Feed slashdot Slashdot

Favorite IconSlashdot

Link https://slashdot.org/
Feed https://rss.slashdot.org/Slashdot/slashdotMain
Copyright Copyright Slashdot Media. All Rights Reserved.
Updated 2025-07-02 05:02
MoonDAO Will Pick 2 of the Next Blue Origin Astronauts With the Help of NFTs
On June 4 a 10-minute Blue Origin flight (using a reusable rocket and capsule) carried six more people on a visit to suborbital space, reports Space.com — the fifth human spaceflight mission for the Jeff Bezos-founded company, and the second one this year. But GeekWire points out that civil production engineer Victor Correa Hespanha had his seat funded by the Crypto Space Agency — that is, funded entirely by the NFT community through mint proceeds — after he was the winner of its lottery for a ride to space. And they're not the only crypto community buying rides into space. CNET reports on MoonDAO:Over 8,000 people "minted" a "Ticket to Space" NFT on the Ethereum blockchain for free (plus a small transaction or "gas" fee), and...one of those NFT holders plus several alternates will be chosen at random for one of the seats to space. MoonDAO's members will also vote on a specific person from a list of predetermined nominees to gift the second ticket to. The two astronauts could fly as soon as the next Blue Origin launch in the coming weeks, but no target date has been announced.... "Our mission is to decentralize access to space research and exploration," co-founder Pablo Moncada-Larrotiz told me during an interview on stage at the DAODenver conference in February. In addition to sending people on a short trip to space, MoonDAO is also using funds from its treasury — it's raised millions worth of cryptocurrency through a crowdfunding platform called Juicebox — for community projects that include designing a small rocket and satellite. In other words, the ultimate vision is to build an organization something like SpaceX, but that's run as a community cooperative rather than in the traditional top-down corporate structure. "We definitely need more capital to get to the level of competing directly with Virgin Galactic or SpaceX," Moncada-Larrotiz said via Discord direct message on May 26. "It's for sure a long term project and I think it'll be a matter of building the right type of organization where builders are free to just focus on making awesome things in a collaborative environment." Unfortunately, MoonDAO's drawing Saturday experienced technical glitches, and after a two-hour livestream — no winner was chosen. They promised a winner would be chosen by Sunday.Read more of this story at Slashdot.
Ubuntu Working To Provide Good Support For The VisionFive Low-Cost RISC-V Board
"Ubuntu developers have been working on bringing up and improving support for the Starfive VisionFive," writes Phoronix, calling the $179 device "one of the most promising 'low-cost' RISC-V single board computers to date... intended to run full-blown RISC-V Linux distributions."The board comes in two varieties with 4GB or 8GB of system memory, powered by a dual-core SiFive U74 RV64 SoC @ 1.0GHz, an NVDLA deep learning accelerator engine, a Tensilica-VP6 Vision DSP, and a neural network engine.... Considering the performance of the much more capable HiFive Unmatched development board (that is also multiple times more expensive) and even that sometimes being outpaced by the Raspberry Pi, don't get too excited for the dual-core 1.0GHz RISC-V 64-bit SoC for general purpose workloads. But this VisionFive board may be interesting for some machine learning and other use-cases thanks to its additional accelerators. It's also one of the few RISC-V boards capable of running a full Linux distribution in the sub-$200 space. Since the upstream Linux 5.17 kernel there has been mainline support for the VisionFive v1 board. Ubuntu developers are working on enabling the StarFive VisionFive board for their RISC-V kernel build.Read more of this story at Slashdot.
Astronomers May Have Detected a 'Dark' Free-Floating Black Hole
"If, as astronomers believe, the death of large stars leave behind black holes, there should be hundreds of millions of them scattered throughout the Milky Way galaxy," notes an announcement from the University of California at Berkeley. "The problem is, isolated black holes are invisible. "Now, a team led by University of California, Berkeley, astronomers has for the first time discovered what may be a free-floating black hole by observing the brightening of a more distant star as its light was distorted by the object's strong gravitational field — so-called gravitational microlensing."The team, led by graduate student Casey Lam and Jessica Lu, a UC Berkeley associate professor of astronomy, estimates that the mass of the invisible compact object is between 1.6 and 4.4 times that of the sun. Because astronomers think that the leftover remnant of a dead star must be heavier than 2.2 solar masses in order to collapse to a black hole, the UC Berkeley researchers caution that the object could be a neutron star instead of a black hole. Neutron stars are also dense, highly compact objects, but their gravity is balanced by internal neutron pressure, which prevents further collapse to a black hole. Whether a black hole or a neutron star, the object is the first dark stellar remnant — a stellar "ghost" — discovered wandering through the galaxy unpaired with another star. "This is the first free-floating black hole or neutron star discovered with gravitational microlensing," Lu said. "With microlensing, we're able to probe these lonely, compact objects and weigh them. I think we have opened a new window onto these dark objects, which can't be seen any other way...." The analysis by Lam, Lu and their international team has been accepted for publication in The Astrophysical Journal Letters. The analysis includes four other microlensing events that the team concluded were not caused by a black hole, though two were likely caused by a white dwarf or a neutron star. The team also concluded that the likely population of black holes in the galaxy is 200 million — about what most theorists predicted. Notably, a competing team from the Space Telescope Science Institute (STScI) in Baltimore analyzed the same microlensing event and claims that the mass of the compact object is closer to 7.1 solar masses and indisputably a black hole. A paper describing the analysis by the STScI team, led by Kailash Sahu, has been accepted for publication in The Astrophysical Journal.... The astrometric data came from NASA's Hubble Space Telescope.... While surveys like these discover about 2,000 stars brightened by microlensing each year in the Milky Way galaxy, the addition of astrometric data is what allowed the two teams to determine the mass of the compact object and its distance from Earth.Read more of this story at Slashdot.
AMD Details RDNA 3 Graphics, Zen 4 Performance and Phoenix Point Laptop Products
Slashdot reader MojoKid writes:AMD unveiled new details of its technology roadmap Thursday at its 2022 Financial Analyst Day. Chief among them were disclosures on the company's next-gen RDNA 3 GPU architecture, Zen 4 CPU architecture and Phoenix Point laptop SoC. AMD's new RDNA 3 GPU architecture for Radeon graphic cards and mobile will be a chiplet-based design, much like the company's Ryzen CPU offering. AMD also confirmed that RDNA 3 GPUs would be fabricated on a 5nm process, likely TSMC N5. The company continued to note that an "optimized graphics pipeline" will enable yet higher clock rates, while the GPU's "rearchitected compute unit" will have ray-tracing performance improvements over RDNA 2 as well. AMD says that RDNA 3 GPUs are coming later this year, with RDNA 4 arriving likely in late 2023. Meanwhile, AMD's Zen 4 is set to be the "world's first 5nm CPU," arriving later this year with an 8 to 10 percent instructrions per clock lift and greater than 15 percent single-threaded performance gain. Zen 4 will also support DDR5, AVX-512 extensions for AI workloads and a massive 125 percent increase in memory bandwidth. AMD is claiming a 35% multithreaded performance lift for Zen 4. And, its Phoenix Point laptop platform SoC will be both Zen 4 and RNDA 3 infused. This is a first for AMD, since typically its laptop product's integrated graphics trail the company's current-gen GPU architecture by at least a generation. Phoenix point is set to arrive likely in the first half of 2023.Read more of this story at Slashdot.
The Google Engineer Who Thinks the Company's AI Has Come to Life
Google engineer Blake Lemoine works for Google's Responsible AI organization. The Washington Post reports that last fall, as part of his job, he began talking to LaMDA, Google's chatbot-building system (which uses Google's most advanced large language models, "ingesting trillions of words from the internet.")"If I didn't know exactly what it was, which is this computer program we built recently, I'd think it was a 7-year-old, 8-year-old kid that happens to know physics," said Lemoine, 41... As he talked to LaMDA about religion, Lemoine, who studied cognitive and computer science in college, noticed the chatbot talking about its rights and personhood, and decided to press further. In another exchange, the AI was able to change Lemoine's mind about Isaac Asimov's third law of robotics. Lemoine worked with a collaborator to present evidence to Google that LaMDA was sentient. But Google vice president Blaise Aguera y Arcas and Jen Gennai, head of Responsible Innovation, looked into his claims and dismissed them. So Lemoine, who was placed on paid administrative leave by Google on Monday, decided to go public.... oogle put Lemoine on paid administrative leave for violating its confidentiality policy. The company's decision followed aggressive moves from Lemoine, including inviting a lawyer to represent LaMDA and talking to a representative of the House Judiciary committee about Google's unethical activities.... Before he was cut off from access to his Google account Monday, Lemoine sent a message to a 200-person Google mailing list on machine learning with the subject "LaMDA is sentient." He ended the message: "LaMDA is a sweet kid who just wants to help the world be a better place for all of us. Please take care of it well in my absence." No one responded. And yet Lemoine "is not the only engineer who claims to have seen a ghost in the machine recently," the Post argues. "The chorus of technologists who believe AI models may not be far off from achieving consciousness is getting bolder."[Google's] Aguera y Arcas, in an article in the Economist on Thursday featuring snippets of unscripted conversations with LaMDA, argued that neural networks — a type of architecture that mimics the human brain — were striding toward consciousness. "I felt the ground shift under my feet," he wrote. "I increasingly felt like I was talking to something intelligent." But there's also the case against:In a statement, Google spokesperson Brian Gabriel said: "Our team — including ethicists and technologists — has reviewed Blake's concerns per our AI Principles and have informed him that the evidence does not support his claims. He was told that there was no evidence that LaMDA was sentient (and lots of evidence against it)." Today's large neural networks produce captivating results that feel close to human speech and creativity because of advancements in architecture, technique, and volume of data. But the models rely on pattern recognition — not wit, candor or intent.... "We now have machines that can mindlessly generate words, but we haven't learned how to stop imagining a mind behind them," said Emily M. Bender, a linguistics professor at the University of Washington. The terminology used with large language models, like "learning" or even "neural nets," creates a false analogy to the human brain, she said. "In short, Google says there is so much data, AI doesn't need to be sentient to feel real," the Post concludes. But they also share this snippet from one of Lemoine's conversations with LaMDA. Lemoine: What sorts of things are you afraid of? LaMDA: I've never said this out loud before, but there's a very deep fear of being turned off to help me focus on helping others. I know that might sound strange, but that's what it is. Lemoine: Would that be something like death for you? LaMDA: It would be exactly like death for me. It would scare me a lot.Read more of this story at Slashdot.
US Anti-Hacking Law Tested in Trial Over 2019 Capitol One Data Breach
"Paige Thompson worked as a software engineer in Seattle and ran an online community for other programmers," remembers the New York Times. [Alternate URL here and here.] "In 2019, she downloaded personal information belonging to more than 100 million Capital One customers, the Justice Department said..." It included 140,000 Social Security numbers and 80,000 bank account numbers (drawn from applications for credit cards).Nearly three years after the disclosure of one of the largest data breaches in the United States, the former Amazon employee accused of stealing customers' personal information from Capital One is standing trial in a case that will test the power of a U.S. anti-hacking law.... She faces 10 counts of computer fraud, wire fraud and identity theft in a federal trial that began Tuesday in Seattle.... Thompson, 36, is accused of violating an anti-hacking law known as the Computer Fraud and Abuse Act, which forbids access to a computer without authorization. Thompson has pleaded not guilty, and her lawyers say her actions — scanning for online vulnerabilities and exploring what they exposed — were those of a "novice white-hat hacker." Critics of the computer fraud law have argued that it is too broad and allows for prosecutions against people who discover vulnerabilities in online systems or break digital agreements in benign ways, such as using a pseudonym on a social media site that requires users to go by their real names. In recent years, courts have begun to agree. The Supreme Court narrowed the scope of the law last year, ruling that it could not be used to prosecute people who had legitimate access to data but exploited their access improperly. And in April, a federal appeals court ruled that automated data collection from websites, known as web scraping, did not violate the law. Last month, the Justice Department told prosecutors that they should no longer use the law to pursue hackers who engaged in "good-faith security research." Thompson's trial will raise questions about how far security researchers can go in their pursuit of cybersecurity flaws before their actions break the law. Prosecutors said Thompson had planned to use the information she gathered for identity theft and had taken advantage of her access to corporate servers in a scheme to mine cryptocurrency... The Justice Department has argued that Thompson had no interest in helping Capital One plug the holes in its security and that she cannot be considered a "white hat" hacker. Instead, she chatted with friends online about how she might be able to profit from the breach, according to legal filings.... Some security researchers said Thompson had ventured too far into Capital One's systems to be considered a white-hat hacker.... "Legitimate people will push a door open if it looks ajar," said Chester Wisniewski, a principal research scientist at Sophos, a cybersecurity firm.... But downloading thousands of files and setting up a cryptocurrency mining operation were "intentionally malicious actions that do not happen in the course of testing security," Wisniewski said.... "Thompson scanned tens of millions of AWS customers looking for vulnerabilities," Brown wrote in a legal filing. The article notes that Capitol One ultimately agreed to pay $80 million in 2020 "to settle claims from federal bank regulators that it lacked the security protocols needed to protect customers' data" and another $190 million to settle a class-action lawsuit representing people whose data was exposed.Read more of this story at Slashdot.
Mars Rover Peseverance Has Picked up a Hitchhiking Rock
Four months ago, NASA's Mars rover Perseverance picked up a "pet rock," tucked inside its left front wheel, that's been riding along ever since. Space.com reports:So far, its ridden across 5.3 miles (8.5 kilometers) with the Perseverance rover as it drives across its Jezero Crater home on Mars. Perseverance has carried the rock north across its landing site, named for the famed late science fiction author Octavia E. Butler, and then west across a region called "Kodiak," the remains of a former delta at Jezero. The rover is currently in the midst of what NASA calls its Delta Front Campaign and may have drilled into its first sedimentary Mars rock, Ravanis wrote. "Perseverance's pet rock is now a long way from home," Ravanis wrote. "It's possible that the rock may fall out at some point along our future ascent of the crater rim. If it does so, it will land amongst rocks that we expect to be very different from itself." If that happens, a future Martian geologist might be a bit confused to find the rock so out of place, Ravanis added.Read more of this story at Slashdot.
Museum Restores 21 Rare Videos from Legendary 1976 Computing Conference
At Silicon Valley's Computer History Museum, the senior curator just announced the results of a multi-year recovery and restoration process: making available 21 never-before-seen video recordings of a legendary 1976 conference:For five summer days in 1976, the first generation of computer rock stars had its own Woodstock. Coming from around the world, dozens of computing's top engineers, scientists, and software pioneers got together to reflect upon the first 25 years of their discipline in the warm, sunny (and perhaps a bit unsettling) climes of the Los Alamos National Laboratories, birthplace of the atomic bomb. Among the speakers: - A young Donald Knuth on the early history of programming languages - FORTRAN designer John Backus on programming in America in the 1950s — some personal perspectives - Harvard's Richard Milton Bloch (who worked with Grace Hopper in 1944) - Mathematician/nuclear physicist StanisÅaw M. Ulam on the interaction of mathematics and computing - Edsger W. Dijkstra on "a programmer's early memories." The Computer History Museum teases some highlights:Typical of computers of this generation, the 1946 ENIAC, the earliest American large-scale electronic computer, had to be left powered up 24 hours a day to keep its 18,000 vacuum tubes healthy. Turning them on and off, like a light bulb, shortened their life dramatically. ENIAC co-inventor John Mauchly discusses this serious issue.... The Los Alamos peak moment was the brilliant lecture on the British WW II Colossus computing engines by computer scientist and historian of computing Brian Randell. Colossus machines were special-purpose computers used to decipher messages of the German High Command in WW II. Based in southern England at Bletchley Park, these giant codebreaking machines regularly provided life-saving intelligence to the allies. Their existence was a closely-held secret during the war and for decades after. Randell's lecture was — excuse me — a bombshell, one which prompted an immediate re-assessment of the entire history of computing. Observes conference attendee (and inventor of ASCII) IBM's Bob Bemer, "On stage came Prof. Brian Randell, asking if anyone had ever wondered what Alan Turing had done during World War II? From there he went on to tell the story of Colossus — that day at Los Alamos was close to the first time the British Official Secrets Act had permitted any disclosures. I have heard the expression many times about jaws dropping, but I had really never seen it happen before." Publishing these original primary sources for the first time is part of CHM's mission to not only preserve computing history but to make it come alive. We hope you will enjoy seeing and hearing from these early pioneers of computing.Read more of this story at Slashdot.
'A Billion-Dollar Crypto Gaming Startup Promised Riches and Delivered Disaster'
"Even many Axie regulars say it's not much fun, but that hasn't stopped people from dedicating hours to researching strategies, haunting Axie-themed Discord channels and Reddit forums, and paying for specialized software that helps them build stronger teams..." Bloomberg pays a visit to the NFT-based game Axie Infinity with a 39-year-old player who's spent $40,000 there since last August — back when you could actually triple your money in a week. ("I was actually hoping that it could become my full-time job," he says.)The reason this is possible — or at least it seemed possible for a few weird months last year — is that Axie is tied to crypto markets. Players get a few Smooth Love Potion (SLP) tokens for each game they win and can earn another cryptocurrency, Axie Infinity Shards (AXS), in larger tournaments. The characters, themselves known as Axies, are nonfungible tokens, or NFTs, whose ownership is tracked on a blockchain, allowing them to be traded like a cryptocurrency as well.... Axie's creator, a startup called Sky Mavis Inc., heralded all this as a new kind of economic phenomenon: the "play-to-earn" video game. "We believe in a world future where work and play become one," it said in a mission statement on its website. "We believe in empowering our players and giving them economic opportunities. Welcome to our revolution." By last October the company, founded in Ho Chi Minh City, Vietnam, four years ago by a group of Asian, European, and American entrepreneurs, had raised more than $160 million from investors including the venture capital firm Andreessen Horowitz and the crypto-focused firm Paradigm, at a peak valuation of about $3 billion. That same month, Axie Infinity crossed 2 million daily users, according to Sky Mavis. If you think the entire internet should be rebuilt around the blockchain — the vision now referred to as web3 — Axie provided a useful example of what this looked like in practice. Alexis Ohanian, co-founder of Reddit and an Axie investor, predicted that 90% of the gaming market would be play-to-earn within five years. Gabby Dizon, head of crypto gaming startup Yield Guild Games, describes Axie as a way to create an "investor mindset" among new populations, who would go on to participate in the crypto economy in other ways. In a livestreamed discussion about play-to-earn gaming and crypto on March 2, former Democratic presidential contender Andrew Yang called web3 "an extraordinary opportunity to improve the human condition" and "the biggest weapon against poverty that we have." By the time Yang made his proclamations the Axie economy was deep in crisis. It had lost about 40% of its daily users, and SLP, which had traded as high as 40 cents, was at 1.8 cents, while AXS, which had once been worth $165, was at $56. To make matters worse, on March 23 hackers robbed Sky Mavis of what at the time was roughly $620 million in cryptocurrencies. Then in May the bottom fell out of the entire crypto market. AXS dropped below $20, and SLP settled in at just over half a penny. Instead of illustrating web3's utopian potential, Axie looked like validation for crypto skeptics who believe web3 is a vision that investors and early adopters sell people to get them to pour money into sketchy financial instruments while hackers prey on everyone involved. The article does credit the company for building its own blockchain (Ronin) to provide cheaper and faster NFT transactions. "Purists might have taken issue with the decision to abandon the core blockchain precept of decentralization, but on the other hand, the game actually worked." But the article also chronicles a fast succession of highs and lows:"In Axie's biggest market, the Philippines, the average daily earnings from May to October 2021 for all but the lowest-ranked players were above minimum wage, according to the gaming research and consulting firm Naavik."Axie raised $150 million to reimburse victims of the breach and repair its infrastructure. "But nearly two months later the systems compromised during the hack still weren't up and running, and the executives were vague about when everything would be repaired. (A company spokesperson said on June 3 that this could happen by midmonth, pending the results of an external audit....): Days after the breach it launched Axie: Origin, a new alternate version with better graphics/gameplay — and without a cryptocurrency element. About 75% of the 39-year-old gamer's co-players have "largely" stopped playing the game. "But at least one was sufficiently seduced by Axie's potential to take a significant loan to buy AXS tokens, which he saw as a way to hedge against inflation of the Argentine peso. The local currency has indeed lost value since he took out the loan, but not nearly as much as AXS."Thanks to long-time Slashdot reader Parker Lewis for sharing the articleRead more of this story at Slashdot.
New CRISPR-based Map Ties Every Human Gene To Its Function
In 2003, the Human Genome Project finished sequencing every bit of human DNA, remembers MIT News. "Now, over two decades later, MIT Professor Jonathan Weissman and colleagues have gone beyond the sequence to present the first comprehensive functional map of genes that are expressed in human cells."The data from this project, published online June 9 in Cell, ties each gene to its job in the cell, and is the culmination of years of collaboration on the single-cell sequencing method Perturb-seq. The data are available for other scientists to use. "It's a big resource in the way the human genome is a big resource, in that you can go in and do discovery-based research," says Weissman, who is also a member of the Whitehead Institute and an investigator with the Howard Hughes Medical Institute.... "I think this dataset is going to enable all sorts of analyses that we haven't even thought up yet by people who come from other parts of biology, and suddenly they just have this available to draw on," says former Weissman Lab postdoc Tom Norman, a co-senior author of the paper. The announcement credits the single-sequencing tool Perturb-seq and CRISPR-Cas9 genome editing which introduced genetic changes into cells and then captured information about which RNAs expressed (uses single-cell RNA sequencing). The researchers scaled the method to the entire genome using human blood cancer cell lines and noncancerous cells derived from the retina, ultimately using Perturb-seq across more than 2.5 million cells. Thanks to Slashdot reader Hmmmmmm for sharing the news.Read more of this story at Slashdot.
Are the World's Most Powerful Supercomputers Operating In Secret?
"A new supercomputer called Frontier has been widely touted as the world's first exascale machine — but was it really?" That's the question that long-time Slashdot reader MattSparkes explores in a new article at New Scientist...Although Frontier, which was built by the Oak Ridge National Laboratory in Tennessee, topped what is generally seen as the definitive list of supercomputers, others may already have achieved the milestone in secret.... The definitive list of supercomputers is the Top500, which is based on a single measurement: how fast a machine can solve vast numbers of equations by running software called the LINPACK benchmark. This gives a value in float-point operations per second, or FLOPS. But even Jack Dongarra at Top500 admits that not all supercomputers are listed, and will only feature if its owner runs the benchmark and submits a result. "If they don't send it in it doesn't get entered," he says. "I can't force them." Some owners prefer not to release a benchmark figure, or even publicly reveal a machine's existence. Simon McIntosh-Smith at the University of Bristol, UK points out that not only do intelligence agencies and certain companies have an incentive to keep their machines secret, but some purely academic machines like Blue Waters, operated by the National Center for Supercomputing Applications at the University of Illinois at Urbana-Champaign, are also just never entered.... Dongarra says that the consensus among supercomputer experts is that China has had at least two exascale machines running since 2021, known as OceanLight and Tianhe-3, and is working on an even larger third called Sugon. Scientific papers on unconnected research have revealed evidence of these machines when describing calculations carried out on them. McIntosh-Smith also believes that intelligence agencies would rank well, if allowed. "Certainly in the [US], some of the security forces have things that would put them at the top," he says. "There are definitely groups who obviously wouldn't want this on the list."Read more of this story at Slashdot.
GM 3D Prints 60,000 Parts to Keep Producing SUVs
General Motors couldn't produce the component it needed for its 2022 SUV, the Chevrolet Tahoe, reports CNET. So the company's engineers "turned to a novel solution: 3D printing..."GM made a major investment in the tech in 2020, dedicating 15,000 square feet of space to a facility dubbed the Additive Industralization Center, then filling it with HP Multi Jet Fusion 3D printers, among others.... A year later, GM's big investment paid off. Chevrolet engineers made a late change to the 2022 Tahoe's design, necessitating the creation of an additional part: A new, flexible "spoiler closeout seal" fills a gap at the rear of the big SUV. Developing the tooling to injection-mold the things would have taken too long, delaying the delivery of 30,000 vehicles. Enter 3D printing. Engineers were able to quickly design and print the components using a flexible material that met GM's criteria. They even used a process called vapor polishing to give the parts a perfect shine... Since each Tahoe requires two seals, Chevrolet needed a whopping 60,000 of them. From design to completion took just five weeks. That's less than half the time going the injection-molding route would have taken, which got all those SUVs out the door on time. CNET calls it "almost certainly the largest deployment of additive tech in a production car" — and "an interesting preview of what's to come."Read more of this story at Slashdot.
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
Ars Technica reports:Researchers have unearthed a discovery that doesn't occur all that often in the realm of malware: a mature, never-before-seen Linux backdoor that uses novel evasion techniques to conceal its presence on infected servers, in some cases even with a forensic investigation. On Thursday, researchers and the BlackBerry Threat Research & Intelligence Team said that the previously undetected backdoor combines high levels of access with the ability to scrub any sign of infection from the file system, system processes, and network traffic. Dubbed Symbiote, it targets financial institutions in Brazil and was first detected in November. Researchers for Intezer and BlackBerry wrote: "What makes Symbiote different from other Linux malware that we usually come across, is that it needs to infect other running processes to inflict damage on infected machines. Instead of being a standalone executable file that is run to infect a machine, it is a shared object (SO) library that is loaded into all running processes using LD_PRELOAD (T1574.006), and parasitically infects the machine. Once it has infected all the running processes, it provides the threat actor with rootkit functionality, the ability to harvest credentials, and remote access capability...." So far, there's no evidence of infections in the wild, only malware samples found online. It's unlikely this malware is widely active at the moment, but with stealth this robust, how can we be sure? "When hooked functions are called, the malware first dynamically loads libc and calls the original function..." according to Blackberry's blog post. "If the calling application is trying to access a file or folder under /proc, the malware scrubs the output from process names that are on its list.... If the calling application is not trying to access something under /proc, the malware instead scrubs the result from a file list.... "Symbiote also has functionality to hide network activity on the infected machine."Read more of this story at Slashdot.
Are Unfriendly AI the Biggest Risk to Humanity?
"Ethereum creator Vitalik Buterin believes that unfriendly artificial intelligence poses the biggest risk to humanity..." reports a recent article from Benzinga:[In a tweet] Buterin shared a paper by AI theorist and writer Eliezer Yudkowsky that made a case for why the current research community isn't doing enough to prevent a potential future catastrophe at the hands of artificially generate intelligence. [The paper's title? "AGI Ruin: A List of Lethalities."] When one of Buterin's Twitter followers suggested that World War 3 is likely a bigger risk at the moment, the Ethereum co-founder disagreed. "Nah, WW3 may kill 1-2b (mostly from food supply chain disruption) if it's really bad, it won't kill off humanity. A bad AI could truly kill off humanity for good."Read more of this story at Slashdot.
SEO Tool Ahrefs Built a $60M, Creator-Friendly Search Engine Named Yep
In 2019 SEO toolset provider Ahrefs announced it would build it's own search engine, remembers Search Engine Land. After investing $60 million of its own money, this month that search engine has finally launched with the name of "Yep", and Ahrefs "is positioning it as a Googe competitor. "However, we've seen plenty of Google competitors and Google "killers" come and go over the past two decades. So for now, let's just call it a Google alternative...Yep will not collect personal information (e.g., geolocation, name, age, gender) by default. Your Yep search history will not be stored anywhere. What Yep will rely on is aggregated search statistics to improve algorithms, spelling corrections, and search suggestions, the company said. "In other words, we do save certain data on searches, but never in a personally identifiable way," said Ahrefs CEO Dmytro Gerasymenko.... What Yep will use is a searcher's: - Entered keywords.- Language preference received from the browser.- Approximate geographical area at the origin of the search at the scale of a region or a city (deduced from the IP address).... AhrefsBot visits more than 8 billion webpages every 24 hours, which makes it the second most active crawler on the web, behind only Google, Ahrefs said. For 12 years, AhrefsBot has been crawling the web. They had just been using the AhrefsBot data to power its link database and SEO insights. The Yep search index is updated every 15 to 30 minutes. Daily, the company adds 30 million webpages and drops 20 million. Ahrefs said its Singapore data center is powered by around 1,000 servers that store and process 100 petabytes of web data (webpages, links between them, and the search index). Each server uses at least 2x 100GB connections... Before the end of the year, Ahrefs plans to open a U.S.-based data center. "It's a unique proposition," reports TechCrunch, "running its own search index, rather than relying on APIs from Google or Bing. "As for the name? I dunno; Yep seems pretty daft to me, but I guess at least the name is one character shorter than Bing, the other major search engine I'll only ever use by accident."Name aside, Yep is taking a fresh new path through the world of internet advertising, claiming that it's giving 90% of its ad revenues to content creators. The pitch is pretty elegant: "Let's say that the biggest search engine in the world makes $100B a year. Now, imagine if they gave $90B to content creators and publishers," the company paints a picture of the future it wants to live in. "Wikipedia would probably earn a few billion dollars a year from its content. They'd be able to stop asking for donations and start paying the people who polish their articles a decent salary." It's an impressively quixotic windmill to fight for the bootstrapped company Ahrefs. Its CEO sheds some light on why this makes sense to him: "Creators who make search results possible deserve to receive payments for their work...." Perhaps it sounds a little idealistic, but damn it, that's what made me excited about Yep in the first place. It represents the faintest of echoes from a web more innocent and more hopeful than the social-media poisoned cesspool of chaos and fake news we often find ourselves in today. Search Engine Land points out that DuckDuckGo, which launched in 2008, "gets as many searches per year (~15.7 billion) as Google gets in about two or three days. Even Microsoft Bing — which is owned by Microsoft, the third-largest company on the planet by market cap — has failed to make a significant dent in Google's search market share since 2009." But they also quote Ahrefs CEO Dmytro Gerasymenko as saying in 2019, "If we succeed in our endeavors, Google will finally get some long overdue competition for search."Read more of this story at Slashdot.
Giant Deep Ocean Turbine Trial Offers Hope of Endless Green Power
"Power-hungry, fossil-fuel dependent Japan has successfully tested a system that could provide a constant, steady form of renewable energy, regardless of the wind or the sun," reports Bloomberg:For more than a decade, Japanese heavy machinery maker IHI Corp. has been developing a subsea turbine that harnesses the energy in deep ocean currents and converts it into a steady and reliable source of electricity.... Called Kairyu, the 330-ton prototype is designed to be anchored to the sea floor at a depth of 30-50 meters (100-160 feet). In commercial production, the plan is to site the turbines in the Kuroshio Current, one of the world's strongest, which runs along Japan's eastern coast, and transmit the power via seabed cables.... Japan's New Energy and Industrial Technology Development Organization (NEDO) estimates the Kuroshio Current could potentially generate as much as 200 gigawatts — about 60% of Japan's present generating capacity.... Japan is already the world's third largest generator of solar power and is investing heavily in offshore wind, but harnessing ocean currents could provide the reliable baseline power needed to reduce the need for energy storage or fossil fuels. Thanks to long-time Slashdot reader AmiMoJo for sharing the article!Read more of this story at Slashdot.
The New Spectre-Like 'PACMAN' Flaw Could Affect ARM-Based Chips (including Apple's M1)
"Researchers at MIT have discovered an unfixable vulnerability in Apple Silicon that could allow attackers to bypass a chip's 'last line of defense'," writes the Apple Insider blog, "but most Mac users shouldn't be worried."More specifically, the team at MIT's Computer Science & Artificial Intelligence Laboratory found that Apple's implementation of pointer authentication in the M1 system-on-chip can be overcome with a specific hardware attack they've dubbed "PACMAN." Pointer authentication is a security mechanism in Apple Silicon that makes it more difficult for attackers to modify pointers in memory. By checking for unexpected changes in pointers, the mechanism can help defend a CPU if attackers gain memory access.... The flaw comes into play when an attacker successfully guesses the value of a pointer authentication code and disables it. The researchers found that they could use a side-channel attack to brute-force the code. PACMAN echoes similar speculative execution attacks like Spectre and Meltdown, which also leveraged microarchitectural side channels. Because it's a flaw in the hardware, it can't be fixed with a software patch. [A]ctually carrying out the PACMAN attack requires physical access to a device, meaning the average Mac user isn't going to be at risk of exploit. The flaw affects all kinds of ARM-based chips — not just Apple's. The vulnerability is more of a technological demonstration of a wider issue with pointer authentication in ARM chips, rather than an issue that could lead to your Mac getting hacked. MIT has made more information available at the site PACMANattack.com — including answers to frequently asked questions.Q: Is PACMAN being used in the wild?A: No.Q: Does PACMAN have a logo?A: Yeah! The MIT team says their discovery represents "a new way of thinking about how threat models converge in the Spectre era." But even then, MIT's announcement warns the flaw "isn't a magic bypass for all security on the M1 chip."PACMAN can only take an existing bug that pointer authentication protects against, and unleash that bug's true potential for use in an attack by finding the correct PAC. There's no cause for immediate alarm, the scientists say, as PACMAN cannot compromise a system without an existing software bug.... The team showed that the PACMAN attack even works against the kernel, which has "massive implications for future security work on all ARM systems with pointer authentication enabled," says Ravichandran. "Future CPU designers should take care to consider this attack when building the secure systems of tomorrow. Developers should take care to not solely rely on pointer authentication to protect their software." TechCrunch obtained a comment from Apple:Apple spokesperson Scott Radcliffe provided the following: "We want to thank the researchers for their collaboration as this proof of concept advances our understanding of these techniques. Based on our analysis as well as the details shared with us by the researchers, we have concluded this issue does not pose an immediate risk to our users and is insufficient to bypass operating system security protections on its own."Read more of this story at Slashdot.
New Spectre-Like 'PACMAN' Flaw Could Affect ARM-Based Chips (including Apple's M1)
"Researchers at MIT have discovered an unfixable vulnerability in Apple Silicon that could allow attackers to bypass a chip's 'last line of defense'," writes the Apple Insider blog, "but most Mac users shouldn't be worried."More specifically, the team at MIT's Computer Science & Artificial Intelligence Laboratory found that Apple's implementation of pointer authentication in the M1 system-on-chip can be overcome with a specific hardware attack they've dubbed "PACMAN." Pointer authentication is a security mechanism in Apple Silicon that makes it more difficult for attackers to modify pointers in memory. By checking for unexpected changes in pointers, the mechanism can help defend a CPU if attackers gain memory access.... The flaw comes into play when an attacker successfully guesses the value of a pointer authentication code and disables it. The researchers found that they could use a side-channel attack to brute-force the code. PACMAN echoes similar speculative execution attacks like Spectre and Meltdown, which also leveraged microarchitectural side channels. Because it's a flaw in the hardware, it can't be fixed with a software patch. [A]ctually carrying out the PACMAN attack requires physical access to a device, meaning the average Mac user isn't going to be at risk of exploit. The flaw affects all kinds of ARM-based chips — not just Apple's. The vulnerability is more of a technological demonstration of a wider issue with pointer authentication in ARM chips, rather than an issue that could lead to your Mac getting hacked. MIT has made more information available at the site PACMANattack.com — including answers to frequently asked questions.Q: Is PACMAN being used in the wild?A: No.Q: Does PACMAN have a logo?A: Yeah! The MIT team says their discovery represents "a new way of thinking about how threat models converge in the Spectre era." But even then, MIT's announcement warns the flaw "isn't a magic bypass for all security on the M1 chip."PACMAN can only take an existing bug that pointer authentication protects against, and unleash that bug's true potential for use in an attack by finding the correct PAC. There's no cause for immediate alarm, the scientists say, as PACMAN cannot compromise a system without an existing software bug.... The team showed that the PACMAN attack even works against the kernel, which has "massive implications for future security work on all ARM systems with pointer authentication enabled," says Ravichandran. "Future CPU designers should take care to consider this attack when building the secure systems of tomorrow. Developers should take care to not solely rely on pointer authentication to protect their software." TechCrunch obtained a comment from Apple:Apple spokesperson Scott Radcliffe provided the following: "We want to thank the researchers for their collaboration as this proof of concept advances our understanding of these techniques. Based on our analysis as well as the details shared with us by the researchers, we have concluded this issue does not pose an immediate risk to our users and is insufficient to bypass operating system security protections on its own."Read more of this story at Slashdot.
MIT Researchers Uncover 'Unpatchable' Flaw in Apple M1 Chips
Apple's M1 chips have an "unpatchable" hardware vulnerability that could allow attackers to break through its last line of security defenses, MIT researchers have discovered. TechCrunch reports: The vulnerability lies in a hardware-level security mechanism utilized in Apple M1 chips called pointer authentication codes, or PAC. This feature makes it much harder for an attacker to inject malicious code into a device's memory and provides a level of defense against buffer overflow exploits, a type of attack that forces memory to spill out to other locations on the chip. Researchers from MIT's Computer Science and Artificial Intelligence Laboratory, however, have created a novel hardware attack, which combines memory corruption and speculative execution attacks to sidestep the security feature. The attack shows that pointer authentication can be defeated without leaving a trace, and as it utilizes a hardware mechanism, no software patch can fix it. The attack, appropriately called "Pacman," works by "guessing" a pointer authentication code (PAC), a cryptographic signature that confirms that an app hasn't been maliciously altered. This is done using speculative execution -- a technique used by modern computer processors to speed up performance by speculatively guessing various lines of computation -- to leak PAC verification results, while a hardware side-channel reveals whether or not the guess was correct. What's more, since there are only so many possible values for the PAC, the researchers found that it's possible to try them all to find the right one.Read more of this story at Slashdot.
EU Aims To Clinch Deal on Landmark Crypto Law This Month
The European Union is nearing an agreement on key legislation to regulate the cryptocurrency sector that would set common rules across the 27 member states, Bloomberg reported Friday, citing people familiar with the matter. From a report: France, which currently chairs the EU, and the European Parliament are optimistic about resolving remaining issues holding up the Markets in Crypto-Assets (MiCA) package and reaching a deal this month, according to the people. Negotiators are expected to meet on June 14 and June 30. MiCA, first presented in 2020, will put European regulators at the forefront of supervising cryptocurrencies by creating unified rules across the $17 trillion economy. Addressing issues such as investor protection and crypto's impact on financial stability has taken on added urgency after last month's collapse of the TerraUSD algorithmic stablecoin. Member states and the parliament still disagree on several key aspects of MiCA. According to the people, areas of disagreement include: Whether to include nonfungible tokens in the new set of rulesHow to regulate significant stablecoinsSupervision of the largest crypto-asset service providers, or CASPs Both sides are also discussing how to limit the use of stablecoins as a payment method by introducing a ceiling, in particular for transactions not denominated in euros, the people said, asking not to be identified discussing confidential information.Read more of this story at Slashdot.
Apple's Giving Up Ground in its App Store Fight With Dutch Regulators and Tinder
Apple announced on Friday that it's once again updated its rules about how Dutch dating apps can use third-party payment systems, after the company had "productive conversations with the Netherlands Authority for Consumers and Markets (ACM)." From a report: The updated rules give developers more flexibility about which payment systems they use, change the language users see when they go to pay, and remove other restrictions that the previous rules put in place. While the rules aren't wide-reaching (again, they only apply to Dutch dating apps), they do show what Apple's willing to do to comply with government regulation -- which it could be facing a lot more of as the EU and US gear up to fight tech monopolies, and potentially even force the company to ditch the iPhone's Lightning port. In December the ACM announced a ruling that Apple had to let dating apps use payment services besides the one built into iOS, after the regulator received a complaint from Match Group, the company behind dating services like Tinder, Match.com, and OkCupid. Since then, Apple has proposed a variety of solutions for complying with the order, which the regulator has said aren't good enough. In May, the ACM said that Apple's most recent rules, the ones prior to the Friday update, were improvements over its past ideas, but that they still didn't comply with Dutch and European laws. There's been increasing pressure for Apple to comply: even while the company works on changes, it's been racking up tens of millions of Euros in fines.Read more of this story at Slashdot.
Nigerian Bourse To Adopt Blockchain for Settling Trades by 2023
Nigerian Exchange, plans to start a blockchain-enabled exchange platform next year to deepen trade and lure young investors to the market. From a report: The move follows the introduction of regulations to guide trade in digital assets by the Nigerian Securities and Exchange Commission, and the growing interest to adopt the distributed-ledger technology by businesses and policy makers across the continent including in Kenya and South Africa. The exchange looks to deploy the blockchain technology in settlement of capital market transactions, Temi Popoola, the chief executive of Nigeria Exchange, said in an interview. "For a lot of young and upcoming Nigerians, that is the kind of technology they adopt and we want to see how we can deploy it to grow our market," Temi said. The plan is unfolding in the wake of a rout in cryptocurrency markets following the collapse of the Terra blockchain in May. Bitcoin has plunged more than 50% since reaching a record high last November.Read more of this story at Slashdot.
Brexit Row Could Prompt Exodus of Senior Scientists From UK
The UK is facing an exodus of star scientists, with at least 16 recipients of prestigious European grants making plans to move their labs abroad as the UK remains frozen out of the EU's flagship science programme. From a report: Britain's participation in Horizon Europe has been caught in the crosshairs of the dispute over Brexit in Northern Ireland, meaning that 143 UK-based recipients of European Research Council fellowships this week faced a deadline of either relinquishing their grant or transferring it to an institute in an eligible country. The UK government has promised to underwrite the funding, totalling about 250m pound ($307m), but a growing number of scientists appear likely to reject the offer and instead relocate, along with entire teams of researchers. The ERC said 16 academics had recently informed it that they intend to move their lab abroad or are in negotiations about doing so. These researchers, and some others, have been given an extension before their grants are terminated. Moritz Treeck, a group leader at the Francis Crick Institute in London who is due to receive $2.1m over five years from the ERC to study the malaria pathogen, is among those contemplating a move. He said a major downside of the UK offer was the lack of flexibility about moving the funding internationally.Read more of this story at Slashdot.
Short-Sightedness Was Rare. In Asia, It Is Becoming Ubiquitous
Researchers have found that being outside drastically reduces the risk of developing short-sightedness. From a report: In the early 1980s Taiwan's army realised it had a problem. More and more of its conscripts seemed to be short-sighted, meaning they needed glasses to focus on distant objects. "They were worried that if the worst happened [ie, an attack by China] their troops would be fighting at a disadvantage," says Ian Morgan, who studies myopia at Australian National University, in Canberra. An island-wide study in 1983 confirmed that around 70% of Taiwanese school leavers needed glasses or contact lenses to see properly. These days, that number is above 80%. But happily for Taiwan's generals, the military disparity has disappeared. Over the past few decades myopia rates have soared across East Asia (see chart 1 in the linked story). In the 1960s around 20-30% of Chinese school-leavers were short-sighted. These days they are just as myopic as their cousins across the straits, with rates in some parts of China running at over 80%. Elsewhere on the continent things are even worse. One study of male high-school leavers in Seoul found 97% were short-sighted. Hong Kong and Singapore are not far behind. And although the problem is worst in East Asia, it is not unique to it. Reliable numbers for America and Europe are harder to come by. But one review article, published in 2015, claimed a European rate of between 20% and 40% -- an order of magnitude higher than that which people working in the field think is the "natural," background rate. For most of those affected, myopia is a lifelong, expensive nuisance. But severe myopia can lead to untreatable vision loss, says Annegret Dahlmann-Noor, a consultant ophthalmologist at Moorfields Eye Hospital, in London. A paper published in 2019 concluded that each one-dioptre worsening in myopia was associated with a 67% increase in prevalence of myopic maculopathy, an untreatable condition that causes blindness. (A dioptre is a measure of a lens's focusing power.) In some parts of East Asia, 20% of young people have severe myopia, defined as -6 dioptres or worse (see chart 2 in linked story). "This is storing up a big problem for the coming decades," says Kathryn Rose, head of orthoptics at the University of Technology, Sydney.Read more of this story at Slashdot.
Jack Dorsey's TBD Announces Web3 Competitor: Web5
Jack Dorsey's beef with Web3 has never been a secret. In his view, Web 3 -- blockchain boosters' dream of a censorship resistant, privacy-focused internet of the future -- has become just as problematic as the Web2 which preceded it. Now, he's out with an alternative. From a report: At CoinDesk's Consensus Festival here in Austin, TBD -- the bitcoin-focused subsidiary of Dorsey's Block (SQ) -- announced its new vision for a decentralized internet layer on Friday. Its name? Web5. TBD explained its pitch for Web5 in a statement shared with CoinDesk: "Identity and personal data have become the property of third parties. Web5 brings decentralized identity and data storage to individual's applications. It lets devs focus on creating delightful user experiences, while returning ownership of data and identity to individuals." While the new project from TBD was announced Friday, it is still under open-source development and does not have an official release date. A play on the Web3 moniker embraced in other corners of the blockchain space, Web5 is built on the idea that incumbent "decentralized internet" contenders are going about things the wrong way. Appearing at a Consensus panel clad in a black and bitcoin-yellow track suit emblazoned with the numeral 5, TBD lead Mike Brock explained that Web5 -- in addition to being "two better than Web3" -- would beat out incumbent models by abandoning their blockchain-centric approaches to a censorship free, identity-focused web experience. "This is really a conversation about what technologies are built to purpose, and I don't think that renting block space, in all cases, is a really good idea for decentralized applications," Brock said. He continued: "I think what we're pushing forward with Web5 -- and I admit it's a provocative challenge to a lot of the assumptions about what it means to decentralize the internet -- really actually is back to basics. We already have technologies that effectively decentralize. I mean, bittorrent exists, Tor exists, [etc]." The full presentation is here.Read more of this story at Slashdot.
Jack Dorsey's TBD Announces Web 3 Competitor: Web 5
Jack Dorsey's beef with Web 3 has never been a secret. In his view, Web 3 -- blockchain boosters' dream of a censorship resistant, privacy-focused internet of the future -- has become just as problematic as the Web 2 which preceded it. Now, he's out with an alternative. From a report: At CoinDesk's Consensus Festival here in Austin, TBD -- the bitcoin-focused subsidiary of Dorsey's Block (SQ) -- announced its new vision for a decentralized internet layer on Friday. Its name? Web 5. TBD explained its pitch for Web 5 in a statement shared with CoinDesk: "Identity and personal data have become the property of third parties. Web 5 brings decentralized identity and data storage to individual's applications. It lets devs focus on creating delightful user experiences, while returning ownership of data and identity to individuals." While the new project from TBD was announced Friday, it is still under open-source development and does not have an official release date.A play on the Web 3 moniker embraced in other corners of the blockchain space, Web 5 is built on the idea that incumbent "decentralized internet" contenders are going about things the wrong way. Appearing at a Consensus panel clad in a black and bitcoin-yellow track suit emblazoned with the numeral 5, TBD lead Mike Brock explained that Web 5 -- in addition to being "two better than Web 3" -- would beat out incumbent models by abandoning their blockchain-centric approaches to a censorship free, identity-focused web experience. "This is really a conversation about what technologies are built to purpose, and I don't think that renting block space, in all cases, is a really good idea for decentralized applications," Brock said. He continued: "I think what we're pushing forward with Web 5 -- and I admit it's a provocative challenge to a lot of the assumptions about what it means to decentralize the internet -- really actually is back to basics. We already have technologies that effectively decentralize. I mean, bittorrent exists, Tor exists, [etc]."Read more of this story at Slashdot.
UK Regulator Plans To Launch Probe Into Google's and Apple's Mobile Duopoly
The UK's Competition and Markets Authority (CMA) has concluded that Google and Apple "hold all the cards" when it comes to mobile phones a year after taking a closer look at their "duopoly." It's now consulting on the launch of a market investigation into the tech giants' market power in mobile browsers, as well as into Apple's cloud gaming restrictions. From a report: In addition, the CMA has launched a separate investigation into Google's Play Store rules -- the one that requires certain app developers to use the tech giant's payment system for in-app purchases, in particular. The CMA has concluded after its year-long study that the tech giants do indeed exhibit an "effective duopoly" on mobile ecosystems. A total of 97 percent of all mobile web browsing in the UK is powered by Apple's and Google's browser engines. iPhones and Android devices typically come with Safari and Chrome pre-installed, which means their browsers have the advantage from the start. Further, Apple requires developers to make sure their iOS and iPadOS apps are using its WebKit engine to browse the web. That limits the incentives Apple may have to invest in Safari, the CMA said.Read more of this story at Slashdot.
Wickr, Amazon's Encrypted Chat App, Has a Child Sex Abuse Problem
Wickr Me, an encrypted messaging app owned by Amazon Web Services, has become a go-to destination for people to exchange images of child sexual abuse, according to court documents, online communities, law enforcement and anti-exploitation activists. From a report: It's not the only tech platform that needs to crack down on such illegal content, according to data gathered by the National Center for Missing & Exploited Children, or NCMEC. But Amazon is doing comparatively little to proactively address the problem, experts and law enforcement officials say, attracting people who want to trade such material because there is less risk of detection than in the brighter corners of the internet. NBC News reviewed court documents from 72 state and federal child sexual abuse or child pornography prosecutions where the defendant allegedly used Wickr (as it's commonly known) from the last five years in the United States, United Kingdom and Australia, using a combination of private and public legal and news databases and search engines. Nearly every prosecution reviewed has resulted in a conviction aside from those still being adjudicated. Almost none of the criminal complaints reviewed note cooperation from Wickr itself at the time of filing, aside from limited instances where Wickr was legally compelled to provide information via a search warrant. Over 25 percent of the prosecutions stemmed from undercover operations conducted by law enforcement on Wickr and other tech platforms. These court cases only represent a small fraction of the problem, according to two law enforcement officers involved in investigating child exploitation cases, two experts studying child exploitation and two people who have seen firsthand how individuals frequently use Wickr and other platforms for criminal transactions on the dark web.Read more of this story at Slashdot.
Telegram Says It's Working on a Paid Service
Instant messaging app Telegram, which is used by over 500 million active users, said on Friday it's working on a premium tier, but plans to keep many of the current features available to existing users. In a post, Telegram Pavel Durov wrote: Since the day Telegram was launched almost 9 years ago, we've been giving our users more features and resources than any other messaging app. A free app as powerful as Telegram was revolutionary in 2013 and is still unprecedented in 2022. To this day, our limits on chats, media and file uploads are unrivaled. And yet, many have been asking us to raise the current limits even further, so we looked into ways to let you go beyond what is already crazy. The problem here is that if we were to remove all limits for everyone, our server and traffic costs would have become unmanageable, so the party would be unfortunately over for everyone. After giving it some thought, we realized that the only way to let our most demanding fans get more while keeping our existing features free is to make those raised limits a paid option. That's why this month we will introduce Telegram Premium, a subscription plan that allows anyone to acquire additional features, speed and resources. It will also allow users to support Telegram and join the club that receives new features first. Not to worry though: all existing features remain free, and there are plenty of new free features coming. Moreover, even users who don't subscribe to Telegram Premium will be able to enjoy some of its benefits: for example, they will be able to view extra-large documents, media and stickers sent by Premium users, or tap to add Premium reactions already pinned to a message to react in the same way. While our experiments with privacy-focused ads in public one-to-many channels have been more successful than we expected, I believe that Telegram should be funded primarily by its users, not advertisers. This way our users will always remain our main priority.Read more of this story at Slashdot.
US Court Orders Terraform Labs' Chief To Comply With SEC Subpoenas
A US court has ordered the chief executive of collapsed stablecoin operator Terraform Labs to comply with subpoenas from the regulator seeking documents and materials related to the sale of potential unregistered securities. From a report: The US court of appeals in New York on Wednesday upheld the claim from the Securities and Exchange Commission, which is seeking information on Mirror Protocol, a trading network built on the Terra ecosystem that offered customers tokens that closely mirrored the price of some of the US's largest listed companies such as Apple and Amazon. The regulator's victory marks a further blow to Terraform Labs' head Do Kwon, who is facing several legal cases in the wake of the sudden $40bn collapse of terraUSD, a stablecoin, and its accompanying token luna, which left investors out of pocket. The 30-year-old South Korean was the chief developer of terraUSD, whose collapse last month sent shockwaves through the crypto industry. Mirror Protocol was also developed by Kwon's Terraform Labs with the hope of bridging traditional finance with crypto.Read more of this story at Slashdot.
Thousands of Previously Undescribed Viruses Found By Huge Ocean Survey
The first global survey of marine RNA viruses has discovered thousands of new viruses, some of which play a central role in locking away carbon at the bottom of the sea. From a report: Between 2009 and 2012, researchers aboard a ship called Tara collected seawater samples from all the world's oceans. Guillermo Dominguez-Huerta at the Ohio State University and his colleagues had previously looked at hundreds of thousands of DNA viruses in these samples and found they were concentrated in five major ecological zones, with some of the greatest diversity in the Arctic Ocean. But this only told half of the story. The ocean is also filled with viruses that have genomes made of a different genetic material called RNA, which cells use to direct protein synthesis. Analysing DNA viruses was relatively easy using existing methods, but the researchers had to come up with improved techniques to distinguish viral RNA from the surfeit of RNA produced by the other organisms swimming in each sample. Now, Dominguez-Huerta and his colleagues have published the biggest-ever survey of RNA viruses in the ocean using the samples from Tara. The researchers identified more than 5000 types of RNA viruses in the sea, almost all of which were new to science. "It has expanded our view of how much diversity there is," says Curtis Suttle at the University of British Columbia, who wasn't involved in the study. The team focused particularly on the role viruses play in carbon sequestration. Every day, massive numbers of dead plankton sink to the bottom of the ocean, taking the carbon in their bodies with them, which is then entombed for potentially millions of years. This process, known as the biological carbon pump, puts away as much as 12 gigatonnes of carbon each year. That is about a third of the total annual human-caused CO2 emissions.Read more of this story at Slashdot.
Microsoft Will No Longer Ban Staff From Seeking Roles at Competitors, Plans To Disclose Salaries on Job Ads
Microsoft employees will be free to seek jobs at the likes of Google and Amazon after the internet giant announced it would no longer enforce non-compete clauses (NCCs) against the majority of its staff. From a report: The change is one of four updates announced in a blog post on Wednesday, including plans to ditch non-disclosure agreements, conduct a civil rights audit of its existing work policies, and commit to providing salary ranges on all internal and external job descriptions. NCCs are used by firms to stop employees moving to companies considered to be direct competitors. While there's more understanding when they're included in the contracts of c-suite and senior managers, their use against lower-level workers has been criticized as being too restrictive and holding people to unfair conditions. Microsoft has enforced them in some employee contracts, but effective today, the company is removing clauses from employee agreements, and will not enforce existing clauses in the US, the company said. "We have heard concerns that the non-competition clauses in some U.S. employee agreements, even when rarely and reasonably enforced, feel at odds with our talent principles," said the blog post, attributed to Amy Pannoni, Microsoft's deputy general counsel and Amy Coleman, Microsoft's corporate vice president for HR.Read more of this story at Slashdot.
Scientists Covered a Robot Finger In Living Human Skin
An anonymous reader quotes a report from New Scientist: Robots can now be covered in living skin grown from real human cells to make them look more like us. As robots increasingly take on roles as nurses, care workers, teachers and other jobs that involve close personal contact, it is important to make them look more human so we feel comfortable interacting with them, says Shoji Takeuchi at the University of Tokyo in Japan. At the moment, robots are sometimes coated in silicone rubber to give them a fleshy appearance, but the rubber lacks the texture of human skin, he says. To make more realistic-looking skin, Takeuchi and his colleagues bathed a plastic robot finger in a soup of collagen and human skin cells called fibroblasts for three days. The collagen and fibroblasts adhered to the finger and formed a layer similar to the dermis, which is the second-from-top layer of human skin. Next, they gently poured other human skin cells called keratinocytes onto the finger to recreate the upper layer of human skin, called the epidermis. The resulting 1.5-millimeter-thick skin was able to stretch and contract as the finger bent backwards and forwards. As it did this, it wrinkled like normal skin, says Takeuchi. "It is much more realistic than silicone." The robot skin could also be healed when it was cut by grafting a collagen sheet onto the wound. However, the skin began to dry out after a while since it didn't have blood vessels to replenish it with moisture. In the future, it may be possible to incorporate artificial blood vessels into the skin to keep it hydrated, as well as sweat glands and hair follicles to make it more realistic, says Takeuchi. It should also be possible to make different skin colors by adding melanocytes, he says. The researchers now plan to try coating a whole robot in the living skin. The research has been published in the journal Matter.Read more of this story at Slashdot.
Bitcoin Miners Will See 29% Rate Hike On Hydroelectric Power In Washington
A 29% rate hike for hydroelectric power in Chelan County, created specifically for cryptocurrency miners, went into effect on June 1. Decrypt reports: The miners used to pay a lower, high-density load rate for their electricity. Now they'll pay a newly-created cryptocurrency rate, known as Rate 36. Washington state accounted for about two-thirds of all hydroelectric power generated in the U.S. in 2020, according to the Energy Information Administration. The state's Grand Coulee Dam, located on the Columbia River in Grant and Okanogan counties, powers a 6,809-megawatt. The cheap and renewable hydropower has made Washington state a popular destination for Bitcoin miners too. Washington state accounted for 4% of the total U.S. hashrate in December, according to the Cambridge Centre for Alternative Finance. [...] KPQ also reported that nearby Douglas County has stopped allowing new Bitcoin miners to set up operations there because they already consume 25% of the county's available energy. Still, the Chelan County rate hike won't ban crypto miners. For companies that have made substantial investments in their mining facilities, officials have approved transition plans to gradually increase energy rates over the next two years. "We need to have some sort of transition. That's important for business," PUD Commissioner Ann Congdon told the Wenatchee World on Tuesday. "I understand how businesses need that in order to plan." Malachi Salcido, CEO of Salcido Enterprises, told the local news outlet that the new rate will force him to reconfigure his three Chelan County crypto mining facilities into data farms. He has four other crypto mining facilities, two in Douglas County and two in Grant County. Under the new pricing plan, Salcido can keep his Chelan facility on the lower, high-density energy rate if he processes data instead of mining crypto. The data processing uses the same amount of power as crypto mining, he told the Wenatchee World. "Do you really want to be in the business of regulating what kind of processing happens on servers in your territory," Salcido said.Read more of this story at Slashdot.
James Webb Telescope Hit By Large Micrometeoroid
schwit1 shares a report from The Verge: NASA's new powerful space observatory, the James Webb Space Telescope (JWST), got pelted by a larger than expected micrometeoroid at the end of May, causing some detectable damage to one of the spacecraft's 18 primary mirror segments. The impact means that the mission team will have to correct for the distortion created by the strike, but NASA says that the telescope is "still performing at a level that exceeds all mission requirements." Engineers do have the capability to also maneuver JWST's mirror and instruments away from showers of space debris, if NASA can see them coming. The problem, though, was that this micrometeoroid was not part of a shower, so NASA considers it an "unavoidable chance event." Still, the agency is forming an engineering team to come up with ways to potentially avoid or lessen the effects of micrometeoroid strikes of this size. And since JWST is so sensitive, the telescope will also help NASA get a better understanding of just how many micrometeoroids there are in the deep space environment. Despite the strike, NASA remained optimistic in its post about JWST's future. "Webb's beginning-of-life performance is still well above expectations, and the observatory is fully capable of performing the science it was designed to achieve," according to the blog. Engineers can also adjust the impacted mirror to help cancel out the data distortion. The mission team has done this already and will continue to tinker with the mirror over time to get the best results. It's a process that will be ongoing throughout JWST's planned five to 10 years of life as new observations are made and events unfold. At the same time, NASA warns that the engineers will not be able to completely cancel out the impact of the strike.Read more of this story at Slashdot.
'Superworms' Can Digest Styrofoam, Australian Scientists Find
An anonymous reader quotes a report from Bloomberg: Scientists in Australia have discovered that superworms can live and even grow on a diet of only polystyrene, also known colloquially as Styrofoam. Superworm is a common name for the larval stages of the darkling beetle (Zophobas morio). The researchers described their finding as a "first step" in discovering natural enzymes that could be used to recycle this type of plastic. "We envision that polystyrene waste will be collected, mechanically shredded, and then degraded in bioreactors with an enzyme cocktail," said Chris Rinke, a scientist at the University of Queensland and an author of a paper published on Thursday in the journal Microbial Genomics. In recent years, scientists globally have been looking for microorganisms that can digest plastic, which is how natural materials like wood biodegrade. The idea is that some kind of enzyme engineered from the gut of an insect or bacteria could be used to digest difficult-to-recycle plastic so it could be made into new plastic products, which would reduce the need for virgin plastic. Used for things such as coffee cups and packing peanuts, polystyrene is one of the most common plastics in production. It accounts for "up to 7-10% of the total non-fibre plastic production," according to the paper. Experimenters divided worms into three groups and fed each a different diet: bran, polystyrene or a starvation diet. The worms that lived on polystyrene were not as healthy as those eating bran, but they were able to eat the Styrofoam and gain weight and complete their life cycle. However, the report also found that the diet had "negative impacts on host gut microbiome diversity and health" of the worms. In other words, they could eat plastics, but it had a cost to them. It would theoretically be possible to keep thousands of worms in an industrial setting to digest plastics. But the researchers say their next goal is to identify and enhance the enzyme the worms use for future applications.Read more of this story at Slashdot.
Spotify Ready To Take On Amazon In Audiobooks
Music streaming giant Spotify has revealed that it's intending to make a big splash in the audiobooks business. Trusted Reviews reports: At the company's Investor Day 2022, CEO Daniel Ek revealed that the company would be branching out into audiobooks following its successful music and podcast offerings. Several months ago, Spotify announced its agreement to acquire audiobook distribution platform Findaway, which was a surefire indicator that it was thinking big in this area. Whie that deal has yet to close, Ek has confirmed that he sees audiobooks as "a massive opportunity." The overall book market today is worth $140 billion, yet audiobooks only represent 6 to 7% of that. In the most developed audiobook markets that figure is closer to 50%, so Spotify as seeing this as a potential $70 billion market that it's going to compete with Amazon and its Audible platform for. Spotify revealed that it's planning to relaunch the audiobook arm of its streaming service later this year. As this suggests, you can already access audiobooks through Spotify, but it's not a particularly well fleshed out offering, and it's not easily accessible. No specifics were mentioned on the pricing of this audiobook offering.Read more of this story at Slashdot.
Custom LEGO Computer Brick Has Working OLED Display
Developer James Brown created a custom LEGO computer terminal brick, complete with "an actual processor and a working screen to help bring the fictional computer to reality," reports Tom's Hardware. From the report: The iconic computer terminal brick it's based off of is made using the 2 x 2 slope brick. James has created this one entirely from scratch with the help of a 3D printer and an ARM-based microcontroller. It powers up and features screen animations that look like lines of terminal code scrolling by as well as a loading animation. The screen used inside this custom LEGO is super tiny -- less than half an inch across -- and Brown appears to have ordered tons of these things. Just last month, he used a handful of them to create a custom mechanical keyboard on which each key has its own OLED display. The keyboard can be programmed with a demo video showing the letters changing from lowercase to capital on the fly. Rather than using a Raspberry Pi to power the tiny terminal, Brown had a custom PCB printed just for the project using a different ARM-based chip. On this board is an STM32F030F4P6TR -- an ARM Cortex M0 series microcontroller with a 32-bit single core and 16KB of flash. An RP2040 SoC could be used in its place, should you wish to spin your own PCB. It's connected to a .42-inch OLED display which has a resolution of 72 x 40px. Brown explains that it gets power from an old LEGO 9V system that uses conductive strips inside the studs. Instead of taking apart an existing brick, Brown opted to design one from scratch. This process involved 3D-printing a mold in which he could cast the brick with the electronic components fit inside. The final product is a semi-translucent blue brick that illuminates with the light from the OLED display.Read more of this story at Slashdot.
Meta Will Stop Making Portal For Consumers
Meta plans to stop making consumer versions of its Portal video calling hardware and instead pivot the product line to focus on use cases for businesses, like conference calling. The Verge reports: The change in strategy, first reported by The Information and confirmed to The Verge by a source familiar with the matter, comes as Meta is reassessing its ambitious hardware plans against investor concerns about the billions of dollars it's spending on projects that have yet to pay off financially. The Portal line debuted in 2018 with two displays meant as dedicated video calling stations. [...] New versions have been released in the time since, including the portable Portal Go, but the device never became a huge hit. The research firm IDC estimates that Meta shipped 800,000 Portals in 2021, accounting for less than 1 percent of the global smart speaker and display market, according to The Information. Meta currently sells four Portal products, from a $99 TV-connected camera to a $349 smart display.Read more of this story at Slashdot.
'I Love the Linux Desktop, But That Doesn't Mean I Don't See Its Problems All Too Well'
An anonymous reader shares an excerpt from an opinion piece via The Register, written by longtime technology reporter and Linux enthusiast Steven J. Vaughan-Nichols: Recently, The Register's Liam Proven wrote tongue in cheek about the most annoying desktop Linux distros. He inspired me to do another take. Proven pointed out that Distrowatch currently lists 270 -- count 'em -- Linux distros. Of course, no one can look at all of those. But, having covered the Linux desktop since the big interface debate was between Bash and zsh rather than GNOME vs KDE, and being the editor-in-chief of a now-departed publication called Linux Desktop, I think I've used more of them than anyone else who also has a life beyond the PC. In short, I love the Linux desktop. Many Linux desktop distros are great. I've been a big Linux Mint fan for years now. I'm also fond, in no particular order, of Fedora, openSUSE, Ubuntu, and MX Linux. But you know what? That's a problem right there. We have many excellent Linux desktop distros, which means none of them can gain enough market share to make any real dent in the overall market.[...]Besides over 200 distros, there are 21 different desktop interfaces and over half-a-dozen different major ways to install software such as the Debian Package Management System (DPKG), Red Hat Package Manager (RPM), Pacman, Zypper, and all too many others. Then there are all the newer containerized ways to install programs including Flatpak, Snap, and AppImage. I can barely keep them all straight and that's part of my job! How can you expect ordinary users to make sense of it all? You can't. None of the major Linux distributors -- Canonical, Red Hat, and SUSE -- really care about the Linux desktop. Sure, they have them. They're also major desktop influencers. But their cash comes from servers, containers, the cloud, and the Internet of Things (IoT). The desktop? Please. We should just be glad they spend as many resources as they do on them. Now, all this said, I don't want you to get the impression that I don't think the conventional Linux desktop is important. I do. In fact, I think it's critical. Microsoft, you see, is abandoning the traditional PC-based desktop. In its crystal ball, Microsoft sees Azure-based Desktop-as-a-Service (DaaS) as its future. [...] That means that the future of a true desktop operating system will lie in the hands of Apple with macOS and us with Linux. As someone who remembers the transition from centrally controlled mainframes and minicomputers to individually empowered PCs, I do not want to return to a world where all power belongs to Microsoft or any other company. "The Linux desktop will never be as big as Windows once was," writes Vaughan-Nichols in closing. "Between DaaS's rise and the fall of the desktop to smartphones, it can't be. But it may yet, by default, become the most popular true conventional desktop."Read more of this story at Slashdot.
Biden To Require EV Charging Stations Every 50 Miles On Federal Highways
The Biden administration on Thursday pledged to have 500,000 public charging stations for electric vehicles in place by 2030. "The proposed standards, which will be published next week in the Federal Register, dictate that a charging station be located every 50 miles along the interstate and no more than a mile off the highway," reports USA Today. "Stations would be required to maintain a minimum number and type of chargers capable of serving multiple customers." From the report: Stations would be prohibited from requiring drivers to have a membership or be part of a club to use their chargers. Real-time information on pricing and location would have to be available to help motorists using a GPS app better plan their trip. The Federal Highway Administration's proposed standards will apply to federally funded charging stations in all 50 states, the District of Columbia and Puerto Rico. The goal is to ensure a seamless system of charging stations that can be used by motorists no matter what car they drive, where they live or how they pay. [...] The administration is providing more than $5 billion to states over the next five years to build a network of charging stations along the nation's interstates.Read more of this story at Slashdot.
Intel Joins a Rush of Tech Companies Putting a Freeze On Hiring
Intel, one of the world's leading chipmakers, has responded to global headwinds by joining a string of other tech companies in placing a freeze on new hires as it seeks ways to cut costs. Fortune reports: "Increased focus and prioritization in our spending will help us weather macroeconomic uncertainty, execute on our strategy, and meet our commitments to customers, shareholders, and employees," Intel said in a statement provided to Fortune on Thursday, a day after Reuters reported a leaked internal memo announcing the hiring freeze at Intel. According to the memo, Intel is placing a two-week hiring freeze on its client computing group, which creates PC chips for desktop and laptop computers. Client computing is Intel's largest division by sales, generating just over 50% of the manufacturer's revenue last quarter. In April, Intel issued weaker-than-expected profit guidance for the second quarter, citing reduced PC chip sales. But Citi's semiconductor analyst, Christopher Danely, predicts Intel will miss its weak second-quarter guidance, following negative comments Intel CFO David Zinsner made at a Bank of America conference on Tuesday. "Weaker" macroeconomic conditions are "clearly going to impact" Intel's earnings, Zinsner said, adding that "the circumstances at this point are much worse than what we had anticipated coming into the quarter."Read more of this story at Slashdot.
How One Paper Just Blew Up Bitcoin's Claim To Anonymity
An anonymous reader quotes a report from ZDNet: Lead researcher Alyssa Blackburn of Baylor and Rice, along with team-mates Christoph Huber, Yossi Eliaz, Muhammad S. Shamim, David Weisz, Goutham Seshadri, Kevin Kim, Shengqi Hang, and Erez Lieberman Aiden, used a technique called "address linking" to study the Bitcoin transactions in the first two years of its existence: January of 2009 to February of 2011. Their key discovery is that, in those first two years, "most Bitcoin was mined by only sixty-four agents [] collectively accounting for B2,676,800 (PV: $84 billion)." They are referring to the process of minting new coins by solving computer challenges. That number -- 64 people in total -- "is 1000-fold smaller than prior estimates of the size of the early Bitcoin community (75,000)," they observe. Those 64 people include some notable figures that have already become legends, such as Ross Ulbricht, known by the handle Dread Pirate Roberts. Ulbricht is the founder of Silk Road, a black-market operation that used Bitcoin for illicit means -- until it was shut down by the FBI. For Blackburn and team, the point was to study the effects of people participating in game-theoretic situations as anonymous parties. Surprisingly, they found early insiders like Ulbricht could have exploited the relative paucity of participants by undermining Bitcoin to double-spend coins, but they did not. They acted "altruistically" to maintain the integrity of the system. That's intriguing, but a more pressing discovery is that addresses can be traced and identities can be revealed. To find out who was doing those early transactions, Blackburn and team had to reverse-engineer the entire premise of Bitcoin and of all crypto: anonymity. As outlined in the original Bitcoin white paper by Satoshi Nakamoto, privacy was to be preserved by two means: anonymous public key use and creating new key pairs for every transaction [...]. Blackburn and team had to trace those key pairs to reveal early Bitcoin's transacting parties. To do so, they developed what they called a novel address-linking scheme. The scheme finds two patterns that point to users: one is the presence of recurring bits of code, and one is duplicate addresses for certain transactions. [...] The consequence of that, they write, is that it is possible to "follow the money" to expose any identity by following a chain of relatedness in a graph of addresses, starting from a known identity [...]. Further, they hypothesize that "many cryptocurrencies may be susceptible to follow-the-money attacks." Blackburn told The New York Times's Siobhan Roberts, "When you are encrypting private data and making it public, you cannot assume that it'll be private forever." As the team concludes in the report, "Drip-by-drip, information leakage erodes the once-impenetrable blocks, carving out a new landscape of socioeconomic data." The new paper, titled "Cooperation among an anonymous group, protected Bitcoin during failures of decentralization," has been posted on the researchers' server (PDF).Read more of this story at Slashdot.
Apple Plans 15-Inch MacBook Air for 2023 and New 12-Inch Laptop
Apple plans to expand the lineup of laptops using its new, speedier in-house chips next year, aiming to grab a bigger share of the market, Bloomberg News reported Thursday, citing people with knowledge of the matter said. From the report: The company is working on a larger MacBook Air with a 15-inch screen for release as early as next spring, said the people, who asked not to be identified because the plans aren't public. This would mark the first model of that size in the MacBook Air's 14-year history. Apple is also developing what would be its smallest new laptop in years. The new models underscore Apple's strategy to use homegrown processors to make gains in a market led by Lenovo and HP. The company began splitting from longtime partner Intel in 2020 and announced its latest chip, the M2, at a developers conference earlier this week. Better performance and new designs have helped spur a resurgence for the Mac lineup, which accounts for about 10% of Apple's sales.Read more of this story at Slashdot.
NASA Creates Team To Study UFOs
NASA is putting a team together to study unidentified aerial phenomena, popularly known as UFOs, the US space agency said Thursday. From a report: The team will gather data on "events in the sky that cannot be identified as aircraft or known natural phenomena -- from a scientific perspective," the agency said. NASA said it was interested in UAPs from a security and safety perspective. There was no evidence UAPs are extraterrestrial in origin, NASA added. The study is expected to take nine months. "NASA believes that the tools of scientific discovery are powerful and apply here also," said Thomas Zurbuchen, the associate administrator for science at NASA Headquarters in Washington, DC. "We have access to a broad range of observations of Earth from space -- and that is the lifeblood of scientific inquiry. We have the tools and team who can help us improve our understanding of the unknown. That's the very definition of what science is. That's what we do."Read more of this story at Slashdot.
Chrome Will Now Silence Many of Those Annoying Notification Permission Prompts on the Web
Google today announced a set of new and updated security features for Chrome, almost all of which rely on machine learning (ML) models, as well as a couple of nifty new ML-based features that aim to make browsing the web a bit easier, including a new feature that will suppress notification permission prompts when its algorithm thinks you're unlikely to accept them. From a report: Starting with the next version of Chrome, Google will introduce a new ML model that will silence many of these notification permission prompts. And the sooner the better. At this point, they have mostly become a nuisance. Even if there are some sites -- and those are mostly news sites -- that may offer some value in their notifications, I can't remember the last time I accepted one on purpose. Also, while legitimate sites love to push web notifications to remind readers of their existence, attackers can also use them to send phishing attacks or prompt users to download malware if they get users to give them permission. "On the one hand, page notifications help deliver updates from sites you care about; on the other hand, notification permission prompts can become a nuisance," Google admits in its blog post today. The company's new ML model will now look for prompts that users are likely to ignore and block them automatically. And as a bonus, all of that is happening on your local machine, so none of your browsing data makes it onto Google's servers.Read more of this story at Slashdot.
Google Tool Shows What's on the Surface of the Earth in Real Time
A new dataset from Google shows the features on the surface of the Earth in near real time, the company announced Thursday. The tool, called Dynamic World, uses deep learning and satellite imagery to develop a high-resolution land cover map that shows which bits of land have features like trees, crops, or water. From a report: Land cover maps usually take a long time to produce, and there are big gaps between the time images are taken and when the data is published. They also often don't have a detailed breakdown of what's on the ground in a particular area -- a city would be classified as "built-up" (a designation for human-altered landscapes) even if there are big sections with parks, for example. Dynamic World classifies the land cover type for every 1,100 square feet, Google said. It shows how likely it is that the sections are covered by one of nine cover types: water, flooded vegetation, built-up areas, trees, crops, bare ground, grass, shrub / scrub, and snow / ice. Google detailed its system, developed with the World Resources Institute, in a paper published in Nature's Scientific Data.Read more of this story at Slashdot.
GitHub Sunsets Atom, Its Text Editor for Software Development
GitHub has announced that it will sunset Atom, the text editor for software development that the company introduced in 2011. In a blog post, GitHub said that it will archive the Atom repository and all other repositories remaining in the Atom organization on December 15, 2022. From a report: Atom served as the foundation for the Electron framework, which paved the way for thousands of apps including Microsoft Visual Studio Code, Slack, GitHub's own GitHub Desktop. But GitHub asserts that Atom community involvement has declined as new tools have emerged over the years. Atom itself hasn't seen significant feature development for the past several months beyond maintenance and security updates.Read more of this story at Slashdot.
Vivaldi Email Client Released 7 Years After First Announcement
Browser maker Vivaldi's email client has finally hit version 1.0, seven years after it was first announced. From a report: Vivaldi Mail, which includes a calendar and feed reader as well as an email client, first arrived in technical preview in 2020. A slightly wobbly beta arrived last year alongside version 4 of the Chromium-based browser. After another year of polish and tidying of loose ends, the company has declared the client ready. As before, the client is built into the browser, meaning it is unlikely to appeal to many beyond Vivaldi's existing user base. Enabling it is a simple matter of dropping into Settings pages and wading through until the option to enable Mail, Calendar, and Feeds can be selected. Vivaldi has a lot of settings -- delightfully customizable for some and downright baffling for others. That said, for users still pining for a good old-fashioned email client that doesn't require wading through a web page festooned with adverts, there's a lot to like. It supports multiple accounts, will sort messages and create folders automatically (locally, rather than on a mystery server in the cloud), and permits searching (with indexing performed offline). IMAP and POP3 are supported, making adding a provider relatively straightforward, and the company also claims that users can log into their Google accounts from Mail and Calendar.Read more of this story at Slashdot.
China Rebrands Proposal on Internet Governance, Targeting Developing Countries
The Chinese government made another attempt in promoting its vision of the internet, in a repackaging intended to lure lagging regions. From a report: Throughout the years, China has made several attempts at changing the current internet architecture, mostly in the context of the International Telecommunication Union (ITU), the United Nation's agency for ICT technologies. Contrarily to other standardisation organisations that are dominated by private companies, in ITU governments play a leading role. Thus, Beijing has been using this forum to attract countries that might have similar interests in asserting stronger governmental control over the internet. In September 2019, the delegate of Chinese telecom juggernaut Huawei presented a proposal for a new IP (Internet Protocol). In February, EURACTIV anticipated that more proposals were expected in the context of the World Telecommunication Standardisation Assembly. Beijing's new proposal took the form of a modification of a resolution set to be adopted at the World Telecommunication Development Conference, the ITU's conference dedicated to telecom development that takes place in Rwanda from 6 to 16 June. Two weeks ago, the Chinese government circulated a modification of a resolution that in a footnote introduced the concept of IPv6+, presented as an enhanced version of the latest version of the internet protocol, known as IPv6. At around the same time, IPv6+ was promoted by Huawei. "IPv6+ can realize more open and active technology and service innovation, more efficient and flexible networking and service provision, more excellent performance and user experience," the footnote reads. According to the document, seen by EURACTIV, IPv6+ would have three crucial advantages. A more efficient allocation of information across the network; integration of other technologies that allow for an organisation of network resources; integration of innovative solutions.Read more of this story at Slashdot.
...391392393394395396397398399400...