Augmented reality lawsuit provides augmented view of 1st Amendment

“Texas Rope ‘Em is not entitled to First Amendment protection because it does not convey any messages or ideas. Unlike books, movies, music, plays and video games—mediums of expression that typically enjoy First Amendment protection—Texas Rope ‘Em has no plot, no storylines, no characters, and no dialogue. All it conveys is a random display of cards and a map. Absent the communicative features that invoke the First Amendment, Candy Lab has no First Amendment claim,” the county said. (PDF)

Source: Augmented reality lawsuit provides augmented view of 1st Amendment | Ars Technica

No plot, storylines, characters, and dialog describes the Academy Award winner for best picture last year.

Supreme Court Overturns Patent Ruling in Blow Against Trolls

The justices sided 8-0 with beverage flavoring company TC Heartland in its legal battle with food and beverage company Kraft Heinz, ruling that patent infringement suits can be filed only in courts located in the jurisdiction where the targeted company is incorporated. Justice Neil Gorsuch did not participate in the decision.

Source: Supreme Court Overturns Patent Ruling in Blow Against Trolls | Fortune.com

Theresa May Wants To Regulate The Internet

New laws will be introduced to implement these rules, forcing internet companies such as Facebook to abide by the rulings of a regulator or face sanctions: “We will introduce a sanctions regime to ensure compliance, giving regulators the ability to fine or prosecute those companies that fail in their legal duties, and to order the removal of content where it clearly breaches UK law.”

Source: Theresa May Wants To Regulate The Internet

OAUTH phishing against Google Docs ? beware!

As you can see, it appears as Google Docs wants full access to my Gmail as well as my contacts. Of course, this is not real Google Docs – the attacker has simply named his “application” Google Docs – this can be verified by clicking on the Google Docs text where the real web site behind this and developer info is shown:

Source: InfoSec Handlers Diary Blog – OAUTH phishing against Google Docs ? beware!

Finally, if you accidentally clicked on “Allow”, go to https://myaccount.google.com/u/0/permissions?pli=1 to revoke permissions.

The SEC just handed Bitcoin a huge setback

The Securities and Exchange Commission has denied the application for the Winklevoss Bitcoin Trust ETF, in a stunning defeat for its founders, the Winklevoss Twins. In an order today, the commission found that the proposed fund was too susceptible to fraud, due to the unregulated nature of Bitcoin. The result is a major setback for the fund, and a frustrating false start for the crypto-currency at large.

Source: The SEC just handed Bitcoin a huge setback – The Verge

Tesla’s new solar energy station will power Hawaii at night

This is the first big project from Tesla and SolarCity since the acquisition. Both companies believe this station is the biggest combination solar panel and storage facility in the world. With approximately 55,000 solar cells spread over about 45 acres, it’ll be tough to find anything larger.

Source: Tesla’s new solar energy station will power Hawaii at night

SpaceX to Send Privately Crewed Dragon Spacecraft Beyond the Moon Next Year

Once operational Crew Dragon missions are underway for NASA, SpaceX will launch the private mission on a journey to circumnavigate the moon and return to Earth. Lift-off will be from Kennedy Space Center’s historic Pad 39A near Cape Canaveral – the same launch pad used by the Apollo program for its lunar missions. This presents an opportunity for humans to return to deep space for the first time in 45 years and they will travel faster and further into the Solar System than any before them.

Source: SpaceX to Send Privately Crewed Dragon Spacecraft Beyond the Moon Next Year | SpaceX

CMU AI Is Tough Poker Player

Libratus was developed by Computer Science Professor Tuomas Sandholm and his Ph.D. student, Noam Brown. Libratus is being used in this contest to play poker, an imperfect information game that requires the AI to bluff and correctly interpret misleading information to win. Ultimately programs like Libratus also could be used to negotiate business deals, set military strategy or plan a course of medical treatment — all cases that involve complicated decisions based on imperfect information.

Source: CMU AI Is Tough Poker Player | Carnegie Mellon School of Computer Science

Tesla’s Autopilot Vindicated With 40% Drop in Crashes

It turns out that, according to the data Tesla gave investigators, installing Autopilot prevents crashes—by an astonishing 40 percent.

Source: Tesla’s Autopilot Vindicated With 40% Drop in Crashes – Bloomberg

In October, the company began shipping new Autopilot hardware with enhanced sensors that it says will eventually enable fully autonomous driving. Every car now ships with eight cameras and a dozen sensors to give 360-degree visibility. The company is rolling out new features that make use of the sensor suite in regular over-the-air updates.

Rudy Giuliani is an absurd choice to defend the US from hackers

While it’s amusing to make fun of Giuliani, hiring people with little or no bona fide security experience to head up cybersecurity practices in government is sadly a tried and true pastime in Washington. Instead of tapping actual computer security experts, politicians in many cases continue to put their friends or people they know in charge of a monumental problem that requires expertise beyond having many political connections or relationships with donors.

Source: Rudy Giuliani is an absurd choice to defend the US from hackers | Trevor Timm | Opinion | The Guardian

From:  Trump’s cyber-guru Giuliani runs ancient ‘easily hackable website’

“You can probably break into Giuliani’s server,” said Robert Graham of Errata Security. “I know this because other FreeBSD servers in the same data center have already been broken into, tagged by hackers, or are now serving viruses.

“But that doesn’t matter. There’s nothing on Giuliani’s server worth hacking.”