Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'Google'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 870 results

  1. Google has rolled out an answer for those occasions when a bad mobile connection stops you using search. The Google app will now queue searches if there's no connection and deliver results when a connection is re-established. A new feature available on the Google app for Android removes the obstacle of beginning a search when there's no mobile signal or only patchy coverage. The updated app will now queue searches if there's no connection and deliver the result when a connection is re-established, Google says in a blogpost. The new offline capabilities for search join similar improvements to its other apps, such as Google Translate, Google Maps, and its lightweight search-result pages, which aim to patch up key features when a poor connection would otherwise break them. "Mobile networks can sometimes be inconsistent or spotty, which means that even if you have a connection when you start your search, it might fail before you get your results back. With this change, search results are saved as soon as they are retrieved, even if you lose connection afterwards or go into airplane mode," Google explains. While the feature doesn't enable offline search per se, it is a workaround to the problem of searching when there is no connection or if the signal is dropped, for example, while driving through a tunnel, in an underground train, or in a remote area. The updated Google app for Android will now monitor in the background for a decent network connection and once one is found, it delivers a notification detailing the number of results that are ready to view. Despite the additional background activity, Google says the feature "won't drain your battery", and since it features streamlined search-result pages, it shouldn't impact data usage. The feature is available in the latest version of the Google app for Android. Article source
  2. Adult themed streaming sites are using a loophole in Google's services to store infringing material at no cost. Google's servers are increasingly being used as a hosting platform, by exploiting YouTube's private publishing backdoor. With YouTube as one of its flagship services, Google has a dominant market share when it comes to online video. However, behind the scenes it is also becoming a primary source for pirate streaming sites, generating millions of views per day. While it’s no secret that there are pirated videos on YouTube, there is an even greater concern for copyright holders behind the scenes. As highlighted before, streaming sites often use Google’s services as a hosting ‘provider.’ On YouTube, they likely upload material without publicly publishing it. Instead, they grab “private” direct links to these videos and embed them on their websites. These videos are served directly from the GoogleVideo.com domain without being listed on YouTube. This means that they also bypass the Content-ID takedown system. Interestingly, the adult community has discovered this trick as well. While YouTube doesn’t allow people to upload porn, there are many adult sites that use the site as a hosting provider. This hasn’t gone unnoticed by the California-based adult producer Dreamroom Productions, which is very active on the anti-piracy front. “There is a big loophole on YouTube. Copyright infringers take advantage of a private-video-share setting. They upload and store videos, and freely use them on third party websites to earn profits,” the company informed us. According to Dreamroom, the embedded videos are available on a wide variety of streaming sites. Since the content is not publicly listed on YouTube it’s harder to take down. A typical link, tied to an IP-address and with an expiry time While the content is eventually removed, the adult producer says that this can take up to three weeks. However, instead of removing the videos they would rather have YouTube plug this hole, to stop the abuse once and for all. “YouTube should be aware of this. They are allowing the situation to continue by not plugging this hole, which could be done by disabling the sharing function of videos under those special settings.” TorrentFreak contacted Google several weeks ago asking for a comment, but the company has yet to release an official statement. As said before, the issue isn’t limited to adult content or even YouTube. The Google hosting ‘exploit’ has been and still is used by a wide variety of popular streaming sites, with some clearly revealing what their sources are. Googlevideo.com…. Google’s own Transparency Report also shows that the search giant received tens of thousands of notices for the Googlevideo.com domain. These links typically have source=youtube or source=drive as a referrer. The latter suggests that videos are also uploaded to Google’s cloud hosting service, Drive. For pirate streaming sites the trick provides a cheap way to store videos, although they still have plenty of other options as well. According to Dreamroom, however, YouTube itself could very well be the largest pirate service of all now. “The world biggest TUBE site may have become one of the world’s largest databases of copyright infringing material,” a company spokesperson said. Source: TorrentFreak
  3. Gmail Users Under Attack As Hackers Develop Sophisticated Phishing Technique New phishing attack launched against Gmail users Specifically, attackers are now sending emails to Gmail users with embedded attachments that look like images and which require just a click to launch what is supposed to be a preview of the picture. Instead, the attachment opens a new tab in your browser that requires a re-login. When inspecting the typical elements that could point to a phishing scam, such as the address bar, everything looks legit, as in this case the URL is the following: “data:text/html,https://accounts/google.com.” So naturally, most users would provide their Gmail credentials, but as WordFence reports, once you do that, the account is compromised. Surprisingly, the hacked Gmail account is almost instantly accessed in order to retrieve the contacts and then uses the same phishing email to spread the attack. Using email addresses from a person’s contacts can make emails look even more legitimate, thus helping compromise a bigger number of accounts. Most likely, the access is automatically performed by a bot, but there’s also a chance for attackers to do the whole thing manually in order to collect email addresses. How to detect the phishing attack The easiest way to determine that a message is a phishing attack or not is by looking in the address bar. As we’ve told you before, attackers were particularly focused on ways to make the URL look more legitimate, but in reality, there are a lot of white spaces that you can remove to check out the end of the address. If you do that, you can notice that the URL ends with a script that’s supposed to launch the new tab and point the browser to the phishing page used to steal login credentials. Google has already offered a response, according to the aforementioned source, but it’s not what you think, as the company doesn’t seem to be too keen on blocking the attacks. “The address bar remains one of the few trusted UI components of the browsers and is the only one that can be relied upon as to what origin are the users currently visiting. If the users pay no attention to the address bar, phishing and spoofing attack are - obviously - trivial. Unfortunately that’s how the web works, and any fix that would to try to e.g. detect phishing pages based on their look would be easily bypassable in hundreds of ways. The data: URL part here is not that important as you could have a phishing on any http(s) page just as well,” the firm said. The easiest way to keep your account secure, even if you fall for this phishing attack, is to enable two-factor authentication for Gmail, which means that in case you do provide your login credentials on the phishing website, the attacker shouldn’t be able to access your account anyway. Source Alternate Source - Don't Fall For This Dangerously Convincing Ongoing Phishing Attack
  4. Audible Magic, one of the best known anti-piracy companies operating in the digital fingerprinting space, has filed a complaint against Google at the US Patent and Trademark Office. The California-based company says that YouTube's registration of the trademark 'Content ID' was made fraudulently and should be canceled. Automatic Content Recognition (ACR) technologies have been available to the public for a number of years. Perhaps the most visible is the mobile app Shazam, which allows users to identify the name of a song after listening to just a short clip. The same kind of technology is famously deployed at YouTube. Its (in)famous Content ID system can spot copyrighted content uploaded by users and make a decision whether to take it down or allow rightsholders to monetize it. However, YouTube now faces a legal challenge over the Content ID trademark. Audible Magic has been operating in the content recognition and fingerprinting market for more than fifteen years. In fact, during 2006, YouTube and Audible Magic signed an agreement which gave YouTube a license to use the latter’s content recognition technology. Perhaps surprisingly, Audible Magic’s system was called Content ID, a term YouTube uses to this day, despite its agreement with the content recognition company being terminated in 2009. It’s clear the Audible Magic still feels it has a claim to the name and that is the basis of the complaint the company has just filed with the United States Trademark and Patent Office. Audible Magic’s website Describing itself as “the leader in automated identification of audio and visual content for web media platforms,” Audible Magic says it has worked with the biggest names in media, including Warner Bros, Sony, Disney and Facebook. As highlighted above, between 2006 and 2009 it also worked with Google. In its complaint to USPTO, Audible Magic says that during 2006, YouTube was facing accusations that it was a “prime enabler” of copyright infringement and pirating. “The television and movie industries were complaining that YouTube was allowing third-parties to upload copyright materials from television and movies and was not instituting any controls or checks on third-party content. This negative publicity was particularly damaging to YouTube in 2006 when Google was considering acquiring YouTube for over one billion dollars,” the company writes. To address this problem, in October 2006 Audible Magic and Google signed an agreement for YouTube to license Audible Magic’s Content ID system. After YouTube had been bought by Google, the license was transferred to the search giant. The agreement between the companies was terminated three years later in 2009, at which point Audible Magic says that all intellectual property rights in Content ID reverted back to its control. However, Google is now attempting to gain ownership of the trademark. As shown in the image below, its application with the USPTO is ongoing and claims first use nearly eight years ago. Google’s registration for Content ID “According to the date of first use claimed in Google’s registration, Google asserts that it first used the Content ID mark in connection with its services on August 27, 2008,” Audible Magic writes. “Audible Magic’s date of first use of Content ID in March 2006 is thus well before the claimed first use of the mark by Google (as it should be since Google sourced the mark and related services from Audible Magic), and Audible Magic’s use of Content ID therefore has priority over Google’s use and registration.” While Audible Magic feels it has a claim over the name, one of its biggest concerns surrounds the confusion that is set to arise with Google using the term ‘Content ID’ in a marketplace already occupied by Audible Magic. “Such confusion may cause harm to Audible Magic and the consuming public and jeopardize the valuable goodwill and reputation Audible Magic has built up in connection with Content ID and its services,” the company explains. In closing, Audible Magic asks the United States Patent and Trademark Office to cancel Google’s trademark registration on the basis the company “committed fraud” in 2013 when it signed a declaration which stated that it knew of no other company entitled to use the Content ID mark in commerce. The full complaint to the USPTO can be found here (pdf) Source: TorrentFreak
  5. Rankaware 1.5.2 - 1 Year[365 Days] Promo by BitsDuJour Overview: If you call yourself an SEO Expert, you need to be able to provide your clients with immediate reports giving them insight into how their sites are doing across all of the major search engines. And if you’re tallying all of this information up by hand, you’re not going to be an expert for very long. The best SEO Experts have the right tools in their arsenal, tools like today’s discount software promotion, Rankaware! Rankaware lets you check search engine rankings, position changes, and keyword rankings across Google, Yahoo, and Bing. With Rankaware, you’ll be able to automatically bulk-check keyword rankings on all three search engines, while producing scheduled, branded, professionally designed reports for submission to your clients. In fact, all of your clients will be amazed at the level of detail that you can provide them, including intuitive charts and tables that are emblazoned with your company’s logo! So find out today how you can benefit from Rankaware’s intelligent self-learning technology and world-class user interface design, and start establishing yourself as the leader in SEO today! Features: Become a more proficient SEO Expert with this amazing tool Check search engine rankings, position changes, and keyword rankings across three major search engines Produce insightful reports for your clients complete with your company’s logo Include charts and tables that give your clients all the info they need Benefit from self-learning technology and a world class user interface More Info: Product Homepage Links: Offer: https://www.bitsdujour.com/software/rankaware-1-year/buy=true Note: Limited Period Offer. Expires in 24 hours. The program is available for $99.97, but it will be free as a time-limited offer. Current Status: Open. Terms: https://www.bitsdujour.com/software/rankaware-1-year Downloads: http://myrankaware.com/file/rankaware-win.exe
  6. Google Chrome HTML5 Roll-Out Plan Google revealed yesterday how it plans to make the shift to prioritizing HTML5 over Flash in the company's Chrome browser. The company announced previously that it will deprioritize Flash content on the web in favor of HTML5 content. The decision left many questions unanswered: will Chrome block all Flash content eventually? What is the time frame for the change? What happens to sites that only support Flash but not HTML5? This article will answer all those questions and a couple more. Google Chrome HTML5 Roll-out plan The roll out runs from January 2017 to October 2017 if things go as planned. Chrome uses the site engagement metric to determine whether "activate Flash" prompts are displayed to the user on sites that don't support HTML5 fallbacks. Site engagement describes how often a site is accessed by a Chrome user. The value gets higher with visits, and starts at 0 for sites that have not been visited yet. Tip: You can display the site engagement values for all visited sites in Chrome by loading Google chrome://site-engagement in the address bar. Points can be edited for any site. This can be useful for testing purposes, but also to raise the score of a site above a certain threshold. Chrome will display a Flash prompt for any site visited in the browser that falls below a selected threshold for the given month. In January 2017, any site below 1% will throw a prompt to activate Flash. This goes up to a threshold of 32 in June 2017, and to 100 in October 2017. Only new sites will display prompts in the beginning, but this will change over the course of the year 2017 until all sites will prompt the user for activation. January 2017 is special, as only 1% of all stable users of Chrome will join the Flash deprioritizing group. Google plans to increase the value to 100% with the release of Chrome 56 Stable in February 2017. Testing Developers may test the functionality in Chrome Beta. To do so, load chrome://flags/#prefer-html-over-flash in the browser and set the flag to enabled. Restart the browser to complete the change. This enables the HTML5 over Flash functionality in the browser with a fixed site engagement rating of 30. Any site below that threshold will prompt to enable Flash, any site above it won't. Closing Words Flash will remain a part of Google Chrome for the foreseeable future but users will face more and more prompts when they want to run Flash in the browser. The change is of concern to website operators as well who use Flash exclusively or predominantly on their sites as part of Chrome's user base will probably exit the site instead of following the prompt to enable Flash. Mozilla plans to drop NPAPI plugin support in Firefox 53 which will be out April 18th, 2017 (Google did so in Chrome 45 already, but Flash is not NPAPI but PPAPI in Chrome so it did not affect the technology). Flash will likely be the only exception to the rule as plans are underway to whitelist Flash so that it remains available. Now You: Do you visit sites that rely on Flash? Source
  7. 32Bit :: http://redirector.gvt1.com/edgedl/release2/q7lq1jxh9nj7yg25wz7wzwdrac1ksyd9ys0puhi0l4dwmoww5f1xo61y4kl9pkwj4wdgbxpajbh0av7j7ec2q7nptu8uy11j2zo/55.0.2883.87_chrome_installer.exe 64Bit :: http://redirector.gvt1.com/edgedl/release2/ita7hv5uktmxmkscmig7s9ehraz1im1do4ucck991uyfo3bqkdc55mn1vmrebmzqwrxt5ib6x8ohjojd56hwomb4593vqb9sfl1/55.0.2883.87_chrome_installer.exe
  8. Google has rolled out two security patches for Android devices earlier this month that address a total of 74 vulnerabilities in the operating system, including 11 that are rated as critical. Specifically, Google’s December 2016 security patching cycle included two different releases, each of which came with fixes that were aimed at both Google and other Android devices. The so-called 2016-12-01 security patch level includes 5 different fixes aimed at vulnerabilities flagged as “high” severity and 6 others for moderate issues. There are two different remote code execution flaws patches with CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, and CVE-2016-6768, two denial of service vulnerabilities, four elevation of privilege vulnerabilities, and two information disclosure holes. It’s important to note that Android 7.0 or later is not affected by these vulnerabilities if they are already running the latest updates. On the other hand, the rest of the Android versions on the market, starting with 4.4 and ending with 6.0.1, are all targeted by these updates. Then, there’s the 2016-12-05 security patch level, which comes with a bigger number of fixes. There are 58 patches included in this update, 11 of which are rated as critical, 33 as high, and 14 as medium severity risk. Most of the vulnerabilities fixed with this update would allow for elevation of privilege and Google says that both its own devices and other Android phones and tablets on the market were exposed. Once again, all versions of Android starting with 4.4.4 should install the patches as soon as possible. Eagerly-awaited patches Two important patches are CVE-2016-4794 and CVE-2016-5195 which fix the Dirty COW security bug discovered on Linux and also affecting Android, allowing attackers to root devices and get full root access to local data. Google rates the bug as critical and fixes the patch on all its devices, starting with Pixel C, Pixel, Pixel XL, Nexus 5X, and Nexus 6P. “An elevation of privilege vulnerability in the kernel memory subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device,” Google says. Canonical has already patched the flaw in supported Ubuntu versions, and following this month’s Google patch cycle, no devices should be left vulnerable. Android devices getting the update receive just a single OTA patch which then displays the December 05, 2016 security patch level on the About information screen. Article source
  9. Chrome 55 Now Blocks Flash, Uses HTML5 by Default Chrome 55, released earlier this week, now blocks all Adobe Flash content by default, according to a plan set in motion by Google engineers earlier this year. Back in May, Google's staff announced that starting with Q4 2016, Chrome would use HTML5 by default, while Flash would be turned off. While some of the initial implementation details of the "HTML5 By Default" plan changed since May, Flash has been phased out in favor of HTML5 as the primary technology for playing multimedia content in Chrome. Users have to allow Flash to run on non-HTML5 websites Google's plan is to turn off Flash and use HTML5 for all sites. Where HTML5 isn't supported, Chrome will prompt users and ask them if they want to run Flash to view multimedia content. The user's option would be remembered for subsequent visits, but there's also an option in the browser's settings section, under Settings > Content Settings > Flash > Manage Exceptions, where users can add the websites they want to allow Flash to run by default. Back in May, to avoid over-prompting users, Google said it would whitelist some of the Internet's biggest web portals where HTML5 isn't yet supported, or where not all content could be played back via HTML5 just yet. The list included YouTube, Flash, VK, and others. This top 10 list has been dropped, in favor of a better system called Site Engagement (chrome://site-engagement) that gives scores to websites based on the number of visits and time spent on each site. The Site Engagement indicator takes a value from 1 to 100, and once it drops under 30, users will be prompted to enable Flash, regardless of the site's popularity and Alexa ranking. Flash, who's been accused of being a resource hog and a security threat, will continue to ship with Chrome for the time being. If you don't like Google's decision to go with HTML5 by default, there's an option in the chrome://flags section where you can revert to using Flash. Google has been preparing for a life without Flash for many years now. YouTube has dropped Flash support a long time ago, while starting with January 2, 2017, Google will stop accepting Flash ads in its AdWords program. Both Chrome and Firefox now block non-essential Flash content, such as analytics and user fingerprinting scripts. Google has been doing this since Chrome 53, and Mozilla since Firefox 48. Source
  10. Google’s About To Roll Out Invisible Captchas Google is about to roll out an updated version of the company's captcha protection that tries to determine whether a connection was made by a user or Mr. Roboto. Captchas are designed to separate between humans and bots. While sites may want to allow entrance to all human visitors, they may not be as forthcoming when it comes to bots. Too many bot connections may impact a server's responsiveness negatively. Additionally, bots are often used for nefarious activities such as bulk registration of accounts, spam, scraping, and other activities with negative connotations. Google's recaptcha captcha system is widely used on the Internet. The system is already one step ahead of many other solutions, as you may only have to click the "I'm not a robot" box to pass the captcha and enter the site. You may get to solve a captcha or multiple ones if the algorithm used determines that you may not be human however. This can be a really frustrating experience, especially if you use Tor or are connected to a virtual private network (vpn). The reason for this is that these services are not only used by regular users but also by spammers who get the IP addresses flagged. While captchas are solvable most of the time, you may run into situations where the captcha is broken. The new invisible captcha that Google showcases here goes a step further. Instead of having to click a box, users may not have to do a thing to gain entrance to a site that uses the new invisible recaptcha technology. In the best case, access is granted without users doing anything. The algorithm determines that the user is human and grants access directly. The system falls back to captcha solving if the algorithm determines that a user may not be human. Webmasters who use recaptcha on their properties may sign up already for invisible captcha to deploy it before it becomes available to the public. All they need to do in best case is to replace the old code with the new on their web properties to make use of the new system. Closing Words Improvements to the detection of humans are always welcome. This one means that you may not even see a captcha if the algorithm determined that you are human in the background. That's a step in the right direction. It seems likely however that this won't change much for Tor or VPN users. (via Caschy) Now You: What's your captcha experience so far? Source
  11. 32Bit :: http://redirector.gvt1.com/edgedl/release2/bo26ez30rcitgyuswe830vv04ejpvc3spzwynlc7unklxoctxbstgy0otycv79glemtj6mlpt681o1f8dja9ajvo6eed98on0ff/55.0.2883.75_chrome_installer.exe 64Bit ::http://redirector.gvt1.com/edgedl/release2/vllsgbu5dpgyjmk8asiyozmqf97zwlfqwz8lbdozvfzsmg4kf3a7d164wd47jiyapyh7r349khowbfgxdiwr3aluxcb30eap62m/55.0.2883.75_chrome_installer.exe
  12. Android User Locked Out Of Google After Moving Cities Image Courtesy: Techworm An Android user has been locked out of his Google account apparently because he moved cities, according to a post on Reddit. The explanation offered by Google support staff was that since his address details differed, billing information with Google wasn't current and hence the user's purchases could look fraudulent. The user in question does not know for sure that this is the reason; during his interactions with Google support to find out why he had been locked out, he was told that When asked what he could do, he was initially directed by Google staff to a site where he had to scan his driver's licence and credit card and told that he would have to wait 24 hours to get his account unlocked. But after this time passed, he was told that the account would not be unlocked and Google would not tell him why. He was advised to abandon his old account and start a fresh one. However, this meant he could not use the credit card that he had used on the old account and would have to obtain a new one to continue using Google's services. All his previous purchases would not be transferred to the new account, he was told. An email he sent to Google support resulted in the following reply: Source
  13. How well do you know your Android device? Here are some of the hidden Android secret codes. Since most hidden menus are manufacturer specific, there’s no guarantee that they’ll work across all Android smartphones, but you can try them out nevertheless on your Samsung, HTC, Motorola, Sony and other devices. Be advised, though, that some of these can cause serious changes to your device’s configuration, so don’t play with something that you don’t fully understand. You can find more of these spread across the internet, and they’re usually very handy to have, even if just to show off your geekiness to your social circle. Update x1: More codes! Source : Redmondpie
  14. People are tweeting out a concerning Google email alert they received, which notes state-sponsored hackers are trying to break into their account. The alert reads: "Government-backed attackers may be trying to steal your password." Following the highly publicized suspicions that Russian hackers are lurking in our midst, the alerts become a little more alarming. These warnings are not new, though. Google has been advising users of government-backed attacks since 2012. In March, the company launched a full page warning, as shown in the tweets below. It does not indicate which country is behind the attempted hack. If you are being targeted by one of these sophisticated hackers, consider yourself special. Google notes these warnings only get sent to a mere 0.1% of users who are normally activists, journalists and policy-makers. A Google spokesperson told Mashable you should be alert but not alarmed. "We send these warnings out of an abundance of caution — they do not indicate that a user's account has already been compromised or that a more widespread attack is occurring when they receive the notice," the spokesperson said. "Anyone that receives one should follow the instructions in the warning, and we further recommend that all users routinely do a Google Account Security Checkup." So stay strong, know you are not alone and then change all your passwords. Quickly. Still terrified? Here's some extra reading on how to deal with serious hackers. UPDATE: Wednesday, Nov. 23, 7:08 p.m.: Google provided a statement for concerned users. Article source
  15. Originally appeared at The Free Thought Project Julian Assange cautioned all of us a while back, in the vein of revelations similar to those provided by Edward Snowden, that Google — the insidious search engine with a reputation for powering humanity’s research — plays the dark hand role in furthering U.S. imperialism and foreign policy agendas. Now, as the Wikileaks founder faces days of questioning by a Swedish special prosecutor over rape allegations inside his Ecuadorian Embassy haven in London today — and particularly in wake of the presidential election — Assange’s warning Google “is not what it seems” must be revisited. Under intense scrutiny by the U.S. State Department for several controversial Wikileaks’ publications of leaked documents in 2011, Assange first met Google Executive Chairman, then-CEO, Eric Schmidt, who approached the political refugee under the premise of a new book. Schmidt, whose worth Forbes estimates exceeds $11 billion, partnered with Council on Foreign Relations and State Department veteran, Jared Cohen, for the work, tentatively titledThe Empire of the Mind — and asked Assange for an interview. Later acknowledging naïvte in agreeing to meet the pair of tech heavyweights, Assange found afterward how enmeshed in and integral to U.S. global agendas Schmidt and Cohen had become. In fact, both have exhibited quite the fascination with technology’s role in burgeoning revolutions — including, but not-at-all limited to, the Arab Spring. Schmidt created a position for Cohen in 2009, originally called Google Ideas, now Google Jigsaw, and the two began weaving the company’s importance to the United States into narratives in articles, political donations, and through Cohen’s former roles at the State Department. That same year, Schmidt and Cohen co-authored an article for the CFR journal Foreign Affairs, which, seven years hence, appears a rather prescient discussion of Google’s self-importance in governmental affairs. Under the subheading “COALITIONS OF THE CONNECTED,” they wrote [all emphasis added]: “In an era when the power of the individual and the group grows daily, those governments that ride the technological wave will clearly be best positioned to assert their influence and bring others into their orbits. And those that do not will find themselves at odds with their citizens. “Democratic states that have built coalitions of their militaries have the capacity to do the same with their connection technologies. […] they offer a new way to exercise the duty to protect citizens around the world who are abused by their governments or barred from voicing their opinions.” Perhaps appearing laudable on its surface — at least to some degree — as Assange pointed out, there is a self-mischaracterization by the American and other Western governments and inaccurately-monikered ‘non-governmental organizations’ that their interests in other nations’ affairs are innately good. This cult of government and non-government insiders have a firm belief their goals should be the unassailable, unquestionable motivator for American imperialism — whatever the U.S. thinks best as a “benevolent superpower,” so should the rest of the ‘non-evil’ world. “They will tell you that open-mindedness is a virtue, but all perspectives that challenge the exceptionalist drive at the heart of American foreign policy will remain invisible to them,” Assange wrote in When Google Met Wikileaks. “This is the impenetrable banality of ‘don’t be evil.’ They believe that they are doing good. And that is a problem.” Cohen, an Adjunct Senior Fellow at the notorious Council on Foreign Relations, lists his expertise in “terrorism; radicalization; impact of connection technologies on 21st century statecraft; Iran,” and has worked for both Condoleezza Rice and Hillary Clinton at the Department of State. Fortune, calling Cohen a “fascinating fellow,” noted that, in his bookChildren of Jihad, the young diplomat and technology enthusiast “advocates for the use of technology for social upheaval in the Middle East and elsewhere.” Under the auspices of discussing technological aspects at Wikileaks’ disposal for the upcoming book, Schmidt; Cohen; Lisa Shields, a CFR vice president at the time; and Scott Malcomson — who would shortly afterward be appointed Rice’s lead speech advisor for her role as the U.S. ambassador to the United Nations — descended on Assange’s safe haven in Norfolk, outside London. It wasn’t until weeks and months after this gathering Assange fully realized how closely Google operates in tandem with the government of the United States — and how perilous the innocent mask of its public intentions truly is in light of such cooperation. Ironically enough, in Wikileaks’ publishing three years later of the Global Intelligence Files — internal emails from private security firm, Stratfor — Cohen’s and Google’s true depth of influence became strikingly apparent. Assange wrote: “Cohen’s directorate appeared to cross over from public relations and ‘corporate responsibility’ work into active corporate intervention in foreign affairs at a level that is normally reserved for states. Jared Cohen could be wryly named Google’s ‘director of regime change.’ According to the emails, he was trying to plant his fingerprints on some of the major historical events in the contemporary Middle East. He could be placed in Egypt during the revolution, meeting with Wael Ghonim, the Google employee whose arrest and imprisonment hours later would make him a PR-friendly symbol of the uprising in the Western press. Meetings had been planned in Palestine and Turkey, both of which—claimed Stratfor emails—were killed by the senior Google leadership as too risky. Only a few months before he met with me, Cohen was planning a trip to the edge of Iran in Azerbaijan to ‘engage the Iranian communities closer to the border,’ as part of Google Ideas’ project on repressive societies.” However, most significantly, Stratfor vice president for intelligence Fred Burton, also a former official with the State Department, wrote in one of those emails: “Google is getting WH [White House] and State Dept support and air cover. In reality they are doing things the CIA cannot do . . . [Cohen] is going to get himself kidnapped or killed. Might be the best thing to happen to expose Google’s covert role in foaming up-risings, to be blunt. The US Gov’t can then disavow knowledge and Google is left holding the shit-bag.” Of course, the massive company — its various facets now under the umbrella of Alphabet, Inc. — has never been fully absent government involvement. Research for what would become ultimately become Google had been undertaken by company founders Larry Page and Sergey Brin in cooperation with the Defense Advanced Research Projects Agency (DARPA) — the strictly secretive technological testing and planning arm for the Department of Defense. Indeed Google’s continued coziness with the diplomacy, military, and intelligence wings of the United States government should not be, though perpetually are, ignored. Political establishment bulldogs on both sides of the aisle and their cheerleader corporate media presstitutes will continue for months or years to debate the failed presidential bid of Hillary Clinton and the apparently-shocking rise and election of Donald Trump, but technology played a starring role in those events. Several reports last year cautioned Google’s algorithms could swing the election — and not only the American election, but national elections around the globe. “We estimate, based on win margins in national elections around the world,” said Robert Epstein, a psychologist with the American Institute for Behavioral Research and Technology and author of one of the studies, “that Google could determine the outcome of upwards of 25 percent of all national elections.” Considering lines between the tech giant and the government have essentially been abandoned, this revelation puts power and influence into acute, if not terrifying, perspective. Google’s ties with the Pentagon and intelligence communities never ceased. Revealed by a Freedom of Information Act request cited by Assange, Google founder Brin, together with Schmidt, corresponded casually by email with National Security Agency chief Gen. Keith Alexander in 2012, discussing a program called the “Enduring Society Framework.” Alexander wrote to Brin: “Your insights as a key member of the Defense Industrial Base are valuable to ensure ESF’s efforts have measurable impact.” According to the Department of Homeland Security, the Defense Industrial Base is “the worldwide industrial complex that enables research and development, as well as design, production, delivery, and maintenance of military weapons systems, subsystems, and components or parts, to meet U.S. military requirements .” It also provides “products and services that are essential to mobilize, deploy, and sustain military operations.” Although Schmidt and Cohen ultimately watered down their book title The Empire of the Mind into the more palatable and less blatantly imperialistic, The New Digital Age: Reshaping the Future of People, Nations, and Business, its message amounted to self-congratulatory justification for broader foreign policy goals. Nefarious warmonger Henry Kissinger, for one, praised the work, which included telling lines by the Google execs, such as: “What Lockheed Martin was to the twentieth century, technology and cyber-security companies will be to the twenty-first.” So ubiquitous has Google become, its presence — like similarly U.S. government-connected Facebook — is nearly indispensable in the daily lives of hundreds of millions worldwide. However well-known is the government intelligence framework in such platforms, it would be ill-advised to ignore the far darker Machiavellian aspects of private corporate technology’s intersection with global political agendas — and the force that coalition wields around the planet. Whether or not the American establishment’s empire suffered a blow in the election of Donald Trump will be a debatable point for some time, but it’s a veritable guarantee its cogs — seeing themselves as the planet’s saviors — have planned in advance for just such an occasion. “If the future of the internet is to be Google,” Assange noted, “that should be of serious concern to people all over the world—in Latin America, East and Southeast Asia, the Indian subcontinent, the Middle East, sub-Saharan Africa, the former Soviet Union, and even in Europe—for whom the internet embodies the promise of an alternative to US cultural, economic, and strategic hegemony.” Empire will remain empire until its dying breath — particularly if it functions under the obstinate belief it, alone, can save the world. Julian Assange should be praised for the transparency and insight he and Wikileaks have readily given the world, instead of excoriated and blamed for faults which lie in the establishment framework — it is this political, intelligence, and military web deserving of a pointed finger. Article source
  16. Google Pixel hacked in under 60 seconds by Chinese team Google’s new flagship just got hacked by a Chinese team at in under 60 seconds. At PwnFest, a hacking competition in Seoul, South Korea, a team of white-hat hackers known as Qihoo 360 demonstrated an exploit that allowed for remote code execution on the Pixel. In under 60 seconds, the team used a zero-day vulnerabilityto remotely install code on Google’s sought after device. The exploit launched Google Play Store and then Google’s mobile version of Chrome before displaying a messaged that read “Pwned by 360 Alpha Team.” Qihoo 360 won a cash prize of $120,000 for the hack and sent Google to the drawing board in trying to figure out how to patch it. All told, the team walked away with $520,000 in cash prizes after demonstrating additional vulnerabilities in Microsoft Edge on Windows 10, and a decade-old exploit that inexplicably still works on Adobe Flash. Not a bad day’s work. TheNextWeb
  17. It's better to reform misbehaving, power-sucking ads than to block them, the head of engineering for Google's browser says. This year, the Opera browser added an option to block online ads. The newer Brave browser goes farther, blocking them by default. But Google would rather fix the problems with ads than strip them off websites. "We feel like there are a lot of challenges in advertising. There are a lot of wrong ways," Darin Fisher, vice president of Chrome engineering, said in an interview. However, he said, "If publishers and advertisers do ads the right way, it can be great for the users and for the ecosystem." Darin Fisher, vice president of Chrome engineering, speaks at Google's Chrome Dev Summit. Ads are a sticky problem for the web. They give people free access to popular websites like Google search and Facebook's social network, but they also can make websites load slowly, waste battery power, increase mobile network data costs, infringe privacy and even deliver malware. And they can be intrusive or distracting, so it's no surprise millions of users install ad-blocking plug-ins for their browsers. Ads can be bad for the publishers who show them, Fisher said. "A lot of the advertising we see is unfortunate in that it probably hurts engagement," actually deterring people from using the website, he said. To help deal with the problem, Google helped found an effort called the Coalition for Better Ads that's working on standards to curtail problem advertising. The effort also includes publishers like Facebook, News Corp. and The Washington Post, advertisers like Unilever and Proctor & Gamble, and industry groups like the Interactive Advertising Bureau (IAB) and the Association of National Advertisers (ANA). But Google also is taking some actions to rein in ads, even if it's not blocking them. One example: For some users on slow 2G networks, Chrome will intervene so websites can't use a web programming feature called document.write. The feature lets websites run instructions that can analyze ad performance -- but that also can slow websites from loading by tens of seconds. Alex Komoroske, a Chrome group product manager, likened the move to pop-up blockers that have become standard in browsers even though they broke some websites. "The web is an ecosystem," he said, and there must be a balance between website priorities and user priorities for the ecosystem to work. Google is offering an alternative too. For example, it's working on technology that will let advertisers run their instructions without hurting performance. Article source
  18. Google is hosting its Chrome Dev Summit today. There hasn’t been a lot of news out of the event, but one number that stood out in today’s keynote by Chrome Engineering VP Darin Fisher was that there are now 2 billion Chrome installs in active use across desktop and mobile. This is the first time Google has shared this number. Sadly, Google didn’t announce any new user numbers for Chrome today. The latest stat for active Chrome users remains at 1 billion — a number Google shared in April. While this number is surely higher today than it was six months ago, the company decided to focus on the number of active browser install today. “I wanted to make this point that there are a lot of Chrome browsers out there,” Fisher said. “What’s exciting about this to you all is that when you think about building for the web, there’ a lot of browsers out there that implement the latest web standards — that implement the latest and greatest web features.” As Google likes to say, it now has seven products with more than a billion users (Gmail, Android, Chrome, Maps, Search, Youtube and the Google Play store). Article source
  19. 32Bit ::: http://redirector.gvt1.com/edgedl/release2/5hckj7qqkdqrez17nmyh0auyfw7z4agqb3jqf600tyy7kaclj01eu7m1e27jyx0fpe366ud87tea786g1052k9cbvgbs2b26s9k/54.0.2840.99_chrome_installer.exe 64Bit ::: http://redirector.gvt1.com/edgedl/release2/laukm0y820bdcw851yaw9wkkef8rs7k81bt8lhn43mgayofjyxqb5fz7o67bknz47drkndicpdr21sfi8j3d8m7ih18br2l07rw/54.0.2840.99_chrome_installer.exe
  20. Web giant tries to fill the protection gap created when malicious sites clean up their act just long enough to ditch the Safe Browsing warning. Google has added a new classification to its Safe Browsing initiative to better protect users from malicious websites trying to game the system. Google's Safe Browsing warns users when they are about to visit a website known to violate the web giant's policies on malware, unwanted software, phishing or social engineering. The warning appears until Google verifies that the site in question no longer poses a threat to users. But some sites are only cleaning up their act just long enough to shake the warning, and then returning to their harmful behavior. That gap in user protection led Google to create a new label to warn users of sites that engage in this pattern. "Starting today, Safe Browsing will begin to classify these types of sites as "Repeat Offenders," Google explained in a company blog post Tuesday. "Please note that websites that are hacked will not be classified as Repeat Offenders; only sites that purposefully post harmful content will be subject to the policy." Once classified as a "repeat offender," sites will not be allowed to request a review for 30 days. During that time, users will continue to see messages warning them of the risk involved in visiting the site. Article source