A judge in Michigan has ruled that a man who wants to carry his gun into his daughter’s school can do so, even though the state has a ban against it. This is a very complicated story and the ruling is maddening to say the least. It all revolves around a man named Kenneth Herman.

Video. More.

‘Blue Courage’ was created after the incidents of Ferguson brought on a new sense of urgency to police demilitarization.


A bit of privacy, please


This happens when the governments forget about the mandate invested on them by all of their people, and start ruling for a minority of powerful individuals.


In recent years, a number of states have been making it increasingly difficult to vote. One method of disenfranchisement has been voter ID laws. A Federal appeals court in Texas has now struck down that state’s favorite voter suppression tactic.

One day before the 50th anniversary of the Voting Rights Act, one of the most conservative federal appeals courts in the country wielded that law to strike down a Texas voter suppression law. A unanimous panel of the United States Court of Appeals for the Fifth Circuit, in an opinion written by a George W. Bush appointee, held that Texas’s voter ID law violates the Voting Rights Act and must, at the very least, be significantly weakened. Though the court did not accept every argument raised against the state’s voter ID law, and its opinion does not go nearly as far as a trial judge’s decision which also struck down this law, it is a significant blow to the state’s efforts to make voting more difficult.

More at Think Progress.


Security researchers Runa Sandvik and Michael Auger have spent a year hacking a pair of $13,000 TrackingPoint self-aiming rifles.

The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software. Their tricks can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing. In a demonstration for WIRED (shown in the video above), the researchers were able to dial in their changes to the scope’s targeting system so precisely that they could cause a bullet to hit a bullseye of the hacker’s choosing rather than the one chosen by the shooter.

“You can make it lie constantly to the user so they’ll always miss their shot,” says Sandvik, a former developer for the anonymity software Tor. Or the attacker can just as easily lock out the user or erase the gun’s entire file system. “If the scope is bricked, you have a six to seven thousand dollar computer you can’t use on top of a rifle that you still have to aim yourself.”

© 2015 Loss of Privacy Powered by WordPress using the Jishnu theme.