Five of the largest U.S. technology companies pledged support this year for a dangerous law that makes our emails, chat logs, online videos and photos vulnerable to warrantless collection by foreign governments. Now, one of those companies has voiced a meaningful pivot, instead pledging support for its users and their privacy. EFF appreciates this commitment, and urges other companies to do the same. —David Ruiz @EFF
Quantum computing is a new way of computing — one that could allow humankind to perform computations that are simply impossible using today’s computing technologies. It allows for very fast searching, something that would break some of the encryption algorithms we use today. And it allows us to easily factor large numbers, something that would break the RSA cryptosystem for any key length. @Schneier on Security
If you manage Internet number resources in the APNIC Whois Database, you are requested to provide contact information so that people can contact you for network abuse or troubleshooting. You and your colleagues might have created person objects for this purpose. However, from time to time a person performing a role may change. If you have a lot of resource contacts to manage, updating person contacts can be time consuming. To make this task easier, we recommend using ‘role objects’. —Guangliang Pan @APNIC
One of the world’s most dangerous Android and iPhone spyware program has been found deployed against targets across 45 countries around the world over the last two years, a new report from Citizen Lab revealed. —Swati Khandelwal @The Hacker News
Token Ring, in its original form, was clearly a superior technology. For instance, because of the token passing capabilities, it could make use of more than 90% of the available bandwidth. In contrast, Ethernet systems, particularly early Ethernet systems used a true “single wire” broadcast domain. The Fiber Distributed Data Interface (FDDI), is like Token Ring in many ways.