Feed slashdot Slashdot

Favorite IconSlashdot

Link https://slashdot.org/
Feed https://rss.slashdot.org/Slashdot/slashdotMain
Copyright Copyright Slashdot Media. All Rights Reserved.
Updated 2026-02-16 02:53
Earth is Warming Faster Than Previously Thought, and the Window is Closing To Avoid Catastrophic Outcomes
JoshuaZ writes: As the world battles historic droughts, landscape-altering wildfires and deadly floods, a landmark report from global scientists says the window is rapidly closing to cut our reliance on fossil fuels and avoid catastrophic changes that would transform life as we know it. The state-of-the-science report from the United Nations' Intergovernmental Panel on Climate Change says the world has rapidly warmed 1.1 degrees Celsius higher than pre-industrial levels, and is now careening toward 1.5 degrees -- a critical threshold that world leaders agreed warming should remain below to avoid worsening impacts. Only by making deep cuts to greenhouse gas emissions, while also removing carbon dioxide from the atmosphere, can we halt the precipitous trend."Bottom line is that we have zero years left to avoid dangerous climate change, because it's here," Michael E. Mann, a lead author of the IPCC's 2001 report, told CNN. Unlike previous assessments, Monday's report concludes it is "unequivocal" that humans have caused the climate crisis and confirms that "widespread and rapid changes" have already occurred, some of them irreversibly. That is due in part to the breakneck pace at which the planet has been recently warming, faster than scientists have previously observed. Since 2018, when the panel published a special report on the significance of 1.5-degrees, greenhouse gas emissions have continued mostly unabated and have pushed global temperatures higher. Even under the IPCC's most optimistic scenario, in which the world's emissions begin to drop sharply today and are reduced to net zero by 2050, global temperature will still peak above the 1.5-degree threshold before falling. In a statement, UN Secretary-General Antanio Guterres called the report "a code red for humanity," and noted the 1.5-degree threshold is "perilously close." "The only way to prevent exceeding this threshold is by urgently stepping up our efforts, and pursuing the most ambitious path," Guterres said.Read more of this story at Slashdot.
US Navy is Developing a Solar-powered Plane That Can Fly For 90 Days
New submitter tslinks7 writes: The US Navy is developing solar-powered aircraft to fly for 90 days at a time. The Skydweller aircraft could be used as a communications relay platform or a constant eye in the sky to escort surface ships. The testbed aircraft adds new software and upgraded hardware to Solar Impulse 2, a piloted solar aircraft that flew around the world in 2015-16. The new plane is made by US-Spanish aerospace firm Skydweller Aero. The company was awarded a $5 million contract to develop the aircraft.Read more of this story at Slashdot.
Vodafone Latest UK Carrier To Reintroduce Roaming Charges in Europe After Brexit
Vodafone has announced it will reintroduce roaming charges in Europe for UK mobile customers from January next year. From a report: It's the latest UK carrier to reintroduce the fees after the country's departure from the European Union, and it follows a similar U-turn from EE in June. All major carriers in the country previously said they had no plans to introduce roaming fees in Europe after the Brexit vote. The fees will apply to any Vodafone customers who sign up to or change their contract from August 11th, 2021, with the fees applying from January 6th, 2022. Costs are dependent on the specific plan, but most customers will pay $2.77 a day to use their UK allowance of calls, texts, and data in Europe, or $1.4 a day if access is bought in eight- or 15-day bundles.Read more of this story at Slashdot.
Senators Press Facebook for Answers About Why It Cut Off Misinformation Researchers
Facebook's decision to close accounts connected to a misinformation research project last week prompted a broad outcry from the company's critics -- and now Congress is getting involved. From a report: A handful of lawmakers criticized the decision at the time, slamming Facebook for being hostile toward efforts to make the platform's opaque algorithms and ad targeting methods more transparent. Researchers believe that studying those hidden systems is crucial work for gaining insight on the flow of political misinformation. The company specifically punished two researchers with NYU's Cybersecurity for Democracy project who work on Ad Observer, an opt-in browser tool that allows researchers to study how Facebook targets ads to different people based on their interests and demographics. In a new letter, embedded below, a trio of Democratic senators are pressing Facebook for more answers. Senators Amy Klobuchar (D-MN), Chris Coons (D-DE) and Mark Warner (D-VA) wrote to Facebook CEO Mark Zuckerberg asking for a full explanation on why the company terminated the researcher accounts and how they violated the platform's terms of service and compromised user privacy. The lawmakers sent the letter on Friday.Read more of this story at Slashdot.
How a Security Researcher Took Over a Hotel's IoT Devices
"The moment you network IoT and hand over control to third parties, you may also give individuals the keys to a digital kingdom — and the ability to cause mischief, or worse," writes ZDNet. For example, at a hotel where guests control the devices in their room with an iPod Touch...Speaking at Black Hat USA, Las Vegas, security consultant Kya Supa from LEXFO explained how a chain of security weaknesses were combined and exploited to gain control of rooms at a capsule hotel, a budget-friendly type of hotel offering extremely small — and, therefore, cozy — spaces to guests, who are stacked side-by-side... A neighbor, "Bob," kept waking Supa up by making loud phone calls in the early hours of the morning. While Bob had agreed to keep it down, he did not keep his promise — and the researcher set to work since he needed his sleep, especially during his vacation. The first thing Supa did was to explore his room, finding an emergency light installed for safety reasons; a Nasnos automaton center for use in controlling products in case the iPod Touch was lost; an electric motor used to manage the incline of the capsule's bed; and a Nasnos router, hidden in the wall. If you connected to the router via a smartphone, it was then possible to control other devices on the network, and this was the setup the hotel chose to use... Supa found that two networks were connected — the hotel Wi-Fi and the router. To retrieve the router key, Supa targeted WEP, a protocol that has been known to be weak for years. Access points, each being one of the bedrooms, were found. Supa inspected the traffic and found weak credentials in place — "123" — and you can guess the rest... By using an Android smartphone, the iPod Touch, and a laptop, the researcher created a Man-in-The-Middle (MiTM) architecture and inspected the network traffic. No encryption was found and he created a simple program to tamper with these connections, allowing the researcher to seize control of his bedroom through his laptop... Now that he could "control every bedroom," and Bob was still there, Supa then tampered with the lights of different bedrooms until he found the right one. He created a script that, every two hours, would change the bed into a sofa and turn the lights on and off. The script was launched at midnight. We can probably assume Bob did not enjoy his stay. "I hope he will be more respectful in the future," Supa commented.Read more of this story at Slashdot.
US Developer's Workstation Exposed State Department's Network Data, Researchers Find
Long-time Slashdot reader chicksdaddy writes: Sensitive systems and data for the U.S. Department of State could have been exposed by a third party development workstation running the eXide software, according to researchers for the hacking crew Sakura Samurai. According to a report in Forbes, the researchers took advantage of a new State Department Vulnerability Disclosure Program to look for security flaws in one of 8 wild-carded State Department domains included in the program. Using automated tools to do reconnaissance on one of the subdomains the State Department had included in its VDP, researcher Jackson Henry discovered a vulnerable workstation running the open source, web based eXide IDE. It was linked to a third party doing work for the State Department and contained a number of serious security holes including Cross Site Scripting (XSS), Remote File Inclusion (RFI), and Server Side Request Forgery (SSRF) flaws. All are powerful weapons in the hands of a sophisticated cyber adversary. After reporting their findings to the State Department on April 27th, researcher Jackson Henry and Sakura Samurai received acknowledgement of their report on April 29th. The vulnerable endpoint in question was taken offline by the State Department by May 13th. Henry and Sakura Samurai then began working with the State Department on public disclosure of the vulnerabilities, while also communicating with the developers responsible for the open source project to get the flaws fixed, according to communications shared with Forbes. The discovery of flaws buried in an open source development tool underscores the risks that federal agencies face as more and more government business shifts to the web. "The State Department can't audit every open source package it uses," Henry said. "That's why the VDP is such a big thing (and) a step in the right direction." It is also an endorsement of the benefits of a quiet security revolution within the federal government in recent months, as agencies have responded to Binding Operational Directive 20-01, a new requirement from the CISA, the Cybersecurity and Infrastructure Security Agency, that Executive Branch agencies publish and maintain public vulnerability disclosure programs, or VDPs — a kind of front door for bug hunters and "white hat" cybersecurity professionals.Read more of this story at Slashdot.
NASA's Mars Rover Fails to Collect Its First Sample
Friday the Perseverance rover on Mars made its first attempt to collect a rock sample and seal it in a tube, reports NASA. But unfortunately, the data "indicate that no rock was collected during the initial sampling activity..." "The sampling process is autonomous from beginning to end," said Jessica Samuels, the surface mission manager for Perseverance at NASA's Jet Propulsion Laboratory in Southern California. "One of the steps that occurs after placing a probe into the collection tube is to measure the volume of the sample. The probe did not encounter the expected resistance that would be there if a sample were inside the tube." The Perseverance mission is assembling a response team to analyze the data. One early step will be to use the WATSON (Wide Angle Topographic Sensor for Operations and eNgineering) imager - located at the end of the robotic arm - to take close-up pictures of the borehole. Once the team has a better understanding of what happened, it will be able to ascertain when to schedule the next sample collection attempt. "The initial thinking is that the empty tube is more likely a result of the rock target not reacting the way we expected during coring, and less likely a hardware issue with the Sampling and Caching System," said Jennifer Trosper, project manager for Perseverance at JPL "Mars keeps surprising us," adds the rover's Twitter feed. "We're working through this new challenge. More to come." Space.com points out this wasn't a make-or-break moment for the rover, since it's still carrying 42 more sampling tubes. And the plan has always been to leave the sample tubes on the surface of Mars, where they'll be retrieved later by future Mars missions.Read more of this story at Slashdot.
ElasticSearch Keeps Fighting Open Source Fork by Amazon AWS
In January ElasticSearch made what it calls "an incredibly hard decision" — to change the licensing on its scalable data-search solution. They called this an effort to "stand up to" Amazon's AWS for offering ElasticSearch functionality as a service "without collaborating with us... after years of what we believe to be Amazon/AWS misleading and confusing the community." Amazon then forked ElasticSearch, releasing a new "OpenSearch" product under the original Apache 2.0 licensing. Last month AWS's fork reached General Availability/1.0 status. Now Mike Melanson's "This Week in Programming" column reports that ElasticSearch is "making further attempts at closing off access to ElasticSearch and shutting out AWS — while AWS is fighting back:AWS says that "OpenSearch aims to provide wire compatibility with open source distributions of Elasticsearch 7.10.2, the software from which it was derived," making it easy to migrate to OpenSearch. While Elastic can't do anything about that, they can make changes to some open source client libraries that are commonly used. "Over the past few weeks, Elastic added new logic to several of these clients that rejects connections to OpenSearch clusters or to clusters running open source distributions of Elasticsearch 7, even those provided by Elastic themselves," AWS writes. "While the client libraries remain open source, they now only let applications connect to Elastic's commercial offerings..." AWS is again coming out as the savior of open source in this scenario, it would seem, this time promising to offer "a set of new open source clients that make it easy to connect applications to any OpenSearch or Elasticsearch cluster" that "will be derived from the last compatible versions of corresponding Elastic-maintained clients before product checks were added." "In the spirit of openness and interoperability, we will make reasonable efforts to maintain compatibility with all Elasticsearch distributions, even those produced by Elastic," they write. In the meantime, while the OpenSearch community works on creating the replacement libraries, AWS recommends that users do not update to the latest version of any Elastic-maintained clients, lest their applications potentially cease functioning. "It's disappointing to see this," reads a comment (upvoted 35 times) on the ElasticSearch repository announcing the change in late June. "You're forcing us as bystanders in a battle to choose sides." And Amazon responded with its own take on the situation in their AWS press release this week. "Our experience at AWS is that developers find it painful to update their already-deployed applications to use new versions of server software, so backward compatibility for clients and APIs weighs heavily in our designs..." The press release also calls ElasticSearch's changes "disruptive," adding "The most broadly adopted open source projects generally emphasize flexibility, inclusion, and avoidance of lock-in..."Read more of this story at Slashdot.
A Critical Ocean System May Be Heading For Collapse Due to Climate Change
The Washington Post reports:Human-caused warming has led to an "almost complete loss of stability" in the system that drives Atlantic Ocean currents, a new study has found — raising the worrying prospect that this critical aquatic "conveyer belt" could be close to collapse. In recent years, scientists have warned about a weakening of the Atlantic Meridional Overturning Circulation (AMOC), which transports warm, salty water from the tropics to northern Europe and then sends colder water back south along the ocean floor. Researchers who study ancient climate change have also uncovered evidence that the AMOC can turn off abruptly, causing wild temperature swings and other dramatic shifts in global weather systems. Scientists haven't directly observed the AMOC slowing down. But the new analysis, published Thursday in the journal Nature Climate Change, draws on more than a century of ocean temperature and salinity data to show significant changes in eight indirect measures of the circulation's strength. These indicators suggest that the AMOC is running out of steam, making it more susceptible to disruptions that might knock it out of equilibrium, says study author Niklas Boers, a researcher at the Potsdam Institute for Climate Impact Science in Germany. If the circulation shuts down, it could bring extreme cold to Europe and parts of North America, raise sea levels along the east coast of the United States and disrupt seasonal monsoons that provide water to much of the world. "This is an increase in understanding . . . of how close to a tipping point the AMOC might already be," said Levke Caesar, a climate physicist at Maynooth University who was not involved in the study. Boers' analysis doesn't suggest exactly when the switch might happen. But "the mere possibility that the AMOC tipping point is close should be motivation enough for us to take countermeasures," Caesar said. "The consequences of a collapse would likely be far-reaching..." The new analysis suggests "the critical threshold is most likely much closer than we would have expected," Boers said... [T]he apparent consequences of the AMOC slowing are already being felt. A persistent "cold blob" in the ocean south of Greenland is thought to result from less warm water reaching that region. The lagging Gulf Stream has caused exceptionally high sea level rise along the east coast of the United States. Key fisheries have been upended by the rapid temperature swings, and beloved species are struggling to cope with the changes. If the AMOC does completely shut down, the change would be irreversible in human lifetimes, Boers said. The "bi-stable" nature of the phenomenon means it will find new equilibrium in its "off" state. Turning it back on would require a shift in the climate far greater than the changes that triggered the shutdown. "It's one of those events that should not happen, and we should try all that we can to reduce greenhouse gas emissions as quickly as possible," Boers said. "This is a system we don't want to mess with."Read more of this story at Slashdot.
Synthetic Brain Cells That Store 'Memories' Are Possible, New Model Reveals
An anonymous reader quotes a report from Live Science: Scientists have created key parts of synthetic brain cells that can hold cellular "memories" for milliseconds. The achievement could one day lead to computers that work like the human brain. In the new study, published in the journal Science on Aug. 6, researchers at the Centre national de la recherche scientifique in Paris, France created a computer model of artificial neurons that could produce the same sort of electrical signals neurons use to transfer information in the brain; by sending ions through thin channels of water to mimic real ion channels, the researchers could produce these electrical spikes. And now, they have even created a physical model incorporating these channels as part of unpublished, ongoing research. At a finer level, the researchers created a system that mimics the process of generating action potentials -- spikes in electrical activity generated by neurons that are the basis of brain activity. To generate an action potential, a neuron starts to let in more positive ions, which are attracted to the negative ions inside of the cell. The electrical potential, or voltage across the cell membrane, causes doorways on the cell called voltage-gated ion channels to open, raising the charge even more before the cell reaches a peak and returns to normal a few milliseconds later. The signal is then transmitted to other cells, enabling information to travel in the brain. To mimic voltage-gated ion channels, the researchers modeled a thin layer of water between sheets of graphene, which are extremely thin sheets of carbon. The water layers in the simulations were one, two, or three molecules in depth, which the researchers characterized as a quasi-two-dimension slit. [T]he researchers wanted to use this two-dimensional environment because particles tend to react much more strongly in two dimensions than in three, and they exhibit different properties in two dimensions, which the researchers thought might be useful for their experiment. Testing out the model in a computer simulation, the researchers found that when they applied an electric field to the channel, the ions in the water formed worm-like structures. As the team applied a greater electric field in the simulation, these structures would break up slowly enough to leave behind a "memory," or a hint of the elongated configuration. When the researchers ran a simulation linking two channels and other components to mimic the behavior of a neuron, they found the model could generate spikes in electrical activity like action potentials, and that it "remembered" consistent properties in two different states -- one where ions conducted more electricity and one where they conducted less. In this simulation, the "memory" of the previous state of the ions lasted a few milliseconds, around the same time as it takes real neurons to produce an action potential and return to a resting state. This is quite a long time for ions, which usually operate on timescales of nanoseconds or less. In a real neuron, an action potential equates to a cellular memory in the neuron; our brains use the opening and closing of ion channels to create this kind of memory. The new model is a version of an electronic component called a memristor, or a memory resistor, which has the unique property of retaining information from its history. But existing memristors don't use liquid, as the brain does.Read more of this story at Slashdot.
Virgin Galactic Says Trips To Space Aboard Its Rocket Plane Will Start At $450,000 Per Seat
After a successful sub-orbital test flight last month, Virgin Galactic re-opened ticket sales for rides to space starting at $450,000 per seat. CBS News reports: But Michael Colglazier, CEO of Virgin Galactic, said fully commercial flights are not expected until the third quarter of 2022, after two more test flights of the company's VSS Unity spaceplane and extensive upgrades of Virgin's Eve carrier jet to improve durability and turnaround times between flights. While the start of commercial operations will come a few months later than had been hoped, the results of two piloted test flights earlier this year, including Branson's July 11 trip to space, show the company is close to "completing our test flight program and launching commercial passenger service in '22," Colglazier said. "And as we advance towards that goal, we are excited to announce today that we will immediately open ticket sales to our significant list of early hand raisers, prioritizing our spacefarer community who, as promised, will be given first opportunity to reserve their place to space." He said Virgin has developed a "purposeful range of product offerings in order to satisfy the different ways people were want to share this experience." "For the private astronaut flights, our products will include a single seat, a multi-seat couples, families and friends package and a full-flight buyout," he said. "Prices for this next phase of private astronaut sales will begin at $450,000 per seat. Microgravity research and professional astronaut training flights remain priced at $600,000 on a per seat equivalent basis." More than 600 space enthusiasts made down payments on flights much earlier in the program, back when tickets were thought to be in the neighborhood of $250,000 per seat. The prices announced Thursday presumably will apply to new customers only.Read more of this story at Slashdot.
California Shuts Down Edward Hyatt Hydroelectric Power Plant Due To Drought
phalse phace shares a report from Los Angeles Times: In a sign of the region's worsening drought, state water officials announced Thursday the shutdown of a major hydroelectric power plant at Lake Oroville in Northern California, citing the lowest-ever recorded water level at the reservoir. It marks the first time that officials have been forced to close the Edward Hyatt Powerplant, which was completed in 1967, on account of low water at the lake. The loss of the hydroelectric power source at Lake Oroville, about 75 miles north of Sacramento, could contribute to rolling blackouts in the state during heat waves in coming months. Officials had warned that once the water level in Lake Oroville fell to 640 feet above sea level, the plant could no longer produce power; at that level, the water cannot reach the intake pipes that flow toward the underground hydroelectric facility. On Thursday, Lake Oroville was at 641 feet with 863,516 acre-feet of storage, which is 24% of its overall capacity and 34% of its historical average for this time, according to the Department of Water Resources. The Hyatt plant is designed to produce up to 750 megawatts of power but has often generated 100 to 400 megawatts, or slightly less than 1% of the state's average daily peak usage.Read more of this story at Slashdot.
US Air Force Invests In Hermeus' Hypersonic Aircraft Development
An anonymous reader quotes a report from Interesting Engineering: The U.S. Air Force joins a group of venture capital firms in making a $60 million investment in Hermeus, a Georgia-based startup that is striving to make the world's first reusable hypersonic aircraft, a press statement reveals. The new contract, awarded on July 30, sets ambitious objectives for Hermeus, to be accomplished over the next three years. These include the building of three prototypes of the company's Quarterhorse aircraft and the testing of its full-scale reusable hypersonic propulsion system. If all goes to plan, the Quarterhorse passenger aircraft will be capable of flying at a staggering Mach 5 speeds, starting at 3836 mph (6174 km/h). By comparison, NASA's new supersonic jet, the X-59, will fly at Mach 1.5 and reach top speeds of 990 mph. As Hermeus' aircraft will eventually be able to fly five times the speed of sound, it will be capable of traveling from New York to London in only 90 minutes -- instead of seven hours it typically takes today's commercial airliners. In order to reach those speeds, Hermeus is developing a proprietary turbine-based combined cycle (TBCC) engine, based on the GE J85 turbojet engine used for a variety of high-speed aircraft including Virgin Galactic's White Knight carrier aircraft and Boom Supersonic's prototype XB-1 aircraft. The first Quarterhorse prototype is set to be unmanned -- much in the same way that Virgin Galactic's first space plane missions were uncrewed, the earliest flight tests will not be piloted so as to eliminate the risk to human life and to allow the company to start its flight testing earlier. According to a 2020 report by Aviation International News, Hermeus has already built and tested a small-scale hypersonic engine prototype and it is now working on a full-scale engine demonstrator of its TBCC engine.Read more of this story at Slashdot.
Paragon Is Working To Get Its nfs3 Filesystem Into the Linux Kernel
Jim Salter writes via Ars Technica: In March of last year, proprietary filesystem vendor Paragon Software unleashed a stream of anti-open source FUD about a Samsung-derived exFAT implementation headed into the Linux kernel. Several months later, Paragon seemed to have seen the error of its ways and began the arduous process of getting its own implementation of Microsoft's NTFS (the default filesystem for all Windows machines) into the kernel as well. Although Paragon is still clearly struggling to get its processes and practices aligned to open source-friendly ones, Linux kernel BDFL Linus Torvalds seems to have taken a personal interest in the process. After nearly a year of effort by Paragon, Torvalds continues to gently nudge both it and skeptical Linux devs in order to keep the project moving forward. To those familiar with daily Linux use, the utility of Paragon's version of NTFS might not be immediately obvious. The Linux kernel already has one implementation of NTFS, and most distributions make it incredibly easy to install and use another FUSE-based implementation (ntfs-3g) beyond that. Both existing implementations have problems, however. The in-kernel implementation of NTFS is extremely old, poorly maintained, and should only be used read-only. As a result, most people who actually need to mount NTFS filesystems on Linux use the ntfs-3g driver instead. Ntfs-3g is in reasonably good shape -- it's much newer than the in-kernel ntfs implementation, and as Linux filesystem guru Ted Ts'o points out, it actually passes more automated filesystem tests than Paragon's own ntfs3 does. Unfortunately, due to operating in userspace rather than in-kernel, ntfs-3g's performance is abysmal. In Ts'o's testing, Paragon's ntfs3 completed automated testing in 8,106 seconds -- but the FUSE-based ntfs-3g required a whopping 34,783 seconds. Bugs and performance aside, ongoing maintenance is a key aspect to Paragon's ntfs3 making it in-kernel. Torvalds opined that "Paragon should just make a pull request for [ntfs3]" -- but he did so after noting that the code should get OKs from current maintainers and that Paragon itself should maintain the code going forward. (Paragon developer Konstantin Komarov quickly replied that the company intended to continue maintaining the code, once accepted.) [...] For his own part, Torvalds seems determined to find a performant, modern, maintainable replacement for the ancient (2001-era) and seldom-used ntfs implementation in the kernel now. As long as Paragon remains willing to keep playing, it seems likely to get there eventually -- perhaps even in time for the 5.15 kernel.Read more of this story at Slashdot.
The Future of Cryptocurrency Is Being Decided in Biden's Infrastructure Bill
Two competing amendments to the Senate's infrastructure bill may shape the future of cryptocurrency in the United States as senators fight over who must be subject to new tax reporting requirements. Motherboard reports: One proposal wants to exempt miners, hardware manufacturers, and developers, putting the focus on centralized cryptocurrency exchanges and trading apps. But the Biden administration has thrown its weight behind another amendment that would grant exemption only to those behind so-called proof-of-work cryptocurrencies such as Bitcoin, but not other networks said to be more environmentally friendly because they don't consume as much electricity to validate transactions. The infrastructure bill, which promises public spending on major projects like new roads and bridge repairs, wouldn't appear to have anything to do with cryptocurrency. But the Congress figured that "crypto brokers" could be squeezed for $28 billion in taxes over a decade to foot part of the bill. The proposal immediately caused a furor, with crypto influencers prompting their followers to call their senators and industry stakeholders applying pressure. The definition of brokers in the original bill -- any person who (for consideration) is responsible for regularly providing any service effectuating transfers of digital assets on behalf of another person -- was so broad that it meant pretty much anyone that makes a cryptocurrency tick -- node operators, miners, validators, or services that stake digital assets -- would have to report to the I.R.S. the information on their "customers." Cryptocurrencies such as Bitcoin are designed to be non-custodial and pseudonymous, so that requirement would be nearly impossible to satisfy for much of the industry, Olya Veramchuk, director of tax solutions at blockchain firm Lukka, told Motherboard. On Wednesday, three senators -- Ron Wyden (D., Ore.), Pat Toomey (R., Pa.), and Cynthia Lummis (R., Wyo.) -- put forward an amendment to narrow the definition of a crypto broker down to those who are custodial and actually hold information on their customers, such as cryptocurrency exchanges like Coinbase or trading apps like Robinhood, granting exemption to everyone else. But an amendment proposed by Senators Rob Portman (R. Oh) and Mark Warner (D., Va) on Thursday, favored by the Biden administration, grants an exemption from the tax reporting obligation to only a segment of the crypto industry, resting on a major technical difference in blockchain design between proof-of-network and proof-of-stake. [...] The vote on rival amendments is expected to take place on Saturday. A proof-of-work model is when a network, such as Bitcoin and Dogecoin, requires miners to take care of the task of validating transactions using huge amounts of electricity for a reward in the form of newly-minted coins. "Others, like Polkadot and Cardano, require 'staking' (hence, proof-of-stake) -- which is a process of pledging funds to the network and getting semi-randomly called to validate transactions," notes Motherboard. "Validators are rewarded with newly-minted coins."Read more of this story at Slashdot.
Young People Get Their Knowledge of Tech From TV, Not School
According to a survey from Consultancy Accenture, young people born in the 90s are less likely to be getting their information about tech careers from school and teachers than social media, TV series and film. ZDNet reports: Social media ranks top for information sources about career aspirations (31%), beating out parents by a small margin (29%) and teachers by a larger margin (24%). Gen Z are more likely to learn about a future in the tech sector from TV and film (27%) than from school (19%). Accenture surveyed 1,000 UK-based 16-21-year-olds on their career aspirations and their long-term options. It found that 44% of young women said they had good digital skills, but only 40% of young men said they did. Despite this, less than a quarter of young people are confident in securing a technology job. Shaheen Sayed, Accenture's technology lead in the UK & Ireland, said: "If the digital native generation is not turning to technology as a career option, then we have a huge pipeline problem for the technology profession. Young people know technology is completely redefining the world right now -- but their lack of confidence in securing a tech job indicates a worrying disconnect between young people, particularly girls, and a changing jobs market." Those interviewed who were interested in tech jobs said they would most likely choose jobs in AI, data analytics, and cybersecurity. Which makes sense to an extent, given that these are the top three subjects in online tech media at present. "It's striking that young people are influenced more by digital channels than their connections at home and school when choosing their next steps," said Sayed. "Careers advice will need to meet young people where they are at and paint an engaging picture of the skills required for the economy today. Developing the next generation of tech talent requires more than having coding on the curriculum. Technology moves quickly and subjects must evolve to equip young people with the digital skills that will drive economic growth. Employers are looking for people to work with technologies, like AI, as they tackle global challenges like climate change and become more competitive."Read more of this story at Slashdot.
PSA: Apple Can't Run CSAM Checks On Devices With iCloud Photos Turned Off
An anonymous reader quotes a report from iMore: Apple announced new on-device CSAM detection techniques yesterday and there has been a lot of confusion over what the feature can and cannot do. Contrary to what some people believe, Apple cannot check images when users have iCloud Photos disabled. Apple's confirmation of the new CSAM change did attempt to make this clear, but perhaps didn't make as good a job of it as it could. With millions upon millions of iPhone users around the world, it's to be expected that some could be confused. "Using another technology called threshold secret sharing, the system ensures the contents of the safety vouchers cannot be interpreted by Apple unless the iCloud Photos account crosses a threshold of known CSAM content," says Apple. "The threshold is set to provide an extremely high level of accuracy and ensures less than a one in one trillion chance per year of incorrectly flagging a given account." The key part there is the iCloud Photos bit because CSAM checks will only be carried out on devices that have that feature enabled. Any device with it disabled will not have its images checked. That's also a fact that MacRumors had confirmed, too. Something else that's been confirmed -- Apple can't delve into iCloud backups and check the images that are stored there, either. That means the only time Apple will run CSAM checks on photos is when it's getting ready to upload them to iCloud Photos.Read more of this story at Slashdot.
Huawei Chairman Says the 'Aim Is To Survive' As Revenue Slides 29%
The chairman of Huawei said the Chinese technology company's "aim is to survive" as revenue fell almost 30% in the first half of the year. CNBC reports: The Shenzhen-headquartered company, which was put on the U.S. trade blacklist in 2019, announced Friday that it generated 320.4 billion yuan ($49.6 billion) in revenue in the first half of 2021. It's a significant fall from the 454 billion yuan that Huawei recorded in the first half of 2020. Huawei said its profit margin grew 0.6% to 9.8%, largely as a result of efficiency improvements, and added that the overall performance was in line with forecasts. Eric Xu, Huawei's rotating chairman, said in a statement that the company had set its strategic goals for the next five years. "Our aim is to survive, and to do so sustainably," he said. Former U.S. President Donald Trump put Huawei on an export blacklist in 2019, a move that prevents American firms from doing business with it. For instance, Google was no longer allowed to license its Android mobile operating system to Huawei. The blacklist blocks U.S. companies from selling or transferring technology to Huawei unless they are granted a special license. It has hampered Huawei's ability to design its own chips and source other components. Xu said in April that Huawei has ramped up its research and development investment as part of its efforts to "keep the company afloat, to address supply continuity challenges caused by U.S. bans, and to pursue sustainability well into the future."Read more of this story at Slashdot.
Edward Snowden and EFF Slam Apple's Plans To Scan Messages and iCloud Images
Apple's plans to scan users' iCloud Photos library against a database of child sexual abuse material (CSAM) to look for matches and childrens' messages for explicit content has come under fire from privacy whistleblower Edward Snowden and the Electronic Frontier Foundation (EFF). MacRumors reports: In a series of tweets, the prominent privacy campaigner and whistleblower Edward Snowden highlighted concerns that Apple is rolling out a form of "mass surveillance to the entire world" and setting a precedent that could allow the company to scan for any other arbitrary content in the future. Snowden also noted that Apple has historically been an industry-leader in terms of digital privacy, and even refused to unlock an iPhone owned by Syed Farook, one of the shooters in the December 2015 attacks in San Bernardino, California, despite being ordered to do so by the FBI and a federal judge. Apple opposed the order, noting that it would set a "dangerous precedent." The EFF, an eminent international non-profit digital rights group, has issued an extensive condemnation of Apple's move to scan users' iCloud libraries and messages, saying that it is extremely "disappointed" that a "champion of end-to-end encryption" is undertaking a "shocking about-face for users who have relied on the company's leadership in privacy and security." The EFF highlighted how various governments around the world have passed laws that demand surveillance and censorship of content on various platforms, including messaging apps, and that Apple's move to scan messages and "iCloud Photos" could be legally required to encompass additional materials or easily be widened. "Make no mistake: this is a decrease in privacy for all "iCloud Photos" users, not an improvement," the EFF cautioned.Read more of this story at Slashdot.
Ransomware Attack Forces Indiana Hospital To Turn Ambulances Away
Hackers are going after U.S. hospitals with a fresh wave of cyberattacks this week just as coronavirus cases surge around the country. From a report: Eskenazi Health, a health-care service provider that operates a 315-bed hospital, inpatient facilities, and community health centers throughout Indianapolis, was crippled by a ransomware attack that began between 3:30 and 4 a.m. Wednesday morning, a spokesperson told The Daily Beast. By 8 a.m. Eskenazi Health was turning ambulances away and diverting patients to other hospitals as a result of the ransomware incident, the spokesperson said. "A ransomware attack happened," an Eskenazi spokesperson told The Daily Beast, confirming that all of Eskenazi Health's locations -- its hospital, its inpatient facilities, and its community health centers -- are impacted. The spokesperson added that Eskenazi Health was working to contain the ransomware by shutting down some services and operations in order to try to keep the malware from spreading through its systems. "They took all of our systems down so they wouldn't get breached," the spokesperson said, confirming email systems and electronic medical records were still down as of Thursday evening. Eskenazi Health is not alone. Sanford Health, a Sioux Falls, South Dakota-headquartered health system which includes 46 hospitals and care locations in 26 states and 10 countries, said in a statement Thursday it had been hit with a cyberattack in recent days as well. Sanford Health did not confirm whether it was the victim of ransomware, but president and CEO Bill Gassen confirmed to The Daily Beast it was working to "contain" the impact. In both the Sanford Health and Eskenazi Health cases, patient data and employee data were not affected, officials said.Read more of this story at Slashdot.
Apple Confirms It Will Begin Scanning iCloud Photos for Child Abuse Images
Apple will roll out a technology that will allow the company to detect and report known child sexual abuse material to law enforcement in a way it says will preserve user privacy. From a report: Apple told TechCrunch that the detection of child sexual abuse material (CSAM) is one of several new features aimed at better protecting the children who use its services from online harm, including filters to block potentially sexually explicit photos sent and received through a child's iMessage account. Another feature will intervene when a user tries to search for CSAM-related terms through Siri and Search. Most cloud services -- Dropbox, Google, and Microsoft to name a few -- already scan user files for content that might violate their terms of service or be potentially illegal, like CSAM. But Apple has long resisted scanning users' files in the cloud by giving users the option to encrypt their data before it ever reaches Apple's iCloud servers. Apple said its new CSAM detection technology -- NeuralHash -- instead works on a user's device, and can identify if a user uploads known child abuse imagery to iCloud without decrypting the images until a threshold is met and a sequence of checks to verify the content are cleared. News of Apple's effort leaked Wednesday when Matthew Green, a cryptography professor at Johns Hopkins University, revealed the existence of the new technology in a series of tweets. The news was met with some resistance from some security experts and privacy advocates, but also users who are accustomed to Apple's approach to security and privacy that most other companies don't have.Read more of this story at Slashdot.
Microsoft Announces 'Super Duper Secure Mode' for Edge
Microsoft said this week it plans to run an experiment in its Edge web browser where it will intentionally disable an important performance and optimization feature in order to enable more advanced security upgrades in what the company is calling Edge Super Duper Secure Mode. From a report: Announced today by Johnathan Norman, Microsoft Edge Vulnerability Research Lead, the idea behind the new Super Duper Secure Mode is to disable support for JIT (Just-In-Time) inside V8, the Edge browser's JavaScript engine. JIT, while unknown to most end-users, plays a crucial role in all of today's web browsers. JIT works by taking JavaScript and compiling it to machine code ahead of time. If the browser needs the code, it gains a significant speed boost. If it doesn't, the code is discarded. However, JIT support in V8 is complex. Norman said JIT-related security issues amounted to 45% of all V8 vulnerabilities in 2019. Furthermore, more than half of the "in the wild" Chrome exploits rely on JIT-related bugs. Norman said that recent tests carried out by the Edge team have shown that despite its pivotal role in speeding up browsers in the early and mid-2010s, JIT is not a crucial feature anymore to Edge's performance.Read more of this story at Slashdot.
Giraffes Have Been Misunderstood and Are Just as Socially Complex as Elephants, Study Says
An anonymous reader shares a report: With their crane-like necks, spindle legs and knobbly knees, giraffes are among the best loved and most recognizable of animals. Despite their elevated stature, however, giraffes have kept their surprisingly intricate social behavior under wraps. Once perceived as humble creatures that focused solely on feeding their majestic bodies, one book from 1991 described the giraffe as "socially aloof, forming no lasting bonds with its fellows and associating in the most casual way." But new research from the University of Bristol, published Tuesday in the journal Mammal Review, suggests giraffes have been misunderstood and are in fact a highly complex and social species. The most surprising thing for me is that it has taken until 2021 to recognize that giraffes have a complex social system. We have known for decades about other species of socially complex mammal, such as elephants, primates and cetaceans, but it is baffling to me how such a charismatic and well-known species as the giraffe could have been so understudied until recently," said Zoe Muller, study author and biologist at the University Of Bristol's School of Biological Sciences.Read more of this story at Slashdot.
Verizon Enlists AI in 5G Network Build-out
Verizon Communications is enlisting artificial intelligence models to help place thousands of 5G wireless transmitters for optimal performance. From a report: Later this year, the company will begin a multibillion-dollar rollout of midband spectrum, which expands coverage of its existing ultra wideband 5G wireless service. Maximizing coverage with the least number of transmitters is a priority, said Shankar Arumugavelu, senior vice president and global chief information officer of Verizon. "When we build out these networks, these are very capital-intensive," he said. "We have to make sure that we are being very judicious in terms of how we are investing our capital." The models, designed by in-house data scientists and other employees, factor in a number of variables that can alter the strength of 5G signals, like buildings, bridges, terrain, the position of the transmitter, as well as other transmitters nearby. Verizon, along with rivals AT&T and T-Mobile, is racing to build out nationwide 5G service, a yearslong effort slowed by the lack of available airwaves for fast transmission and long signal ranges, and by the deployment of new network equipment, analysts have said.Read more of this story at Slashdot.
Apple Plans To Scan US iPhones for Child Abuse Imagery
Apple intends to install software on American iPhones to scan for child abuse imagery, Financial Times is reporting citing people briefed on the plans, raising alarm among security researchers who warn that it could open the door to surveillance of millions of people's personal devices. From the report: Apple detailed its proposed system -- known as "neuralMatch" -- to some US academics earlier this week, according to two security researchers briefed on the virtual meeting. The plans could be publicised more widely as soon as this week, they said. The automated system would proactively alert a team of human reviewers if it believes illegal imagery is detected, who would then contact law enforcement if the material can be verified. The scheme will initially roll out only in the US. The proposals are Apple's attempt to find a compromise between its own promise to protect customers' privacy and ongoing demands from governments, law enforcement agencies and child safety campaigners for more assistance in criminal investigations, including terrorism and child pornography. [...] "This will break the dam -- governments will demand it from everyone," said Matthew Green, a security professor at Johns Hopkins University, who is believed to be the first researcher to post a tweet about the issue. Alec Muffett, a security researcher and privacy campaigner who formerly worked at Facebook and Deliveroo, said Apple's move was "tectonic" and a "huge and regressive step for individual privacy. Apple are walking back privacy to enable 1984," he said.Read more of this story at Slashdot.
Biden Wants Half of New Cars Sold in 2030 To Be Hybrid or All-Electric
President Biden wants 50 percent of all new cars sold in the United States in 2030 to be all-electric, plug-in hybrid, or hydrogen-powered. From a report: In addition, his administration will propose new fuel economy and emissions standards that will more or less erase the Trump administration's rollback of the previous Obama-era rules covering cars made through 2025. Biden will also sign an executive order that tasks the Environmental Protection Agency (EPA) and National Highway Traffic Safety Administration (NHTSA) to develop aggressive long-term rules to support his 2030 target, ones that include medium- and heavy-duty vehicles as well. "When I say electric vehicles are the future, I'm not joking," read a tweet from the President on Wednesday night. This planned shift away from internal combustion engines is not as aggressive as the approaches that have been proposed or set in motion around the world. The European Union has proposed a de-facto ban on sales of new gas-powered passenger vehicles by 2035, though France has pushed back on the phaseout of hybrids, which still use fossil fuels. The United Kingdom wants to stop selling new combustion engine vehicles by 2030. China wants all new cars sold in 2035 to be hybrids at the very least, but is aiming for 50 percent to be plug-in hybrid, battery electric, or hydrogen-powered.Read more of this story at Slashdot.
Fed Governor Waller 'Highly Skeptical' of a Fed Digital Coin
Federal Reserve Governor Christopher Waller said he is "highly skeptical" about the need for the U.S. central bank to develop a digital currency. From a report: "While CBDCs continue to generate enormous interest in the United States and other countries, I remain skeptical that a Federal Reserve CBDC would solve any major problem confronting the U.S. payment system," Waller said in the text of remarks prepared for delivery Thursday to the American Enterprise Institute. The Federal Reserve Board stepped up its engagement on the possibility of a central bank digital currency in May when Chair Jerome Powell said the central bank will issue a paper outlining the Board's thinking on digital payments "with a particular focus on the benefits and risks associated with CBDC in the U.S. context." Powell said the central bank will also seek public comment on issues related to payments, financial inclusion, data privacy, and information security. The Boston Fed is also studying technologies around digital payments in conjunction with Massachusetts Institute of Technology in Cambridge, Mass.Read more of this story at Slashdot.
Qualcomm Tries To Outbid Magna For Veoneer
DrTJ writes: Chipmaker Qualcomm places a bid of $4.6bn for Swedish automotive company Veoneer. As of last week, Magna offered $3.8bn for the company. Qualcomm is making an 18% higher offer, or $37 per share. Veoneer focuses its business on ADAS (Advanced Driver Assistance Systems), including computer vision, radar sensing, LIDAR and drive policy software. Both Qualcomm and Magna states that they want to strengthen their ADAS position on the market by the purchase.Read more of this story at Slashdot.
US Taps Amazon, Google, Microsoft, Others To Help Fight Ransomware, Cyber Threats
The U.S. government is enlisting the help of tech companies, including Amazon, Microsoft and Google, to bolster the country's critical infrastructure defenses against cyber threats after a string of high-profile attacks. From a report: The Department of Homeland Security, on Thursday, is formally unveiling the initiative called the Joint Cyber Defense Collaborative. The effort will initially focus on combating ransomware and cyberattacks on cloud-computing providers, said Jen Easterly, director of the DHS's Cybersecurity and Infrastructure Security Agency. Ultimately, she said, it aims to improve defense planning and information sharing between government and the private sector. "This will uniquely bring people together in peacetime, so that we can plan for how we're going to respond in wartime," she said in an interview. Ms. Easterly was sworn in as CISA's director last month. She was previously a counterterrorism official in the Obama White House, and the commander of the Army's first cyber operations unit at the National Security Agency, America's cyberspy agency. Over the past year, ransomware attacks have disrupted large parts of daily life in the U.S. They have diverted ambulances, caused long lines at gas stations in the southeast, and disrupted the production of hot dogs and other meat products.Read more of this story at Slashdot.
The Slow Collapse of Amazon's Drone Delivery Dream
An anonymous reader quotes a report from Wired: Well over 100 employees at Amazon Prime Air have lost their jobs and dozens of other roles are moving to other projects abroad as the company shutters part of its operation in the UK, WIRED understands. Insiders claim the future of the UK operation, which launched in 2016 to help pioneer Amazon's global drone delivery efforts, is now uncertain. Those working on the UK team in the last few years, who spoke on condition of anonymity, describe a project that was "collapsing inwards," "dysfunctional" and resembled "organized chaos," run by managers that were "detached from reality" in the years building up to the mass redundancies. They told WIRED about increasing problems within Prime Air in recent years, including managers being appointed who knew so little about the project they couldn't answer basic work questions, an employee drinking beer at their desk in the morning and some staff being forced to train their replacements in Costa Rica. Amazon says it still has staff working for Prime Air in the UK, but has refused to confirm headcount. [...] An Amazon spokesperson says it will still have a Prime Air presence in the UK after the cuts, but refuses to disclose what type of work will take place. The spokesperson also refused to confirm, citing security reasons, if any of the test flights that once filled promotional videos will still take place in the UK. The spokesperson adds that the company has found positions in other parts of its business for some affected employees and that it will keep growing its presence in the region. The spokesperson did not confirm how many employees were offered other jobs internally.Read more of this story at Slashdot.
Spanish Engineers Extract Drinking Water From Thin Air
A Spanish company has devised a system to extract drinking water from thin air to supply arid regions where people are in desperate need. Reuters reports: "The goal is to help people," said Enrique Veiga, the 82-year-old engineer who invented the machine during a harsh drought in southern Spain in the 1990s. "The goal is to get to places like refugee camps that don't have drinking water." The devices made by his company, Aquaer, are already delivering clean, safe water to communities in Namibia and a Lebanese refugee camp. "In the villages we visited in Namibia, they were astonished, they didn't understand, asking where the water came from," he said. The machines use electricity to cool air until it condenses into water, harnessing the same effect that causes condensation in air-conditioning units. While other water generators based on similar technology require high ambient humidity and low temperatures to function effectively, Veiga's machines work in temperatures of up to 40 Celsius (104F) and can handle humidity of between 10% and 15%. A small machine can produce 50-75 liters a day, and be easily carried on a trolley, but bigger versions can produce up to 5,000 liters a day.Read more of this story at Slashdot.
Netflix Announces SpaceX Documentary On Civilian Mission Into Orbit
Netflix will stream a documentary next month which will follow the story of the world's first private all-civilian space orbit. Sky News reports: The group will board a SpaceX capsule next month and spend three days orbiting the Earth, becoming Netflix's first documentary "to cover an event in near real-time." The privately chartered flight will be commanded, funded and led by 38-year-old billionaire Jared Isaacman, and aim to support St Jude Children's Research Hospital to the tune of $200 million. He will be joined on board by Sian Proctor, a geoscientist and former NASA candidate, Christopher Sembroski, a US Airforce veteran, and Hayley Arceneaux, a doctor's assistant at St Jude and childhood cancer survivor. The group will apparently reach a higher altitude than the International Space Station as they orbit the planet in the SpaceX Dragon capsule, dubbed Inspiration4. The quick-turnaround documentary will be made in five parts, with the first two premiering on 6 September. Viewers have been promised behind the scenes access of the mission -- from their selection, to footage from inside the spacecraft while it orbits Earth.Read more of this story at Slashdot.
Amazon and Google Patch Major Bug in Their DNS-as-a-Service Platforms
At the Black Hat security conference Wednesday, two security researchers have disclosed a security issue impacting hosted DNS service providers that can be abused to hijack the platform's nodes, intercept some of the incoming DNS traffic, and then map customers' internal networks. From a report: Discovered by Shir Tamari and Ami Luttwak from cloud security company Wiz, the vulnerability highlights the amount of sensitive information collected by managed DNS platforms and their attractiveness from a cyber-espionage and intelligence data collection standpoint. Also known as DNS-as-a-Service providers, these companies effectively rent DNS servers to corporate entities. While it's not hard to run your own DNS name server, the benefit of using a service like AWS Route53 or the Google Cloud Platform is that companies can offload managing DNS server infrastructure to a third-party and take advantage of better uptime and top-notch security. Companies that sign up for a managed DNS provider typically have to onboard their internal domain names with the service provider. This typically means companies have to go to a backend portal and add their company.com and other domains to one of the provider's name servers (i.e., ns-1611.awsdns-09.co.uk). Once this is done, when a company employee wants to connect to an intranet app or an internet website, their computer will query the third-party DNS server for the IP address it needs to connect. What the Wiz team discovered was that several managed DNS providers did not blacklist their own DNS servers inside their backends.Read more of this story at Slashdot.
Australian Mathematician Discovers Applied Geometry Engraved on 3,700-year-old Tablet
An Australian mathematician has discovered what may be the oldest known example of applied geometry, on a 3,700-year-old Babylonian clay tablet. Known as Si.427, the tablet bears a field plan measuring the boundaries of some land. From a report: The tablet dates from the Old Babylonian period between 1900 and 1600 BCE and was discovered in the late 19th century in what is now Iraq. It had been housed in the Istanbul Archaeological Museum before Dr Daniel Mansfield from the University of New South Wales tracked it down. Mansfield and Norman Wildberger, an associate professor at UNSW, had previously identified another Babylonian tablet as containing the world's oldest and most accurate trigonometric table. At the time, they speculated the tablet was likely to have had some practical use, possibly in surveying or construction. That tablet, Plimpton 322, described right-angle triangles using Pythagorean triples: three whole numbers in which the sum of the squares of the first two equals the square of the third -- for example, 3^2 + 4^2 = 5^2.Read more of this story at Slashdot.
Russia Tells UN It Wants Vast Expansion of Cybercrime Offenses, Plus Network Backdoors, Online Censorship
An anonymous reader writes: Russia has put forward a draft convention to the United Nations ostensibly to fight cyber-crime. The proposal, titled "United Nations Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes," calls for member states to develop domestic laws to punish a far broader set of offenses than current international rules recognize. Russia, the ransomware hotbed whose cyber-spies were blamed for attacking US and allied networks, did not join the 2001 Budapest Convention on Cybercrime because it allowed cross-border operations, which it considers a threat to national sovereignty. Russian media outlet Tass also said the 2001 rules are flawed because they only criminalize nine types of cyber offenses. The new draft convention from Russia, submitted last week, defines 23 cybercrimes for discussion. Russia's proposed rule expansion, for example, calls for domestic laws to criminalize changing digital information without permission -- "the intentional unauthorized interference with digital information by damaging, deleting, altering, blocking, modifying it, or copying of digital information." The draft also directs members states to formulate domestic laws to disallow unsanctioned malware research -- "the intentional creation, including adaptation, use and distribution of malicious software intended for the unauthorized destruction, blocking, modification, copying, dissemination of digital information, or neutralization of its security features, except for lawful research." It would forbid "the creation and use of digital data to mislead the user," such as deep fakes -- "the intentional unlawful creation and use of digital data capable of being mistaken for data already known and trusted by a user that causes substantial harm."Read more of this story at Slashdot.
Microsoft Exchange Used To Hack Diplomats Before 2021 Breach
An anonymous reader shares a report: Late last year, researchers at the Los Angeles-based cybersecurity company Resecurity stumbled across a massive trove of stolen data while investigating the hack of an Italian retailer. Squirreled away on a cloud storage platform were five gigabytes of data that had been stolen during the previous three and half years from foreign ministries and energy companies by hacking their on-premises Microsoft Exchange servers. In all, Resecurity researchers found documents and emails from six foreign ministries and eight energy companies in the Middle East, Asia and Eastern Europe. The attacks, which haven't been previously reported, served as a prequel to a remarkably similar, widely publicized hack of Microsoft Exchange servers from January to March of this year, according to Resecurity. A person familiar with the investigation into the 2021 attack, who wasn't authorized to speak publicly and requested anonymity, made a similar allegation, saying the data theft discovered by Resecurity followed the same methods. The 2021 hack was extraordinary for its scope, infecting as many as 60,000 global victims with malware. Microsoft quickly pinned the 2021 cyberattack on a group of Chinese state-sponsored hackers it named Hafnium, and the U.S., U.K., and their allies made a similar claim last month, attributing it to hackers affiliated with the Chinese government. Resecurity can't say for sure the attacks were perpetrated by the same group. Even so, the cache of documents contained information that would have been of interest to the Chinese government, according to Gene Yoo, Resecurity's chief executive officer. The person familiar said the victims selected by the hackers and type of intelligence gathered by attackers also pointed to a Chinese operation.Read more of this story at Slashdot.
Amazon To Cut Waste Following Backlash Over the Destruction of Unused Products
Amazon has launched two programs as part of an effort to give products a second life when they get returned to businesses that sell items on its platform or fail to get sold in the first place. From a report: The so-called Fulfilment by Amazon programs, announced in a blog post on Wednesday, will help to build a circular economy, the company said. It comes less than two months after British broadcaster ITV reported that Amazon was destroying millions of items of unsold stock at one of its 24 U.K. warehouses every year, including smart TVs, laptops, drones and hairdryers. The online giant was sharply criticized by U.K. lawmakers and environmental campaigners at the time and Prime Minister Boris Johnson pledged to look into the allegations. In a blog post on June 28, Greenpeace said ITV's investigation showed it was clear Amazon "works with within a business model built on greed and speed." The group also described the environmental and human cost of Amazon's wastefulness as "staggering."Read more of this story at Slashdot.
Leaked Document Says Google Fired Dozens of Employees for Data Misuse
Google has fired dozens of employees between 2018 and 2020 for abusing their access to the company's tools or data, with some workers potentially facing allegations of accessing Google user or employee data, according to an internal Google document obtained by Motherboard. From a report: The document provides concrete figures on an often delicate part of a tech giant's operations: investigations into how company's own employees leverage their position inside the company to steal, leak, or abuse data they may have access to. Insider abuse is a problem across the tech industry. Motherboard previously uncovered instances at Facebook, Snapchat, and MySpace, with employees in some cases using their access to stalk or otherwise spy on users. The document says that Google terminated 36 employees in 2020 for security related issues. Eighty-six percent of all security-related allegations against employees included mishandling of confidential information, such as the transfer of internal-only information to outside parties. 10 percent of all allegations in 2020 concerned misuse of systems, which can include accessing user or employee data in violation of Google's own policies, helping others to access that data, or modifying or deleting user or employee data, according to the document. In 2019, that figure was 13 percent of all security allegations.Read more of this story at Slashdot.
Microsoft Pauses Free Windows 365 Cloud PC Trials After 'Significant Demand'
Microsoft launched its new cloud PC Windows 365 service earlier this week, and the company has already had to pause free trials due to demand. From a report: Windows 365 lets you rent a cloud PC -- with a variety of CPU, RAM, and storage options -- and then stream Windows 10 or Windows 11 via a web browser. The service reached max capacity after only a day of signups. "Following significant demand, we have reached capacity for Windows 365 trials," reads a statement from the Microsoft 365 Twitter account. "We have seen unbelievable response to Windows 365 and need to pause our free trial program while we provision additional capacity," explains Scott Manchester, director of Windows 365 program management.Read more of this story at Slashdot.
Law School Applicants Surge 13%, Biggest Increase Since Dot-Com Bubble
An anonymous reader quotes a report from Reuters: The number of people applying for admission to law school this fall surged nearly 13%, making it the largest year-over-year percentage increase since 2002, according to the latest data from the Law School Admission Council. And they were an impressive bunch. The number of people applying with LSAT scores in the highest band of 175 to 180 more than doubled from 732 last year to 1,487 this year. In total, 71,048 people applied to American Bar Association-accredited law schools this cycle, up from 62,964 at this point in 2020. That's still significantly lower than the historic high of 100,601 applicants in 2004, but it's by far the largest national applicant pool of the past decade. Experts attribute the crush of applications to a number of factors, particularly the slowdown in the entry-level job market caused by the COVID-19 pandemic. Law school and other graduate programs historically become more popular when jobs are tougher to come by in slow economies. Law school applicants shot up nearly 18% in 2002, amid the bursting of the so-called dot-com bubble. The number of people applying also climbed nearly 4% in 2009, amid the Great Recession. But current events separate from the economy also prompted more people to consider a law degree this cycle [...]. The death of George Floyd, the national reckoning over systemic racism and inequality, and the death of iconic U.S. Supreme Court Justice Ruth Bader Ginsburg all focused attention on the rule of law and the role lawyers play in pushing for a more equitable society. Election years also tend to yield more law school applicants.Read more of this story at Slashdot.
'Totally New' Idea Suggests Longer Days On Early Earth Set Stage For Complex Life
"A research team has proposed a novel link between how fast our planet spun on its axis, which defines the length of a day, and the ancient production of additional oxygen," reports Science Magazine. "Their modeling of Earth's early days, which incorporates evidence from microbial mats coating the bottom of a shallow, sunlit sinkhole in Lake Huron, produced a surprising conclusion: as Earth's spin slowed, the resulting longer days could have triggered more photosynthesis from similar mats, allowing oxygen to build up in ancient seas and diffuse up into the atmosphere." From the report: As a postdoc at the University of Michigan, Ann Arbor, Klatt had studied microbial mats growing on sediments in the Middle Island Sinkhole in Lake Huron. There, the water is shallow enough for the cyanobacteria to get enough sunlight for photosynthesis. Oxygen-depleted water and sulfur gas bubble up from the lake floor, creating anoxic conditions that roughly approximate conditions of early Earth. Scuba divers collected samples of the microbial mats and in the lab, Klatt tracked the amount of oxygen they released under various day lengths simulated with halogen lamps. The longer the exposure to light, the more of the gas the mats released. Excited, Klatt and Arjun Chennu, a modeler from the Leibniz Center for Tropical Marine Research, set up a numerical model to calculate how much oxygen ancient cyanobacteria could have produced on a global scale. When the microbial mat results and other data were plugged into this computer program, it revealed a key interaction between light exposure and the microbial mats. Typically, microbial mats "breathe" in almost as much oxygen at night as they produce during the day. But as Earth's spin slowed, the additional continuous hours of daylight allowed the simulated mats to build up a surplus, releasing oxygen into the water. As a result, atmospheric oxygen tracked estimated day length over the eons: Both rose in a stepped fashion with a long plateau. This "elegant" idea helps explain why oxygen didn't build up in the atmosphere as soon as cyanobacteria appeared on the scene 3.5 billion years ago, says Timothy Lyons, a biogeochemist at the University of California, Riverside. Because day length was still so short back then, oxygen in the mats never had a chance to build up enough to diffuse out. "Long daytimes simply allow more oxygen to escape to the overlying waters and eventually the atmosphere," Lyons says. Still, Lyons and others say, many factors likely contributed to the rise in oxygen. For example, Fischer suspects free-floating cyanobacteria, not just those in rock-affixed mats, were big players. Benjamin Mills, an Earth system modeler at the University of Leeds, thinks the release of oxygen-binding minerals by ancient volcanoes likely countered the early buildup of the gas at times and should be factored into oxygen calculations. Nonetheless, changing day length "is something that should be considered in more detail," he says. "I'll try to add it to our Earth system models."Read more of this story at Slashdot.
What if Highways Were Electric? Germany Is Testing the Idea.
An electrified highway is theoretically the most efficient way to eliminate truck emissions. But the political obstacles are daunting. From a report: Traton is among the backers of the so-called eHighway south of Frankfurt, a group that also includes Siemens and Autobahn GmbH, the government agency that oversees German highways. There are also short segments of electrified road in the states of Schleswig-Holstein and Baden-Wurttemberg. The technology has been tried in Sweden and, in 2017, on a one-mile stretch near the Port of Los Angeles. So far the sections of highway equipped with overhead cable in Germany are short -- about three miles long in both directions near Frankfurt. Their purpose is to test how the system performs in everyday use by real trucking companies hauling real goods. By the end of the year more than 20 trucks will be using the systems in Germany. Enter Mr. Schmieder, who learned to drive a truck in the German army, and his employer, a trucking firm called Schanz Spedition in the small town of Ober-Ramstadt, in a hilly, thickly forested region about a 35-mile drive from Frankfurt. If the eHighway is ever going to be rolled out on a large scale, it has to work for companies like Schanz, a family-owned firm managed by Christine Hemmel and Kerstin Seibert, sisters who are great-granddaughters of the founder. Their father, Hans Adam Schanz, though technically retired, was at the wheel of a forklift maneuvering pallets into the back of a truck recently as Mr. Schmieder climbed into the cab for his second run of the day hauling paint to a distribution center in Frankfurt.Read more of this story at Slashdot.
Study: Which Countries Will Best Survive a Collapse?
An anonymous reader quotes a report from The New York Times: Will civilization as we know it end in the next 100 years? Will there be any functioning places left? These questions might sound like the stuff of dystopian fiction. But if recent headlines about extreme weather, climate change, the ongoing pandemic and faltering global supply chains have you asking them, you're not alone. Now two British academics, Aled Jones, director of the Global Sustainability Institute at Anglia Ruskin University in Cambridge, England, and his co-author, Nick King, think they have some answers. Their analysis, published in July in the journal Sustainability, aims to identify places that are best positioned to carry on when or if others fall apart. They call these lucky places "nodes of persisting complexity." The winner, tech billionaires who already own bunkers there will be pleased to know, is New Zealand. The runners-up are Tasmania, Ireland, Iceland, Britain, the United States and Canada. The findings were greeted with skepticism by other academics who study topics like climate change and the collapse of civilization. Some flat-out disagreed with the list, saying it placed too much emphasis on the advantages of islands and failed to properly account for variables like military power. And some said the entire exercise was misguided: If climate change is allowed to disrupt civilization to this degree, no countries will have cause to celebrate. "For his study, he built on the University of Notre Dame's Global Adaptation Initiative, which ranks 181 countries annually on their readiness to successfully adapt to climate change," the NYT adds. "He then added three additional measures: whether the country has enough land to grow food for its people; whether it has the energy capacity to 'keep the lights on,' as he put it in an interview; and whether the country is sufficiently isolated to keep other people from walking across its borders, as its neighbors are collapsing." "New Zealand comes out on top in Professor Jones's analysis because it appears to be ready for changes in the weather created by climate change. It has plenty of renewable energy capacity, it can produce its own food and it's an island, meaning it scores well on the isolation factor, he said."Read more of this story at Slashdot.
UK Considers Blocking Nvidia Takeover of ARM Over Security
According to Bloomberg, the U.K. is considering blocking a takeover of Arm by Nvidia due to potential risks to national security. SoftBank announced plans to sell Arm to U.S. chip company Nvidia last September for more than $40 billion. It's been under investigation and protested ever since. Bloomberg reports: In April, U.K. Culture Secretary Oliver Dowden asked the Competition and Markets Authority (CMA) to prepare a report on whether the deal could be deemed anti-competitive, along with a summary of any national security concerns raised by third parties. The assessment, delivered in late July, contains worrying implications for national security and the U.K. is currently inclined to reject the takeover, a person familiar with government discussions said. The U.K. is likely to conduct a deeper review into the merger due to national security issues, a separate person said. No final decision has been taken, and the U.K. could still approve the deal alongside certain conditions, the people added. Dowden is set to decide on whether the merger needs further examination by the U.K.'s competition authorities. "We continue to work through the regulatory process with the U.K. government," said an Nvidia spokesperson in a statement. "We look forward to their questions and expect to resolve any issues they may have."Read more of this story at Slashdot.
Theranos Patients: The Emerging Wild Card in the Trial of Elizabeth Holmes
The government hopes patient testimony -- if a judge allows it -- in the closely watched criminal fraud trial will support the charge that Elizabeth Holmes touted the company's medical tests as reliable despite knowing of bad results. The former executive has pleaded not guilty. From a report: After three back-to-back miscarriages, Brittany Gould said she turned to Theranos Inc. to know if her latest pregnancy was on track. Then, one of the company's trademark finger-prick tests indicated she was losing another baby, Ms. Gould said. The Mesa, Ariz., medical assistant recalled dreading the moment when she would have to tell her 7-year-old daughter, who was waiting for a sibling. "Mommy is not having a baby," Ms. Gould said she told her. Like those of other patients slated as potential witnesses in the criminal trial of Theranos founder Elizabeth Holmes , Ms. Gould's test was wrong. Prosecutors have accused Ms. Holmes of defrauding patients and investors by falsely claiming her invention could accurately perform lab tests on just a few drops of blood. The repeatedly delayed trial -- postponed once because Ms. Holmes was due to have a baby herself -- is expected to be one of the most widely watched corporate-fraud cases in years. Scheduled to begin with jury selection on Aug. 31 in San Jose, Calif., the trial features a star-studded list of potential witnesses, including ex-Theranos directors Henry Kissinger and Jim Mattis ; ex-Theranos lawyer David Boies ; and high-profile investors, including Riley Bechtel, the former chairman of Bechtel Corp., and Rupert Murdoch, chairman of Fox Corp. and executive chairman of News Corp, owner of The Wall Street Journal. The lineup also could include a handful of previously unknown patients -- if the court allows them to take the stand. Ms. Holmes's lawyers have argued the patient witnesses should be excluded, and they have already had success in limiting the scope of their testimony. A ruling by the judge to eliminate the patients would be considered a big win for Ms. Holmes, and could significantly change the nature of the trial.Read more of this story at Slashdot.
Google Chrome To No Longer Show Secure Website Indicators
Google Chrome will no longer show whether a site you are visiting is secure and only show when you visit an insecure website. Bleeping Computer reports: To further push web developers into only using HTTPS on their sites, Google introduced the protocol as a ranking factor. Those not hosting a secure site got a potentially minor hit in their Google search results rankings. It has appeared to have worked as according to the 'HTTPS encryption on the web' of Google's Transparency Report, over 90% of all browser connections in Google Chrome currently use an HTTPS connection. Currently, when you visit a secure site, Google Chrome will display a little locked icon indicating that your communication with the site is encrypted, as shown below. As most website communication is now secure, Google is testing a new feature that removes the lock icon for secure sites. This feature is available to test in Chrome 93 Beta, and Chrome 94 Canary builds by enabling the 'Omnibox Updated connection security indicators' flag. With this feature enabled, Google Chrome will only display security indicators when the site is not secure. For businesses who wish to have continued HTTPS security indicators, Google has added an enterprise policy for Chrome 93 named 'LockIconInAddressBarEnabled' that can be used to enable the lock icon again on the address bar.Read more of this story at Slashdot.
AMD Ryzen 5000G Series Launches With Integrated Graphics At Value Price Points
MojoKid writes: AMD is taking the wraps off of its latest integrated processors known as Ryzen 7 5700G and the Ryzen 5 5600G. As their branding suggests, these new products are based on the same excellent AMD Zen 3 core architecture, but with integrated graphics capabilities on board as well, hence the "G" designation. AMD is targeting more mainstream applications with these chips. The Ryzen 7 5700G is an 8-core/16-thread CPU with 4MB of L2 cache and 16MB of L3. Those CPU cores are mated to an 8 CU (Compute Unit) Radeon Vega graphics engine, and it has 24 lanes of PCIe Gen 3 connectivity. The 5700G's base CPU clock is 3.8GHz, with a maximum boost clock of 4.6GHz. The on-chip GPU can boost up to 2GHz, which is a massive uptick from the 1.4GHz of previous-gen 3000-series APUs. The Ryzen 5 5600G takes things down a notch with 6 CPU cores (12 threads) and a smaller 3MB L2 cache while L3 cache size remains unchanged. The 5600G's iGPU is scaled down slightly as well with only 7 CUs. At 3.9GHz, the 5600G's base CPU clock is 100MHz higher than the 5700G's, but its max boost lands at 4.4GHz with a slightly lower GPU boost clock of 1.9GHz. In the benchmarks, the Ryzen 5 5600G and Ryzen 7 5700G both offer enough multi-threaded muscle for the vast majority of users, often besting similar Intel 11th Gen Core series chips, with highly competitive single-thread performance as well.Read more of this story at Slashdot.
NYC Will Require Vaccines For Entry To Restaurants and Gyms; Requirement Can Be Met With An App
Mayor Bill de Blasio announced today that New York City will become the first major U.S. city to require proof of vaccination to enter all restaurants, fitness centers and indoor entertainment venues. "If you're unvaccinated, unfortunately, you will not be able to participate in many things," de Blasio said. "If you want to participate in our society fully, you've got to get vaccinated." As The Verge reports, "New Yorkers can meet those requirements by carrying their vaccination card or scanning and storing it in one of two authorized mobile apps." From the report: The spread of the highly contagious Delta variant is being cited as a reason to increase restrictions without returning to a full lockdown or other measures. The program is scheduled to launch on August 13th, with enforcement slated to start on September 13th. It doesn't introduce any new documentation; the name is a reference to it serving as a "key" to the city's recovery. Workers and patrons can confirm their vaccination status (at least one dose administered) in one of three ways: Vaccination card; NYC COVID Safe exposure notification app (iOS, Android); orNYS Excelsior Pass app.Read more of this story at Slashdot.
Google Will Kill Off Very Old Versions of Android Next Month
An anonymous reader quotes a report from Ars Technica: Google has started emailing users of very old Android devices to tell them it's time to say goodbye. Starting September 27, devices running Android 2.3.7 and lower will no longer be able to log in to Google services, effectively killing a big portion of the on-rails Android experience. As Google puts it in an official community post, "If you sign in to your device after September 27, you may get username or password errors when you try to use Google products and services like Gmail, YouTube, and Maps." Android is one of the most cloud-based operating systems ever. Especially in older versions, many included apps and services were tied to your Google login, and if that stops working, a large chunk of your phone is bricked. While Android can update many core components without shipping a full system update today, Android 2.3.7 Gingerbread, released around 10 years ago, was not so modular. The individual Google apps started to be updatable through the Android Market/Play Store, but signing in to Google was still a system-level service and is frozen in time. Any Google services wanting to allow sign-ins from those versions would have to conform to 2011-era security standards, which means turning off two-factor authentication and enabling a special "allow less-secure access" setting in your Google account. Really, these old Android versions have to die eventually because they're just too insecure. Google shows active user base breakdowns for Android versions in Android Studio, and Gingerbread has such a low device count that it doesn't even make the list. It's less than 0.2 percent of active devices, behind 14 other versions of Android. Users of these old devices could still sideload a third-party app store and find replacements for all the Google apps, but if you're a technical user and can't get a new device, there's a good chance you could load a whole new operating system with an aftermarket Android ROM. After September 27, the oldest version of Android you'll be able to sign in to is Android 3.0 Honeycomb, which is only for tablets.Read more of this story at Slashdot.
Proposed Federal Standard Would Require Cars To 'Prevent or Limit Operation' By Impaired Drivers
On Sunday, a bipartisan group of Senators published draft text of a massive new bipartisan infrastructure bill, proposing more than a trillion dollars in spending and a vast array of far-reaching provisions. But a little-noticed section in the bill could have significant implications in the fight against drunk driving, eventually mandating a new in-car safety technology to actively prevent Americans from driving while impaired. The Verge reports: Introduced under the heading "Advanced Impaired Driving Technology," the provision would require the Department of Transportation to set a new standard for detecting and preventing impaired driving. The bill calls on the secretary of transportation to release a standard within three years, with the requirement taking effect for new cars three years after that. The specific provisions of the standard are vague, but it would require cars to "passively monitor the performance of a driver of a motor vehicle to accurately identify whether that driver may be impaired" and "prevent or limit motor vehicle operation" if impairment is detected. The specific means of creating that system are still undetermined, but advocates say much of the technology is already available. Driver monitoring systems, which track a driver's face or eyelids to ensure they are alert and actively piloting the vehicle, are already offered in some models by Lexus, BMW, and Mercedes Benz. Systems like lane detection could also be used to detect impairment, creating an alert if the driver is consistently veering outside their lane. "Twenty years ago, this technology didn't exist," says Jason Levine of the Center for Auto Safety. "[But] we have the technology available now. We can install tech in vehicles that helps to monitor whether someone is impaired and stops that person from hurting themselves or others." Crucially, the new standard wouldn't be limited to drunk drivers. Because the systems measure impairment directly, they would be just as effective at detecting impairment from prescription drugs, emotional distress, or simple distraction. A longer-term effort would also seek to mandate passive alcohol monitoring systems, like those currently being developed by Volvo. While the provisions are aimed at creating a new mandatory requirement for automakers, such a requirement is still a long way off. Negotiations around the infrastructure bill are still in flux, and the provision could still be removed or altered by lawmakers. Even if it passes into law, the Department of Transportation will have wide leeway in how and when to implement the requirement and could easily delay it beyond the schedule set by Congress.Read more of this story at Slashdot.
...572573574575576577578579580581...