Geek Stuff

A New Form of Online Tracking: Canvas Fingerprinting

Slashdot -

New submitter bnortman (922608) was the first to write in with word of "a new research paper discussing a new form of user fingerprinting and tracking for the web using the HTML 5 <canvas> ." globaljustin adds more from an article at Pro Publica: Canvas fingerprinting works by instructing the visitor's Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user's device a number that uniquely identifies it. ... The researchers found canvas fingerprinting computer code ... on 5 percent of the top 100,000 websites. Most of the code was on websites that use the AddThis social media sharing tools. Other fingerprinters include the German digital marketer Ligatus and the Canadian dating site Plentyoffish. ... Rich Harris, chief executive of AddThis, said that the company began testing canvas fingerprinting earlier this year as a possible way to replace cookies ...

Read more of this story at Slashdot.

Meet the first games designed for Amazon’s Fire Phone

Liliputing -

The Amazon Fire Phone is scheduled to start shipping to customers on July 25th. One of the phone’s most unusual features is a 3D user interface that uses a series of cameras to keep track of what you’re looking at and adjust the display appropriately. Want to do more with the Fire Phone’s “Dynamic Perspective” […]

Meet the first games designed for Amazon’s Fire Phone is a post from: Liliputing

Print Isn't Dead: How Linux Voice Crowdfunded a New Magazine

Slashdot -

M-Saunders (706738) writes The death of print has been predicted for years, and many magazines and publishers have taken a big hit with the rise of eBooks and tablets. But not everyone has given up. Four geeks quit their job at an old Linux magazine to start Linux Voice, an independent GNU/Linux print and digital mag with a different publishing model: giving profits and content back to the community. Six months after a successful crowdfunding campaign, the magazine is going well, so here is the full story.

Read more of this story at Slashdot.

Experiment Shows People Exposed To East German Socialism Cheat More

Slashdot -

An anonymous reader writes The Economist reports, "'UNDER capitalism', ran the old Soviet-era joke, 'man exploits man. Under communism it is just the opposite.' In fact new research suggests that the Soviet system inspired not just sarcasm but cheating too: in East Germany, at least, communism appears to have inculcated moral laxity. Lars Hornuf of the University of Munich and Dan Ariely, Ximena García-Rada and Heather Mann of Duke University ran an experiment last year to test Germans' willingness to lie for personal gain. Some 250 Berliners were randomly selected to take part in a game where they could win up to €6 ($8). ... The authors found that, on average, those who had East German roots cheated twice as much as those who had grown up in West Germany under capitalism. They also looked at how much time people had spent in East Germany before the fall of the Berlin Wall. The longer the participants had been exposed to socialism, the greater the likelihood that they would claim improbable numbers ... when it comes to ethics, a capitalist upbringing appears to trump a socialist one."

Read more of this story at Slashdot.

MIT's Ted Postol Presents More Evidence On Iron Dome Failures

Slashdot -

Lasrick (2629253) writes In a controversial article last week, MIT physicist Ted Postol again questioned whether Israel's vaunted Iron Dome rocket defense system actually works. This week, he comes back with evidence in the form of diagrams, photos of Iron Dome intercepts and contrails, and evidence on the ground to show that Iron Dome in fact is effective only about 5% of the time. Postol believes the real reason there are so few Israeli casualties is that Hamas rockets have very small warheads (only 10 to 20 pounds), and also Israel's outstanding civil defense system, which includes a vast system of shelters and an incredibly sophisticated rocket attack warning system (delivered through smart phones, among other ways).

Read more of this story at Slashdot.

No RIF'd Employees Need Apply For Microsoft External Staff Jobs For 6 Months

Slashdot -

theodp (442580) writes So, what does Microsoft do for an encore after laying off 18,000 employees with a hilariously bad memo? Issue another bad memo — Changes to Microsoft Network and Building Access for External Staff — "to introduce a new policy [retroactive to July 1] that will better protect our Microsoft IP and confidential information." How so? "The policy change affects [only] US-based external staff (including Agency Temporaries, Vendors and Business Guests)," Microsoft adds, "and limits their access to Microsoft buildings and the Microsoft corporate network to a period of 18 months, with a required six-month break before access may be granted again." Suppose Microsoft feels that's where the NSA went wrong with Edward Snowden? And if any soon-to-be-terminated Microsoft employees hope to latch on to a job with a Microsoft external vendor to keep their income flowing, they best think again. "Any Microsoft employee who separated from Microsoft on or after July 1, 2014," the kick-em-while-they're-down memo explains, "will be required to take a minimum 6-month break from access between the day the employee separates from Microsoft and the date when the former employee may begin an assignment as an External Staff performing services for Microsoft." Likely not just to prevent leaks, but also to prevent any contractors from being reclassified as employees.

Read more of this story at Slashdot.

Rupert Murdoch's Quest To Buy Time Warner: Not Done Yet

Slashdot -

Presto Vivace (882157) writes It seems that Murdoch's desire to acquire Time Warner predates his acquisition of Fox, and continues in spite of Time Warner's recent refusal. The possible deal is important in and of itself, but it also affects the future leadership of Fox. From the article: "Murdoch's skill is not just hiring the right people; he has been able to maintain control over them. They have his support as long as they produce results. His executives are the hired help. There is never any threat to his control. When a Murdoch favourite begins to get more headlines than the chairman, the clock begins ticking for their departure. But with the Time Warner bid, that balance may change. Chase Carey has put together a deal that, because of Murdoch's history, is almost irresistible to him. But it's a deal only Carey can put together. If he succeeds, the $US160 billion company that will emerge will be an ungainly beast that will depend on Carey making the merger work. He's indispensable." Clearly we have not heard the last of this.

Read more of this story at Slashdot.

Mimicking Vesicle Fusion To Make Gold Nanoparticles Easily Penetrate Cells

Slashdot -

rtoz (2530056) writes A special class of tiny gold particles can easily slip through cell membranes, making them good candidates to deliver drugs directly to target cells. A new study from MIT materials scientists reveals that these nanoparticles enter cells by taking advantage of a route normally used in vesicle-vesicle fusion, a crucial process that allows signal transmission between neurons. MIT engineers created simulations of how a gold nanoparticle coated with special molecules can penetrate a membrane. Paper (abstract; full text paywalled).

Read more of this story at Slashdot.

The Loophole Obscuring Facebook and Google's Transparency Reports

Slashdot -

Jason Koebler writes The number of law enforcement requests coming from Canada for information from companies like Facebook and Google are often inaccurate thanks to a little-known loophole that loops them in with US numbers. For example, law enforcement and government agencies in Canada made 366 requests for Facebook user data in 2013, according to the social network's transparency reports. But that's not the total number. An additional 16 requests are missing, counted instead with US requests thanks to a law that lets Canadian agencies make requests with the US Department of Justice.

Read more of this story at Slashdot.

NASA Names Building For Neil Armstrong

Slashdot -

An anonymous reader writes A building at NASA's Kennedy Space Center in Florida, where Apollo astronauts once trained, was named in honor of astronaut Neil Armstrong. Armstrong, who died in 2012, was remembered at a ceremony as not only an astronaut, but also as an aerospace engineer, test pilot, and university professor. NASA renamed the Operations and Checkout building, also known as the O&C, which is on the National Register of Historic Places. It has been the last stop for astronauts before their flights since 1965. It was also used to test and process Apollo spacecraft. Currently, it's where the Orion spacecraft is being assembled to send astronauts to an asteroid and later to Mars.

Read more of this story at Slashdot.

Lilbits (7-21-2014): Are you ready for 8TB hard drives?

Liliputing -

My first desktop computer didn’t have a hard drive. My first system that did came with a whopping 40MB of storage. We’ve come a long way since then. You can buy terabytes of storage for under a hundred bucks. Still, it’s kind of mind-boggling that Seagate has announced it’s begun shipping samples of its first 8TB […]

Lilbits (7-21-2014): Are you ready for 8TB hard drives? is a post from: Liliputing

The "Rickmote Controller" Can Hijack Any Google Chromecast

Slashdot -

redletterdave writes Dan Petro, a security analyst for the Bishop Fox IT consulting firm, built a proof of concept device that's able to hack into any Google Chromecasts nearby to project Rick Astley's "Never Gonna Give You Up," or any other video a prankster might choose. The "Rickmote," which is built on top of the $35 Raspberry Pi single board computer, finds a local Chromecast device, boots it off the network, and then takes over the screen with multimedia of one's choosing. But it gets worse for the victims: If the hacker leaves the range of the device, there's no way to regain control of the Chromecast. Unfortunately for Google, this is a rather serious issue with the Chromecast device that's not too easy to fix, as the configuration process is an essential part of the Chromecast experience.

Read more of this story at Slashdot.

Activist Group Sues US Border Agency Over New, Vast Intelligence System

Slashdot -

An anonymous reader writes with news about one of the latest unanswered FOIA requests made to the Department of Homeland Security and the associated lawsuit the department's silence has brought. The Electronic Privacy Information Center (EPIC) has sued the United States Customs and Border Protection (CBP) in an attempt to compel the government agency to hand over documents relating to a relatively new comprehensive intelligence database of people and cargo crossing the US border. EPIC's lawsuit, which was filed last Friday, seeks a trove of documents concerning the 'Analytical Framework for Intelligence' (AFI) as part of a Freedom of Information Act (FOIA) request. EPIC's April 2014 FOIA request went unanswered after the 20 days that the law requires, and the group waited an additional 49 days before filing suit. The AFI, which was formally announced in June 2012 by the Department of Homeland Security (DHS), consists of "a single platform for research, analysis, and visualization of large amounts of data from disparate sources and maintaining the final analysis or products in a single, searchable location for later use as well as appropriate dissemination."

Read more of this story at Slashdot.

Mergulhando Fundo: Atualizações para os Princípios Necessários e Proporcionais

EFF's Deeplinks -

O dia 10 de julho marca um ano desde que a EFF e uma coalizão de centenas de especialistas e ativistas de direitos humanos deram os últimos retoques nos Princípios Necessários e Proporcionais.

Esses 13 Princípios explicam como a legislação internacional de direitos humanos deve ser aplicada à vigilância governamental. Desde então, os Princípios vêm recebendo forte apoio em todo o planeta, alimentado em parte pela indignação popular com a espionagem realizada pela NSA1, GCHQ2 e outras agências de inteligência mencionadas nos documentos revelados pelo denunciante Edward Snowden. Ativistas locais e nacionais do México à Coreia do Sul, passando pelo Canadá e pelo Brasil, vêm usando os Princípios como forma de pressão para obter proteções mais sólidas contra a vigilância digital governamental. Já os vimos usados em litígios, legislação, trabalhos administrativos, campanhas de sensibilização e em diversas outras ocasiões, além de terem sido debatidos na elaboração de políticas públicas tanto no âmbito regional quanto internacional.

Hoje estamos publicando uma versão atualizada dos Princípios Necessários e Proporcionais, incorporando o excelente retorno que recebemos durante o ano que passou. A intenção primordial das mudanças era elucidar a linguagem para captar melhor a intenção original e, em alguns pontos, simplificar tanto a linguagem quanto a estrutura, removendo possíveis ambiguidades, melhorando a gramática e diminuindo a redundância. Também fizemos uma mudança significativa na seção “Notificação ao Usuário”.

O núcleo do grupo para o projeto de elaboração consistiu das organizações Electronic Frontier Foundation, Privacy International, Access, Samuelson-Glushko Canadian Internet Policy and Public Interest Clinic e Center for Internet and Society-India, além da consultoria da Article 19, Open Net Korea, the Association for Progressive Communications e outras organizações ao redor do mundo.

Abaixo resumimos as alterações que merecem atenção:

Primeiro parágrafo e ao longo do texto: Acrescentamos “atividades, poderes ou autoridades” a “leis e regulamentos” para nos certificar de que estejam incluídos todos os atos praticados pelos governos. Isto não deve deixar nenhuma dúvida de que os Princípios abrangem atividades como a vigilância da NSA realizadas sob o Decreto-Lei 12333 dos Estados Unidos.

Primeiro parágrafo: Acrescentamos a palavra “esclarecer” para descrever a intenção dos Princípios de reiterar que estes não reivindicam mudança nas normas e na legislação internacional de direitos humanos. Pelo contrário, argumentamos em favor de sua aplicação adequada no contexto digital. A palavra “esclarecer” é uma construção comum para denotar que nenhuma lei nova está sendo colocada em questão. Também acrescentamos a formulação “padrões e leis de direitos humanos” por uma questão de correção gramatical e sintaxe.

Preâmbulo e ao longo do texto: Acrescentamos “vários outros direitos humanos” aqui e ao longo do texto para deixar claro que não se trata somente do direito à privacidade, mas também de liberdades fundamentais, tais como as liberdades de associação e de expressão. Essa expressão também sinaliza que os Princípios não tratam da totalidade dos direitos humanos, uma vez que o direito à vida, por exemplo, não tem relação com eles.

Âmbito de aplicação: Acrescentamos essa subseção para maior clareza e adicionamos a seguinte frase explicativa: “Os Princípios e o Preâmbulo são holísticos e auto-referenciais — cada princípio e o preâmbulo devem ser lidos e interpretados como parte de um quadro mais amplo e, lidos em conjunto, cumprem um objetivo singular: assegurar que as leis, políticas e práticas relacionadas à Vigilância das Comunicações sigam os padrões e leis internacionais de direitos humanos, além de protegerem adequadamente direitos humanos individuais tais como privacidade e liberdade de expressão”.

Âmbito de aplicação: Sentimos que era importante salientar que a inteligência e a segurança nacionais estão incluídas no âmbito dos Princípios, bem como todas as outras funções governamentais — inclusive “o cumprimento da lei, a proteção da segurança nacional, o recolhimento de dados de inteligência ou alguma função governamental”.

Âmbito de aplicação: Procuramos esclarecer o papel das entidades do setor privado. “As empresas têm a responsabilidade de respeitar a privacidade de um indivíduo e outros direitos humanos, particularmente tendo em conta o papel chave que desempenham no planejamento, desenvolvimento e difusão de tecnologias; na habilitação e oferecimento de serviços de comunicação; e na facilitação de determinadas atividades de vigilância estatal”.

Definição de informações protegidas: Trouxemos a definição da parte inferior do parágrafo para o topo, mas não alteramos o conteúdo.

Primeiro parágrafo do preâmbulo: Para deixar as coisas mais claras, acrescentamos que a vigilância das comunicações “interfere” no direito à privacidade “dentre uma série de outros direitos humanos”. Como resultado, pode ser justificada “apenas” quando determinada pela lei, necessária para atingir um fim legítimo e proporcional ao fim almejado.

Quinto parágrafo das definições: Acrescentamos “bem como as técnicas invasivas usadas para realizar a Vigilância das Comunicações” com o intuito de esclarecer que técnicas como a instalação de malware podem ser a base para determinar que uma informação é protegida tanto quanto a abrangência ou a natureza sistêmica da vigilância.

Proporcionalidade: Entendemos que esta pode ser percebida como uma grande mudança, mas esperamos que, no final das contas, não seja tão substancial. Devido à confusão sobre o papel dos dois testes contidos nos princípios originais, tentamos elaborar um único teste que abrangesse os dois anteriores, permitindo que ambos os crimes e as “ameaças específicas a um Fim Legítimo” servissem como base para a vigilância. Isso também auxilia que o teste esteja conectado ao Princípio do Fim Legítimo.

Autoridade Judicial Competente: Esclarecemos que deve haver uma autoridade judicial “independente”.

Notificação do Usuário: Esta foi outra grande mudança em resposta ao retorno que tivemos. Novamente, tentarmos esclarecer e simplificar este ponto e vincular qualquer atraso na notificação à possibilidade de que o propósito da vigilância torne-se inepto ou a um perigo iminente para a vida humana. Eliminamos a cláusula que exigia que se emitisse a notificação no final do processo de vigilância, mas também especificamos que essa determinação deve ser feita pela Autoridade Judicial Competente, e que a notificação deve acontecer após a cessação do risco e que a decisão deve ser, também ela, tomada por uma autoridade judicial.

Transparência: Acrescentamos alguns esclarecimentos para exigir números “específicos”, não apenas agregados. As informações agregadas não são suficientemente úteis para permitir ao público compreender como os poderes de vigilância estão sendo utilizados.

Escrutínio Público: Especificamos que os mecanismos de fiscalização devem possuir a autoridade para determinar publicamente a legalidade da vigilância das comunicações, incluindo o alcance da conformidade com estes princípios. Sem a capacidade para determinar se a prática de vigilância supervisionada é realmente legal, o escrutínio pode se tornar irrelevante ou ser visto como mera burocracia.

Salvaguardas Contra o Acesso Ilegítimo e Direito a Medidas Eficazes: Acrescentamos o “Direito a Medidas Eficazes” na seção de medidas com a finalidade de alertar para o direito no próprio título.

Breve histórico: Finalmente, acrescentamos um breve histórico do desenvolvimento dos 13 Princípios ao final do texto para explicar a história da iniciativa e da consulta final, que foi realizada para verificar e esclarecer problemas textuais e atualizar os Princípios de forma apropriada. O efeito e a intenção dos Princípios não foram alterados por essas mudanças.

1Agência de Segurança Nacional dos Estados Unidos.

2Serviço de inteligência britânico.

Related Issues: InternationalState Surveillance & Human Rights
Share this:   ||  Join EFF

Tizen update turns the Samsung Galaxy Gear into a Gear 2 (almost)

Liliputing -

Samsung is now offering a free software update to owners of the Samsung Galaxy Gear smartwatch that kind of turns last year’s smartwatch into this year’s Gear 2 watch. No, the software update won’t give you a slightly faster processor or a heart-rate sensor, but it will replace that Android software that came with the […]

Tizen update turns the Samsung Galaxy Gear into a Gear 2 (almost) is a post from: Liliputing

How One School District Handled Rolling Out 20,000 iPads

Slashdot -

First time accepted submitter Gamoid writes This past school year, the Coachella Valley Unified School District gave out iPads to every single student. The good news is that kids love them, and only 6 of them got stolen or went missing. The bad news is, these iPads are sucking so much bandwidth that it's keeping neighboring school districts from getting online. Here's why the CVUSD is considering becoming its own ISP.

Read more of this story at Slashdot.

The EFF Guide to San Diego Comic-Con 2014

EFF's Deeplinks -

More than 100,000 people will descend on San Diego Comic-Con this week, including yours truly representing the Electronic Frontier Foundation. If you’re one of the the lucky badge-holders with an interest in protecting Internet freedom, I’d love to chat with you and give you a sticker (while supplies last, obviously). Our friends at Alaska Robotics and musician Marian Call have generously offered us a spot at their table. You can find me there (#1134 in the main exhibition hall) from 2 - 3 pm on Friday, Saturday and Sunday.

But EFF isn’t the only opportunity at SDCC to ponder issues of surveillance, tech policy, free speech, and intellectual property. We’ve compiled this schedule of panels worth checking out this check out this year.

Are you a creator with a project, panel, or table at SDCC that ties into issues EFF covers? Send details to and we’ll add them in our next update.

Scorpion: World Premiere Screening and Panel

When the trailer for a new TV show starts off with a 12-year-old being arrested for hacking NASA, you know EFF is interested in hearing more. CBS’s new series, Scorpion, is loosely based on hacker Walter O’Brien, and follows his team of technologists as they seek to counteract global crises.
Thursday, July 24, 2014 12:05 pm - 1:10 pm  - Ballroom 20

Digging E.T.: Behind the Scenes of the Xbox Originals Documentary, Atari: Game Over

This new documentary tracks the demise of the Atari Corporation, including an investigation into the hundreds of thousands of copies of the E.T. video game buried in the New Mexico desert. Admittedly, there’s no real connection to EFF’s core issues here, except in the sense that a lot of us grew up on the Atari and miss it badly.
Friday, July 25, 2014 3:30 pm - 4:30 pm - Room 5AB

Creativity Is Magic: Fandom, Transmedia, and Transformative Works

This panel examines how media technology has exploded over the last 18 months, from apps to social media, and how this has elevated fan fiction, “gift culture,” and transformative works. The discussion is moderated by Heidi Tandy of, which is described as “the Snopes of copyright & trademark law (for fangirls, fanboys, creators & hipsters).”
Friday, July 25, 2014 7:30 pm - 8:30 pm - Room 26AB

Comic Book Law School 303: Muy Caliente! Hot Topics 2014

Lawyers attending Comic-Con can pick up continuing legal education credits by attending the panels in the Comic Book Law School series, which are led by Michael Lovitz, author of The Trademark and Copyright Book comic book. In this panel, a group of attorneys will discuss the impact of several cases that EFF has been tracking closely, including Tarantino v Gawker, the battle over whether Sherlock Holmes is in the public domain, and an appellate court’s decision to force YouTube to remove “The Innocence of Muslims.”
Saturday, July 26, 2014 10:30 am - 12 pm - Room 30CDE

Pop Culture and Robot Reality

NASA’s Advanced Exploration Systems Director Jason Crusan, Intel Resident Futurist Brian David Johnson, and Rethink Robotics Senior Engineer Jennifer Barry will share their visions of the near-future of robotics and how that compares to the alternately loyal and menacing depictions of robots in pop culture.
Saturday, July 26, 2014 11 am - 12 pm - Room 7AB

Comic-Con How-To: Fans, Love, and the Law with DeviantArt and Organization for Transformative Works

EFF are big fans of the Organization for Transformative Works, who we’ve partnered with on amicus briefs and submitting requests to the Library of Congress. The group, which champions the rights of fan creators and protects them from wrongheaded intellectual-property attacks, is partnering up with DeviantArt for this panel, in which they promise to “bring out their lawyers to explain how you can go to sleep at night, dream the dream of fans, and never have to hide under the bed.”
Saturday, July 26, 2014 3:30 pm - 4:30 pm - Room 2

Person of Interest Special Video Presentation and Q&A

At last year’s Comic-Con, the creators of the CBS show rolled out an extended preview of the series that relied heavily on the fallout from the Snowden files. This time around, Executive Producer Greg Plageman and cast members will take questions on the fourth season of the science fiction (although scarily close to reality) series that examines the ethical and privacy issues surrounding big data, mass surveillance, artificial intelligence, and predictive technology.
Saturday, July 26, 2014 6:15 pm - 7:00 pm - Room 6BCF

Comics and Global Concerns

Within SDCC there is an academic sub-event called the Comics Arts Conference. In this session, panelists will discuss how the comics reflect contemporary global debates, including how comics of the 1940s and 1950s foreshadowed the current debate over drones.
Sunday, July 27, 2014 10:30 am - 12 pm - Room 26AB

Comic Book League Defense Fund Panels

For decades upon decades, comic books artists and writers have pushed the boundaries of speech and authorities have sought to censor them. One of the most notorious chapters of history is the Comics Code, when the industry—faced with calls for regulation from Congress—decided to censor itself. This year, the free speech heroes at the Comic Book Legal Defense Fund are taking a look at the history of the Comics Code, including the controversial work of Fredric Wertham, who claimed that violent media and comics damaged childhood development. They will also host their annual Banned Comics! panel and a “live art jam” where artists are challenged to create art on the spot that violates the defunct Comics Code.

The History of the Comics Code Thursday, July 24, 2014 1 pm - 2 pm - Room 30CDE

Dr. Wertham's War on Comics Friday, July 25, 2014 1 pm - 2 pm Room 30CDE

Tales from the Code-True Stories of Censorship Saturday, July 26, 2014 12:00 pm - 1:00 pm - Room 30CDE

Banned Comics! Saturday, July 26, 2014 1 pm - 2 pm - Room 30CDE

You Can't Draw That! Live Art Jam Sunday, July 27, 2014 12:15 pm - 1:45 pm - Room 5AB

Share this:   ||  Join EFF

Researcher Finds Hidden Data-Dumping Services In iOS

Slashdot -

Trailrunner7 writes There are a number of undocumented and hidden features and services in Apple iOS that can be used to bypass the backup encryption on iOS devices and remove large amounts of users' personal data. Several of these features began as benign services but have evolved in recent years to become powerful tools for acquiring user data. Jonathan Zdziarski, a forensic scientist and researcher who has worked extensively with law enforcement and intelligence agencies, has spent quite a bit of time looking at the capabilities and services available in iOS for data acquisition and found that some of the services have no real reason to be on these devices and that several have the ability to bypass the iOS backup encryption. One of the services in iOS, called mobile file_relay, can be accessed remotely or through a USB connection can be used to bypass the backup encryption. If the device has not been rebooted since the last time the user entered the PIN, all of the data encrypted via data protection can be accessed, whether by an attacker or law enforcement, Zdziarski said.

Read more of this story at Slashdot.

HarperCollins, BitLit offer cheap eBooks of print books you already own

Liliputing -

Have a copy of Neil Stephenson’s Cryptonomicon, but don’t want to haul a 900 page book around with you? Publisher HarperCollins now lets you buy an eBook edition for just a few bucks if you can prove that you already own a print copy of the book. It’s part of a pilot program that has […]

HarperCollins, BitLit offer cheap eBooks of print books you already own is a post from: Liliputing


Subscribe to debianHELP aggregator - Geek Stuff