tindal
is quick to point out that fitness is just one way to use the suffix.
There's a whole other group of sites focused on education. AWS.training,
a site for taking classes on Amazon Web Services, is already up and
running.

Jeff Davidoff, former chief marketing officer of Orbitz and Bono's ONE
Campaign, is tasked with turning the Not Com Revolution into a mainstream
business. As CMO of Donuts, he's meeting with prospective customers at
conferences like South by Southwest and helping users of new TLDs tell
their stories.

He's convinced the market is about to tip.

"This isn't hypothetical anymore," Davidoff said. "So much of the history
was four smart guys making bets on what the future could be. It's not a
question of whether this will stick, it's just a question of how quickly
it gets to be the new normal."



4 Billion People Still Not Online


Despite an increase in global Internet usage and efforts to boost
international Web access, some 4 billion people remain offline.

Over the last 15 years, the International Telecommunication Union (ITU)
has seen the number of global Internet users increase from 400 million to
an expected 3.2 billion by year's end. Along the way, however, many
billions of people were left by the wayside, without access to email,
texts, social media, digital maps, or even statistics about themselves.

Industry heavyweights like Facebook and Google are working to bring free
or cheap Internet access to emerging markets, teaming with local ISPs or
launching balloon-based Internet service.

Internet.org and Google's Project Loon are still in their infancy, but ITU
announced that between 2000 and 2015, Internet penetration overall
increased almost seven fold from 6.5 to 43 percent of the global
population.

"These new figures not only show the rapid technological progress made to
date," ITU Secretary General Houlin Zhao said in a statement. "But also
help us identify those being left behind in the fast-evolving digital
economy."

Mobile users are keeping pace, too, according to ITU's forecast, which
suggests that, by the end of the year, there will be more than 7 billion
mobile subscribers worldwide—up from fewer than 1 billion in 2000.

Global cellular penetration is set to reach 47 percent this year, while at
the same time, 69 percent of the global population will reportedly be
covered by 3G mobile broadband, up from 45 percent in 2011. Of the 3.4
billion people in rural areas, meanwhile, about 29 percent will be
covered by 3G broadband this year, the ITU said.

"ICTs [information and communication technologies] will play an even more
significant role in the post-2015 era and in achieving future sustainable
development goals as the world moves faster and faster towards a digital
society," said Brahima Sanou, director of the ITU's Telecommunication
Development Bureau.

"Our mission," he added, "is to connect everyone and to create a truly
inclusive information society."



FCC's Wheeler To Propose Subsidized Internet Access


The U.S. Federal Communications Commission will propose a plan to offer
subsidized broadband Internet access to low-income Americans, the New
York Times reported.

FCC Chairman Tom Wheeler will roll out a plan on Thursday to his
commissioners suggesting major changes to a $1.7 billion subsidy program,
the newspaper cited senior officials as saying.

Wheeler will propose potentially giving recipients a choice of phone
service, Internet service or a mix of both, the officials said.

The subsidy program, Lifeline, is funded through fees paid by landline
and cellphone customers.

"Lifeline helps ensure that all Americans can afford phone service,
providing connections to jobs, family and 911," Wheeler said last year.

Wheeler will also suggest new measures to curb fraud, the newspaper said.
Lifeline has been a subject of controversy in recent years, after
instances of abuse. Three men were indicted on charges of defrauding the
subsidy program last year.

While the plan proposed by Wheeler is likely to win the support of the
FCC's Democratic majority in a vote next month, it is almost certain to
set off fierce debate in Washington, the newspaper said.



Rejoice: Facebook Gets GIF Support - Here's Everything You Need To Know


That's right children, you can now post GIFs to Facebook and have them
display not only inline, but in the mobile app as well.

See also: Beep boop beep: An interactive, animated droid encyclopedia
Longtime Facebook users (read: old people like me who have been using the
service since it was for college students only), will recall that if
offered GIF support in the very early days. The ability to embed or upload
GIFs was removed a decade ago, probably because of the negative impacts a
ton of GIFs in the Newsfeed had on the product.

A decade later, GIFs are bigger than ever and the ways in which a web
service can deal with loading GIFs has improved too. Plus, virutally
every other major social service now supports GIFs, so it's sort of time
for Facebook to re-join the party.

As with all good things, however, there are caveats.

The GIF support offered by Facebook is considerably better than the lame
support Giphy hacked onto the platform in 2013, but there are still some
guidelines to keep in mind.

The first thing to keep in mind is that the feature works with GIF links,
not GIF uploads. At least for now, attempting to upload your favorite GIF
will not result in a usable, playable GIF on Facebook.

Instead you need to paste a GIF file link into the "status update"
screen. For most services, you'll see an inline, real-time preview of
the GIF embed.

In our tests, GIF links pasted from Tumblr didn't preview in the status
update preview, but showed up just fine on the page itself.

Services such as Giphy, Imgur, GFYcat and others are trying to make it
easier to embed large GIFs all over the web.

Oftentimes, those services create a custom URL that will dynamically
decide between loading a Flash or HTML5 video version of a GIF (which are
smaller in file size and can load more quickly) or falling back to a
traditional GIF image.

From our tests, it looks like the JavaScript involved in trying to parse
the GIF gets confused with Facebook's embed process and you wind up with
the standard Giphy embed feature, which requires loading the GIF in
another window.

To get around this, make sure you're using the full GIF url from Giphy or
other GIF services.

For Giphy, click on the "share" button and then copy the GIF link.
Pasting that link, which ends with *.gif, will result in happiness for
everyone.

First, the good news. GIF links you paste on Facebook work on mobile too.
The latest version of the iPhone app supports GIFs perfectly.

When scrolling through your feed, there will occasionally be an icon
letting you know that a GIF exists (this seems to depend on the size of
said GIF) and you can tap on the image to get the GIF to play. This is a
common lazy-load feature that many other sites use in order to minimize
the processing power needed to load lots of GIFs.

Now, for the bad news. For right now, GIF links only work for personal
profiles, not brand pages.

I tried to get GIFs to work on the Mashable Tech Facebook page, and
although the embed originally looked like it would work — it ended up
defaulting to a standard Giphy link.

No Virginia, GIF links do not work on Facebook Pages.

Subsequent attempts to paste GIF links just led to static images. Sad face.

We expect Facebook will eventually allow Pages to show GIFs too. (And you
thought branded memes were bad — wait until we get into the battle of
brand-page GIFs.)

This is new and stuff is going to break and not work. We're still figuring
out what's what with GIFs on Facebook, so stay tuned for more details.

In the meantime, GIF on!



=~=~=~=




Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT