14.1 C
Thursday, November 23, 2017
Home Tags Tidal

Tag: Tidal

Water inside a flexible core is enough to keep the moon liquid for billions of years.
Expect a computational tidal wave by 2020.By then, data traveling to and from an estimated 20 billion IoT devices will flood datacenters—outpacing data flowing from datacenters to users by a factor of 275.Yet there’s a wealth of computing power in u...
When native species are gone, an invasive one can provide ecosystem services.
$241.6 billion in investment gets you 138.5 gigawatts of renewable energy
The X-rays appeared suddenly a decade ago and have not gone away.
On Monday, Kanye West fan Justin Baker-Rhett sued (PDF) West and S.

Carter Enterprises (SCE), the company that owns music streaming service Tidal.

Baker-Rhett alleges that the rapper and the streaming platform falsely promised that West’s most recent album, The Life of Pablo, would be exclusive to Tidal and would never show up on any other competing streaming service, nor would it be sold for download or in any physical media format.

But just a month and a half after the release of Life of Pablo on Tidal, the album showed up on Apple Music and Spotify. Baker-Rhett is asking the court to certify a class action against West and SCE, which is owned by rapper Jay-Z.

The plaintiff claims that West and Tidal defrauded customers, engaged in false advertising, practiced unfair competition, and enjoyed unjust enrichment from the millions of subscribers who handed over their personal information to the company to sign up for the service because they believed Life of Pablo wouldn't be available anywhere else. The complaint claims that Tidal found itself struggling to gain subscribers after its launch.

But when West, who is an investor in Tidal and has a financial interest in the platform’s success, tweeted, “My album will never never never be on Apple.

And it will never be for sale... You can only get it on Tidal,” the platform’s subscription numbers allegedly jumped from 1 million to 3 million.

Those 2 million subscribers were given a free trial period in exchange for submitting their credit card information, which was automatically charged if they did not cancel the subscription before the free period was over.In addition to the album's release on Apple Music and Spotify less than two months later, West also began selling the album on his own website. "Mr. West’s promise of exclusivity also had a grave impact on consumer privacy,” the complaint adds. "For each new Tidal subscriber who signed up as a result of Mr. West’s claims, Tidal obtained that consumer’s e-mail address, social media account information, and other personally identifiable information.” The plaintiff’s lawyers allege that this information is worth up to $84 million to the streaming service. Ars contacted Tidal for comment, but we have not yet received a response. West has claimed that his debts exceed $50 million, and the complaint notes that “during this time of financial difficulty for Mr. West (and concurrent with Tidal’s fiscal failings) he announced that his album would be available on Tidal in early 2016.” In the subsequent time, news outlets echoed West’s assertions that Life of Pablo would be permanently exclusive to Tidal. Baker-Rhett’s complaint mentions that Tidal needed to boost its subscriber numbers badly, noting that SCE “is preparing to sue the two entities it purchased the Tidal platform from” because the sellers allegedly over-inflated subscriber numbers to the company. "Defendant SCE knows the value of subscribers all too well,” the complaint alleges. In a statement, Baker-Rhett’s attorney asserted "We fully support the right of artists to express themselves freely and creatively, however creative freedom is not a license to mislead the public.” This isn't Tidal's first lawsuit.

Earlier this year, a musician sued Tidal along with Slacker Radio and Google Play for allegedly stiffing him on royalties.

And in February, West reportedly considered suing The Pirate Bay for illegally copying Life of Pablo while it was still exclusive to Tidal.
There's been a swell of online harassment, and the authorities have noticed.
“Expect more trouble,” a former international vice-president of Isaca has told information security professionals at the 2013 EuroCACS information security and risk management conference in London. Rolf von Roessing said the security challenges will only multiply as wireless data speeds increase and a growing number of devices become connected and interdependent in the “internet of things”. He warned that, while the vulnerabilities and threats associated with the Android operating system are multiplying “almost exponentially”, users of Apple’s iOS can no longer be complacent. “Android is currently more of a target than iOS, but attacks are happening against Apple mobile devices and, when they are breached, it is usually fairly serious,” said Rolf von Roessing. Connected clusters However, von Roessing sees even bigger challenges for security professionals in attacks that compromise a cluster of connected devices and exploit interactions between the devices. In the latest models of BMW cars, for example, navigation systems, locking systems, starting systems and mobile phones are all connected, he said.

Any of these systems could be infected and compromised. “Where there are clusters of wirelessly connected devices, it will become increasingly difficult to identify infections or where they have come from,” said von Roessing. This means even cars have become another mobile device that information security professionals will have to secure and include in the Cobit 5 framework for IT governance and management. “Forgetting to include a car key fob in Cobit could open up a potential area of vulnerability,” said von Roessing. The problem is magnified when you consider the increasing number of connected device clusters emerging, such as those around point of sale devices. Mobile challenge In the enterprise, mobile phones present a significant challenge to security professionals, especially where phones are brand-locked and prevent the use of mobile device management systems. “For effective protection, security professionals need access to mobile operating systems, but this is not always possible and consequently 30% to 40% of devices are under the radar,” said von Roessing. There is also the challenge of enterprise mobile users being unwilling to surrender their devices on a regular basis for security maintenance. The increasing number and complexity of wireless protocols is yet another challenge, especially when devices are designed to fall back to older, less secure technologies when network capacity is low. At the application level, particularly in Android, the challenge is the excessive permissions that apps require users to agree to when downloading them, said Von Roessing. “K-9 Mail, for example, demands 17 permissions, including the ability to manipulate contacts and create its own network sockets or side channels,” he said. Von Roessing advises that security professionals should weigh up the potential back doors in commonly used apps and encourage users to find less risky alternatives to the worst offenders. Risk-aware users “In the light of bring your own device (BYOD) programmes, it is more important than ever for end users to be aware of the risks involved,” he said. Considering the “tidal wave” of new and emerging risks associated with mobile devices, von Roessing said security structure and planning is essential. “Organisations need to set aside adequate budgets to deal with these challenges comprehensively, otherwise all efforts will simply be a waste of money because of all the security gaps,” he said. In addition to an adequate budget for technical security controls, von Roessing said organisations should ensure they either have adequate internal skills or access to trusted external parties that can be integrated into the organisation to deal with mobile security. Von Roessing re-iterated the importance of risk-aware users. “Reasonable and responsible use is essential, otherwise you can forget about technical security. Rules must back technical controls,” he said. Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners.

If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com