时间:2020年02月23日 19:35:48

BEIJING — Yahoo Inc. is closing its Beijing research and development center and leaving China in a new cost-cutting move.北京——作为削减成本的新措施,雅虎公司将关闭其在北京的研发中心,全面撤出中国。The company said Thursday the Beijing office#39;s functions would be consolidated in other locations. It gave no details of how many people would lose their jobs but said they would be ;treated with respect and fairness.;公司周四表示,北京办事处的职能将转移到其他地方及部门。公司对有多少人将失去工作没有提供细节,但表示这些人将“得到有尊严及公平的对待”。The Sunnyvale, California-based company has cut jobs elsewhere in a sweeping corporate overhaul as it tries to catch up with Internet users who have shifted to using smartphones and tablets instead of laptop and desktop computers.这家总部位于加利福尼亚州森尼维尔的公司正在进行大规模企业整改,已经在其他地方裁掉大批员工,公司试图追赶互联网用户上网方式的改变,许多用户已转向使用智能手机和平板电脑上网,而不是笔记本电脑和台式电脑。Yahoo turned over control of its China operations to its partner Alibaba Group in 2005 as part of a corporate tie-up. Yahoo stopped offering services in China in 2013.作为企业结盟的一部分,雅虎曾在2005年将自己中国业务的控制权移交给其合作伙伴阿里巴巴集团。雅虎于2013年停止了向中国提供务。Yahoo#39;s profit for the quarter ending in December fell 52 percent from a year earlier while revenue dipped 1 percent.雅虎的利润在截止去年12月的上个季度与去年同期相比下降了52%,营业收入下降了1%。 /201503/365688

It may come as a surprise to hear that the FBI are trying to force Apple to help them hack an iPhone: one used by one of the killers from December’s mass shooting in San Bernardino, California. Does the FBI not aly know everything that people are doing on their phones? In fact, Apple’s devices are among the most secure around — and chief executive Tim Cook’s loud proclamation of his wish to keep them so marks the latest broadside in a battle over just how far the remit of national security reaches.听闻美国联邦调查局(FBI)正试图迫使苹果(Apple)帮助他们解锁一部去年12月加州圣贝纳迪诺大规模击案一名行凶者使用过的iPhone,你或许会感到惊讶。FBI难道不是早已知晓人们在手机上所做的一切吗?事实上,苹果的设备是目前最安全的产品之一,而苹果首席执行官蒂姆錠克(Tim Cook)希望保护iPhone安全性的公开宣言,标志着一场关于国家安全之手应该伸多长的争论中的最新火力点。For the security services, no technology should be secure beyond penetration in the fight against terrorism. For tech firms, protecting users’ privacy is a cornerstone of both business models and trust. And if you think this is a little rich coming several years after Edward Snowden’s revelations of corporate co-operation with the National Security Agency, Google’s chief executive Sundar Pichai has posted some clarifying messages on Twitter. It would, he argues, be a “troubling precedent” to require companies actively “to enable hacking of customer devices and data” — something quite distinct from giving “law enforcement access to data based on valid legal orders”.对安全部门而言,在反恐斗争中,任何技术都不应成为无法破解的障碍。但对科技公司来说,保护用户隐私既是商业模式的基石,也是赢得用户信任的基石。如果在爱德华斯诺登(Edward Snowden)将企业与美国国家安全局(NSA)之间的合作曝光几年后,你觉得这有些让人费解,那么谷歌(Google)首席执行官桑德尔皮查伊(Sundar Pichai)在Twitter上的发帖则让人明白问题所在。他指出,这将成为一个“令人不安的先例”——要求企业积极“帮助破解用户的设备和数据”,这与“让执法部门基于有效法律命令访问数据”可远远不是一回事。The issue has arisen because Apple’s latest mobile operating system prohibits anyone from accessing users’ data without their unique passcode. (The killer, Syed Rizwan Farook, died in a police shootout). If an incorrect passcode is entered too many times, an iPhone can irrecoverably delete all data. Hence the FBI’s request, via a court order served on February 16: that Apple create a specially adapted version of its operating system — dubbed the “FBiOS” by security expert Dan Guido — allowing law enforcement to make an unlimited number of passcode guesses.问题源于苹果最新的移动操作系统禁止任何人在没有用户唯一密码的情况下访问他们的数据。行凶者赛义德里兹万法鲁克(Syed Rizwan Farook)在与警察的交火中被击毙。如果输入不正确密码的次数过多,iPhone将删除所有数据,且不可恢复。因此,FBI通过2月16日的一项法院命令要求,苹果开发一个专门改编的操作系统——安全专家丹圭多(Dan Guido)称之为“FBiOS”——让执法部门可以无限次地猜测密码。Opinion has divided along predictable lines. Tech firms, digital rights activists and a good number of iPhone users tend to support the privacy principle. State officials and the more conservatively minded back law enforcement. What is not in dispute is that the precedent at stake is one law enforcement have been seeking to set for some time, and that its outcome will have profound consequences for security, encryption and privacy.舆论方面针对此事的分歧也在预料之中。科技公司、数字维权人士及很多iPhone用户倾向于持隐私保护原则。而政府官员及思想更为保守的人士持执法机构。不存在争论的是:这一利害攸关的先例是执法部门一段时期以来一直试图确立的,而其结果将对安全、数据加密及隐私权产生深远影响。So far as specifics are concerned, even the most ardent libertarian will have little sympathy for the privacy of a dead killer. What counts, however, is not the morality of one case, but whether this constitutes the thin end of a perilous wedge. Here, the proponents of privacy have a powerful case to make.就事论事,即便最狂热的自由论者也不会对一名被击毙的行凶者的隐私抱以丝毫同情。然而,重要的不是某一案例中的道德准则,而在于这一先例是否会造成一种愈演愈烈的风险。在这一点上,隐私权的持者有强大的理由。Slippery-slope arguments stand or fall on the strength of their evidence for movement from the particular to the general. How convincing is it to suggest that security services may deploy new powers promiscuously once obtained? In the case of technology, the answer seems to be “very”. The past five years show something little short of mania on the part of the NSA and others for hoovering up data and undermining every encryption going. This is hardly surprising. It is what they do.极具争议的观点是否站得住脚,取决于从特例到一般的过程中持它的据有多强。关于安全部门一旦获得新的权力就可能任意行使的论断有多大说力呢?就技术而言,似乎是“非常有说力”。过去5年,我们看到了美国国家安全局及其他机构在搜集数据、破坏加密方面几近疯狂的一面。这不足为奇。这就是他们的工作。Yet technology presents special hazards under such an approach. Escalation is the rule rather than the exception when it comes to tech — as are unintended consequences. The most damaging cyber attacks are invisible until they have aly begun; the most alarming data losses often go undetected, and may remain so for years. It is an unforgiving arena in which to juggle protection and deception. But it is also one in which the very nature of the terrain makes a certain shared level of security integral to the health of the whole.然而,在这种做法下,技术意味着特殊的危险。对科技而言,不断升级是必然,而非例外——意想不到的后果同样如此。最具破坏性的网络攻击在实施之前通常无影无踪;最令人担忧的数据泄露常常不会被察觉,并且可能持续数年不被察觉。这是一个残酷的领域,很难在隐私保护和欺骗之间把握平衡,同时,这一领域的本质决定了某种共享安全级别,而后者不可避免地影响整体安全。Undermining encryption and opening back doors does not just give good guys tools for detecting bad guys. It also creates official data repositories and tools that are themselves vulnerable to assault. It exposes everyone to risks of infection and compromise, and debases vital currencies of trust and co-operation, together with the industries they support.破坏数据加密、打开后门不仅仅会为好人提供发现坏人的工具,还会创建自身易遭攻击的官方数据库和工具。这样做会使每个人面临遭受病毒感染并做出让步的风险,同时降低重要的信任与合作,以及这种信任与合作所撑的行业。Once developed, a technique can be used again and again. This is why staying safe in a digital age is a moving target, and absolute privacy a fantasy. Yet in these fraught circumstances, Mr Cook is right. Our future safety is best served by the best security for all.一项技术一旦被开发出来,就可以反复使用。这就是为什么在数字时代保安全是一个不断变动的目标,而绝对隐私权只是一种幻想。然而,在这些令人担忧的情况下,库克是对的。只有在所有人都享有最高安全的情况下,我们未来的安全才能得到最大保障。 /201602/428205

Edward J. Snowden, the former National Security Agency contractor, opened his Twitter account with a joke on Tuesday. “Can you hear me now?” he wrote, in a short message that electrified the social network and made reference to his revelations about the agency’s spying on phone calls.本周二,国家安全局(National Security Agency)前承包商雇员爱德华·J·斯诺登(Edward J. Snowden)在Twitter上开设账户,并开了个玩笑:“现在你能听到我吗?”这条引爆Twitter的简短帖子调侃了国家安全局监听电话的行动。Mr. Snowden’s first words on his verified account were borrowed from an old television commercial for Verizon, in which an actor playing a technician tested the range of the company’s wireless network.斯诺登用认帐户发出的第一句话,借用了威瑞森(Verizon)以前的一则电视广告的台词。在那个广告中,一名演员扮成技术人员,对公司的无线网络覆盖范围进行了测试。When Mr. Snowden disclosed the scope of N.S.A. surveillance and the role of American communications companies by leaking a trove of classified documents in 2013, the first revelation was a secret court order compelling Verizon to give the N.S.A. information on all telephone calls in its systems, which was published by The Guardian.斯诺登在2013年泄露了大批机密文件,曝光了国家安全局的监控范围以及美国通信公司在其中扮演的角色。首当其冲的是一条秘密的法庭令,它迫使威瑞森将其系统中的所有电话记录提交给国家安全局。此事刊登在了《卫报》(The Guardian)上。As word sp that Mr. Snowden’s account was genuine, and he racked up more than 160,000 followers in his first hour on the network, several users noted that he was following only one account: that of the N.S.A.使用这个Twitter账户的是斯诺登本人的消息迅速传开。他开通账户刚一个小时,关注者人数就突破了16万。一些用户发现,斯诺登只关注了一个帐户:国家安全局。Among those welcoming Mr. Snowden was Glenn Greenwald, the former Guardian journalist who revealed Verizon’s role in the N.S.A.’s bulk domestic phone records program after meeting the former contractor in Hong Kong and obtaining the documents.不少人对斯诺登表示了欢迎,其中之一是前《卫报》记者格伦·格林沃尔德(Glenn Greenwald)。当年他在香港与斯诺登会面并拿到资料之后,向公众揭露了威瑞森在国家安全局大规模监听电话的计划中起到的作用。According to Dan Froomkin of The Intercept, Mr. Snowden was prodded to join Twitter by Neil deGrasse Tyson, the astrophysicist and television host, during an interview on his “Star Talk” radio show, “via robotic telepresence from Moscow,” where he has lived since winning temporary asylum in Russia in 2013.美国新闻网站The Intercept的丹·弗鲁姆金(Dan Froomkin)表示,斯诺登在Twitter上开账户是听从了天体物理学家、电视节目主持人尼尔·德格拉斯·泰森(Neil deGrasse Tyson)的建议。当时他“从莫斯科通过机器人远程连线”,在泰森的广播节目《星语》(Star Talk)中接受采访。自从2013年获得俄罗斯临时庇护之后,斯诺登就一直住在莫斯科。Dr. Tyson was among the many users of the network to welcome the whistle-blower, and the first Mr. Snowden responded to, striking up a brief conversation.泰森士是向这位泄密者表示欢迎的众多Twitter用户之一,也是斯诺登第一个回复的人,两人进行了简短对话。Mr. Snowden’s short Twitter biography s: “I used to work for the government. Now I work for the public.” It also mentions his role as a director of the Freedom of the Press Foundation, a nonprofit organization “helping support and defend public interest journalism focused on exposing mismanagement, corruption and law-breaking in government,” which has as one of its founders Daniel Ellsberg, who leaked the Pentagon Papers during the Vietnam War.斯诺登Twitter帐户上的简介写道:“曾经我为政府工作。现在我为公众务。”其中也提到了他目前是新闻自由基金会(Freedom of the Press Foundation) 的一名总监。该基金会是非营利组织,旨在“帮助持和捍卫符合公众利益的新闻报道,侧重于揭露政府的管理不善、腐败和违法问题”,其创始人之一丹尼尔·埃尔斯伯格(Daniel Ellsberg)曾在越南战争期间曝光了五角大楼文件(Pentagon Papers)。 /201510/402132

White hat hackers revealed白帽黑客身份被揭露The majority of Chinese ;white hat hackers; are young people born in the 1990s, according to China#39;s first survey on the subject, initiated by an online ;geek; community called GeekPwn.由极客在线社区GeekPwn发起的中国首份《白帽黑客调查报告》显示,90后年轻人成为中国白帽黑客的主力军。White hat hackers are information security personnel using online hacking skills to help maintain Internet safety.;白帽黑客;指利用黑客技术维护网络安全的信息安全工作人员。Some 61% were born in the 1990s, while 30% were born in the 1980s and 4% in the 1970s, according to the report.根据该报告,90后白帽黑客的比例约为61%,80后占30%,70后则占4%。The report also says that 55% of white hat hackers make no more than RMB100,000 a year, and only 5% have an annual income above RMB500,000.报告还显示,55%的;白帽黑客;年收入在10万以下,仅有5%的人年薪超过50万。 /201506/380289

文章编辑: 医典范