75 posts • joined 3 Feb 2011
Re: Martin Gregorie Anon Cluetard Boston Marathon Bombing
If it's aimed at tracking groups, surely they know who these groups are? If so, then how about they get a warrant and target their snooping. If not, then how the hell do they "prevent" and "disrupt" these groups' communications by monitoring everyone? How much noise are they collecting? How the hell do they work out which pattern of calls is me calling my friend with a joke and him sharing it with his friends and me calling my terrorist contacts to get them to call their bomb-making buddies and arrange a car bombing spree?
You're effectively asking an ISP to breach their contract to an end user based on Twitter's request because someone reported to Twitter that they received a tweet they didn't like.
I think you'll find that the "over-stretched police force" would still need to be involved, given that you don't usually punish someone for something unless you can prove they did it. Something to do with the rule of law and due process.
Re: To summarize....
If you watch Adult Video rather than playing with the real thing you're less likely to get a virus?
Re: JimmyPage : they can suspect all they want
So they can look at the randomn data generated by Truecrypt to fill the empty space when the volume was created and tell the difference between that and the random-looking data generated by encrypting a file and writing it amongst that random data?
That's one hell of an expert you have there.
With respect, that sounds like a piece of Star Trek "insert technical stuff here" script. You've used a technical phrase and followed it with your required conclusion but it is, in non-geek parlance, utter bollocks.
Re: One can only presume...
Your argument is so flawed it's hardly worth rebutting, but here goes:
1) It's not currently illegal to avoid taxes in the ways that many companies do.
2) Making it illegal at some future point in time does not make it illegal now. You can claim it does as much as you want, but it simply doesn't (short of an ex post facto law, which are thankfully not possible in some countries and are normally frowned upon because it requires some really special powers to know whether you're currently breaking a yet-to-be-created law).
"Why are these companies not being brought to book ?"
In most countries you don't bring people to book for not breaking the law.
In your road speed limit analogy, noone is saying that you could now argue that there used to be no speed limit but now there is, so I'll ignore the limit. What they are saying is that currently there is no speed limit. Introducing a speed limit does not make past driving at above the now legal limit magically illegal, but it does make continued driving at such speeds illegal.
Arguing what they are doing now is legal is not "dodging and fudging the issue". If it's not illegal, it's legal. End of story. Anything else leads to chaos.
Re: I am going to take an unpopular side here.
I'm confused. You seem to be saying that I can purchase a CD and resell that but I can't do the same with digital downloads because I might keep a copy somewhere. Has it occurred to you that I can rip the CD then resell it? Or do you trust me not to do this, in which case why can't you trust me to delete any copies I have made of my digital downloads when I resell them?
Re: Good or bad comments.
No, your 1st amendment rights are not being curtailed - the right to free speech does not mean you can freely write whatever you want wherever you want and that noone can prevent you from doing so. It merely gives you the right to say what you wish (within certain limits).
A rating system, whereby negative comments are relegated to a less visible area of the comment stream, does not prevent you from saying what you wish to say. Next you'll be telling me that, because older comments are less visible on comment streams that are ordered by date, with the newer comments shown more prominently, this is also curtailing your right to free speech because you commented first and now people have to scroll all the way down to see what you said.
In fact, as I understand it, freedom of speech provisions in the first amendment extend solely to what the government can't do to curtail your speech. Facebook is not government so they can, in fact, do what they wish with the comments. If you don't like that, don't use Facebook.
DNA or HTTP headers are not "data relative to those accounts". HTTP headers may be classified as data relative to the processing of the transaction, but the "accounts" in question are the VISA card details.
I think you'll find that "data relative to those accounts" is legal speak for cardnumber, CVC, expiry date, etc. - the data required to actually perform a transaction against the card in question. Section 18 of their complaint effectively lays out what this data is (the mag stripe data). They claim that such data may be retained unencrypted for the duration of the authorisation; this may be true, but my understanding (having had to do this kind of thing) is that you may briefly store such data in memory (pretty much unavoidable given that computers are involved), but it is preferable that this be done encrypted until such time as the unencrypted data is required, i.e. you decrypt just as you're generating the request and sending it to the bank. Logging any of it, unencrypted, is a no-no.
Section 54 of the complaint states that the log files would have been overwritten before they could have been exfiltrated, so no "data relative to those accounts" could have been compromised via the logs. This kind of suggests that some account data was being logged - why would you bother mentioning that you were storing data unrelated to the complaint in a log file in a motion to have your money returned? The only useful data in this context is card numbers, expiry dates, etc. I may be reading between the lines, but it seems a reasonable assumption to me.
Part of their defence (from the linked Wired article) appears to be that because of regular server reboots the card numbers in their server log files would have been overwritten before the hackers got to it (though what a packet sniffer is doing reading log files is not stated). Persisting unencrypted card data to log files is very much a PCI DSS violation and shows a level of incompetence I can't begin to understand.
All that being said, if VISA can't prove that any fraud was carried out using the cards that may have been compromised during the breach then they really shouldn't be gathering fines. I know that absence of evidence of fraud isn't evidence of absence, but legally it almost certainly is so the fines levied sound to be in serious danger of being overturned, assuming that the rules outlined in the Wired article are those that should apply in this scenario (more than 10,000 cards breached, PCI violation leading to the breach, more fraud than normal occurred on the cards in question).
Re: ... and yet...
"I don't think google are getting off too lightly here"
Fine for breaking the law: $7m
Performance bonuses for last year:
Eric Schmidt: $6m
David Drummond (their head legal person): $3m
Patrick Pichette (CFO): $2.8m
Nikesh Arora (CBO): $2.8m
Yeah, that fine is really going to hurt them...
In November last year, the House of Commons Justice Select Committee blasted the directive. It said that while data protection law in the EU needed a shakeup some of the plans "
do not allow for flexibility or discretion for businesses or other organisations which hold personal data, or for data protection authoritiesdo not allow us to incorporate the reforms in such a way that we can still choose to ignore them and do whatever we want with the data we and our business friends are accumulating".
"He also states that a warrant is required “to access the content of a communication”." Personally I'd rather a warrant were required before you start even monitoring my communications.
I thought I was supposed to have some sort of human rights, something about the right to private life without unncessary state interference? In fact, I'm pretty sure this convtravenes article 12 of the universal declaration of human rights:
"No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks."
Recording the fact that I'm communicating with people/servers/whatever (even being generous and assuming they don't do a Google and "accidentally" store everything I send rather than just the metadata) without a valid reason sounds like arbitrary intereference with my privacy to me.
Re: " I seriously doubt Balmer will be hauled into court..."
The big difference is the accessability of your data. Upload to dropbox and only you and people you allow access can see it. Upload a video to
Megaupload video YouTube and everyone could watch it.
Mind telling me why YouTube hasn't been taken down yet?
Re: Superior cookie handling?
What is this superior cookie handling of which you speak? I've used FF for years but I'm also aware that IE has had the ability to block/allow cookies per site for yonks. In fact, IIRC FF started out without this feature, which IE had for some time before FF finally adopted it.
Can't comment on Chrome as I never use it.
Re: Mixed blessing
How about having a paper copy of a manual so I don't have to lug my computer into the garden when I'm trying to set up the timings on my sprinkler system (or keep swapping between the program I'm running and its oh-so-helpful pdf manual)?
Yes, I know I could get a tablet device of some description or a second monitor, but paper seems to be a low-cost alternative that works in both cases. Or do I just not understand technology?
Re: Bad Hersfeld! Bad Hersfeld!
> Nein Nein Nein!
Emergency services, how may I help you?
I think you'll find that nuclear should be on that green grid too, as should hydro. Both are clean; nuclear has waste issues which need addressing and hydro can have environmental issues, but other than that they are pretty much clean and green from the "carbon price" (remember, it's not a tax!) perspective.
The obvious thing for Australia to do is go nuclear and solar, use hydro where feasible, and tidal if it becomes viable (most major urban areas are fairly close to the coast). We're actually pretty well suited to going "green" for our energy needs, we just need to bite the bullet and build some nuclear plants.
From my reading on <a href="http://www.popehat.com/2013/02/06/the-popehat-signal-help-an-author-against-a-bogus-trademark-claim/">Popehat</a>, it looks like the EFF said "no". They're appealing for pro bono assistance (and have had a few replies) but they may start a fund if required.
Re: Two sided sword
Then they are guilty of libel/defamation and can be pursued as such, should either my wife or I choose to do so. Part of that process would be a request to have the offending tweet removed, but quite frankly I couldn't care less what some random person tweets about my wife's extra curricular activities because I actually trust her.
To turn your example on its head, what if those tweets weren't false? Does my wife have the right to request that factual tweets be taken down? We can both lie and say they're untrue, even if they're not. How is the service provider supposed to determine what is true and what is not?
If you want to protect speech, you have to deal with speech you would rather wasn't said but still needs to be protected regardless. There are limits, I agree, and where such speech crosses those lines it needs to be dealt with. However, the proper place for such arguments over what is illegal is in the courts. I do not believe that service providers should have to interpret laws (over many jurisdictions) to determine whether people using their services are breaking those laws. That's what judges/magistrates are for.
In what way is Twitter "responsible for much of the damage caused online"? The government may well want Twitter to allow users only to post about flowers, rainbows, and fluffy kittens but in the real world people have free will and their own causes to pursue. If, in the course of their pursuit, they break any laws, then by all means punish them using the same process as used for everyone else who breaks the law.
I really don't think that a government approved programme for the speedy removal of stuff that offends
the government Australian minor celebs citizens is the way forward. If someone does something that is illegal, prosecute them - that's what the law is for. Speech can be offensive without being illegal and noone has the right not to be offended by speech.
Blame the users, not the carriers.
Re: Do no evil
"...proscribed standards...". That word, I do not think it means what you think it means.
I am missing something here? Every virtual keyboard I've seen jumbles up the keys so knowing where the mouse was when I clicked is completely pointless since you still have no idea which key I clicked on.
I'm with the first AC on this too - which ad companies are using this? It's not something you can do accidentally (unless it's google, when of course it's just a rogue engineer leaving proof of concept code in the project and they're accidentally storing all that mouse location data unwittingly, the poor dears).
Re: Fiscal cliff is not an actual cliff......
I'm not American but I was under the impression that actual debating and proposing laws, etc. was the work of Congress. The president has the power of veto over whatever comes out of Congress, but the (hopelessly divided along party lines) Congress is the place where the real action happens.
Blame the senate and reps for the impasse. If they'd start thinking of the country and stop being so bloody partisan some actual progress might be possible.
As for "paying their true share", the fact that > 50% are not paying taxes (assuming that is true) should be ringing alarm bells - the most powerful nation on the planet appears to be failing > 50% of its population by paying them so little for the work that they do that they need state subsidy to survive. Proposing to tax these people, who are earning so little that they actually need state assistance in the first place, is a pointless exercise. Far better would be to improve their standards of pay so that they can survive without state assistance and can actually contribute to the state via taxes themselves. It may mean some businesses earning less profit, but it would increase the number of people with disposable income who will, presumably, go and dispose of this income by buying things.
Re: What I don't get is...
Because "think of the children" is so compelling. It's a battle cry that is used for both good and bad causes. I get equally annoyed when the news runs a story that, e.g. 3 children were killed. Oh, and 10 other people too.
From what I can see so far, Kim's intention is to make money from people by offering a secure, cloud-hosted, file storage service. Your suspicion that he's creating this as a place for illegal content is not based in fact and, sad to say, the law does actually require facts to prove a case.
Kim can easily point out that he has no knowledge of what data is stored on his service (nor should he know) and that it has substantial non-infringing uses. As long as he cooperates with any legal requests by law enforcement agencies (though what he could do is questionable if all content is encrypted and he doesn't have access to any means to decrypt the data), he's in the clear.
"...it's not likely to be particularly difficult to prove beyond reasonable doubt that the new site's admins know that it's being used for illegal purposes." Really? If every file is encrypted, how can this be proven? Using your logic you could argue that google knows that YouTube is being used for illegal purposes and thus should be in the dock beside Kim.
There's nothing to stop the user passing the key in the URL, I guess, except it seems a somewhat insecure method of transmitting your key. Encryption only works when your key is secret, if you're broadcasting it to the world every time you request a file then why bother encrypting at all? The server definitely doesn't want to be seeing the key (they don't want to be able to decrypt your data) and I can't see why the client would be built to look for the key in the URL - transmitting the location of encrypted data and the means to decrypt it in the same message would be a massive security hole and would remove any hope of getting "serious" businesses to use your solution.
The way they've phrased the encryption/decryption side of things, it appears to be entirely client-side. There's no reason to post the key to the server if all encryption is done prior to submitting to the server and all decryption is done as the file is received. Again, I'm assuming that security and/or limiting liability is their concern here - they don't want to be taken down like last time and not knowing what you're hosting is probably a good starting point.
Given that the first screen is a logon screen, I'd guess that the field with the key icon is your password. Why you think that this refers to an encrytpion key is beyond me, especially since the key isn't actually generated until a later stage. It even looks like a password field, with the password starred out.
The key generation being strengthened by "entropy from your mouse movements and keystroke timings" is just a variation on a theme, where some additional inputs are used to add randomness to the key being generated, e.g. TrueCrypt does something similar.
Note that they state that "You hold the keys to what you store in the cloud, not us". This suggests to me that the encryption key for the files is stored by the user, a move designed to prevent third parties accusing them of knowlingly infringing copyright? If they are storing encrypted data only and have no way of decrypting that data to find out what it is, they really can argue that they are not liable for the content they host since they cannot even view that content. Some would say that this is a sensible move, not only in a self-preservation sense (they really don't know what the user is uploading so they can't be held liable for it) but also because it should, if implemented correctly, ensure some degree of security for the end-user's data - even if someone manages to get access to the servers where the data is stored, all they get is a load of encrypted data.
One question that springs to mind is: If all the data is encrypted and the key is stored at the user's end, how is this going to replicate the success of megaupload? You can no longer just upload a file and post the URL, you now also have to post the key so other users can decrypt the data. It's not a huge extra burden, but it's one more hoop to jump through and may discourage the less technical users from using the site unless they make it really easy to use. There are some hints that you'll be able to share files and folders with other users, but part of the success of megaupload was that you didn't need an account to download stuff.
It'll be interesting to see how this all pans out and whether this is a real change of direction from the original megaupload. It certainly sounds like they're moving from a free-for-all file hosting model to more of an encrypted file system approach with access to the service limited to registered users only but I guess time will tell.
If by "deteriorated" you mean "allows people to register trademarks" then it's been this "broken" for quite some time...
There are many examples of marks that have been registered that are simple shapes. The point is that these shapes, after much use, become an identifying feature in their own right and become a symbol that people recognise and (if you're lucky) trust. The way you protect these marks is to register them, thus preventing other people from abusing the recognition and value you have built up by using the mark on their own products.
This really isn't that sinister. If anything, you'd have to be asking why they've registered this mark now. Could it be that there is a new product line on the way?
Re: Intellectual property = vested interests = corruption
It's a trademark, so it is *very* different from a patent. A patent can be used to prevent you from making something using the patented method, a trademark simply prevents you from selling something bearing the mark in the same industries for which it was registered. Pretty much the only reason to abuse a trademark is to pass off your goods as being made by the holder of the mark.
Conflating trademarks and patents? Do you actually understand the difference or did you just want to moan about patents and saw it was an Apple thread?
Re: As many people have said here many times
I don't care how much tax any firm pays, nor where it is based - no firm should never have heavy influence in legislation via lobbying. Governments should (I'm not saying that they always do) pass legislation based on what is good for the country and its people; companies invariably want to have legislation that is good for them.
Re: Well, obviously . . .
So any denial is confirmation of intent to do what is denied? Do you work for the Spanish Inquisition by any chance?
Re: I recall....
Apple are now busy applying for a patent for "Transmitting kinetic energy into a (male) legal scholar's gonads as a way of signalling extreme disagreement with the activities of the recipient of the energy transmission using a mobile device."
Re: Patent abuse
What "attack" is happening in this case? Samsung agreed payments terms for licenses for the patents in 2001 and 2007 and is now refusing to pay, despite others being offered and accepting the same terms offered to Samsung.
IANAL but I really don't think import bans for FRAND patents should be allowed unless it is the absolute final option to force a settlement. After all, if you're forced to license a patent then any loss you suffer by someone using but not licensing that patent can be made good by fines. Import bans are supposed to be a weapon to prevent irreparable harm and if you have to license something then the only loss you suffer is financial and is thus not irreparable.
Ericsson has tried to negotiate terms for almost 2 years and still can't reach agreement. I'd say that 2 years is a reasonable show of good faith negotiating and it's time for Samsung to have some legal pressure applied.
Re: it's all about the device and how it manages certain interactions
They could indeed change how it works, but then it would no longer be covered by the patent in question, assuming the patent is valid in the first place.
I'm not saying I agree with the patent, or the case, or that I even like Apple. All I'm saying is that the patent appears to be related to a portable device used to manage photos and goes into some detail about how certain elements of such management would be implemented, taking into account the screen size and other limitations presented by working on a mobile device as opposed to a workstation. It appears that the contention is that Samsung has used one or more of the methods described in the patent.
IANAL and to me it does seem that what Apple has done is attempt to gain a sort of software patent by describing methods of operation on a physical device that would obvioulsy be implemented in software. Whether that is valid is for the courts to decide and, if it is invalid, then I hope Samsung's lawyers will pursue that argument strongly. Not being a lawyer, I'm not sure where the distinction between describing a method for doing something that requires software and an actual software patent is drawn.
A more interesting point to me is how do you protect a novel way of handling interactions on a device? You seem to be saying that software is just, well, software so it's fine if someone takes my novel approach and just uses it without any reward for my work in coming up with said approach?
Re: Aren't the Netherlands in the EU?
You've heard of hyperlinks I take it? Click on the one in the article and you'll be taken to the actual patent in question. It's for a "PORTABLE ELECTRONIC DEVICE FOR PHOTO MANAGEMENT" and describes a number of scenarios related to how photos can be managed on small form factor devices with limited screen sizes. You'll note that it's nothing to do with software, it's all about the device and how it manages certain interactions. You may even, if you read the article, notice that it's a European patent and thus, presumably, is valid under EU law or it wouldn't have been granted.
Oh, and if you're about to use the "Apple paid the corrupt system to grant this patent", please don't - it just sounds childish. If the patent is invalid, you'd think Samsung's legal team could get it invalidated.
The alleged infringement would seem to be related to one or more of the many examples of how the device will function (there's quite a list).
I know that as soon as the Reg prints an "Apple sues X" piece almost everyone jumps onto the comments and tells everyone else how evil Apple are and how they'll never buy another iDevice, etc. and how anyone who says differently is an Apple fanboi and can't be believed because they're on the kool aid but really, if you can't even be bothered to read the article and get your facts straight you just look like a fanboi from a different church.
Re: Good to Hear..
At the risk of suffering death by a thousand downvotes, I'm failing to see where the article is "small-minded, bigoted, and practically condoned domestic abuse". The article relates the facts of the story (albeit in El Reg language) and doesn't seem to suggest anywhere that violence is acceptable, nor offer any view on the rights or wrongs of transgender issues.
I can see that Jan doesn't come across as all that enlightened but calling the article bigoted seems a massive overreaction.
Re: "a trend given extra momentum"
You do realise that Apple haven't patented "a means or method for taking out an advertisement on television" (yet) so these other players could have upsized their profile and embiggened their media presence by making adverts and getting them on the telly?
The solution to the problem you propose is not to use Google services when blogging, maintain mulitple accounts or, and I realise the Google men will track me down, torture me, and dump my mutilated body in shallow grave for even suggesting it, use a pseudonym?
What Google is doing is not great for a number of reasons, but aiding the torture and mutilation of of these anonymous bloggers is not one of them as anyone in that situation is going to be using a modicum of common sense to avoid detection in the first place and signing up for a service using your real name when you intend to piss off the shadowy powers that be is, well, asking for trouble.
Re: Simple answer
Here's an idea, make parents responsible for monitoring their children when they're online.
They would have to sit with/near their spawn and monitor what they're doing and even, perhaps, do some parenting when their beloved little ones come across something distressing. They could teach them how to cope with such issues and the appropriate actions to take. Hell, perhaps even the parents of the 'cyber-bully' could stop their spawn being an obnoxious fuckwit in the first place by monitoring what they do too.
This means parents get to spend more time with their children and the government doesn't need to piss my taxes away paying for yet another quango.
That'd fix it in no time.
Re: When can we get this on El Reg?
I imagine that paying to say that you like MS and Apple products and dislike Android and Linux would result in so many people downvoting you that it would look like a DDOS on El Reg's servers.
Re: Guy was a bit daft BUT
Except, as previous posters have said, this offence is strict liability. You can rant all you like against the judges and CPS (though accusing them of being paedophiles or having such tendencies makes you sound like a Daily Mail reader) but their hands are tied.
In fact your rant missed the people responsible: the politicians. The only way to stop this kind of stupidity is to get these kinds of strict-liability laws repealed and replaced with ones that allow the judiciary more discretion.
Re: How Much Redmond Money Did Flow For This Crap News ??
From where did you get the requirement to enter any password? All I see in the article relating to passwords is: "The threat can install itself on Mac systems without requiring a password.". The linked article also makes no mention of requiring passwords.
Re: but, but they weren't "in transmission"...
I think the fact that one of the phone owners was dead at the time her voice mail was accessed probably helps with that, but IANAL.
Re: Actually, "Anonymous" hasn't really ever done anything.
How politics works:
1) Lick arses of people in the particular camp you agree with until you get a nomination.
2) Get elected.
3) Vote self pay rise (amount set by "independant" committee, so that's alright then!).
4) Pass laws for your mates in various businesses "to encourage growth and help the mum and dad shareholders".
5) Leave politics and get cushy job with businesses mentioned above.
There are very few politicians over here that I trust (mostly the independants because they don't have to toe a party line and seem to actually listen to their electorate). The choice is basically get shafted by Labor or get shafted by the Libs and neither option is that appealling.
As to the actual issue being protested, I was under the impression that there was a presumption of innocence in criminal law. These proposals seem to be assuming guilt by all (until they are proven innocent by the data gathered). If you suspect I'm plotting nefarious deeds then by all means apply for a warrant to monitor my communications, otherwise leave me alone - you have no right to invade my privacy and that of the vast majority of the population because you may capture some evidence against a tiny number of criminals
I'm not saying I agree with their methods, but the fact that this is in the news shows that the defacement has done its job - the issue is now in the media again and hopefully more people will read about it and protest.
P.S. Voting in federal elections in Australia is mandatory, so the people who defaced the sites, assuming they are Aussies and old enough, will be voting too rather than sitting on their "fucking high-horse arses".
Re: Koh is an idiot.
The SCA is designed to limit what may be lawfully disclosed about wire or electronic communications held by third parties. The data LinkedIn was disclosing was not data the user had lodged with LinkedIn, it was data that LinkedIn generates (user id) or tracks (urls visited) based on their users' interaction with LinkedIn.
Koh found that the data LinkedIn supplied did not fall under the terms of the SCA and thus LinkedIn could not be considered either an SCA or an RCS. The case was therefore dismissed with prejudice, since no amount of refiling would make it workable.
If you're going to call the judge an idiot, it would be more helpful to your cause to choose a case where she was obviously wrong in her judgement. Using selective quotes, failing to check the contents of the linked page (which itself contains other links to the detailed judgement where her opinions are stated quite clearly, citing precedent, etc.), and ranting about how LinkedIn must be an ECS and/or RCS because you say so make you look like the idiot.
tl;dr; Arguing someone is stupid by citing an example where they have acted correctly makes you look stupid.
Re: Word of Mouth
"Just a few billion USD would save the whole Euro Zone". Are you serious? Have you seen how much money they've already
squandered invested to help Greece, Spain, etc.? A few billion is a drop in the ocean.
Besides, you might want to keep that money and use it to pay off that $15 trillion debt you're sitting on. Should cover a few months of interest whilst the US sorts out balancing its books and gets its economy running with a surplus...
Re: I do wonder though
Usually because the installer is a little rubbish. See https://support.steampowered.com/kb_article.php?ref=5357-FSQM-0382 for how to install games from disc.
Hashing is not encryption
Why are they encrypting their password hashes, or is it the passwords that are encrypted then hashed?
The Reg seems to be confusing encryption with hashing quite a lot lately. Encryption results in a ciphertext that you can later decrypt, hashing results in a digest/checksum/hash code that is useful for checking that a given value matches the value that was originally hashed. Confuse the two and your encrypted cache of state secrets/porn collection/secret santa shopping list will turn out to be a set of completely useless (but conveniently smaller and easier to store) codes...
@Droid on Droid
There's this thing called "humour", you should try it some time...
"Indian software pirating suspect faces US extradition", thunders the headline.
"It's unclear if US authorities will seek Kablekar's extradition...', says the story.
Do try to have some sort of internal consistency in your articles chaps!
- Product round-up Six of the best gaming keyboard and mouse combos
- LinuxCon 2014 GitHub.io killed the distro star: Why are people so bored with the top Linux makers?
- China building SUPERSONIC SUBMARINE that travels in a BUBBLE
- Boffins attempt to prove the UNIVERSE IS JUST A HOLOGRAM
- 6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)