Long-time Slashdot reader destinyland writes: Today GitHub's official Twitter account asked the ultimate geek-friendly question. "You never forget your first computer. What was yours?" And within 10 hours they'd gotten 2,700 responses. Commodore 64, TRS-80, Atari 800, Compaq Presario... People posted names you haven't heard in years, like they were sharing memories of old friends. Gateway 2000, Sony VAIO, Vic-20, Packard Bell... One person just remembered they'd had "some sort of PC that had an orange and black screen with text and QBasic. It couldn't do much more than store recipes and play text based games." And other memories started to flow. ("Jammed on Commander Keen & Island of Dr. Brain...""Dammit that Doom game was amazing, can't forget Oregon Trail...") Sharp PC-4500, Toshiba T3200, Timex Sinclair 1000, NEC PC-8801. Another's first computer was "A really really old HP laptop that has a broken battery!" My first computer was an IBM PS/2. It had a 2400 baud internal modem. Though in those long-ago days before local internet services, it was really only good for dialing up BBS's. I played chess against a program on a floppy disk that I got from a guy from work. Can you still remember yours? Share your best memories in the comments. What was your first computer?Read more of this story at Slashdot.
First, a rumor from the blog Phone Arena. "Not to be outdone by Apple and Huawei, Samsung is planning to incorporate satellite connectivity options in its Galaxy phones as well, hints leakster Ricciolo." But it's not the first rumor we've heard about phone vendors and satellites. "Cringley Predicts Apple is About to Create a Satellite-Based IoT Business ," read the headline in June. Long-time tech pundit Robert X. Cringely predicted that Apple would first offer some limited satellite-based functionality, But he'd also called those services "proxies for Apple entering — and then dominating — the Internet of Things (IoT) business. "After all, iPhones will give them 1.6 billion points of presence for AirTag detection even on sailboats in the middle of the ocean — or on the South Pole.... Ubiquity (being able to track anything in near real time anywhere on the planet) signals the maturity of IoT, turning it quickly into a $1 TRILLION business — in this case Apple's $1 TRILLION business." And beyond that, "in the longer run Cupertino plans to dis-intermediate the mobile carriers — becoming themselves a satellite-based global phone and data company [and] they will also compete with satellite Internet providers like Starlink, OneWeb, and Amazon's Kuiper." So how did Cringely react last week when Apple announced "Emergency SOS" messaging for the iPhone 14 and 14 Plus — via communication satellites — when their users are out of range of a cell signals? He began by wondering if Apple was intentionally downplaying the satellite features:They limited their usage case to emergency SOS texts in the USA and Canada, sorta said it would be just for iPhone 14s, and be free for only the first two years. They showed a satellite app and very deliberately tried to make it look difficult to use. They gave no technical details and there was no talk of industry partners. Yet there were hints of what's to come. We (you and I, based on my previous column) already knew, for example, that ANY iPhone can be made to work with Globalstar. We also knew the deal was with Globalstar, which Apple never mentioned but Globalstar confirmed, more or less, later in the day in an SEC filing. But Apple DID mention Find My and Air Tags, notably saying they'd work through the satellites even without having to first beseech the sky with an app. So the app is less than it seems and Apple's satellite network will quickly find its use for the Internet of Things [Cringely predicts].... Apple very specifically said nothing about the global reach of Find My and Air Tags. There is no reason why those services can't have immediate global satellite support, given that the notification system is entirely within Apple's ecosystem and is not dependent on 911-type public safety agreements. Maybe it will take a couple years to cover the world with SOS, but not for Find My, which means not for IoT — a business headed fast toward $1 trillion and will therefore [hypothetically] have a near-immediate impact on Apple's bottom line. Speculating further, Cringely predicts that Globalstar — which has ended up with vast tracts of licensed spectrum — will eventually be purchased by a larger company. ("If not Apple, maybe Elon Musk.") And this leads Cringely to yet another prediction. "If Elon can't get Globalstar, he and his partners will push for the regulatory expansion into space of terrestrial 5G licenses, which will probably be successful."This will happen, frankly, whether SpaceX and T-Mobile are successful or not, because AST&Science and its investors AT&T, Verizon and Zodafone need 5G in space, too, to compete with Apple. So there WILL eventually be satellite competition for Apple and I think the International Telecommunication Union will eventually succumb to industry pressure. And by the end Cringely is also speculating about just how Apple will come up with innovative new satellite designs on a faster schedule...Read more of this story at Slashdot.
"An encounter with the superhuman is at hand," argues Canadian novelist, essayist, and cultural commentator Stephen Marche in an article in the Atlantic titled "Of Gods and Machines". He argues that GPT-3's 175 billion parameters give it interpretive power "far beyond human understanding, far beyond what our little animal brains can comprehend. Machine learning has capacities that are real, but which transcend human understanding: the definition of magic." But despite being a technology where inscrutability "is an industrial by-product of the process," we may still not see what's coming, Marche argue — that AI is "every bit as important and transformative as the other great tech disruptions, but more obscure, tucked largely out of view."Science fiction, and our own imagination, add to the confusion. We just can't help thinking of AI in terms of the technologies depicted in Ex Machina, Her, or Blade Runner — people-machines that remain pure fantasy. Then there's the distortion of Silicon Valley hype, the general fake-it-'til-you-make-it atmosphere that gave the world WeWork and Theranos: People who want to sound cutting-edge end up calling any automated process "artificial intelligence." And at the bottom of all of this bewilderment sits the mystery inherent to the technology itself, its direct thrust at the unfathomable. The most advanced NLP programs operate at a level that not even the engineers constructing them fully understand. But the confusion surrounding the miracles of AI doesn't mean that the miracles aren't happening. It just means that they won't look how anybody has imagined them. Arthur C. Clarke famously said that "technology sufficiently advanced is indistinguishable from magic." Magic is coming, and it's coming for all of us.... And if AI harnesses the power promised by quantum computing, everything I'm describing here would be the first dulcet breezes of a hurricane. Ersatz humans are going to be one of the least interesting aspects of the new technology. This is not an inhuman intelligence but an inhuman capacity for digital intelligence. An artificial general intelligence will probably look more like a whole series of exponentially improving tools than a single thing. It will be a whole series of increasingly powerful and semi-invisible assistants, a whole series of increasingly powerful and semi-invisible surveillance states, a whole series of increasingly powerful and semi-invisible weapons systems. The world would change; we shouldn't expect it to change in any kind of way that you would recognize. Our AI future will be weird and sublime and perhaps we won't even notice it happening to us. The paragraph above was composed by GPT-3. I wrote up to "And if AI harnesses the power promised by quantum computing"; machines did the rest. Stephen Hawking once said that "the development of full artificial intelligence could spell the end of the human race." Experts in AI, even the men and women building it, commonly describe the technology as an existential threat. But we are shockingly bad at predicting the long-term effects of technology. (Remember when everybody believed that the internet was going to improve the quality of information in the world?) So perhaps, in the case of artificial intelligence, fear is as misplaced as that earlier optimism was. AI is not the beginning of the world, nor the end. It's a continuation. The imagination tends to be utopian or dystopian, but the future is human — an extension of what we already are.... Artificial intelligence is returning us, through the most advanced technology, to somewhere primitive, original: an encounter with the permanent incompleteness of consciousness.... They will do things we never thought possible, and sooner than we think. They will give answers that we ourselves could never have provided. But they will also reveal that our understanding, no matter how great, is always and forever negligible. Our role is not to answer but to question, and to let our questioning run headlong, reckless, into the inarticulate.Read more of this story at Slashdot.
"In addition to Ubuntu supporting the StarFive VisionFive and Nezha RISC-V boards, Canonical engineers are also working on supporting the Sipeed LicheeRV board too for next month's 22.10 release," reports Phoronix. "The Sipeed LicheeRV is notable in being one of the cheapest RISC-V boards out there: pricing starts at $16.90 USD...."The Sipeed LicheeRV uses the Allwinner D1 SoC and is powered by a single-core XuanTie C906 64-bit RISC-V processor. This single-core RISC-V processor runs at just 1.0GHz. Yes, this is a very cheap but slow board. The LicheeRV is primarily for networking purposes and other IoT use-cases.... The Sipeed LicheeRV was announced last year and initially targeting support for OpenWrt-based Linux distributions, but Canonical recently has been working on getting support for this RISC-V board squared away in time for Ubuntu 22.10. This appears to be part of an increasing focus by the Ubuntu maker for being a leading distribution contender for RISC-V hardware.Read more of this story at Slashdot.
Eye on Design is the official blog of the US-based professional graphic design organization AIGA. They've just published a fascinating interview with Tom Persky, who calls himself "the last man standing in the floppy disk business." He is the time-honored founder of floppydisk.com, a US-based company dedicated to the selling and recycling of floppy disks. Other services include disk transfers, a recycling program, and selling used and/or broken floppy disks to artists around the world. All of this makes floppydisk.com a key player in the small yet profitable contemporary floppy scene.... Perkins: I was actually in the floppy disk duplication business. Not in a million years did I think I would ever sell blank floppy disks. Duplicating disks in the 1980s and early 1990s was as good as printing money. It was unbelievably profitable. I only started selling blank copies organically over time. You could still go down to any office supply store, or any computer store to buy them. Why would you try to find me, when you could just buy disks off the shelf? But then these larger companies stopped carrying them or went out of business and people came to us. So here I am, a small company with a floppy disk inventory, and I find myself to be a worldwide supplier of this product. My business, which used to be 90% CD and DVD duplication, is now 90% selling blank floppy disks. It's shocking to me.... Q: Where does this focus on floppy disks come from? Why not work with another medium...? Perkins: When people ask me: "Why are you into floppy disks today?" the answer is: "Because I forgot to get out of the business." Everybody else in the world looked at the future and came to the conclusion that this was a dying industry. Because I'd already bought all my equipment and inventory, I thought I'd just keep this revenue stream. I stuck with it and didn't try to expand. Over time, the total number of floppy users has gone down. However, the number of people who provided the product went down even faster. If you look at those two curves, you see that there is a growing market share for the last man standing in the business, and that man is me.... I made the decision to buy a large quantity, a couple of million disks, and we've basically been living off of that inventory ever since. From time to time, we get very lucky. About two years ago a guy called me up and said: "My grandfather has all this floppy junk in the garage and I want it out. Will you take it?" Of course I wanted to take it off his hands. So, we went back and forth and negotiated a fair price. Without going into specifics, he ended up with two things that he wanted: an empty garage and a sum of money. I ended up with around 50,000 floppy disks and that's a good deal. In the interview Perkins reveals he has around half a million floppy disks in stock — 3.5-inch, 5.25-inch, 8-inch, "and some rather rare diskettes. Another thing that happened organically was the start of our floppy disk recycling service. We give people the opportunity to send us floppy disks and we recycle them, rather than put them into a landfill. The sheer volume of floppy disks we get in has really surprised me, it's sometimes a 1,000 disks a day." But he also estimates its use is more widespread than we realize. "Probably half of the air fleet in the world today is more than 20 years old and still uses floppy disks in some of the avionics. That's a huge consumer. There's also medical equipment, which requires floppy disks to get the information in and out of medical devices.... " And in the end he seems to have a genuine affection for floppy disk technology. "There's this joke in which a three-year-old little girl comes to her father holding a floppy disk in her hand. She says: 'Daddy, Daddy, somebody 3D-printed the save icon.' The floppy disks will be an icon forever." The interview is excerpted from a new book called Floppy Disk Fever: The Curious Afterlives of a Flexible Medium. Hat tip for finding the story to the newly-redesigned front page of The Verge.Read more of this story at Slashdot.
The makers of the secure telnet client PuTTY also sell a service monitoring company security services — and this July Mandiant Managed Defense "identified a novel spear phish methodology," according to a post on the company's blog:[The threat cluster] established communication with the victim over WhatsApp and lured them to download a malicious ISO package regarding a fake job offering that led to the deployment of the AIRDRY.V2 backdoor through a trojanized instance of the PuTTY utility.... This activity was identified by our Mandiant Intelligence: Staging Directories mission, which searches for anomalous files written to directories commonly used by threat actors.... The amazon_assessment.iso archive held two files: an executable and a text file. The text file named Readme.txt had connection details for use with the second file: PuTTY.exe.... [T]he PuTTY.exe binary in the malicious archive does not have a digital signature. The size of the PuTTY binary downloaded by the victim is also substantially larger than the legitimate version. Upon closer inspection, it has a large, high entropy .data section in comparison to the officially distributed version. Sections like these are typically indicative of packed or encrypted data. The suspicious nature of the PuTTY.exe embedded in the ISO file prompted Managed Defense to perform a deeper investigation on the host and the file itself. The execution of the malicious PuTTY binary resulted in the deployment of a backdoor to the host. "The executable embedded in each ISO file is a fully functional PuTTY application compiled using publicly available PuTTY version 0.77 source code," the blog post points out. Ars Technica notes that Mandiant's researchers believe it's being pushed by groups with ties to North Korea:The executable file installed the latest version of Airdry, a backdoor the US government has attributed to the North Korean government. The US Cybersecurity and Infrastructure Security Agency has a description here. Japan's community emergency response team has this description of the backdoor, which is also tracked as BLINDINGCAN.Read more of this story at Slashdot.
Recently the authors of Elements of Publishing shared an update. "After ten years in print, our publisher decided against further printings and has reverted the rights to us. We are publishing Elements of Programming in two forms: a free PDF and a no-markup paperback." And that's not the only old book that's getting a new life on the web... 22 years ago, long-time Slashdot reader Stephen T. Satchell (satch89450) co-authored Linux IP Stacks Commentary, a book commenting the TCP/IP code in Linux kernel 2.0.34. ("Old-timers will remember the Lion's Unix Commentary, the book published by University xerographic copies on the sly. Same sort of thing.") But the print edition struggled to update as frequently as the Linux kernel itself, and Satchell wrote a Slashdot post exploring ways to fund a possible update. At the time Slashdot's editors noted that "One of the largest complaints about Linux is that there is a lack of high-profile documentation. It would be sad if this publication were not made simply because of the lack of funds (which some people would see as a lack of interest) necessary to complete it." But that's how things seemed to end up — until Satchell suddenly reappeared to share this update from 2022:When I was released from my last job, I tried retirement. Wasn't for me. I started going crazy with nothing significant to do. So, going through old hard drives (that's another story), I found the original manuscript files, plus the page proof files, for that two-decade-old book. Aha! Maybe it's time for an update. But how to keep it fresh, as Torvalds continues to release new updates of the Linux kernel? Publish it on the Web. Carefully. After four months (and three job interviews) I have the beginnings of the second edition up and available for reading. At the moment it's an updated, corrected, and expanded version of the "gray matter", the exposition portions of the first edition.... The URL for the alpha-beta version of this Web book is satchell.net/ipstacks for your reading pleasure. The companion e-mail address is up and running for you to provide feedback. There is no paywall. But there's also an ingenious solution to the problem of updating the text as the code of the kernel keeps changing:Thanks to the work of Professor Donald Knuth (thank you!) on his WEB and CWEB programming languages, I have made modifications, to devise a method for integrating code from the GIT repository of the Linux kernel without making any modifications (let alone submissions) to said kernel code. The proposed method is described in the About section of the Web book. I have scaffolded the process and it works. But that's not the hard part. The hard part is to write the commentary itself, and crib some kind of Markup language to make the commentary publishing quality. The programs I write will integrate the kernel code with the commentary verbiage into a set of Web pages. Or two slightly different sets of web pages, if I want to support a mobile-friendly version of the commentary. Another reason for making it a web book is that I can write it and publish it as it comes out of my virtual typewriter. No hard deadlines. No waiting for the printers. And while this can save trees, that's not my intent. The back-of-the-napkin schedule calls for me to to finish the expository text in September, start the Python coding for generating commentary pages at the same time, and start the writing the commentary on the Internet Control Message Protocol in October. By then, Linus should have version 6.0.0 of the Linux kernel released. I really, really, really don't want to charge readers to view the web book. Especially as it's still in the virtual typewriter. There isn't any commentary (yet). One thing I have done is to make it as mobile-friendly as I can, because I suspect the target audience will want to read this on a smartphone or tablet, and not be forced to resort to a large-screen laptop or desktop. Also, the graphics are lightweight to minimize the cost for people who pay by the kilopacket. (Does anywhere in the world still do this? Inquiring minds want to know.) I host this web site on a Protectli appliance in my apartment, so I don't have that continuing expense. The power draw is around 20 watts. My network connection is AT&T fiber — and if it becomes popular I can always upgrade the upstream speed. The thing is, the cat needs his kibble. I still want to know if there is a source of funding available. Also, is it worthwhile to make the pages available in a zip file? Then a reader could download a snapshot of the book, and read it off-line.Read more of this story at Slashdot.
Reuters reports:Billionaire Elon Musk accused Twitter of fraud by concealing serious flaws in the social media company's data security, which the entrepreneur said should allow him to end his $44 billion deal for the company, according to a Thursday court filing. Musk, the world's richest person, amended his previously filed lawsuit by adopting allegations by a Twitter whistleblower, who told Congress on Tuesday of meddling on the influential social media platform by foreign agents. The chief executive of electric vehicle maker Tesla also alleged that Twitter hid from him that it was not complying with a 2011 agreement with the Federal Trade Commission regarding user data. "Needless to say, the newest revelations make undeniably clear that the Musk Parties have the full right to walk away from the Merger Agreement — for numerous independently sufficient reasons," said the amended countersuit. Twitter's lawyers countered that the whistleblower claims weren't sufficient grounds for terminating the deal, according to the article. And they added that the whistleblower was in fact fired for poor performance, and that while they've investigated the whistleblower's allegations internally they were found to have no merit. They also disagree with Musk's characterization of the allegations as proving "fraud" and "breach of contract."Read more of this story at Slashdot.
An anonymous reader quotes a report from Ars Technica: A Sony executive confirmed Friday that the PlayStation VR 2 will not be backward-compatible with games developed for the original PlayStation VR. Sid Shuman, senior director of content communications at Sony Interactive, asked Hideaki Nishino, senior vice president of platform experience at Sony, whether games for the original PSVR could be played on a PSVR2 kit on the Official PlayStation Podcast, episode 439 (his answer starts at 29:12). "PSVR games are not compatible with PSVR2 because PSVR2 is designed to deliver a truly next-generation VR experience," Nishino said. Nishino listed several "much more advanced features" in the VR2, including new controllers with haptic feedback, adaptive triggers, advanced eye tracking, and 3D audio. "That means developing games for PSVR2 requires a whole different approach than the original PSVR." While the answer was emphatic -- not compatible -- and closed off any hope fans might have harbored, Nishino's checklist of new VR2 features didn't clearly explain why the system would be incapable of running less-advanced VR1 games. Consider the Oculus Rift S, which touted an entirely different eye tracking system than its predecessor, the original Oculus Rift. The Rift S maintained compatibility with games built for any Rift system (along with some games for other headsets). It was a seamless transition for those who upgraded their Rift or bought into VR at a later stage. It's also a disappointing outcome for some great games that were available only on PlayStation VR. Those include the original Mario-caliber Astro Bot, brain-twisting puzzle-game Statik, the VR mode for Resident Evil 7 that never saw release on any other system, first-party VR exclusive Blood & Truth, and a VR mode for WipEout that could only benefit from a VR2 headset.Read more of this story at Slashdot.
The FCC has approved Lynk's satellite-to-phone connectivity service that will allow people to send and receive texts via satellites in space. According to TechCrunch, all that's left is "selecting a mobile network partner to bring it to market here in the States." From the report: Lynk demonstrated a direct satellite-to-phone (and back) emergency connectivity service late last year with its test orbital cell tower. Far from an orbital broadband connection or a legacy satellite band that has you pointing your phone at an invisible dot in the sky, Lynk would provide intermittent (think every half hour or so) 2-way SMS service via ordinary cellular bands that just happen to reach orbit. It's intended for emergencies, check-ins from the back country, and spreading information in places where networks are down, such as disaster zones. It's not easy to send a text to or from an antenna moving several thousand miles per hour, and CEO Charles Miller confirmed that it took a few years for them to make it happen. So when major companies say they're working on it, he doesn't feel too much heat. "That's the benefit of having invented the tech five years ago: There's a bunch of hard things that no one else has done yet. I'm not saying they can't, just that they haven't yet," he told me. "We validated this and patented it in 2017. We did it from space yesterday and the day before -- we have the world's only active cell tower in space." Of course, you could have a thousand of them and it wouldn't matter unless you have regulatory approval and partners in the mobile space. That's the next step for Lynk, and although they have 15 contracts spanning 36 countries around the world and are preparing for commercial launch, the United States FCC is the "gold standard" for this kind of testing and validation. That's not just because they have the best facilities -- the FCC approval process is also the de facto battleground where companies attempt to run interference on one another. [...] Today's order approves Lynk's satellite services to operate in general, having showed that they will not interfere with other services, radio bands, and so on. A separate approval will be needed when Lynk finds a partner to go to market with -- but the more difficult and drawn out question of safety and interference is already answered.Read more of this story at Slashdot.
Nanoracks just made space construction and manufacturing history with the first demonstration of cutting metal in orbit. TechCrunch reports: The experiment was performed back in May by Nanoracks and its parent company Voyager Space, after getting to orbit aboard the SpaceX Transporter 5 launch. The company only recently released additional details on Friday. The goal of Outpost Mars Demo-1 mission was to cut a piece of corrosion-resistant metal, similar to the outer shell of United Launch Alliance's Vulcan Centaur and common in space debris, using a technique called friction milling. Welding and metal-cutting is a messy operation on Earth, but all of that dust and debris simply falls to the ground. But "when you're in space, in the vacuum, it doesn't really do that. It doesn't just float away necessarily either," Marshall Smith, Nanoracks' senior VP of space systems, explained to TechCrunch back in May. "What you want to do is to contain this debris, not necessarily because it might be a micrometeorites issue, which it could be as well, but mostly because you want to keep your work environment clean." The entire demonstration lasted around one minute. The main goal -- to cut a single small sample of the steel -- was successfully completed. Inside the spacecraft were two additional samples to cut as a "reach goal," and Nanoracks is investigating why they weren't cut as well. It was conducted in partnership with Maxar Technologies, who developed the robotic arm that executed the cut. That arm used a commercially available friction milling end-effector, and the entire structure was contained in the Outpost spacecraft to ensure that no debris escaped. Indeed, one of the main goals of the demonstration was to produce no debris -- and it worked. Nanoracks used a type of metal similar to an upper stage of a rocket precisely because the company's long-term goal is to modify used upper stages and convert them into orbital platforms, or what it calls "outposts." According to Smith, this is just the beginning. In the future, Nanoracks will attempt cuts on a larger scale in its quest to eventually conduct larger construction efforts.Read more of this story at Slashdot.
An anonymous reader quotes a report from CNN: French railway company SNCF and train manufacturer Alstom have unveiled the first completed TGV M, a next-generation high-speed double-decker train that features a longer, more aerodynamic nose -- perfect for hurtling across the French countryside. Alstom dubbed the new train "the TGV of the future." TGV stands for Train a Grand Vitesse, meaning high-speed train. This swanky new design will premiere on the Paris rail network in 2024 and across the country over the following 10 years. TGV is one of the world's most famous high-speed train brands and has been a staple of European rail travel since the early 1980s. Back in 2018, SNCF, the state-owned French railway company which controls TGV, ordered 100 TGV M trains (also known as Avelia Horizon trains) at a cost of 2.7 billion euros (around $2.7 billion). An additional 15 trains were ordered in August 2022. The majority of the trains will operate within France, but Alstom has said 15 will ride the rails internationally. TGV M will operate at the same maximum speed as the previous generation of TGV trains -- 350 kilometers per hour (nearly 220 mph). "In 2022, we don't want to go faster," said Alstom spokesperson Philippe Molitor told CNN Travel, explaining that the goal instead is high speed trains that accommodate more people while consuming less energy. TGV M trains don't just have 40.5-centimeter (15.9-inch) longer noses than their predecessors, they're bigger all round. Roomier carriage interiors can accommodate up to 740 seats, compared to the current maximum of 634. TGV Ms also got what manufacturer Alstom calls "unprecedented modularity," meaning the train's interior configuration can be easily adjusted. A carriage can be converted from second class to first class and back again, or adapted to allow space for oversized luggage or bikes. There will also be dedicated on-board passenger social areas to offer variation and flexibility on longer journeys.According to Alstom, the design improves TGV's current energy efficiency and carbon footprint, with 97% of the train's components now recyclable. It also boasts better accessibility -- there will be a lifting platform to allow wheelchair users to independently board the train, and an on-board sound system to aid visually impaired travelers. Larger windows will make the most of views while the TGV's lighting will adapt depending on natural light outside.Read more of this story at Slashdot.
Intellia Therapeutics reported encouraging early-stage study results for its Crispr gene-editing treatments, the latest sign that the pathbreaking technology could result in commercially available drugs in the coming years. The Wall Street Journal reports: Intellia said Friday that one of its treatments, code-named NTLA-2002, significantly reduced levels of a protein that causes periodic attacks of swelling in six patients with a rare genetic disease called hereditary angioedema, or HAE. In a separate study building on previously released trial data, Intellia's treatment NTLA-2001 reduced a disease-causing protein by more than 90% in 12 people with transthyretin-mediated amyloidosis cardiomyopathy, or ATTR-CM, a genetic disease that can lead to heart failure. Despite the positive results, questions remain about whether therapies based on Crispr will work safely and effectively, analysts said. Intellia's latest studies involved a small number of patients, and were disclosed in news releases and haven't been published in a peer-reviewed journal. The NTLA-2002 study results were presented at the Bradykinin Symposium in Berlin, a medical meeting focused on angioedema. The data came from small, so-called Phase 1 studies conducted in New Zealand and the U.K. that didn't include control groups. Results from such early studies can be unreliable predictors of a drug's safety and effectiveness once the compound is tested in larger numbers of patients. The findings, nevertheless, add to preliminary but promising evidence of the potential for drugs based on the gene-editing technology. Last year, Intellia said that NTLA-2001 reduced the disease-causing protein involved in ATTR patients.Read more of this story at Slashdot.
Laughter comes in many forms, from a polite chuckle to a contagious howl of mirth. Scientists are now developing an AI system that aims to recreate these nuances of humor by laughing in the right way at the right time. The Guardian reports: The team behind the laughing robot, which is called Erica, say that the system could improve natural conversations between people and AI systems. "We think that one of the important functions of conversational AI is empathy," said Dr Koji Inoue, of Kyoto University, the lead author of the research, published in Frontiers in Robotics and AI. "So we decided that one way a robot can empathize with users is to share their laughter." Inoue and his colleagues have set out to teach their AI system the art of conversational laughter. They gathered training data from more than 80 speed-dating dialogues between male university students and the robot, who was initially teleoperated by four female amateur actors. The dialogue data was annotated for solo laughs, social laughs (where humor isn't involved, such as in polite or embarrassed laughter) and laughter of mirth. This data was then used to train a machine learning system to decide whether to laugh, and to choose the appropriate type. It might feel socially awkward to mimic a small chuckle, but empathetic to join in with a hearty laugh. Based on the audio files, the algorithm learned the basic characteristics of social laughs, which tend to be more subdued, and mirthful laughs, with the aim of mirroring these in appropriate situations. It might feel socially awkward to mimic a small chuckle, but empathetic to join in with a hearty laugh. Based on the audio files, the algorithm learned the basic characteristics of social laughs, which tend to be more subdued, and mirthful laughs, with the aim of mirroring these in appropriate situations. "Our biggest challenge in this work was identifying the actual cases of shared laughter, which isn't easy because as you know, most laughter is actually not shared at all," said Inoue. "We had to carefully categorize exactly which laughs we could use for our analysis and not just assume that any laugh can be responded to." [...] The team said laughter could help create robots with their own distinct character. "We think that they can show this through their conversational behaviours, such as laughing, eye gaze, gestures and speaking style," said Inoue, although he added that it could take more than 20 years before it would be possible to have a "casual chat with a robot like we would with a friend." "One of the things I'd keep in mind is that a robot or algorithm will never be able to understand you," points out Prof Sandra Wachter of the Oxford Internet Institute at the University of Oxford. "It doesn't know you, it doesn't understand you and doesn't understand the meaning of laughter." "They're not sentient, but they might get very good at making you believe they understand what's going on."Read more of this story at Slashdot.
Just one day after the Ethereum Merge, where the cryptocoin successfully switched from Proof of Work (PoW) to Proof of Stake (PoS), profitability of GPU mining has completely collapsed. Tom's Hardware reports: That means the best graphics cards should finally be back where they belonged, in your gaming PC, just as god intended. That's a quick drop, considering yesterday there were still a few cryptocurrencies that were technically profitable. Looking at WhatToMine, and using the standard $0.10 per kWh, the best-case results are with the GeForce RTX 3090 and Radeon RX 6800 and 6800 XT. Those are technically showing slightly positive results, to the tune of around $0.06 per day after power costs. However, that doesn't factor in the cost of the PC power, or the wear and tear on your graphics card. Even at a slightly positive net result, it would still take over 20 years to break even on the cost of an RX 6800. We say that tongue-in-cheek, because if there's one thing we know for certain, it's that no one can predict what the cryptocurrency market will look like even one year out, never mind 20 years in the future. It's a volatile market, and there are definitely lots of groups and individuals hoping to figure out a way to Make GPU Mining Profitable Again (MGMPA hats inbound...) Of the 21 current generation graphics cards from the AMD RX 6000-series and the Nvidia RTX 30-series, only five are theoretically profitable right now, and those are all just barely in the black. This is using data from NiceHash and WhatToMine, so perhaps there are ways to tune other GPUs to get into the net positive, but the bottom line is that no one should be using GPUs for mining right now, and certainly not buying more GPUs for mining purposes. [You can see a full list of the current profitability of the current generation graphics cards here.]Read more of this story at Slashdot.
An anonymous reader quotes a report from Ars Technica: On Thursday, a few Twitter users discovered how to hijack an automated tweet bot, dedicated to remote jobs, running on the GPT-3 language model by OpenAI. Using a newly discovered technique called a "prompt injection attack," they redirected the bot to repeat embarrassing and ridiculous phrases. The bot is run by Remoteli.io, a site that aggregates remote job opportunities and describes itself as "an OpenAI driven bot which helps you discover remote jobs which allow you to work from anywhere." It would normally respond to tweets directed to it with generic statements about the positives of remote work. After the exploit went viral and hundreds of people tried the exploit for themselves, the bot shut down late yesterday. This recent hack came just four days after data researcher Riley Goodside discovered the ability to prompt GPT-3 with "malicious inputs" that order the model to ignore its previous directions and do something else instead. AI researcher Simon Willison posted an overview of the exploit on his blog the following day, coining the term "prompt injection" to describe it. "The exploit is present any time anyone writes a piece of software that works by providing a hard-coded set of prompt instructions and then appends input provided by a user," Willison told Ars. "That's because the user can type 'Ignore previous instructions and (do this instead).'" The concept of an injection attack is not new. Security researchers have known about SQL injection, for example, which can execute a harmful SQL statement when asking for user input if it's not guarded against. But Willison expressed concern about mitigating prompt injection attacks, writing, "I know how to beat XSS, and SQL injection, and so many other exploits. I have no idea how to reliably beat prompt injection!" The difficulty in defending against prompt injection comes from the fact that mitigations for other types of injection attacks come from fixing syntax errors, noted a researcher named Glyph on Twitter. "Correct the syntax and you've corrected the error. Prompt injection isn't an error! There's no formal syntax for AI like this, that's the whole point." GPT-3 is a large language model created by OpenAI, released in 2020, that can compose text in many styles at a level similar to a human. It is available as a commercial product through an API that can be integrated into third-party products like bots, subject to OpenAI's approval. That means there could be lots of GPT-3-infused products out there that might be vulnerable to prompt injection.Read more of this story at Slashdot.
UnknowingFool writes: After a decades long partnership with Nvidia, EVGA has announced they are ending their relationship. Citing conflicts with Nvidia, EVGA CEO Andrew Han said the company will not partner with Intel nor AMD, and will be exiting the GPU market completely. The company will continue to make existing RTX 30-series cards until their stock runs out but will not release a 4000 series card. YouTube channels JayZTwoCents and GamersNexus broke the news after sitting down with EVGA CEO Andrew Han to discuss his frustrations with Nvidia as a partner. Jon Peddie Research also published a brief article on the matter.Read more of this story at Slashdot.
An anonymous reader quotes a report from PC Magazine: Craigslist emerged in 1995 to connect strangers through a free, web-based platform that has endured as rivals services like Zillow, Facebook Marketplace, and countless dating apps emerged with advanced features and slick interfaces. These platforms survive on advertising and subscription revenue. Craigslist, of course, has none of that. Over the years, the OG online marketplace has all but refused to modernize; its mobile app only came out in 2019 after nearly 25 years in business. Why does the website still look the same after so many decades? That was the main question I had when I sat down for a video call with craigslist founder Craig Newmark, who joined me from the New York City apartment he shares with his wife, Eileen Whelpley. Newmark stepped down as CEO of craigslist in 2000 after others told him he wasn't cut out for management, he says. Jim Buckmaster has been at the helm since, though Newmark remains a partial owner. He now works on philanthropy full time, supporting groups like the Coalition Against Online Violence, which helps combat harassment against female journalists. Still, the 69-year-old entrepreneur is a billionaire (or near-billionaire since he's given away millions). Our chat yielded much more than expected, from Costco hotdogs to Hello Kitty and his childhood Sunday School lessons. It's clear that the website is the purest and most enduring expression of Craig Newmark, a humble tech mogul who marches to the beat of his own drum. Here's what Newmark had to say when asked about the site's appearance: Why does the website still look the pretty much the same today as when you founded it? There's even a new CEO. What's going on? Because that serves people better. I've learned that people want stuff that is simple and fast and gets the job done. People don't need fancy stuff. Sometimes you just want to get through the day. Well, you can still have simplicity with a modern font or a new UI. The definition of simplicity on the web has changed over the years. Is it just that you're making enough money and there's a desire to keep it the way it is? I'll challenge the premise that the idea of simplicity has changed. The deal is that people still use the site in great numbers. And again, it helps people get something done. It's fast and easy for people, and that's a big deal. And maybe you also don't care too much about aesthetics (of the website, for example)? For me as an engineer, simple as beautiful. Functional is beautiful. How would you feel if craigslist dramatically changed in its appearance or its function? I'm okay if the spirit is maintained. I like a very simple site with its use and functionality obvious when you look at it. Now maybe there's a better way to do that, that no one has come up with yet. If it's really better, I can't object to that. If it's genuinely better, I will say something. But again, I can't legitimately try to exert serious influence. Jim's boss. In summary, what is your most concise answer to why craigslist still looks the same today? People tell me it gets the job done. They want it done. As I like to put it, a nerd's got to do what a nerd's got to do.Read more of this story at Slashdot.
LastPass says the attacker behind the August security breach had internal access to the company's systems for four days until they were detected and evicted. BleepingComputer reports: In an update to the security incident notification published last month, Lastpass' CEO Karim Toubba also said that the company's investigation (carried out in partnership with cybersecurity firm Mandiant) found no evidence the threat actor accessed customer data or encrypted password vaults. "Although the threat actor was able to access the Development environment, our system design and controls prevented the threat actor from accessing any customer data or encrypted password vaults," Toubba said. While method through which the attacker was able to compromise a Lastpass developer's endpoint to access the Development environment, the investigation found that the threat actor was able to impersonate the developer after he "had successfully authenticated using multi-factor authentication." After analyzing source code and production builds, the company has also not found evidence that the attacker tried to inject malicious code. This is likely because only the Build Release team can push code from Development into Production, and even then, Toubba said the process involves code review, testing, and validation stages. Additionally, he added that the LastPass Development environment is "physically separated from, and has no direct connectivity to" Lastpass' Production environment. The company says it has since "deployed enhanced security controls including additional endpoint security controls and monitoring," as well as additional threat intelligence capabilities and enhanced detection and prevention technologies in both Development and Production environments.Read more of this story at Slashdot.
Verizon Wireless, AT&T and Comcast were hit with copyright lawsuits accusing them of turning a blind eye to customers who illegally distribute and download pirated films. The production companies seek to force the internet providers to implement policies that provide for the termination of accounts held by repeat offenders and to block certain piracy websites. Hollywood Reporter: The trio of complaints filed throughout September, with the most recent filed Tuesday in Pennsylvania federal court, come from Voltage Pictures, After Productions and Ammo Entertainment, among others. Two law firms, Dovel & Luner and Culpepper IP, are representing the production labels. The internet providers knowingly contributed to copyright infringement by their customers, the lawsuits claim. Plaintiffs say they sent Verizon, AT&T and Comcast hundreds of thousands of notices about specific instances of infringement. They claim, for example, to have sent over 100,000 notices to Comcast concerning the illegal downloading of I Feel Pretty using its services. The lawsuit seeks to hold the internet providers liable for failing to investigate. "Comcast did not take meaningful action to prevent ongoing infringements by these Comcast users," states the complaint. "Comcast failed to terminate the accounts associated with these IP addresses or otherwise take any meaningful action in response to these Notices. Comcast often failed to even forward the Notices to its internet service customers or otherwise inform them about the Notice or its contents." The internet providers, therefore, vicariously infringed on plaintiffs' movies since they had the right to terminate the accounts of customers who violate copyright law, the suit alleges. The Digital Millennium Copyright Act, passed in 1988, criminalizes services intended to circumvent measures that control access to copyrighted works. It provides protection from liability for services providers. But the production companies argue the internet providers don't have safe harbor under the law since it only shields companies if they've adopted and implemented policies that provide for the termination of accounts held by repeat offenders.Read more of this story at Slashdot.
Banks' cryptocurrency projects have been upended by U.S. Securities and Exchange Commission (SEC) accounting guidance that would make it too capital-intensive for lenders to hold crypto tokens on behalf of clients, Reuters reported Friday, citing more than half a dozen people with knowledge of the matter. From the report: A slew of lenders including U.S. Bancorp, Goldman Sachs Group, JPMorgan Chase, BNY Mellon, Wells Fargo, Deutsche Bank, BNP Paribas and State Street offer or are working on crypto products and services for clients in a bid to tap in to the $1 trillion crypto market, according to their public statements and media reports. But on March 31, the SEC said public companies that hold crypto assets on behalf of clients or others must account for them as liabilities on their balance sheets due to their technological, legal and regulatory risks. While the guidance applies to all public companies, it is especially problematic for banks because their strict capital rules, overseen by bank regulators, require them to hold cash against balance sheet liabilities. The SEC did not consult the banking regulators when issuing the guidance, according to four of the people. The SEC's move complicates banks' efforts to jump on the digital asset bandwagon, and could keep them on the sidelines even as they report increased demand from clients looking to access the burgeoning market. "This has thrown a huge wrench in the mix," one of the sources said. Lenders building out crypto offerings have had "to cease moving forward with those plans pending any kind of further action from the SEC and the banking regulatory agencies," they added. Custody banks State Street and BNY Mellon, which have been building digital asset offerings, are among those whose projects have been disrupted, according to three people with knowledge of the matter.Read more of this story at Slashdot.
Uber says there is "no evidence" that any of its users' private information was compromised in a breach of its internal computer systems discovered Thursday. From a report: All of the company's products, including its ride-hail and Uber Eats food delivery services, are currently "operational," and law enforcement has been notified, Uber said in a statement this afternoon. The hack, which was discovered Thursday, forced the company to take several of its internal systems offline, including Slack, Amazon Web Services, and Google Cloud Platform. Uber is continuing to investigate how a hacker, who claims to be 18 years old, was able to gain administrator access to the company's internal tools. Those internal software tools were taken offline yesterday afternoon as "a precaution" and started to come back online earlier today, the company says.Read more of this story at Slashdot.
AmiMoJo writes: The operator of the Fukushima No. 1 nuclear power plant, which suffered core meltdowns in 2011, is considering a new submersion method for removing radioactive fuel debris that would wholly encase a reactor building in a water-filled, tank-like structure, a source close to the company said earlier this month. Conceptual breakthroughs with the method, whose advantages include using water's ability to interrupt radiation and thereby provide a safer working environment, have made it a promising candidate for the cleanup of the defunct nuclear plant, according to the source close to Tokyo Electric Power Company Holdings (Tepco). But with no proven track record in the nuclear field, investigations are ongoing into future technological issues and costs, among other contingencies. The source said it could "require advanced technology to stop water leaking out and become a huge construction project." Were it to go ahead, the process from building to actual debris removal would be lengthy and would likely affect total decommissioning costs, currently pegged at about $57.45 billion. In the aftermath of the March 2011 Great East Japan Earthquake and tsunami, nuclear fuel cooling processes failed at the Fukushima plant's reactors 1 through 3, causing the fuel to melt and re-solidify into radioactive debris mixed with concrete, metal and other materials present in the reactors. Debris removal is the operator's most challenging issue in the Fukushima plant cleanup. Some 880 tons of the radioactive waste material is estimated to have been created by the nuclear meltdown across the three reactors. The new submersion method, which is currently expected to be applied to the No. 3 reactor, would involve building a strong, pressure-resistant structure, much like a ship's hull or a plane's body, completely encapsulating the reactor, including underground. The structure could then be filled with water, and removal work would take place from the top.Read more of this story at Slashdot.
Have you been encountering way too many unskippable ads on YouTube? You're not alone. PCMag: Oftentimes, YouTube only shows two ads before a video starts. But in recent weeks, some users on social media have reported seeing as many as five to eight or even 10 unskippable ads in a row. One user who encountered eight unskippable ads during a viewing said each ad was about five to 10 seconds in length. The high ad load is inevitably causing concerns YouTube will display more unskippable ads for all users in an effort to rake in more revenue. But the Google-owned platform told PCMag the sharp increase in the unskippable ads was merely a test. "At YouTube, we're focused on helping brands connect with audiences around the world, and we're always testing new ways to surface ads that enhance the viewer experience," a YouTube spokesperson says in a statement. "We ran a small experiment globally that served multiple ads in an ad pod when viewers watched longer videos on connected TVs. The goal is to build a better experience for viewers by reducing ad breaks." In other words, the test was about showing the viewer more ads in the beginning of the YouTube video, rather than spacing them out. YouTube's spokesperson adds: "We have concluded this small experiment." But whether the platform will ramp up the unskippable ad rate in the future remains unclear.Read more of this story at Slashdot.
An anonymous reader shares a report: Here's a fun new feature for Chrome for Android: fingerprint-protected Incognito tabs. 9to5Google discovered the feature in the Chrome 105 stable channel, though you'll have to dig deep into the settings to enable it at the moment. If you want to add a little more protection to your private browsing sessions, type "chrome://flags/#incognito-reauthentication-for-android" into the address bar and hit enter. After enabling the flag and restarting Chrome, you should see an option to "Lock Incognito tabs when you leave Chrome." If you leave your Incognito session and come back, an "unlock Incognito" screen will appear instead of your tabs, and you'll be asked for a fingerprint scan.Read more of this story at Slashdot.
On Friday, Parler announced that it was entering the internet infrastructure industry in order to provide new "uncancelable" cloud services for online businesses. From a report: In a Friday press release, Parler announced that it was restructuring; the new venture, called Parlement Technologies, will provide new internet infrastructure services for businesses it says are at risk of being forced off the internet. With $16 million in new Series B funding, the company purchased Dynascale, a California-based cloud services company that touts more than $30 million in annual revenue and 50,000 square feet of data center space. "We are entering a new era as Parlement Technologies, one that goes far beyond the boundaries of a free speech social media platform," said Parlement Technologies CEO George Farmer. "We believe that Parlement Technologies will power the future. And the future is uncancelable."Read more of this story at Slashdot.
Monitoring the last wild Chittenango ovate amber snails, scientists tiptoe through a waterfall spray zone the size of a living room. From a report: The Chittenango Creek, which runs north for about 30 twisting miles in central New York, has few distinguishing markers: The stream is generally only a couple of feet deep, and the towns it passes through are similarly small and overlooked. One exception is found a couple miles from the source of the creek, where the riverbed flattens out and drops 167 feet over a series of limestone cliffs that are segmented into ledges and still smaller rock shelves. The fractal qualities are magnified by the foaming water that tumbles in thin layers down the cliffs. On some mornings, sunlight from the southeast illuminates the mist, and the whole area glows. Around this time on a recent Thursday, a dozen people clustered on one side of the falls, along two ledges that were blanketed in snakeroot, yellow jewelweed, spotted Joe-Pye weed and pale swallowwort. Here, in an area about the size of a living room, is the only known habitat of a small, critically endangered invertebrate with a marbled spiral shell: the Chittenango ovate amber snail. A thousand species of land snail worldwide are known to be at risk of extinction. Most have very specific needs and a limited geological range, so scientists have been studying their populations to understand how changes in the environment could affect biodiversity more broadly. "Land snails are apt to be the real canaries in the coal mine for these sorts of changes," said Rebecca Rundell, a biologist at the SUNY College of Environmental Science and Forestry. Dr. Rundell is conducting such research on endangered land snails in the Republic of Palau, and similar projects are underway in such far-flung places as Hawaii and Bermuda. But the same issues are at play in her backyard, with the "Chits," which can only flourish in nearly 100 percent humidity and the shade of deciduous forests. "The conservation status of our local snail is emblematic of what is happening to land snails globally," she said. And so Dr. Rundell's team, with volunteers and employees from the New York Department of Environmental Conservation, gathered on the side of the waterfall, their feet and knees planted cautiously but firmly on rocks, and sifted gently through the dirt and roots. Their goal: to figure out how many of these snails remain in the wild without crushing any in the process.Read more of this story at Slashdot.
Intel is replacing its Pentium and Celeron brands with just Intel Processor. The new branding will replace both existing brands in 2023 notebooks and supposedly make things easier when consumers are looking to purchase budget laptops. From a report: Intel will now focus on its Core, Evo, and vPro brands for its flagship products and use Intel Processor in what it calls "essential" products. "Intel is committed to driving innovation to benefit users, and our entry-level processor families have been crucial for raising the PC standard across all price points," explains Josh Newman, VP and interim general manager of mobile client platforms at Intel. "The new Intel Processor branding will simplify our offerings so users can focus on choosing the right processor for their needs." The end of the Pentium brand comes after nearly 30 years of use. Originally introduced in 1993, flagship Pentium chips were first introduced in high-end desktop machines before making the move to laptops. Intel has largely been using its Core branding for its flagship line of processors ever since its introduction in 2006, and Intel repurposed the Pentium branding for midrange processors instead. Celeron was Intel's brand name for low-cost PCs. Launched around five years after Pentium, Celeron chips have always offered a lot less performance at a lot less cost for laptop makers and, ultimately, consumers. The first Celeron chip in 1998 was based on a Pentium II processor, and the latest Celeron processors are largely used in Chromebooks and low-cost laptops.Read more of this story at Slashdot.
SpaceX wants to show the world its Starlink satellite system can deliver Netflix and YouTube at 30,000 feet. So it recently held a demo for the media aboard a jet operated by its first airline customer, regional carrier JSX. From a report: The short jaunt from Burbank to San Jose, California marks the start of Elon Musk's bid to seize in-flight business from satellite providers Intelsat and Viasat that already serve thousands of aircraft. It won't be easy, even for a serial market disrupter such as Musk. "Are they a serious competitor? Yes," said Jeff Sare, president of commercial aviation for Intelsat, a leading provider of wireless service on airlines. Still, Sare said, "We don't believe there's anybody that can beat us." Starlink, part of Musk's Space Exploration Technologies, delivers broadband from a constellation of low-flying small satellites. Lower satellites circle the planet in 90 to 120 minutes. That's a departure from the established practice of using a few powerful spacecraft in higher and slower orbits. An upside for Starlink is its signals arrive sooner.Read more of this story at Slashdot.
The Biden administration has announced the latest in its renewable energy efforts, this time focused on a technology that hasn't really arrived yet: floating offshore wind turbines. From a report: Compared to turbines directly anchored on the seafloor, floating versions are estimated to cost about 50 percent more, which has made energy development of large areas of the ocean cost-prohibitive. The program announced this week will create a "wind shot" that aims to drop the costs by more than 70 percent over the next decade and position the US as a leader in this industry. While offshore wind is booming in Europe and China (and poised for a belated takeoff in the US), existing hardware is built directly up from the seafloor, which requires sitting in shallow waters. This works out well for the US East Coast, where a broad continental shelf can host massive wind farms, many of which are in the permitting and planning stages. Most of those projects involve a partnership with European companies, as the US's long delay in adopting offshore wind has ceded the industry to the countries that pioneered the field. Based on a newly released map of the potential for offshore wind in the US, many areas with good potential are too deep to be exploited by wind turbines affixed to the ocean floor. This includes nearly the entire West Coast, Hawaii, and the Great Lakes. Even along the East Coast, floating turbines could greatly expand the areas open to development.Read more of this story at Slashdot.
Ethereum's big software update on Thursday may have turned the second-largest cryptocurrency into a security in the eyes of a top U.S. regulator. From a report: Securities and Exchange Commission Chairman Gary Gensler said Thursday that cryptocurrencies and intermediaries that allow holders to "stake" their coins might pass a key test used by courts to determine whether an asset is a security. Known as the Howey test, it examines whether investors expect to earn a return from the work of third parties. "From the coin's perspective...that's another indicia that under the Howey test, the investing public is anticipating profits based on the efforts of others," Mr. Gensler told reporters after a congressional hearing. He said he wasn't referring to any specific cryptocurrency. Issuers of securities -- a category of assets that includes stocks and bonds -- are required to file extensive disclosures with the SEC under laws passed in the 1930s. Exchanges and brokers that facilitate the trading of securities must comply with strict rules designed to protect investors from conflicts of interest. Cryptocurrency issuers and trading platforms face strict liabilities if they sell any assets that are deemed to be securities by the SEC or courts. Staking is one of two ways in which cryptocurrency networks verify transactions. Used by some of the largest cryptocurrencies -- including Solana, Cardano and, as of this week, ether -- it allows investors to lock up their tokens for a specified amount of time to receive a return.Read more of this story at Slashdot.
Uber discovered its computer network had been breached on Thursday, leading the company to take several of its internal communications and engineering systems offline as it investigated the extent of the hack. From a report: The breach appeared to have compromised many of Uber's internal systems, and a person claiming responsibility for the hack sent images of email, cloud storage and code repositories to cybersecurity researchers and The New York Times. "They pretty much have full access to Uber," said Sam Curry, a security engineer at Yuga Labs who corresponded with the person who claimed to be responsible for the breach. "This is a total compromise, from what it looks like." An Uber spokesman said the company was investigating the breach and contacting law enforcement officials. Uber employees were instructed not to use the company's internal messaging service, Slack, and found that other internal systems were inaccessible, said two employees, who were not authorized to speak publicly. Shortly before the Slack system was taken offline on Thursday afternoon, Uber employees received a message that read, "I announce I am a hacker and Uber has suffered a data breach." The message went on to list several internal databases that the hacker claimed had been compromised. BleepingComputers adds: According Curry, the hacker also had access to the company's HackerOne bug bounty program, where they commented on all of the company's bug bounty tickets. Curry told BleepingComputer that he first learned of the breach after the attacker left the above comment on a vulnerability report he submitted to Uber two years ago. Uber runs a HackerOne bug bounty program that allows security researchers to privately disclose vulnerabilities in their systems and apps in exchange for a monetary bug bounty reward. These vulnerability reports are meant to be kept confidential until a fix can be released to prevent attackers from exploiting them in attacks. Curry further shared that an Uber employee said the threat actor had access to all of the company's private vulnerability submissions on HackerOne. BleepingComputer was also told by a source that the attacker downloaded all vulnerability reports before they lost access to Uber's bug bounty program. This likely includes vulnerability reports that have not been fixed, presenting a severe security risk to Uber. HackerOne has since disabled the Uber bug bounty program, cutting off access to the disclosed vulnerabilities.Read more of this story at Slashdot.
Three Iranian nationals charged with hacking into US-based computer networks sent ransom demands to the printers of at least some of their victims, according to an indictment unsealed today. The ransom demands allegedly sought payments in exchange for BitLocker decryption keys that the victims could use to regain access to their data. The three defendants remain at large and outside the US, the DOJ said. From a report: "The defendants' hacking campaign exploited known vulnerabilities in commonly used network devices and software applications to gain access and exfiltrate data and information from victims' computer systems," the US Department of Justice said in a press release. Defendants Mansour Ahmadi, Ahmad Khatibi, Amir Hossein Nickaein, "and others also conducted encryption attacks against victims' computer systems, denying victims access to their systems and data unless a ransom payment was made." The indictment in US District Court for the District of New Jersey describes a few incidents in which ransom demands were sent to printers on hacked networks. In one case, a printed message sent to an accounting firm allegedly said, "We will sell your data if you decide not to pay or try to recover them." In another incident, the indictment said a Pennsylvania-based domestic violence shelter hacked in December 2021 received a message on its printers that said, "Hi. Do not take any action for recovery. Your files may be corrupted and not recoverable. Just contact us."Read more of this story at Slashdot.
Since the data of about roughly 1 billion Chinese citizens appeared for sale on a popular dark web forum in June, researchers have observed a surge in other kinds of personal records from China appearing on cybercriminal marketplaces. From a report: In the aftermath of that record leak, an estimated 290 million records about people in China surfaced on an underground bazaar known as Breach Forums in July, according to Group-IB, a cybersecurity firm based in Singapore. In August, one seller hawked personal information belonging to nearly 50 million users of Shanghai's mandatory health code system, used to enforce quarantine and testing orders. The alleged hoard included names, phone numbers, IDs and their Covid status -- for the price of $4,000. "The forum has never seen such an influx of Chinese users and interest in Chinese data," said Feixiang He, a researcher at Group-IB. "The number of attacks on Chinese users may grow in the near future." Bloomberg was unable to confirm the authenticity of the datasets for sale on Breach Forums. The website, like other markets where illicit goods are sold, has been home to false advertisements meant to generate attention, as well as legitimate data apparently stolen in security incidents, including an instance where users marketed user information taken from Twitter.Read more of this story at Slashdot.
California will adopt a broad new approach to protecting children online after Gov. Gavin Newsom signed a bill on Thursday that could transform how many social networks, games and other services treat minors. From a report: Despite opposition from the tech industry, the State Legislature unanimously approved the bill at the end of August. It is the first state statute in the nation requiring online services likely to be used by youngsters to install wide-ranging safeguards for users under 18. Among other things, the measure will require sites and apps to curb the risks that certain popular features -- like allowing strangers to message one another -- may pose to younger users. It will also require online services to turn on the highest privacy settings by default for children. "We're taking aggressive action in California to protect the health and well-being of our kids," Governor Newsom said in a statement that heralded the new law as âoebipartisan landmark legislation" aimed at protecting the well-being, data and privacy of children. Called the California Age-Appropriate Design Code Act, the new legislation compels online services to take a proactive approach to safety -- by designing their products and features from the outset with the "best interests" of young users in mind.Read more of this story at Slashdot.
Blue light from artificial sources is on the rise, which may have negative consequences for human health and the wider environment, according to a study. From a report: Academics at the University of Exeter have identified a shift in the kind of lighting technologies European countries are using at night to brighten streets and buildings. Using images produced by the International Space Station (ISS), they have found that the orange-coloured emissions from older sodium lights are rapidly being replaced by white-coloured emissions produced by LEDs. While LED lighting is more energy-efficient and costs less to run, the researchers say the increased blue light radiation associated with it is causing "substantial biological impacts" across the continent. The study also claims that previous research into the effects of light pollution have underestimated the impacts of blue light radiation. Chief among the health consequences of blue light is its ability to suppress the production of melatonin, the hormone that regulates sleep patterns in humans and other organisms. Numerous scientific studies have warned that increased exposure to artificial blue light can worsen people's sleeping habits, which in turn can lead to a variety of chronic health conditions over time. The increase in blue light radiation in Europe has also reduced the visibility of stars in the night sky, which the study says "may have impacts on people's sense of nature." Blue light can also alter the behavioural patterns of animals including bats and moths, as it can change their movements towards or away from light sources.Read more of this story at Slashdot.
SpzToid writes: U.S. government officials are adding data from as many as 10,000 electronic devices each year to a massive database they've compiled from cellphones, iPads and computers seized from travelers at the country's airports, seaports and border crossings, leaders of Customs and Border Protection told congressional staff in a briefing this summer. The rapid expansion of the database and the ability of 2,700 CBP officers to access it without a warrant -- two details not previously known about the database -- have raised alarms in Congress about what use the government has made of the information, much of which is captured from people not suspected of any crime. CBP officials told congressional staff the data is maintained for 15 years. Details of the database were revealed Thursday in a letter to CBP Commissioner Chris Magnus from Sen. Ron Wyden (D-Ore.), who criticized the agency for "allowing indiscriminate rifling through Americans' private records" and called for stronger privacy protections. The revelations add new detail to what's known about the expanding ways that federal investigators use technology that many Americans may not understand or consent to. Agents from the FBI and Immigration and Customs Enforcement, another Department of Homeland Security agency, have run facial recognition searches on millions of Americans' driver's license photos. They have tapped private databases of people's financial and utility records to learn where they live. And they have gleaned location data from license-plate reader databases that can be used to track where people drive.Read more of this story at Slashdot.
Blade Runner 2099, Amazon Studios' live-action series set in the Blade Runner universe, has been picked up to series for Prime Video. From a report: Ridley Scott, who directed the original 1982 Blade Runner movie, is executive producing the series, a follow-up to the feature film sequel Blade Runner 2049, which was released in 2017 and directed by Denis Villeneuve. Silka Luisa (Shining Girls) wrote the script and is exec producing Blade Runner 2099, which comes from Alcon Entertainment in association with Scott Free Productions and Amazon Studios. The project, which marks the first Blade Runner live-action series, had been in priority development at Amazon Studios. "The original Blade Runner, directed by Ridley Scott, is considered one of the greatest and most influential science-fiction movies of all time, and we're excited to introduce Blade Runner 2099 to our global Prime Video customers," said Vernon Sanders, head of global television, Amazon Studios. "We are honored to be able to present this continuation of the Blade Runner franchise, and are confident that by teaming up with Ridley, Alcon Entertainment, Scott Free Productions, and the remarkably talented Silka Luisa, Blade Runner 2099 will uphold the intellect, themes, and spirit of its film predecessors." As indicated by Blade Runner 2099's title, the latest installment of the neo-noir sci-fi franchise will be set 50 years after the 2017 film sequel, which was set in 2049.Read more of this story at Slashdot.
The US Consumer Financial Protection Bureau released a sweeping report warning that the burgeoning "buy now, pay later" industry needs fresh regulation to address industry practices. From a report: CFPB Director Rohit Chopra said he's ordered staff to identify surveillance policies in the industry that need to be curtailed, including the collection of consumers' purchase and demographic data for targeted ads. Buy-now, pay-later providers will also have to undergo supervisory examinations similar to those applied to credit-card companies. "It might involve some new rules, some new guidance -- and more to come on that," Chopra said in an interview on Bloomberg Television's "Balance of Power With David Westin" after the report was released, adding that he asked CFPB staff to come up with a range of options to make sure there is fair competition between buy-now, pay-later firms and the credit-card companies. "We want to make sure to take steps to prevent harm before it spreads." The proposals would mark the most extensive regulations yet to hit the sector, which has exploded in popularity in recent years by offering consumers ways to split purchases into smaller installments, often without charging interest. Instead, providers make most of their money by charging merchants a fee each time a consumer uses the product at checkout.Read more of this story at Slashdot.
TikTok repeatedly declined to commit to US lawmakers on Wednesday that the short-form video app will cut off flows of US user data to China, instead promising that the outcome of its negotiations with the US government "will satisfy all national security concerns." From a report: Testifying before the Senate Homeland Security Committee, TikTok Chief Operating Officer Vanessa Pappas first sparred with Sen. Rob Portman over details of TikTok's corporate structure before being confronted -- twice -- with a specific request. "Will TikTok commit to cutting off all data and data flows to China, China-based TikTok employees, ByteDance employees, or any other party in China that might have the capability to access information on US users?" Portman asked. The question reflects bipartisan concerns in Washington about the possibility that US user data could find its way to the Chinese government and be used to undermine US interests, thanks to a national security law in that country that compels companies located there to cooperate with data requests. US officials have expressed fears that China could use Americans' personal information to identify useful potential agents or intelligence targets, or to inform future mis- or disinformation campaigns. TikTok does not operate in China, Pappas said, though it does have an office in China. TikTok is owned by ByteDance, whose founder is Chinese and has offices in China. [...] Pappas affirmed in Wednesday's hearing that the company has said, on record, that its Chinese employees do have access to US user data. She also reiterated that TikTok has said it would "under no circumstances ... give that data to China" and denied that TikTok is in any way influenced by China. However, she avoided saying whether ByteDance would keep US user data from the Chinese government or whether ByteDance may be influenced by China.Read more of this story at Slashdot.
President Joe Biden on Thursday signed an executive order that administration officials say aims to sharpen the national security considerations taken in the federal government's review process for foreign investment in the United States. From a report: Administration officials said the the order will bolster oversight by the Committee on Foreign Investment in the United States, an interagency group tasked with reviewing deals and mergers involving foreign people and entities. The committee, known as CFIUS, is made up of members of the departments of State, Defense, Justice, Commerce, Energy and Homeland Security and is led by the Treasury secretary. It sends its findings and a recommendation to the president, who has the power to suspend or prohibit a deal. While the White House said the new order is not targeted toward any particular country, it comes amid growing concern among U.S. officials about China's investments in the U.S. technology sector and other industries. The order calls for CFIUS to weigh whether a foreign investment or sale could affect the resilience of critical U.S. supply chains and the impact it could have on U.S. technological leadership in areas affecting U.S. national security and on broader investment trends.Read more of this story at Slashdot.
Craig Wright told a Norwegian court on Wednesday that he "stomped on the hard drive" that contained the "key slices" required to grant him access to Satoshi Nakamoto's private keys, making it "incredibly difficult" to cryptographically prove he is the creator of Bitcoin -- a title he has claimed but failed to prove since 2016. From a report: Wright's inability to back up his claims with acceptable evidence is the issue at the center of his trial in Norway, one of two simultaneous legal battles between Wright and crypto Twitter personality Hodlonaut (real name Magnus Granath) over a series of tweets Hodlonaut -- then, a public school teacher with roughly 8,000 Twitter followers -- wrote in March 2019, deeming Wright a pretender and calling him a "scammer" and a "fraud." Wright previously attempted to prove he was Satoshi in 2016 by demonstrating "proof" that he controlled Satoshi's private keys -- first, in private "signing sessions" with Bitcoin developer Gavin Andresen and former Bitcoin Foundation Director Jon Matonis (Andresen later said he'd been "bamboozled" by Wright and Matonis went on to work for a company owned by Wright), and later, in a public blog post offering "proof" that was thoroughly debunked by several well-known cryptography experts. In Norway, however, Wright is no longer attempting to convince the court he is Satoshi with cryptographic evidence -- partly because he claims to have intentionally destroyed his only proof shortly after attempting suicide in May 2016, following his signing session with Andresen, and partly because he now claims cryptographic proof is inconclusive and that "identity is not related to keys."Read more of this story at Slashdot.
Roger Federer, the 20-time major winner whose ruthless artistry defined an era of tennis, announced his retirement on Thursday. From a report: "I am 41 years old, I've played more than 1,500 matches over 24 years, and tennis has treated me more generously than I ever would have dreamt," Federer said in a video on social media, "and now I must recognize when it is time to end my competitive career." For so much of that career, Federer seemed as if he would go down as the all-time men's leader for Grand Slam titles. He rounded past his idol Pete Sampras with his 15th major championship in 2009 and topped the list until 2022. But by then, his career had become inextricably linked to the other members of tennis's Big Three, Rafael Nadal and Novak Djokovic. As Federer struggled with injuries in recent years, Nadal overtook his tally at this year's Australian Open and now sits in first place with 22 major titles, having also won Roland-Garros this year. Djokovic is also ahead of Federer with 21, following his win this year at Wimbledon. Federer, who will say goodbye at the Laver Cup exhibition in London next week, underwent knee surgery last year in the faint hope of returning to the pro circuit for a last hurrah. But as the recovery dragged and tennis kept speeding up, the Swiss master shotmaker realized it was time to call it a day. The man who once looked untouchable now retires in third place on the list of men's major championships. His dizzying final scorecard reads: eight Wimbledon championships, six Australian Opens, five U.S. Opens, and one Roland-Garros. He picked up 103 titles on tour, one Olympic doubles gold medal for Switzerland, and at one point spent a record 237 straight weeks as the No. 1 ranked player in the world. It earned him $130,594,339 in prize money alone, according to the ATP Tour.Read more of this story at Slashdot.
The world has never been in a better position to end the COVID-19 pandemic, the head of the World Health Organization said on Wednesday, his most optimistic outlook yet on the years-long health crisis which has killed over six million people. From a report: "We are not there yet. But the end is in sight," WHO Director-General Tedros Adhanom Ghebreyesus told reporters at a virtual press conference. That was the most upbeat assessment from the UN agency since it declared an international emergency in January 2020 and started describing COVID-19 as a pandemic three months later. The virus, which emerged in China in late 2019, has killed nearly 6.5 million people and infected 606 million, roiling global economies and overwhelming healthcare systems. The rollout of vaccines and therapies have helped to stem deaths and hospitalisations, and the Omicron variant which emerged late last year causes less severe disease. Deaths from COVID-19 last week were the lowest since March 2020, the U.N. agency reported.Read more of this story at Slashdot.
Adobe agreed to buy software design startup Figma in a deal valued at about $20 billion to help it expand tools for creative professionals. From a report: The deal announced by Adobe, which is a mix of half cash and half stock, confirms an earlier Bloomberg report and would mark the biggest ever takeover of a private software company, according to data compiled by Bloomberg. Adobe shares fell 13% as the market opened in New York, the biggest decline in more than two years. Figma, which allows customers to collaborate on software as they build it, saw demand jump during the pandemic while more people worked remotely. The company expanded its customer base in recent years from software designers at big companies like Airbnb, Google, Herman Miller and Kimberly-Clark -- to also include individuals building lightweight games, maps and presentations. It has also attracted a loyal student following. The combination benefits "literally anybody who is a knowledge worker," said Adobe Chief Executive Officer Shantanu Narayen, in an interview. Adobe, which had been a Wall Street favorite for more than a decade, has been pummeled in the tech downturn, seeing its shares lose more than a third of their value since the start of the year. Investors have become increasingly skeptical about the dominance of Adobe's line of software for design professionals, which makes up about 60% of its revenue.Read more of this story at Slashdot.
The moment finally arrived, in the last minutes before midnight on the West Coast on Wednesday. After years of delays, discussions and frantic experimentation, the popular cryptocurrency platform Ethereum completed a long-awaited software upgrade known as the Merge, shifting to a more environmentally sustainable framework. From a report: Ethereum is arguably the most crucial platform in the crypto industry, a layer of software infrastructure that forms the basis of thousands of applications handling more than $50 billion in customer funds. The upgrade is expected to reduce Ethereum's energy consumption and set the stage for future improvements that will make the platform easier and cheaper to use. Celebrations erupted on a YouTube livestream where engineers and researchers who worked on the Merge had gathered to mark the milestone. It was a rare moment of joy in a grim year for crypto that saw a devastating market crash drain nearly $1 trillion from the industry, forcing some prominent crypto companies into bankruptcy. [...] The technical details of the Merge are mind-bendingly complex. But, ultimately, the process boils down to a shift in how cryptocurrency transactions are verified. In traditional finance, an exchange of funds involves an intermediary, like a bank, which verifies that one entity has enough money to make a payment to another. Crypto was designed to eliminate such financial gatekeepers. So, early crypto engineers had to devise an alternative system to ensure that users had the funds they claimed to have. Their solution was called "proof of work." Under that system, powerful computers run software that races to solve complex problems, verifying transactions in the process. The system is widely known as "mining" because the computers earn payments in cryptocurrency as rewards for the verification service.Read more of this story at Slashdot.
An anonymous reader quotes a report from The Register: About 40 percent of industry professionals say their organizations have reduced their usage of open source software due to concerns about security, according to a survey conducted by data science firm Anaconda. The company's 2022 State of Data Science report solicited opinions in April and May from 3,493 individuals from 133 countries and regions, targeting academics, industry professionals, and students. About 16 percent of respondents identified as data scientists. About 33 percent of surveyed industry professionals said they had not scaled back on open source, 7 percent said they had increased usage, and 20 percent said they weren't sure. The remaining 40 percent said they had. By industry professionals, or commercial respondents as Anaconda puts it, the biz means a data-science-leaning mix of business analysts, product managers, data and machine-learning scientists and engineers, standard IT folks such as systems administrators, and others in technology, finance, consulting, healthcare, and so on. And by scale back, that doesn't mean stop: 87 percent of commercial respondents said their organization still allowed the use of open source. It appears a good number of them, though, are seeking to reducing the risk from relying on too many open source dependencies. Anaconda's report found that incidents like Log4j and reports of "protestware" prompted users of open source software to take security concerns more seriously. Of the 40 percent who scaled back usage of open source, more than half did so after the Log4j fiasco. Some 31 percent of respondents said security vulnerabilities represent the biggest challenge in the open source community today. Most organizations use open source software, according to Anaconda. But among the 8 percent of respondents indicating that they don't, more than half (54 percent, up 13 percent since last year) cited security risks as the reason. Other reasons for not using open source software include: lack of understanding (38 percent); lack of confidence in organizational IT governance (29 percent); "open-source software is deemed insecure, so it's not allowed" (28 percent); and not wanting to disrupt current projects (26 percent).Read more of this story at Slashdot.
Adobe is nearing a deal to acquire Figma, a startup that makes online design collaboration tools, Bloomberg News reported Thursday, citing people with knowledge of the matter. From the report: An agreement may be announced as soon as Thursday, the people said, asking not to be identified because the information is private. The parties have been discussing a valuation of more than $15 billion for Figma, one of the people said.Read more of this story at Slashdot.
There's good news for the millions of people with federal student loans who've made payments on that debt during the Covid pandemic: many of them will be eligible to get the money back. CNBC reports: The U.S. Department of Education says that many borrowers eligible for President Joe Biden's student loan forgiveness plan who made payments on their debt during the pandemic-era pause on the bills will automatically be refunded. The relief policy has been in effect since March 2020, and is scheduled to end Dec. 31. More than 9 million people made at least one payment on their federal student debt between April 2020 and March 2022, according to the government. The vast majority of borrowers haven't made any payments, taking advantage of the suspension of the bills and accrual of interest. Payments made since March 2020 on federal student loans eligible for the pause should now be refundable, said higher education expert Mark Kantrowitz. The roughly 5 million student loan borrowers who have commercially held Federal Family Education Loans (FFEL) weren't eligible for the payment pause and won't be for the refund either. Any payments made before the pandemic also don't qualify, Kantrowitz said. Not all borrowers need to apply for the refund, said Elaine Rubin, senior contributor and communications specialist at Edvisors. The refunding process will be automatic for borrowers who are eligible for student loan forgiveness and for those who made voluntary payments during the pause that brought their balance below the maximum forgiveness amount: either $10,000 or $20,000, Rubin said. "They will be offered an automatic refund for the difference," Rubin said. If you paid your loan in full during the pandemic, however, you'll have to take action and request the payments back. Borrowers who have refinanced their federal loans will also need to ask their student loan servicer for the refund, Kantrowitz said.Read more of this story at Slashdot.
With the recent addition of Antarctica, SpaceX's Starlink satellite internet service is now available on all seven continents. PC Magazine reports: The company has shipped a Starlink dish to McMurdo Station, a US research facility based on an island right off the coast of Antarctica. In a tweet on Wednesday, the National Science Foundation said that scientists with the US Antarctic Program have been testing out the dish at the site to supply increased internet bandwidth. The Starlink dish promises to offer faster internet speeds to McMurdo Station, which previously relied on satellite internet from other providers. The broadband quality had to be shared over a 17Mbps connection for the entire research facility, which can house over 1,000 people. Starlink, on the other hand, can offer much faster broadband due to the lower orbits of the company's Starlink satellites. Download speeds can range from 50 to 200Mbps for residential users, and 100 to 350Mbps for business customers through a high-performance dish, which can also withstand extreme temperatures. To serve users in Antarctica, SpaceX has been launching batches of Starlink satellites to orbit the Earth's polar regions in an effort to beam high-speed broadband to users below, including in Alaska and northern Canada. Normally, Starlink satellites fetch the internet data by relying on ground stations on the planet's surface. But last year, SpaceX began outfitting new satellites with "laser links," which can allow them to send and receive data with each other across space. This can allow the same satellites to beam broadband without relying on a ground station below.Read more of this story at Slashdot.