CNBC reports that El Salvador "is looking to introduce legislation that will make it the world's first sovereign nation to adopt bitcoin as legal tender, alongside the U.S. dollar."In a video broadcast to Bitcoin 2021, a multiday conference in Miami being billed as the biggest bitcoin event in history, President Nayib Bukele announced El Salvador's partnership with digital wallet company, Strike, to build the country's modern financial infrastructure using bitcoin technology. Strike founder and CEO Jack Mallers said this will go down as the "shot heard 'round the world for bitcoin...." Speaking from the mainstage, Mallers said the move will help unleash the power and potential of bitcoin for everyday use cases on an open network that benefits individuals, businesses, and public sector services... While details are still forthcoming about how the rollout will work, CNBC is told that El Salvador has assembled a team of bitcoin leaders to help build a new financial ecosystem with bitcoin as the base layer. "It was an inevitability, but here already: the first country on track to make bitcoin legal tender," said Adam Back, CEO of Blockstream.Read more of this story at Slashdot.
Slashdot reader ochinko (user #19,311) shares The Register's report about a recent presentation by Google engineer Peter Hochschild. His team discovered machines with higher-than-expected hardware errors that "showed themselves sporadically, long after installation, and on specific, individual CPU cores rather than entire chips or a family of parts."The Google researchers examining these silent corrupt execution errors (CEEs) concluded "mercurial cores" were to blame CPUs that miscalculated occasionally, under different circumstances, in a way that defied prediction...The errors were not the result of chip architecture design missteps, and they're not detected during manufacturing tests. Rather, Google engineers theorize, the errors have arisen because we've pushed semiconductor manufacturing to a point where failures have become more frequent and we lack the tools to identify them in advance. In a paper titled "Cores that don't count" [PDF], Hochschild and colleagues Paul Turner, Jeffrey Mogul, Rama Govindaraju, Parthasarathy Ranganathan, David Culler, and Amin Vahdat cite several plausible reasons why the unreliability of computer cores is only now receiving attention, including larger server fleets that make rare problems more visible, increased attention to overall reliability, and software development improvements that reduce the rate of software bugs. "But we believe there is a more fundamental cause: ever-smaller feature sizes that push closer to the limits of CMOS scaling, coupled with ever-increasing complexity in architectural design," the researchers state, noting that existing verification methods are ill-suited for spotting flaws that occur sporadically or as a result of physical deterioration after deployment. Facebook has noticed the errors, too. In February, the social ad biz published a related paper, "Silent Data Corruption at Scale," that states, "Silent data corruptions are becoming a more common phenomena in data centers than previously observed...." The risks posed by misbehaving cores include not only crashes, which the existing fail-stop model for error handling can accommodate, but also incorrect calculations and data loss, which may go unnoticed and pose a particular risk at scale. Hochschild recounted an instance where Google's errant hardware conducted what might be described as an auto-erratic ransomware attack. "One of our mercurial cores corrupted encryption," he explained. "It did it in such a way that only it could decrypt what it had wrongly encrypted." How common is the problem? The Register notes that Google's researchers shared a ballpark figure "on the order of a few mercurial cores per several thousand machines similar to the rate reported by Facebook."Read more of this story at Slashdot.
"Earthquakes shouldn't occur more than 300 kilometers below Earth's surface, according to most geophysical models," reports Science magazine. "Yet they commonly do — a phenomenon that has mystified seismologists for decades." Slashdot reader sciencehabit shares their report on one possible explanation: that water carried by the tectonic plates shoved beneath continents "could be triggering these deep temblors."The find may also explain another marvel: why a huge number of fist-size diamonds form at this depth... Steven Shirey, a geochemist at the Carnegie Institution for Science...and his team took a closer look at how water might make its way down deep... Regardless of depth, Shirey and his team found that once rocks in the slabs reached temperatures above 580 degrees C, they were less able to hold water. As that water flooded out of the slab, it weakened the surrounding rocks and triggered quakes, Shirey and his colleagues report in AGU Advances. This water, typically chock-full of dissolved minerals, would also be available to fuel diamond formation... "The temperature tells the story," says Douglas Wiens, a seismologist at Washington University in St. Louis who was not involved in the new study. If the tectonic slab starts out hot, as it would if the rocks are relatively young, he says, the plate will dehydrate at depths between 100 and 250 kilometers and thus won't carry water far enough down to generate deep quakes. But if rocks in the sinking slab are old and relatively cool, water will stay locked inside the sinking slab for a longer time, persisting there until it is released at depths of 300 to 500 kilometers or more. Further work in both the lab and the field will be needed to fully understand the relationships between water released from sinking slabs and deep earthquakes, Wiens says. In the meantime, he says, it's clear that diamonds that form at those depths, imperfections and all, will be critical to teasing out the details of the story.Read more of this story at Slashdot.
From today's edition of Mike Melanson's "This Week in Programming" column:If you've been using open source software for any amount of time, then you're well aware of the tangled web of dependencies often involved in such projects. If not, there's any number of tools out there that explore just how interconnected everything is, and this week Google has jumped into the game with its own offering — an exploratory visualization site called Open Source Insights that gives users an interactive view of dependencies of open source projects. Now, Google isn't the first to get into the game of trying to uncover and perhaps untangle the dizzying dependency graph of the open source world, but the company argues that it is more so trying to lay everything out in a way that developers can see, visually, just how, well, hopelessly screwed they really are. "There are tools to help, of course: vulnerability scanners and dependency audits that can help identify when a package is exposed to a vulnerability. But it can still be difficult to visualize the big picture, to understand what you depend on, and what that implies," they write. The Open Source Insights tool — currently "experimental" — gives users either a table or graphical visualization of how a project is composed, allowing them to explore the dependency graph and examine how using different versions of certain projects might actually affect that dependency graph. One of the benefits, Google notes, is that it allows users to see all this information "without asking you to install the package first. You can see instantly what installing a package — or an updated version — might mean for your project, how popular it is, find links to source code and other information, and then decide whether it should be installed." Currently, the tool supports npm, Maven, Go modules, and Cargo, with more packaging systems on the way soon...Read more of this story at Slashdot.
Version 9.4 of the GNU Compiler Collection "encompasses more than 190 bug fixes for GCC 9.3, which has been available since March 2020," reports DevClass. But they add that in addition, "Developers who want to contribute to the GNU Compiler Collection but don't feel like signing over copyright to the Free Software Foundation can get busy committing now."GCC Steering Committee member David Edelsohn informed contributors via the mailing list that the committee "decided to relax the requirement to assign copyright for all changes" to the FSF. Speaking for the committee, he wrote that the GCC project "will now accept contributions with or without an FSF copyright assignment", a practice thought of as consistent with that "of many other major Free Software projects, such as the Linux kernel". GCC "will continue to be developed, distributed and licensed" under the GPLv3, so nothing should change for those adding to the project under the old assumptions. There are those who have had troubles with that arrangement before, with Apple often cited as a popular example. They are now free to contribute utilising the Developer Certificate of Origin instead of agreeing to an FSF Copyright Assignment. A reason was not given, though the last sentence of the statement, which affirms the principles of Free Software, might give a clue. In March 2021, the committee commented on the removal of Richard Stallman from the project's steering committee website with a similar declaration... [T]hey felt like an association with Stallman was not serving the best interests of the GCC developers and user community, given that the "GCC Steering Committee is committed to providing a friendly, safe and welcoming environment for all." The Register notes that Red Hat senior principal engineer Mark Wielaard asked why there was no public discussion before making the change.Read more of this story at Slashdot.
The newspaper USA Today reports that it's "fighting a subpoena from the FBI demanding records that would identify readers of a February story" about a Southern Florida shooting that killed two of the investigative agency's agents and wounded three others. Long-time Slashdot reader schwit1 shares their report:In a motion filed in federal district court in Washington, D.C. asking a judge to quash the subpoena, Gannett, USA TODAY's parent company, said the effort is not only unconstitutional but also violates the Justice Department's own rules... The subpoena, issued in April, demands the production of records containing IP addresses and other identifying information "for computers and other electronic devices" that accessed the story during a 35-minute time frame starting at 8:03 p.m. on the day of the shooting. "Being forced to tell the government who reads what on our websites is a clear violation of the First Amendment," Maribel Perez Wadsworth, USA TODAY's publisher, said in a statement. "The FBI's subpoena asks for private information about readers of our journalism...." The subpoena, signed by an FBI agent in Maryland, said the records relate to a criminal investigation. But it's unclear how USA TODAY's readership records are related to the investigation of the Florida shooting, or why the FBI is focusing on the time frame. Wadsworth said Gannett's attorneys tried to contact the FBI before and after the company fought the subpoena in court, but she said the FBI has yet to provide any meaningful explanation of the basis for the subpoena. The FBI and the Justice Department declined to comment.Read more of this story at Slashdot.
An anonymous reader writes:This week the GitHub Yearbook went live, with 6794 "graduates" featured on a special web page showcasing "any student who has graduated, or plans to graduate, in 2021... This includes bootcamps, code camps, high school graduates, Master's graduates, Ph. D. Graduates, etc." (Students were added by submitting a pull request — as long as they'd also signed up for the GitHub Student Developer Pack.) The first 5,000 graduates received "swag," including a custom holographic card with their GitHub stats. But Saturday sees a special ceremony where these students will "walk" the stage at GitHub Graduation (starting at 9 a.m. PST). "We'll be hearing from special guests, giving out exclusive swag, and highlighting student stories and projects from around the world," explains the event's web page. Calling it "a day to celebrate our craft, our community, and how technology moves the world forward," a post on GitHub's blog invites viewers "to welcome them to a global community of innovative thinkers and impactful builders." It acknowledges the special challenges of 2021, saying "This year, thousands of students from around the world came together and redefined the world we live in, how we learn, and how we move forward," adding "We are honored to be part of the experience and eager to celebrate this milestone...." "During a devastating year, these graduates shined a light on what is possible. We saw project after project showcasing not only their skills, but also their passion and perseverance. This class is unstoppable!"Read more of this story at Slashdot.
Slashdot reader DevNull127 writes: Documents filed by Florida's health department now "confirm two of the core aspects" of a whistleblower complaint filed by fired data manager Rebekah Jones, the Miami Herald reported Friday. "Sworn affidavits from Department of Health leaders acknowledge Jones' often-denied claim that she was told to remove data from public access after questions from the Miami Herald." And they also report a position statement from the department (filed August 17th) acknowledging something even morning damning. While a team of epidemiologists at the Department of Health had developed data for the state's plan to re-open — their findings were never actually incorporated into that plan. Reached for comment, a spokesperson for governor Ron DeSantis still insisted to the Herald that "every action taken by Governor DeSantis was data-driven and deliberate." From the article:But when the Herald requested the data, data analysis, or data model related to reopening under Florida's open records law, the governor's office responded that there were no responsive records... Secrecy was a policy. Staffers were told not to put anything about the pandemic response into writing, according to four Department of Health employees who spoke on the condition of anonymity... Emails and texts reviewed by the Herald show the governor's office worked in coordination with Department of Health "executive leadership" to micromanage everything about the department's public response to the pandemic, from information requests from the press to specific wording and color choice on the Department of Health website and data dashboard. They slow-walked responses to questions on important data points and public records, initially withholding information and data on deaths and infections at nursing homes, state prisons and schools, forcing media organizations to file or threaten lawsuits. Important information that had previously been made public was redacted from medical examiner accounts of COVID-19 fatalities. At one point the state mischaracterized the extent of Florida's testing backlog by over 50 percent — skewing the information about how many people were getting sick each day — by excluding data from private labs, a fact that was only disclosed in response to questions from the press. Emails show that amid questions about early community spread, data on Florida's earliest potential cases — which dated back to late December 2019 — were hidden from the public by changing "date range of data that was available on the dashboard." Department of Health staffers interviewed by the Herald described a "hyper-politicized" communications department that often seemed to be trying to match the narrative coming from Washington. The Herald's article also "delved into the details of the department's operation," writes DevNull127 :For example, the whistleblower complaint of Rebekah Jones quotes the state's deputy health secretary as telling her pointedly that "I once had a data person who said to me, 'you tell me what you want the numbers to be, and I'll make it happen.'" Or, as Jones later described that interaction to her mother, "They want me to put misleading data up to support that dumb f***'s plan to reopen. And more people are gonna die because [of] this and that's not what I agreed to." Last Friday the health department's Office of the Inspector General announced they'd found "reasonable cause" to open an investigation into decisions and actions by Department of Health leadership that could "represent an immediate injury to public health." Meanwhile, Florida officials confirmed Friday night that their health department "will no longer update its Covid-19 dashboard and will suspend daily case and vaccine reports," according to the New York Times. "Officials will instead post weekly updates, becoming the first U.S. state to move to such an infrequent publishing schedule." Jones had been using that data to continue running her own online dashboard, and posted Friday in lieu of data that the dashboard's operation would now be interrupted "as I work to reformat the website to adjust for these changes...." But she promised to keep trying to help the people of Florida "in whatever capacity I can with the limitations the Department of Health is now putting on public access to this vital health information."Read more of this story at Slashdot.
Plans for an artificial island to house 35,000 people and protect the port of Copenhagen from rising sea levels have been approved by Danish MPs. The BBC reports: The giant island, named Lynetteholm, would be connected to the mainland via a ring road, tunnels and a metro line. The approval by Denmark's parliament paves the way for the 1 sq mile (2.6 sq km) project to begin later this year. But it faces opposition from environmentalists who have concerns over the impact of its construction. Plans for Lynetteholm include a dam system around its perimeter, with the aim of protecting the harbour from rising sea levels and storm surges. If construction goes ahead as planned, the majority of the foundations for the island off Denmark's capital should be in place by 2035, with an aim to fully complete the project by 2070. Some of the environmental concerns include the transportation of materials by road, which will involve large numbers of vehicles to move the 80 million tons of soil required to create the peninsula alone. "There are also concerns among environmentalists about the movement of sediment at sea and the possible impact on ecosystems and water quality," the report adds.Read more of this story at Slashdot.
An anonymous reader quotes a report from AppleInsider: The new WebExtensions Community Group will try to forge a common architecture for future web extensions, and is inviting developers to join the effort. The new group, shortened WECG, consists of members from each of the major browser developers. Member chairs are held by Timothy Hatcher of Apple and Simeon Vincent of Google. Current participants include employees from Apple, Mozilla, and Microsoft. The WebExtensions Community Group has two goals: Make extension creation easier for developers by specifying a consistent model and common core of functionality, APIs, and permissions; and Outline an architecture that enhances performance and is even more secure and resistant to abuse. The group doesn't want to specify every aspect of the web extensions platform or stifle innovation. Each browser vendor will continue to operate independently with their own policies. Developers and browser vendors interested in contributing to the group can join via the W3C website. The WECG has a dedicated GitHub repository with the community charter and work.Read more of this story at Slashdot.
On Monday, NASA's Juno spacecraft will come within 645 miles of the surface of Jupiter's largest moon, Ganymede. "The flyby will be the closest a spacecraft has come to the solar system's largest natural satellite since NASA's Galileo spacecraft made its penultimate close approach back on May 20, 2000," reports Phys.Org. From the report: Along with striking imagery, the solar-powered spacecraft's flyby will yield insights into the moon's composition, ionosphere, magnetosphere, and ice shell. Juno's measurements of the radiation environment near the moon will also benefit future missions to the Jovian system. Ganymede is bigger than the planet Mercury and is the only moon in the solar system with its own magnetosphere -- a bubble-shaped region of charged particles surrounding the celestial body. Juno's science instruments will begin collecting data about three hours before the spacecraft's closest approach. Along with the Ultraviolet Spectrograph (UVS) and Jovian Infrared Auroral Mapper (JIRAM) instruments, Juno's Microwave Radiometer's (MWR) will peer into Ganymede's water-ice crust, obtaining data on its composition and temperature. Signals from Juno's X-band and Ka-band radio wavelengths will be used to perform a radio occultation experiment to probe the moon's tenuous ionosphere (the outer layer of an atmosphere where gases are excited by solar radiation to form ions, which have an electrical charge).Read more of this story at Slashdot.
An anonymous reader quotes a report from Bloomberg: The hack that took down the largest fuel pipeline in the U.S. and led to shortages across the East Coast was the result of a single compromised password, according to a cybersecurity consultant who responded to the attack. Hackers gained entry into the networks ofColonial Pipeline Co.on April 29 through a virtual private network account, which allowed employees to remotely access the company's computer network, said Charles Carmakal, senior vice president at cybersecurity firm Mandiant, part of FireEye Inc., in an interview. The account was no longer in use at the time of the attack but could still be used to access Colonial's network, he said. The account's password has since been discovered inside a batch of leaked passwords on the dark web. That means a Colonial employee may have used the same password on another account that was previously hacked, he said. However, Carmakal said he isn't certain that's how hackers obtained the password, and he said investigators may never know for certain how the credential was obtained. The VPN account, which has since been deactivated, didn't use multifactor authentication, a basic cybersecurity tool, allowing the hackers to breach Colonial's network using just a compromised username and password. It's not known how the hackers obtained the correct username or if they were able to determine it on their own. "We did a pretty exhaustive search of the environment to try and determine how they actually got those credentials," Carmakal said. "We don't see any evidence of phishing for the employee whose credentials were used. We have not seen any other evidence of attacker activity before April 29." A little more than one week later, on May 7, an employee in Colonial's control room saw a ransom note demanding cryptocurrency appear on a computer just before 5 a.m. The employee notified an operations supervisor who immediately began to start the process of shutting down the pipeline, Colonial Chief Executive Officer Joseph Blount said in an interview. By 6:10 a.m., the entire pipeline had been shut down, Blount said. It was the first time Colonial had shut down the entirety of its gasoline pipeline system in its 57-year history, Blount said. "We had no choice at that point," he said. "It was absolutely the right thing to do. At that time, we had no idea who was attacking us or what their motives were."Read more of this story at Slashdot.
A heroic rat named Magawa is retiring from sniffing out dozens of land mines in Cambodia for the last five years. NPR reports: Magawa is a Tanzanian-born African giant pouched rat who was trained by APOPO to sniff out explosives. With careful training, he and his rat colleagues learn to identify land mines and alert their human handlers, so the mines can be safely removed. Even among his skilled cohorts working in Cambodia, Magawa is a standout sniffer: In four years he has helped to clear more than 2.4 million square feet of land. In the process, he has found 71 land mines and 38 items of unexploded ordnance. Last year, Magawa received one of Britain's highest animal honors. Magawa is part of a cohort of rats bred by APOPO for this purpose. He was born in Tanzania in 2014, socialized and moved to Siem Reap, Cambodia, in 2016 to begin his bomb-sniffing career. APOPO uses positive reinforcement methods that give the rats food rewards for accomplishing tasks such as finding a target or walking across a surface. Then they're trained in scent discrimination: choosing explosive smells over something else to get a food reward. Though they have terrible eyesight, the rats are ideal for such work, with their extraordinary sense of smell and their size -- they are too light to trigger the mines. When they detect a mine, they lightly scratch atop it, signaling to their handler what they've found. Their reward: a banana. [T]he rats hone their skills in a training field and are only cleared to begin work once they have perfect accuracy over an 8,600-square-foot area with various stages of complexity.Read more of this story at Slashdot.
WhatsApp will soon let you use the popular instant messaging app simultaneously on multiple devices, Facebook chief executive Mark Zuckerberg said. The instant messaging app, used by more than 2 billion users, also plans to add more options to its disappearing messages feature, top executives said. TechCrunch reports: Zuckerberg confirmed to news outlet WaBetaInfo that multi-device support will be arriving on the instant messaging service "soon." WhatsApp head Will Cathcart said users will be able to connect up to four devices to one account. The messaging firm is also working to introduce a dedicated WhatsApp app for the iPad, he said. The instant messaging service, which last year introduced the ability to set a seven-day timer on messages (disappearing mode), is now planning to expand this feature to let users share pictures and videos that can only be viewed once. WhatsApp users will also get an option to enforce disappearing mode across the app for all new chats. Zuckerberg and Cathcart told the news outlet -- and it's indeed the two of them talking -- that these features will be available to users in public beta "in the next month or two."Read more of this story at Slashdot.
After temporarily grounding its fleet of more than 500 DJI drones in January 2020 over cybersecurity concerns, the Pentagon has finally cleared two of DJI's drones of any security risks. An analysis of the two DJI drones built for government use found "no malicious code or intent" and are "recommended for use by government entities and forces working with US services," a report summary said. Pocketnow reports: Specifically, the Pentagon has cleared only two drone models so far -- the DJI Mavic Pro and Matrice 600 Pro. However, it will still come as a relief for the brand after being under the scanner for over security threats, especially after giants like HUAWEI have had to face terrible consequences after being blacklisted for similar reasons. DJI, on the other hand, has maintained that the company is not involved in any secretive data-sharing practices with the Chinese government and that its drones are safe to use. "This U.S. government report is the strongest confirmation to date of what we, and independent security validations, have been saying for years -- DJI drones are safe and secure for government and enterprise operations," a DJI spokesperson was quoted as saying. While two of DJI's drone models can now be again used by the Interior Department, there is no relief for the company regarding its inclusion on the Commerce Department's Entity List. Even though the sale of its product has not been banned, sourcing technology from US-based firms would still require approval, and then there are risks of supply chain disruption as well as reputation loss.Read more of this story at Slashdot.
An anonymous reader quotes a report from The Register: A scammer who convinced some of the world's biggest tech businesses to send him replacement kit has been sentenced to seven years and eight months in the U.S. prison system. Justin David May, 31, used stolen hardware serial numbers, a plethora of fake websites and online identities, social engineering tactics, and a network of associates, to scam Cisco out of nearly $3.5m in hardware in just 12 months. Microsoft lost 137 Surface laptops (retail cost $364,761) to the crew, with Lenovo US also losing 137 replacement hard drives worth $143,000 and APC (formerly American Power Conversion) getting scammed out of a few uninterruptible power supplies. May pled guilty to 42 counts of mail fraud, 10 counts of money laundering, three counts of interstate transportation of goods obtained by fraud, and two counts of tax evasion. In the largest scam against Cisco, run from April 2016, according to court documents [PDF] filed in eastern district court of Pennsylvania, May and the team set up domains and email addresses to mimic cisco.com user IDs and harvested serial numbers of legit machinery. They then used these to trick Cisco into sending out replacement kit, such as a Cisco Catalyst 3850-48P-E Switch worth around $21,000 at the time, and a couple of Cisco ASR 9001 routers priced at over $100,000 for the pair. The same scam worked well for Microsoft and Lenovo too, it seems. The court docs note that May was skilled at picking imaginary faults that weren't remotely repairable, such as basic software issues, but which were more obvious as serious flaws needing a replacement unit. In addition the crew digitally altered images of their supposed kit and serial numbers to fool support staff. Once the hardware was received, usually via UPS or FedEx, the companies never got the faulty kit back because it never existed. Meanwhile the packages were picked up, sold on eBay and other second-hand sites, and the cash pocketed, or in the case of Microsoft, some of the hardware shipped to Singapore for resale.Read more of this story at Slashdot.
A multi-platform Python-based malware targeting Windows and Linux devices has now been upgraded to worm its way into Internet-exposed VMware vCenter servers unpatched against a remote code execution vulnerability. BleepingComputer reports: The malware, dubbed FreakOut by CheckPoint researchers in January (aka Necro and N3Cr0m0rPh), is an obfuscated Python script designed to evade detection using a polymorphic engine and a user-mode rootkit that hides malicious files dropped on compromised systems. FreakOut spreads itself by exploiting a wide range of OS and apps vulnerabilities and brute-forcing passwords over SSH, adding the infected devices to an IRC botnet controlled by its masters. The malware's core functionality enables operators to launch DDoS attacks, backdoor infected systems, sniff and exfiltrate network traffic, and deploy XMRig miners to mine for Monero cryptocurrency. As Cisco Talos researchers shared in a report published today, FreakOut's developers have been hard at work improving the malware's spreading capabilities since early May, when the botnet's activity has suddenly increased. "Although the bot was originally discovered earlier this year, the latest activity shows numerous changes to the bot, ranging from different command and control (C2) communications and the addition of new exploits for spreading, most notably vulnerabilities in VMWare vSphere, SCO OpenServer, Vesta Control Panel and SMB-based exploits that were not present in the earlier iterations of the code," Cisco Talos security researcher Vanja Svajcer said. FreakOut bots scan for new systems to target either by randomly generating network ranges or on its masters' commands sent over IRC via the command-and-control server. For each IP address in the scan list, the bot will try to use one of the built-in exploits or log in using a hardcoded list of SSH credentials.Read more of this story at Slashdot.
The three major carriers in the U.S. have now agreed to start providing vertical location data for 911 calls, which will help first responders quickly locate 911 callers in multi-story buildings. XDA Developers reports: The FCC wrote in its announcement, "FCC Acting Chairwoman Jessica Rosenworcel today announced breakthrough agreements with America's three largest mobile phone providers to start delivering vertical location information in connection with 911 calls nationwide in the coming days. This information will help first responders quickly locate 911 callers in multi-story buildings, which will reduce response times and ultimately save lives." The FCC first announced in 2015 that carriers would be required to start sharing vertical location data. The original deadline was June 2nd, 2021, but AT&T, T-Mobile, and Verizon wanted an 18-month extension (allegedly due to issues testing the functionality during the COVID-19 pandemic). With the deadline rapidly approaching, the FCC began an investigation in April to find out what was taking carriers so long. All three major carriers have now agreed to start providing vertical location data to 911 call centers within the next seven days, and each company will pay a $100,000 settlement. The agreement also increases the scope of the vertical location data; instead of the data only being provided in select areas, vertical location information will be provided by carriers across the entire United States. However, it will likely take longer than a week for the vertical data to be used in most 9-1-1 call centers, as the change will require updated software and (possibly) additional training for emergency dispatchers.Read more of this story at Slashdot.
An anonymous reader quotes a report from Bloomberg: Apple is working on a new iPad Pro with wireless charging and the first iPad mini redesign in six years, seeking to continue momentum for a category that saw rejuvenated sales during the pandemic. The Cupertino, California-based company is planning to release the new iPad Pro in 2022 and the iPad mini later this year [...]. The main design change in testing for the iPad Pro is a switch to a glass back from the current aluminum enclosure. The updated iPad mini is planned to have narrower screen borders while the removal of its home button has also been tested. For the new Pro model, the switch to a glass back is being tested, in part, to enable wireless charging for the first time. Making the change in material would bring iPads closer to iPhones, which Apple has transitioned from aluminum to glass backs in recent years. Apple's development work on the new iPad Pro is still early, and the company's plans could change or be canceled before next year's launch [...]. Wireless charging replaces the usual power cable with an inductive mat, which makes it easier for users to top up their device's battery. It has grown into a common feature in smartphones but is a rarity among tablets. Apple added wireless charging to iPhones in 2017 and last year updated it with a magnet-based MagSafe system that ensured more consistent charging speeds. The company is testing a similar MagSafe system for the iPad Pro. Wireless charging will likely be slower than directly plugging in a charger to the iPad's Thunderbolt port, which will remain as part of the next models. As part of its development of the next iPad Pro, Apple is also trying out technology called reverse wireless charging. That would allow users to charge their iPhone or other gadgets by laying them on the back of the tablet. Apple had previously been working on making this possible for the iPhone to charge AirPods and Apple Watches. In addition to the next-generation iPad Pro and iPad mini, Apple is also working on a thinner version of its entry-level iPad geared toward students. That product is planned to be released as early as the end of this year, about the same time as the new iPad mini. Apple is still reportedly working on a technology similar to its failed AirPower, a charging mat designed to simultaneously charge an iPhone, Apple Watch and AirPods. People familiar with the matter said it's also internally investigating alternative wireless charging methods that can work over greater distances than an inductive connection.Read more of this story at Slashdot.
An anonymous reader writes: Data mining startup Stealth Data is working to help websites uncover the "individual names, phone numbers, emails and physical addresses" of the users who visit websites. This information "can include a website visitor's job title, employer, annual income, age, and personal and professional social media profiles" so that businesses can use this data for marketing purposes.Stealth Data's third co-founder Chad Sneed experienced marketing frustrations firsthand through his family's dealership, Dennis Sneed Ford in Gower, Missouri. Sneed, who's a vice president and partner, said the dealership spends a significant amount on marketing, from search engines to third-party advertising. A bulk of the dealership's website visitors were anonymous, however, which meant it couldn't follow-up with visitors to try and close a sale. Sneed wanted to unlock that information and started talking to the dealership's outside marketing firm, Phame Influence, to see if it was possible. Puckett, who co-founded Phame with Paris, also is a trial lawyer. "My lawyer hat instantly says no," Puckett said. But after digging further, he discovered it's legal and that using the information for cold calling and emailing is fair game.Co-founder Chad Sneed noted that he doesn't see any privacy issues.Read more of this story at Slashdot.
Bing, the search engine owned by Microsoft, is not displaying image results for a search for "Tank man," even when searching from the United States. The apparent censorship comes on the anniversary of China's violent crackdown on protests in Tiananmen Square in 1989. From a report: "There are no results for tank man," the Bing website reads after searching for the term. "Tank man" relates to the infamous image of a single protester standing in front of a line of Chinese tanks during the crackdown. China censors and blocks distribution of discussion of tank man and Tiananmen Square more generally. This year, anniversary events in Hong Kong have dwindled in size after authorities banned a vigil. Motherboard verified that the issue also impacts image searches on Yahoo and DuckDuckGo, which both use Bing.Read more of this story at Slashdot.
Marco Arment, a widely respected programmer, app developer and commentator on Apple, has analyzed Apple's arguments and its thinking as officially portrayed in its lawsuit against Epic. He writes: Apple's leaders continue todenydevelopers deny developers of two obvious truths: 1. That our apps provide substantial value to iOS beyond the purchase commissions collected by Apple.2. That any portion of our customers came to our apps from our own marketing or reputation, rather than the App Store. For Apple to continue to deny these is dishonest, factually wrong, and extremely insulting -- not only to our efforts, but to the intelligence of all Apple developers and customers. This isn't about the 30%, or the 15%, or the prohibition of other payment systems, or the rules against telling our customers about our websites, or Apple's many other restrictions. (Not today, at least.) It's about what Apple's leadership thinks of us and our work. It isn't the App Store's responsibility to the rest of Apple to "pay its way" by leveraging hefty fees on certain types of transactions. Modern society has come to rely so heavily on mobile apps that any phone manufacturer must ensure that such a healthy ecosystem exists as table stakes for anyone to buy their phones. Without our apps, the iPhone has little value to most of its customers today. If Apple wishes to continue advancing bizarre corporate-accounting arguments, the massive profits from the hardware business are what therefore truly "pay the way" of the App Store, public APIs, developer tools, and other app-development resources, just as the hardware profits must fund the development of Apple's own hardware, software, and services that make the iPhone appeal to customers. The forced App Store commissions, annual developer fees, and App Store Search Ads income are all just gravy. The "way" is already paid by the hardware -- but Apple uses their position of power to double-dip. And that's just business. Apple's a lot of things, and "generous" isn't one. But to bully and gaslight developers into thinking that we need to be kissing Apple's feet for permitting us to add billions of dollars of value to their platform is not only greedy, stingy, and morally reprehensible, but deeply insulting.Read more of this story at Slashdot.
Towns and cities across Scotland would be devastated if the country's coastline was hit by a tsunami of the kind that happened 8,200 years ago, according to an academics' study. From a report: While about 370 miles of Scotland's northern and eastern coastline were affected when the Storegga tsunami struck, the study suggests a modern-day disaster of the same magnitude would have worse consequences. The researchers at the universities of Sheffield, St Andrews and York attributed this to denser human populations and higher sea levels that could potentially destroy seafront and port areas of Arbroath, Stonehaven, Aberdeen, Inverness and Wick, all of which have significant built-up areas less than 10 metres above sea level and directly face the sea. The study which maps the impact of the ancient tsunami for the first time, used modelling to estimate how far the wave would have travelled inland. The estimates suggest the water could have encroached up to 18 miles inland. That distance today would probably leave a town such as Montrose, which overlooks a tidal lagoon and has a population of 12,000, completely devastated.Read more of this story at Slashdot.
Some 150 birds named for people tied to slavery and white supremacy could eventually get new monikers as part of an ongoing reckoning with racism within the world of birding. The Verge: That includes Jameson's firefinch, named for a British naturalist who bought a young girl while in Africa "as a joke" and then drew pictures of her being brutally killed. In a new story this week, Washington Post reporter Darryl Fears breaks down the horrific history of ornithology that has managed to be scrubbed clean in many history books. Fears also writes about the names these birds already had, given to them by Indigenous peoples who understood the animals long before white settlers supposedly "discovered" the creatures. There's a push now to return to some of those names or use new ones in local languages, which continue to be mocked by a cadre of birding elite that is still largely white. Just last year the American Ornithological Society apologized for "inappropriate comments" its members made nearly 10 years ago about a proposal to rename the Maui parrotbill to the Hawaiian name Kiwikiu.Read more of this story at Slashdot.
Amazon's massive cloud-computing unit is aggressively recruiting U.S. government officials as it pushes to make itself essential to branches such as the military and the intelligence community, POLITICO reported Friday. From the report: Since 2018, Amazon Web Services has hired at least 66 former government officials with acquisition, procurement or technology adoption experience, most hired directly away from government posts and more than half of them from the Defense Department. That's a small portion of AWS' tens of thousands of employees, but a particularly key group to its federal business. Other AWS hires have come from departments including Homeland Security, Justice, Treasury and Veterans Affairs. That's on top of more than 600 hires of government officials across all of Amazon during the same time -- itself a mark of the company's expanding footprint in the D.C. region. Amazon employs more than 1 million people overall, after adding 500,000 new jobs last year alone. The hiring spree highlights how tech companies are becoming more entrenched in the operations of the government itself -- and indispensable to Cabinet agencies and national security operations -- even as politicians shout about the danger of letting them get too powerful.Read more of this story at Slashdot.
Facebook announced Friday that former President Donald Trump's account will remain suspended for at least two years, setting a timetable for his potential return after its oversight board criticized the company's indefinite ban. From a report: "Given the gravity of the circumstances that led to Mr. Trump's suspension, we believe his actions constituted a severe violation of our rules which merit the highest penalty available under the new enforcement protocols," Facebook's vice president of global affairs Nick Clegg said in a blog post. "We are suspending his accounts for two years, effective from the date of the initial suspension on January 7 this year." The social media giant said after that period it would evaluate whether "the risk to public safety has receded," and make a call on his possible reinstatement.Read more of this story at Slashdot.
The Nigerian government suspended all Twitter operations in the country on Friday. From a report: Alhaji Lai Mohammed, the Nigerian minister of information and culture, said the decision stemmed from citizens using the platform for activities "capable of undermining Nigeria's corporate existence," according to a press release. The move follows Twitter's decision to remove a post by Nigeria's president Muhammadu Buhari that threatened to punish those responsible for recent attacks on electoral offices and police stations, and referenced the country's 1960s civil war that killed 1 million people, Reuters reported. "Those of us in the fields for 30 months, who went through the war, will treat them in the language they understand," Buhari said in a tweet before Twitter removed the post for violating its "abusive behavior" policy.Read more of this story at Slashdot.
A California man has filed for a class action lawsuit against PC manufacturer Dell, claiming that the company "intentionally misled and deceived" buyers of its Alienware Area 51-m R1 gaming laptop, which was advertised to be more upgradeable than other gaming notebooks. From a report: The plaintiff, Robert Felter, who is based in San Francisco, alleges that Dell misleads customers to believe that the laptop would be upgradeable, possibly into future generations of components. The case, Felter v. Dell Technologies, Inc. (3:21-cv-04187) has been filed with the United States District Court in the Northern District of California. The Alienware Area 51-m was announced at CES 2019 and launched soon after. (The complaint claims the announcement was made in the summer of 2019, which is incorrect.). Among the Area 51-m's biggest touted innovations were a user-replaceable CPU and GPU. At media briefings, Alienware representatives told the press that the CPU could be upgraded as long as it used Intel's Z390 chipset. The laptop used Intel's 9th Gen Core desktop processors, up to the Intel Core i9-9900K. Dell developed separate proprietary Dell Graphics Form Factor (DGFF) modules for the Nvidia graphics. The lawsuit, however, claims that consumers were told that "core components" (meaning the CPU and GPU) could be replaced beyond the current generation of hardware. "Dell's advertisement to the public didn't place any restrictions on the upgradeability of the laptop," lawyer David W. Kani said in an email to Tom's Hardware. "They also never disclosed that those with the highest spec CPU and/or GPU that their device would not be upgradeable."Read more of this story at Slashdot.
President Joe Biden signed an executive order on Thursday that bans U.S. entities from investing in dozens of Chinese companies with alleged ties to defense or surveillance technology sectors. From a report: The move, which his administration says expands the scope of a legally flawed Trump-era order, drew anger from Beijing. The Treasury Department will enforce and update on a "rolling basis" the new list of about 59 companies, which bars buying or selling publicly traded securities in target companies, and replaces an earlier list from the Department of Defense, senior administration officials told reporters. The order prevents U.S. investment from supporting the Chinese military-industrial complex, as well as military, intelligence, and security research and development programs, Biden said in the order. "In addition, I find that the use of Chinese surveillance technology outside the PRC and the development or use of Chinese surveillance technology to facilitate repression or serious human rights abuse constitute unusual and extraordinary threats," Biden said, using the acronym for the People's Republic of China.Read more of this story at Slashdot.
Google says it will scan the extensions users install in their Chrome browsers and warn users if they are adding an extension from a new or untrusted developer. From a report: The new extension scanning feature will be part of a Google security feature called Enhanced Safe Browsing, which Google added to Chrome in May last year. Google says trusted developers are those who adhere to the Chrome Web Store Developer Program Policies. "For new developers, it will take at least a few months of respecting these conditions to become trusted," the browser maker said in a blog post today. Currently, Google said that almost 75% of all extensions hosted on the Chrome Web Store were developed by "trusted developers." For the rest, the browser will show an alert like the one below if users had enabled Enhanced Safe Browsing in their Chrome settings page.Read more of this story at Slashdot.
UK and EU regulators are investigating Facebook over whether it is abusing its dominance in digital advertising. From a report: It marks the first time the regulators have coordinated on a major inquiry since Brexit, and strikes at the core of Facebook's revenues, which rely heavily on selling advertising on its platform. The investigation will consider whether the social media giant has unfairly used its vast trove of data to compete with individuals and businesses that post adverts on Facebook Marketplace -- where people buy and sell goods daily -- or the Facebook Dating platform, which launched in Europe last year. The Competition and Markets Authority (CMA) said it would work "closely" with the European commission to determine whether Facebook might be stifling competition by "abusing a dominant position in the social media or digital advertising markets." Facebook, which could be fined by regulators depending on their findings, has said that the investigations were launched "without merit."Read more of this story at Slashdot.
An anonymous reader quotes a report from TechCrunch: A change to TikTok's U.S. privacy policy on Wednesday introduced a new section that says the social video app "may collect biometric identifiers and biometric information" from its users' content. This includes things like "faceprints and voiceprints," the policy explained. Reached for comment, TikTok could not confirm what product developments necessitated the addition of biometric data to its list of disclosures about the information it automatically collects from users, but said it would ask for consent in the case such data collection practices began. The biometric data collection details were introduced in the newly added section, "Image and Audio Information," found under the heading of "Information we collect automatically" in the policy. This is the part of TikTok's Privacy Policy that lists the types of data the app gathers from users, which was already fairly extensive. The first part of the new section explains that TikTok may collect information about the images and audio that are in users' content, "such as identifying the objects and scenery that appear, the existence and location within an image of face and body features and attributes, the nature of the audio, and the text of the words spoken in your User Content." The policy also notes this part of the data collection is for enabling "special video effects, for content moderation, for demographic classification, for content and ad recommendations, and for other non-personally-identifying operations," it says. The more concerning part of the new section references a plan to collect biometric data. It states: "We may collect biometric identifiers and biometric information as defined under US laws, such as faceprints and voiceprints, from your User Content. Where required by law, we will seek any required permissions from you prior to any such collection." "The statement itself is vague, as it doesn't specify whether it's considering federal law, states laws, or both," adds TechCrunch. "It also doesn't explain, as the other part did, why TikTok needs this data. It doesn't define the terms 'faceprints' or 'voiceprints.' Nor does it explain how it would go about seeking the 'required permissions' from users, or if it would look to either state or federal laws to guide that process of gaining consent."Read more of this story at Slashdot.
7-11 announced Tuesday that it will be placing 500 EV chargers at 250 stores in the U.S. and Canada by the end of 2022. CNET reports: OK, but if they can't keep the Slurpee machine up and running, what kind of charging can users expect? Well, we don't know, and 7-11 isn't saying, but we do know that they will be DC fast-chargers, and it looks like they'll be supplied by ChargePoint, so we'd bet on anything from 60-ish kilowatts to 125 kilowatts. These new chargers will join 7-11's small network of 22 charging stations at 14 stores in four states, and the whole thing is a part of 7-11's ongoing work to reduce its carbon footprint.Read more of this story at Slashdot.
NASA is sending water bears and bobtail squid to the International Space Station, "as NASA researchers attempt to learn more about how the conditions of spaceflight can affect biological organisms and, by extension, future astronauts," writes Joe Hernandez via NPR. From the report: Tardigrades are microscopic organisms better known as "water bears" because of their shape and the fact that they commonly live in the water. (They have also been called, endearingly, "moss piglets.") Water bears can survive in conditions that would prove fatal for most other animals, such as exposure to extreme temperatures, pressure, and radiation. The fact that they are basically indestructible, according to NASA, makes them the perfect test subjects for an experiment about the effects of spaceflight on biological survival. Thousands of microbes live inside the human body and work to keep us healthy. But scientists don't have a clear picture of how microgravity -- which allows the kind of floating weightlessness experienced by astronauts when they travel into space -- affects those microbes. That is the subject of an ongoing NASA research program called the Understanding of Microgravity on Animal-Microbe Interactions, or UMAMI. Scientists will study whether microgravity has an impact on the relationship between newly hatched bobtail squid, or Euprymna scolopes, and their symbiotic bacterium, Vibrio fischeri. The goal is to use what they learn about the relationship between squid and the microbes to help better prepare astronauts for lengthy space missions and preserve their health while they're out there.Read more of this story at Slashdot.
An anonymous reader quotes a report from The New York Times: Researchers believe they've now pinpointed a previously unknown planetary-scale reset that occurred about 19 million years ago. This extinction event transpired in the world's oceans, and decimated shark populations. The boneless fishes still have not recovered from the damage, the team suggests in a paper published Thursday in Science. Scales cover the bodies -- and even the eyeballs -- of sharks. Known as "dermal denticles," these scales function like protective armor and their ridges also reduce drag as the animals swim, said Elizabeth C. Sibert, an oceanographer and paleontologist at Yale University. These scales are microscopic -- each one is only about the width of a human hair -- but sharks slough off about 100 denticles for each tooth they lose, making them common in the fossil record. This abundance makes them valuable to scientists seeking to understand the past, said Paul Harnik, a paleobiologist at Colgate University, not involved in the research. "It's a sheer numbers game." In 2015, Dr. Sibert received a box of mud spanning about 40 million years of history. The reddish clay, extracted from two sediment cores that had been drilled deep into the Pacific Ocean seafloor, contained fish teeth, shark denticles and other marine microfossils. Using a microscope and a very fine paintbrush, Dr. Sibert picked through the two sediments and counted the number of fossils in samples separated in time by several hundred thousand years. About halfway through her data set, Dr. Sibert spotted an abrupt change in the fossil record. Nineteen million years ago, the ratio of shark denticles to fish teeth changed drastically: Samples older than that tended to contain roughly one denticle for every five fish teeth (a ratio of about 20 percent), but more recent samples had ratios closer to 1 percent. That meant that sharks suddenly became much less common, relative to fish, during an era known as the early Miocene, Dr. Sibert concluded. Dr. Sibert and her collaborators, in an earlier study using the same data set, had also found that sharks declined in abundance by roughly 90 percent about 19 million years ago. These declines in relative and absolute shark abundance suggest that something happened to shark populations about 19 million years ago, Dr. Sibert concluded. But there was still the question of whether a true extinction occurred, she said. "We wanted to know if the sharks went extinct, or if they just became less prominent." To test the idea of an extinction, Dr. Sibert recruited Leah D. Rubin, a marine scientist then at the College of the Atlantic in Maine. Together, they developed a framework to identify distinct groups of denticles. The researchers settled on 19 denticle traits -- such as their shape and the orientation of their ridges. Dr. Sibert and Ms. Rubin sorted roughly 1,300 denticles into 88 groups. These groups don't correspond exactly to shark species, but seeing more groups is an indicator that a shark population is more diverse, the researchers proposed. Of the 88 denticle groups initially present before 19 million years ago, only nine persisted afterward. The reduction in shark diversity suggests that they experienced an extinction around that time, Dr. Sibert and Ms. Rubin concluded. In fact, this event was probably even more cataclysmic to sharks than the dinosaur-killing asteroid impact that occurred 66 million years ago, they said. "There were just a small fraction that survived into this post-extinction world," Dr. Sibert said. The researchers have no idea what caused this massive die-off. "There were no significant climatic changes in the early Miocene, and there's no evidence of an asteroid impact around that time," the report says.Read more of this story at Slashdot.
After being announced in 2017, the Atari VCS game console finally has a launch date: June 15th. HotHardware reports: However, pricing for the Atari VCS might leave many scratching their heads, especially considering that it is retro-centric and uses seriously underpowered hardware compared to modern gaming consoles from Sony and Microsoft. The base Onyx system is priced at $299, while an Onyx or Black Walnut All-in Bundle includes a wireless Classic Joystick and a wireless Modern Controller. Unfortunately, that bundle will set you back an eye-popping $399. The Atari VCS [...] uses a rather pokey AMD Ryzen R1606G embedded APU. [...] However, Atari says that the VCS can also function as a full-fledged PC. You can even install Windows 10 or Linux on it, turning it into a versatile multimedia computer. The hardware is reportedly capable of running 4K videos and includes a built-in "Vault" containing 100 retro Atari 2600 and arcade games. That's all well and good for those with a penchant for retro gaming, but remember that we're talking about games that debuted roughly 40 years ago. That nostalgia could run a bit thin when you're talking about a device that costs $299 and up. Atari says over 11,000 of its original Indiegogo campaign backers have already received their consoles. Everyone else will have to purchase directly from Atari or a third party.Read more of this story at Slashdot.
Samsung is killing the first-generation SmartThings Hub at the end of the month, kicking off phase two of its plan to shut down the SmartThings ecosystem and force users over to in-house Samsung infrastructure. "Phase one was in October, when Samsung killed the Classic SmartThings app and replaced it with a byzantine disaster of an app that it developed in house," writes Ars Technica's Ron Amadeo. "Phase three will see the shutdown of the SmartThings Groovy IDE, an excellent feature that lets members of the community develop SmartThings device handlers and complicated automation apps." From the report: The SmartThings Hub is basically a Wi-Fi access point -- but for your smart home stuff instead of your phones and laptops. Instead of Wi-Fi, SmartThings is the access point for a Zigbee and Z-Wave network, two ultra low-power mesh networks used by smart home devices. [...] The Hub connects your smart home network to the Internet, giving you access to a control app and connecting to other services like your favorite voice assistant. You might think that killing the old Hub could be a ploy to sell more hardware, but Samsung -- a hardware company -- is actually no longer interested in making SmartThings hardware. The company passed manufacturing for the latest "SmartThings Hub (v3)" to German Internet-of-things company Aeotec. The new Hub is normally $125, but Samsung is offering existing users a dirt-cheat $35 upgrade price. For users who have to buy a new hub, migrating between hubs in the SmartThings ecosystem is a nightmare. Samsung doesn't provide any kind of migration program, so you have to unpair every single individual smart device from your old hub to pair it to the new one. This means you'll need to perform some kind of task on every light switch, bulb, outlet, and sensor, and you'll have to do the same for any other smart thing you've bought over the years. Doing this on each device is a hassle that usually involves finding the manual to look up the secret "exclusion" input, which is often some arcane Konami code. Picture holding the top button on a paddle light for seven seconds until a status light starts blinking and then opening up the SmartThings app to unpair it. Samsung is also killing the "SmartThings Link for Nvidia Shield" dongle, which let users turn Android TV devices into SmartThings Hubs.Read more of this story at Slashdot.
In a company-wide memo to staff on Wednesday, CEO Tim Cook said workers must return to their desks for at least three days a week, though exceptions will be made. The BBC reports: Some staff members will be given the option to work the remaining two days remotely. Teams that require "in-person" work will return for four or five days. Apple also told staff they will be able to apply for the chance to work remotely for two weeks a year. However, managers will need to approve remote work requests. Mr Cook said that despite a smooth transition to remote working, it was not an adequate replacement for in-person collaboration. "For all that we've been able to achieve while many of us have been separated, the truth is that there has been something essential missing from this past year: each other," he said in the document. "Video conference calling has narrowed the distance between us, to be sure, but there are things it simply cannot replicate." He added: "I know I'm not alone in missing the hum of activity, the energy, creativity and collaboration of our in-person meetings and the sense of community we've all built."Read more of this story at Slashdot.
Facebook plans to end its controversial policy that shields politicians from the content moderation rules that apply to other users, a sharp reversal that could have global ramifications for how elected officials use the social network. From a report: The change, which Facebook is set to announce as soon as Friday, comes after the Oversight Board -- an independent group funded by Facebook to review its thorniest content rulings -- affirmed its decision to suspend former President Donald Trump but critiqued the special treatment it gives politicians, stating that the "same rules should apply to all users." The board gave Facebook till June 5th to respond to its policy recommendations.Read more of this story at Slashdot.
An anonymous reader quotes a report from Motherboard: [T]he routing algorithm designed for its Flex app by Amazon's research scientists often makes [Amazon delivery drivers cross two- or three-lane highways], according to a source with direct knowledge of Amazon's routing algorithm. In North America and Europe, roughly 85,000 contracted delivery drivers rely on this algorithm to do their jobs. While crossing the street in a quiet suburban neighborhood is probably safe, doing so on a 50 mph highway can be deadly. Motherboard spoke to Amazon delivery drivers who work in Florida, Illinois, Michigan, South Carolina, Tennessee, Indiana, and California who described sprinting across the street -- or the highway -- to follow the Flex app's directions. This app determines delivery routes for both Amazon's contracted delivery drivers, who drive Amazon-branded vans, and members of its independent contractor workforce, known as Amazon Flex drivers, who drive their own cars. When a driver has to make deliveries to several addresses that are clustered together, the Flex app combines them into a single stop, rather than make a stop at each address. Drivers call these "group stops," while Amazon research scientists and engineers tasked with optimizing routes that incorporate hundreds of stops per shift refer to this routing mechanism as "stop consolidation." These stops often include addresses on both sides of a street -- or highway. Rather than directing drivers to make a U-turn and deliver packages on one side of the street and then the other, the app instructs drivers to cross the street on foot. Depending on the size and number of packages, the driver might have to walk across the street multiple times, or run in order to meet Amazon's delivery quotas. Amazon's contracted delivery drivers must use the app and follow its directions to make deliveries, meanwhile Amazon's gig workers -- who are independent contractors -- can manually change Amazon's routing order, but must use the app to make their deliveries. At Amazon, which pays delivery companies a fixed rate per delivery route each day regardless of how long it takes, the goal is to squeeze in as many deliveries as possible on a route, the source with internal knowledge of how Amazon creates its delivery routes said. "The main goal [at Amazon] is to make them deliver the most packages as possible in [a shift] because then we have to hire fewer drivers," the source familiar with Amazon's routing algorithm said. Hiring fewer drivers means the employer can pay less into worker's compensation, disability, and other employment benefits. Alexandra Miller, a spokesperson for Amazon Logistics, denied that Amazon delivery drivers frequently jaywalk across busy intersections and run across high-speed rural highways, and said that if the company identifies data quality issues or defects in its maps, it fixes them promptly. "Our routing system is designed to make the delivery experience as easy as possible for drivers and prioritizes same side of the street deliveries, unless the road is safe to cross," Miller said.Read more of this story at Slashdot.
Brian Krebs: Fake, positive reviews have infiltrated nearly every corner of life online these days, confusing consumers while offering an unwelcome advantage to fraudsters and sub-par products everywhere. Happily, identifying and tracking these fake reviewer accounts is often the easiest way to spot scams. Here's the story of how bogus reviews on a counterfeit Microsoft Authenticator browser extension exposed dozens of other extensions that siphoned personal and financial data. After hearing from a reader about a phony Microsoft Authenticator extension that appeared on the Google Chrome Store, KrebsOnSecurity began looking at the profile of the account that created it. There were a total of five reviews on the extension before it was removed: Three Google users gave it one star, warning people to stay far away from it; but two of the reviewers awarded it between three and four stars. "It's great!," the Google account Theresa Duncan enthused, improbably. "I've only had very occasional issues with it." "Very convenient and handing," assessed Anna Jones, incomprehensibly.Read more of this story at Slashdot.
On Wednesday, crews were putting the final touches on the Bitcoin 2021 Convention, the world's largest-ever crypto-currency conference to be held this weekend at the Mana Convention Center in Wynwood. CBS4 Miami reports: Miami's crypto conference is expected to draw 50,000 people. The convention runs from Friday, June 4 through June 6th. The conference places Miami firmly in the landscape as the new Silicon Valley. "Miami is becoming the new capital of capital. It's becoming an innovative hub. It's becoming a tier 1 city of venture capital and innovation," said Brock Pierce. "A lot of the best and the brightest from Silicon Valley and New York have moved their businesses and their firms here." And Brock Pierce should know. He's the chairman of Bitcoin Foundation who has "mined" his way through the crypto world. Oh and by the way, he's a billionaire. "Mayor [Francis Suarez] has done an incredible job of saying 'come here, Miami is the place.' As a result of it, this has become the most important city in the United States," Pierce says.Read more of this story at Slashdot.
Catalin Cimpanu, reporting at Record: Live streams for radio and TV stations owned by the Cox Media Group, one of the largest media conglomerates in the US, have gone down earlier today in what multiple sources have described as a ransomware attack. The incident took place earlier this morning and impacted live streaming capabilities for the Cox radio and TV stations. Official websites, telephone lines, and other IT systems remained running. While live streams for most of the impacted TV stations have now returned online, most of the Cox radio streams are still offline at the time of writing.Read more of this story at Slashdot.
Back in January, researchers warned that the iPhone 12 lineup and MagSafe accessories could potentially deactivate implanted medical devices. Now, the American Heart Association has released a study that corroborates these findings on a larger scale, noting that several devices from three major companies were "found to have magnetic susceptibility." Gizmodo reports: The initial study published in HeartRhythm was done on a single patient with a Medtronic implantable cardioverter-defibrillator (ICD). It was an important finding in terms of awareness, but raised questions as to whether this would impact ICDs from all device makers if the iPhone 12 lineup posed a greater risk than other magnetized devices, and what the impact on pacemakers might be. The AHA's study offers a few preliminary insights into what those answers might be. In the study, researchers observed the impact of an iPhone 12 Pro Max on both ICDs and pacemakers from multiple device makers, as well as conducted both in vivo and ex vivo tests. In vivo refers to tests done on actual patients with an implanted medical device, while the ex vivo tests were done on 11 unboxed devices. The devices tested came from Medtronic, Abbot, and Boston Scientific. (You can see exactly which ICDs and pacemakers were tested in the study itself.) In 100% of the three in vivo tests, the iPhone 12 Pro Max triggered the devices' magnet reversion mode. That said, the Boston Scientific pacemaker was found to be less susceptible as it only triggered a temporary response. In ex vivo testing, magnetic interference was detected in 8 out of 11 devices, or 72.7%. There are a few things to note here. How seriously a device is impacted may depend on the sensors or components used. The study notes that magnetic interference can occur when medical devices are exposed to magnetic fields as little as 10G. According to the researchers, the iPhone 12 Pro Max has a magnetic field strength of over 50G. However, the ex vivo devices tested didn't respond uniformly. Some were only temporarily disrupted, others had sustained asynchronous pacing, and three weren't impacted at all. The researchers suggest that in the case of a Boston Scientific Accolade MRI pacemaker, the device may not have been affected because it requires a magnet stronger than 70G. After the HeartRhythm study was published, Apple issued additional guidance urging consumers with implanted medical devices to keep iPhone 12 devices more than 6 inches away, or more than 12 inches if wirelessly charging. It also recommended those people consult with both their physician and device manufacturer.Read more of this story at Slashdot.
An anonymous reader quotes a report from Bloomberg: Hart InterCivic Inc., one of the largest voting machine makers in the U.S., will incorporate Microsoft's vote-tracking system into its in-person machines, adding a layer of security that may help reduce heightened attacks on the legitimacy of U.S. election results. The program will allow people to confirm their votes were counted after they're cast. The partnership makes Hart the first manufacturer in the U.S. to allow local voting jurisdictions to incorporate ballot-tracking software into machines, the companies said Thursday in a joint statement. The program will let voters track their choices and offer security experts using Hart's system the opportunity to independently audit results using Microsoft's ElectionGuard software. The technology would not change the process for voters. In most cases, voters would still fill out their ballots the same way they did in November 2020, either using a touchscreen or by hand-marking a ballot. Once they submit their ballots, voters will receive a piece of paper with a verification or QR code, which they can input into their local election jurisdiction's website to track their ballot through the tabulation process. The process is done without revealing the content of the voter's ballot while maintaining the privacy and secrecy of their selections, according to the statement. The system will also allow third-parties, including political parties or news organizations, to write their own programs to confirm election tallies.Read more of this story at Slashdot.
The Biden administration will make $1 billion in grants available to expand broadband access and adoption on tribal lands, Vice President Kamala Harris announced at the White House Thursday. From a report: The funds, from the Commerce Department's National Telecommunications and Information Administration (NTIA), will be made to eligible Native American, Alaska Native, and Native Hawaiian entities for broadband deployment, to support digital inclusion, workforce development, telehealth, and distance learning. "For generations, a lack of infrastructure investment in Indian Country has left Tribes further behind in the digital divide than most areas of the country," Department of Interior Secretary Deb Haaland said in a statement. "We have a responsibility as a country to build infrastructure that will fuel economic development, keep communities safe, and ensure everyone has opportunities to succeed." According to the Commerce Department, census figures show only half of households on tribal lands subscribe to home internet service, and some areas lack even the most basic cellphone reception. More than 20 percent of people living on tribal lands don't have broadband access at home. And during the pandemic as schools closed, some students at tribal-serving schools had to drive for miles to find a strong enough connection to participate in online classes.Read more of this story at Slashdot.
The U.S. Department of Justice is elevating investigations of ransomware attacks to a similar priority as terrorism in the wake of the Colonial Pipeline hack and mounting damage caused by cyber criminals, a senior department official told Reuters. From the report: Internal guidance sent on Thursday to U.S. attorney's offices across the country said information about ransomware investigations in the field should be centrally coordinated with a recently created task force in Washington. "It's a specialized process to ensure we track all ransomware cases regardless of where it may be referred in this country, so you can make the connections between actors and work your way up to disrupt the whole chain," said John Carlin, acting deputy attorney general at the Justice Department. Last month, a cyber criminal group that the U.S. authorities said operates from Russia, penetrated a pipeline operator on the U.S. East Coast, locking its systems and demanding a ransom. The hack caused a shutdown lasting several days, led to a spike in gas prices, panic buying and localized fuel shortages in the southeast. Colonial Pipeline decided to pay the hackers who invaded their systems nearly $5 million to regain access, the company said.Read more of this story at Slashdot.
Apple said it's adjusting its approach to its AirTags sensors, changing the time they play an alert when separated from their owner, and also creating new ways to warn people an unexpected AirTag or Find My network-enabled device is nearby. From a report: The tech giant said Thursday it's begun sending out updates to its AirTags, changing the window of time they'll make noises when potentially being used to track another person. Initially, the Apple device would play in three days. Now it'll begin to play at a random time inside a window that lasts between 8 and 24 hours. To further reassure people about its AirTags, Apple said it's developing an app for Android devices that will help people "detect" an AirTag or Find My network-enabled device that may also be unsuspectedly "traveling" with them. Apple iPhones already have a similar alert system built into their devices. The Android app will be released later this year.Read more of this story at Slashdot.
Private equity giant Blackstone said on Thursday it has purchased media and data company IDG for $1.3 billion. IDG -- which runs consultancy firm IDC and a collection of tech publications including CIO, Computerworld, InfoWorld, Macworld, Network World, PCWorld, and Tech Hive -- was previously owned by Oriental Rainbow, LLC, a subsidiary of China Oceanwide Holdings Group. From a report: The media publishing arm was once a powerhouse in the 1990s tech publishing world, although its shine has faded in recent years as the publishing industry in general has come under intense pressure. The company has also been making some additions to the platform more recently with a stronger focus on data and analytics. Last year it bought Triblio, a marketing data platform to help companies deliver more personalized customer experiences. Last month it acquired Metri, an IT pricing service, which can help with IT budgeting and procurement. The latter could dovetail nicely with IDG's consulting services.Read more of this story at Slashdot.
The airline, which plans to buy planes from Boom Supersonic [Editor's note: the link may be paywalled; alternative source], a start-up, could become the first to offer ultrafast commercial flights since the Concorde stopped flying in 2003. From a report: The era of supersonic commercial flights came to an end when the Concorde completed its last trip between New York and London in 2003, but the allure of ultrafast air travel never quite died out. President Biden mused about supersonic flights when discussing his infrastructure plan in April. And on Thursday, United Airlines said it was ordering 15 jets that can travel faster than the speed of sound from Boom Supersonic, a start-up in Denver. The airline said it had an option to increase its order by up to 35 planes. Boom, which has raised $270 million from venture capital firms and other investors, said it planned to introduce aircraft in 2025 and start flight tests in 2026. It expects the plane, which it calls the Overture, to carry passengers before the end of the decade. But the start-up's plans have already slipped at least once, and it will have to overcome many obstacles, including securing approval from the Federal Aviation Administration and regulators in other countries. Even established manufacturers have stumbled when introducing new or redesigned planes. Boeing's 737 Max was grounded for nearly two years after two crashes.Read more of this story at Slashdot.