An anonymous reader quotes a report from NPR: Tennessee made history on Thursday, becoming the first U.S. state to sign off on legislation to protect musicians from unauthorized artificial intelligence impersonation. "Tennessee (sic) is the music capital of the world, & we're leading the nation with historic protections for TN artists & songwriters against emerging AI technology," Gov. Bill Lee announced on social media. The Ensuring Likeness Voice and Image Security Act, or ELVIS Act, is an updated version of the state's old right of publicity law. While the old law protected an artist's name, photograph or likeness, the new legislation includes AI-specific protections. Once the law takes effect on July 1, people will be prohibited from using AI to mimic an artist's voice without permission.Read more of this story at Slashdot.
Stability AI founder and chief executive Emad Mostaque has stepped down from the top role and the unicorn startup's board, the buzzy firm said. From a report: Stability AI, which has been backed by investors including Lightspeed Venture Partners and Coatue Management, doesn't have an immediate permanent replacement for the CEO role but has appointed its COO Shan Shan Wong and CTO Christian Laforte as interim co-CEOs, it said in a blog post. Stability AI, which has lost more than half a dozen key talent in recent quarters, said Mostaque is stepping down to pursue decentralized AI. In a series of posts on X, Mostaque opined that one can't beat "centralized AI" with more "centralized AI," referring to the ownership structure of top AI startups such as OpenAI and Anthropic.Read more of this story at Slashdot.
Florida Governor Ron DeSantis just signed into law HB 3 [PDF], a bill that will give parents of teens under 16 more control over their kids' access to social media and require age verification for many websites. From a report: The bill requires social media platforms to prevent kids under 14 from creating accounts, and delete existing ones. It also requires parent or guardian consent for 14- and 15-year-olds to create or maintain social media accounts and mandates that platforms delete social media accounts and personal information for this age group at the teen's or parent's request. Companies that fail to promptly delete accounts belonging to 14- and 15-year-olds can be sued on behalf of those kids and may owe them up to $10,000 in damages each. A "knowing or reckless" violation could also be considered an unfair or deceptive trade practice, subject to up to $50,000 in civil penalties per violation. The bill also requires many commercial apps and websites to verify their users' ages -- something that introduces a host of privacy concerns. But it does require websites to give users the option of "anonymous age verification," which is defined as verification by a third party that cannot retain identifying information after the task is complete.Read more of this story at Slashdot.
China has introduced new guidelines that will mean US microprocessors from Intel and AMD are phased out of government PCs and servers [Editor's note: the link may be paywalled; non-paywalled source], as Beijing ramps up a campaign to replace foreign technology with homegrown solutions. From a report: The stricter government procurement guidance also seeks to sideline Microsoft's Windows operating system and foreign-made database software in favour of domestic options. It runs alongside a parallel localisation drive under way in state-owned enterprises. The latest purchasing rules represent China's most significant step yet to build up domestic substitutes for foreign technology and echo moves in the US as tensions increase between the two countries. Washington has imposed sanctions on a growing number of Chinese companies on national security grounds, legislated to encourage more tech to be produced in the US and blocked exports of advanced chips and related tools to China.Read more of this story at Slashdot.
An anonymous reader shares a report: The number of landline users has plummeted with the rise of cellphones, and the 19th-century technology's days appear to be numbered. Providers like AT&T are looking to exit the business by transitioning customers to cellphones or home telephone service over broadband connections. But for many of the millions of people still clinging to their copper-based landline telephones, newer alternatives are either unavailable, too expensive, or are unreliable when it matters most: in an emergency. According to the National Center for Health Statistics, only a quarter of adults in the United States still have landlines and only around 5 percent say they mostly or only rely on them. The largest group of people holding onto their landlines are 65 and older. Meanwhile, more than 70 percent of adults are using wireless phones only. The copper lines used for traditional landlines carry electricity over the wires, so as long as a phone is corded or charged it will work during a power outage. Landlines are separate from cellular and broadband networks and are not affected by their outages, making them a necessary backstop in rural areas. Many of those same areas have inadequate cellular or internet coverage. "In three, four, maybe five years a lot of states are going to say 'Okay, it's permissible to discontinue service if you, the phone company, can demonstrate there's functional alternative service,'" says Rob Frieden, an Academy and Emeritus Professor of Telecommunications and Law at Pennsylvania State University. AT&T recently asked the California Public Utilities Commission to end its obligation to provide landline service in parts of the state. The Federal Communications Commission, which has to approve a request to end service, said it hasn't received one from AT&T.Read more of this story at Slashdot.
An anonymous reader shares a report: About 6,000 older Bitcoin mining machines in the US will soon be idled and sent to a warehouse in Colorado Springs where they'll be refreshed and resold to buyers overseas looking to profit from mining in lower-cost environs. Wholesaler SunnySide Digital operates the 35,000 square-foot facility taking in the equipment from a mining client. The outdated machines are among several hundred-thousand it expects to receive and refurbish around a major quadrennial update in the Bitcoin blockchain. Known as the halving, the late April event will slash the reward that's the main revenue stream for miners, who will try to lessen the impact by upgrading to the latest and most efficient technology. With electricity the biggest expense, mining companies including publicly traded giants Marathon Digital Holdings and Riot Platforms need to lower usage costs to maintain a positive margin. Their older computers may still bring a profit, just not likely in the US. Some 600,000 S19 series computers, which account for a majority of machines currently in use, are moving out of the US mostly to Africa and South America, according to an estimate by Ethan Vera, chief operating officer at crypto-mining services and logistics provider Luxor Technology in Seattle. In Bitcoin mining, specialized machines are used to validate transactions on the blockchain and earn operators a fixed token reward. Anonymous Bitcoin creator Satoshi Nakamoto baked in the once-every-four-years halving to maintain the hard cap of 21 million tokens. Next month's event is the fourth since 2012 and the reward will drop to 3.125 Bitcoin from 6.25 now.Read more of this story at Slashdot.
An anonymous reader shares a report: Nvidia earned its $2.2 trillion market cap by producing AI chips that have become the lifeblood powering the new era of generative AI developers from startups to Microsoft, OpenAI and Google parent Alphabet. Almost as important to its hardware is the company's nearly 20 years' worth of computer code, which helps make competition with the company nearly impossible. More than 4 million global developers rely on Nvidia's CUDA software platform to build AI and other apps. Now a coalition of tech companies that includes Qualcomm, Google and Intel, plans to loosen Nvidia's chokehold by going after the chip giant's secret weapon: the software that keeps developers tied to Nvidia chips. They are part of an expanding group of financiers and companies hacking away at Nvidia's dominance in AI. "We're actually showing developers how you migrate out from an Nvidia platform," Vinesh Sukumar, Qualcomm's head of AI and machine learning, said in an interview with Reuters. Starting with a piece of technology developed by Intel called OneAPI, the UXL Foundation, a consortium of tech companies, plans to build a suite of software and tools that will be able to power multiple types of AI accelerator chips, executives involved with the group told Reuters. The open-source project aims to make computer code run on any machine, regardless of what chip and hardware powers it. "It's about specifically - in the context of machine learning frameworks - how do we create an open ecosystem, and promote productivity and choice in hardware," Google's director and chief technologist of high-performance computing, Bill Hugo, told Reuters in an interview. Google is one of the founding members of UXL and helps determine the technical direction of the project, Hugo said. UXL's technical steering committee is preparing to nail down technical specifications in the first half of this year. Engineers plan to refine the technical details to a "mature" state by the end of the year, executives said. These executives stressed the need to build a solid foundation to include contributions from multiple companies that can also be deployed on any chip or hardware.Read more of this story at Slashdot.
Atlas VPN informed customers on Monday that it will discontinue its services on April 24, citing technological demands, market competition, and escalating costs as key factors in the decision. The company said it will transfer its paid subscribers to its sister company, NordVPN, for the remainder of their subscription period to ensure uninterrupted VPN services.Read more of this story at Slashdot.
Apple has been hit with a flurry of new consumer lawsuits accusing the iPhone maker of monopolizing the smartphone market, piggybacking on a sweeping antitrust case lodged by the U.S. Justice Department and 15 states last week. From a report: At least three proposed class actions have been filed since Friday in California and New Jersey federal courts by iPhone owners who claim Apple inflated the cost of its products through anticompetitive conduct. The lawsuits, seeking to represent millions of consumers, mirror the Justice Department's claims that Apple violated U.S. antitrust law by suppressing technology for messaging apps, digital wallets and other items that would have increased competition in the market for smartphones.Read more of this story at Slashdot.
The U.K. government has blamed China for a 2021 cyberattack that compromised the personal information of millions of U.K. voters. From a report: In a statement to lawmakers in Parliament on Monday, U.K. deputy prime minister Oliver Dowden attributed the 2021 data breach at the Electoral Commission to hackers working for the Chinese government. Dowden told lawmakers that the U.K. government "will not hesitate to take swift and robust actions wherever the Chinese government threatens the United Kingdom's interests." It's the first time the United Kingdom has attributed the breach since the cyberattack was first disclosed in 2023. The Electoral Commission, which maintains copies of the U.K. register of citizens eligible to vote, said at the time hackers took the names and addresses of an estimated 40 million U.K. citizens, including those who were registered to vote between 2014 and 2022 and overseas voters. The data breach began as early as 2021 but wasn't detected until a year later. In a statement Monday, the U.K. National Cyber Security Centre (NCSC) said it is "highly likely" that the Chinese hackers accessed and exfiltrated emails and data from the electoral register during the hack.Read more of this story at Slashdot.
FrankOVD shares a report: Here's a paragraph from the DOJ's antitrust lawsuit against Apple in full: "In addition to degrading the quality of third-party messaging apps, Apple affirmatively undermines the quality of rival smartphones. For example, if an iPhone user messages a non-iPhone user in Apple Messages -- the default messaging app on an iPhone -- then the text appears to the iPhone user as a green bubble and incorporates limited functionality: the conversation is not encrypted, videos are pixelated and grainy, and users cannot edit messages or see typing indicators. "This signals to users that rival smartphones are lower quality because the experience of messaging friends and family who do not own iPhones is worse -- even though Apple, not the rival smartphone, is the cause of that degraded user experience. Many non-iPhone users also experience social stigma, exclusion, and blame for 'breaking' chats where other participants own iPhones. This effect is particularly powerful for certain demographics, like teenagers -- where the iPhone's share is 85 percent, according to one survey. This social pressure reinforces switching costs and drives users to continue buying iPhones -- solidifying Apple's smartphone dominance not because Apple has made its smartphone better, but because it has made communicating with other smartphones worse."Read more of this story at Slashdot.
Dave Plummer, a former Microsoft developer, has shared the story behind the Format drive dialog box in Windows, which has remained unchanged for nearly three decades. According to Plummer, the dialog box was created as a temporary solution during the porting of code from Windows 95 to Windows NT, due to differences between the two operating systems. Plummer jotted down all the formatting options on a piece of paper and created a basic UI, intending it to be a placeholder until a more refined version could be developed. However, the intended UI improvement never materialized, and Plummer's temporary solution has persisted through numerous Windows versions, including the latest Windows 11. Plummer also admitted that the 32GB limit on FAT volume size in Windows was an arbitrary decision he made at the time, which has since become a permanent constraint.Read more of this story at Slashdot.
Boeing announced a major leadership overhaul Monday, with CEO Dave Calhoun set to step down at the end of 2024 amid mounting pressure from airlines and regulators over quality and manufacturing issues. Chairman Larry Kellner will also resign and depart the board at Boeing's annual meeting in May, the company said. He will be replaced as chair by Steve Mollenkopf, a Boeing director since 2020. Stan Deal, president and CEO of Boeing Commercial Airplanes, is leaving the company effective immediately. Stephanie Pope, who recently became Boeing's Chief Operating Officer after leading Boeing Global Services, will take over Deal's role. The shakeup comes as the aerospace giant faces increasing scrutiny following a series of production flaws and a recent incident involving a nearly new Boeing 737 Max 9, where a door plug blew out minutes into an Alaska Airlines flight on Jan. 5. Airlines and regulators have been calling for significant changes at Boeing to address these issues and restore confidence in the company's products. The leadership changes appear to be a response to these growing concerns. An excerpt from a letter the CEO wrote to employees, also on Monday: As you all know, the Alaska Airlines Flight 1282 accident was a watershed moment for Boeing. We must continue to respond to this accident with humility and complete transparency. We also must inculcate a total commitment to safety and quality at every level of our company. The eyes of the world are on us, and I know we will come through this moment a better company, building on all the learnings we accumulated as we worked together to rebuild Boeing over the last number of years.Read more of this story at Slashdot.
In a state where housing is expensive to build, to rent, or to buy - and not especially energy efficient - can a big blue robot make a difference? The Boston Globe reports on Reframe Systems, one of the companies "trying robots to make construction more efficient" - in this case, "working alongside humans in an assembly line to build small houses in a factory."[Its cofounders] learned to get robots and humans to work together while at Amazon, which has built more than 750,000 bots in Massachusetts and deployed them to distribution centers around the world. Advising the company are Amy Villeneuve, former chief operating officer of that Amazon division, and Charly Mwangi, a veteran of the carmakers Nissan, Tesla, and Rivian... Standing at one end of Reframe's factory, [cofounder Aaron] Small explained that the company's ambition is to build net-zero houses - houses that produce as much energy as they use - "twice as fast as traditional methods, twice as cheap, and with 10 times lower carbon" emissions. That means using large screws called helical piles to fix the house to the site, instead of a concrete foundation. (Concrete production generates large amounts of carbon dioxide.) The company buys recycled cellulose insulation to fill the walls. Solar panels go on the roof and triple-paned windows in the walls... Reframe's "microfactory" can produce between 30 and 50 homes a year, [cofunder Vikas] Enti said. Eventually, the company aims to set up larger factories around the country, all within an hour's drive of big cities. After a home is trucked to its final destination, "Electrical wires and plumbing are installed in both floors and walls as they're built," according to the article. "Employees toting iPads can refer to digital construction drawings and get step-by-step instructions about tasks from cutting lumber to connecting pipes." One of the co-founders says, "We like to compare it to Lego instructions."Read more of this story at Slashdot.
The European Union has launched investigations into Apple, Meta and Google under its sweeping new digital-competition law, adding to the regulatory scrutiny large U.S. tech companies are facing worldwide. From a report: The suite of probes [Editor's note: the link may be paywalled; official press release here] announced Monday are the first under the EU's Digital Markets Act law, which took effect earlier this month. They come less than a week after the Justice Department sued Apple over allegations it makes it difficult for competitors to integrate with the iPhone, ultimately raising prices for customers. Apple and Google will now face EU scrutiny of how they are complying with rules that say they must allow app developers to inform customers about alternative offers outside those companies' main app stores. The European Commission, the EU's executive arm, said it is concerned about constraints the tech companies place on developers' ability to freely communicate with users and promote their offers. The bloc will also examine changes that Google made to how its search results appear in Europe. The new digital competition law says companies cannot give their own services preference over similar services that are offered by rivals. Another probe will look at how Apple complies with rules that say users should be able to easily remove software applications and change default settings on their iPhones, as well as how the company shows choice screens that offer alternative search engine and browser options.Read more of this story at Slashdot.
In 2019 Los Angeles film/TV producer Brian Morrison painted Blockbuster's logo onto an old newspaper box - and then filled it up with used DVDs. "The Free Blockbuster movement slowly gained traction," reports the New York Times - aided at times by social media - "and eventually more than 200 other community boxes had opened from Louisiana to Canada and even Britain." Though it's not clear how many are still operational, a 37-year-old California opened a free "Blockbuster" library outside her home earlier this year, according to the article, "and stocks it with season-specific films, subversive books and free candy.""We are social animals; we want to go out into the world and engage with each other," said Brian Morrison, who keeps a lending library outside his home. He often refills it with DVDs and VHS tapes of TV series, horror movies and, on occasion, signed independent films, and said that it had encouraged interaction with his neighbors. Andrew Kevin Walker, a Los Angeles-based screenwriter, said he had visited secondhand stores especially to seek out films to leave in the boxes, including two sealed James Bond box sets and a copy of "Cobra," a 1986 film written by Sylvester Stallone. "It's an opportunity for people to really share their love of cinema, whether it be their favorite guilty pleasure or their favorite movie of all time," he said. Viewers with streaming fatigue say they are tired of chasing content that moves around an ever-expanding array of platforms or even disappears altogether, and some long for the physical media that was dominant until streaming took over. "I think it's great that folks are doing this, keeping the spirit of DVDs alive, circulating film[s] in and exchanging them," said Joe Pichirallo, a film producer and professor at New York University... Alfonso Castillo, who co-founded a Free Blockbuster on Long Island, N.Y., with his son, said the lending library sees regular turnover with people both taking and dropping off movies, including older people. "My sense is that for them, it's less of this cool novelty sort of ironic thing and more like, finally, there's a place to get DVDs again," he said. Award-winning filmmaker Ava DuVernay misses the commentary tracks on DVDs (along with director's cuts). But more importantly, they told the Times that when it comes to art, "nothing beats holding it in your hand... It is a part of the experience of consuming and experiencing art."Read more of this story at Slashdot.
The Los Angeles Times checks in on America's largest dam-removal project, which they say is now "revealing a stark landscape that had been underwater for generations." "A thick layer of muddy sediment covers the sloping ground, where workers have been scattering seeds and leaving meandering trails of footprints. In the cracked mud, seeds are sprouting and tiny green shoots are appearing."With water passing freely through tunnels in three dams, the Klamath River has returned to its ancient channel and is flowing unhindered for the first time in more than a century through miles of waterlogged lands. Using explosives and machinery, crews began blasting and tearing into the concrete of one of the three dams earlier this month... The emptying of the reservoirs, which began in January, is estimated to have released as much as 2.3 million tons of sediment into the river, abruptly worsening its water quality and killing nonnative perch, bluegill and bass that had been introduced in the reservoirs for fishing. Downstream from the dams, the river's banks are littered with dead fish. But tribal leaders, biologists and environmentalists say that this was part of the plan, and that the river will soon be hospitable for salmon to once again swim upstream to spawn... [The dams] blocked salmon from reaching vital habitat and degraded the river's water quality, contributing to toxic algae blooms in the reservoirs and disease outbreaks that killed fish... Workers have been drilling holes in the top of the Copco No. 1 Dam, placing dynamite and setting off blasts, then using machinery to chip away fractured concrete. The dam, which has been in place since 1918, is scheduled to be fully removed by the end of August. The smaller Copco No. 2 Dam was torn down last year as the project began. Two earthen dams, the Iron Gate and the John C. Boyle, remain to be dismantled starting in May. If the project goes as planned, the three dams will be gone sometime this fall, reestablishing a free-flowing stretch of river and enabling Chinook and coho salmon to swim upstream and spawn along about 400 miles of the Klamath and its tributaries. Meanwhile, teams of scientists and workers are focusing on restoring the landscape and natural vegetation on about 2,200 acres of denuded reservoir-bottom lands... River restoration advocates are optimistic. They say undamming the Klamath will demonstrate the potential for restoring free-flowing rivers elsewhere in California, and point to initial plans to remove two dams on the Eel River as another promising opportunity.Read more of this story at Slashdot.
The Baffler says a new publishing house launched earlier this month "brings Silicon Valley-style startup disruption to the business of books." Authors Equity has "a tiny core staff, offloading its labor to a network of freelancers," and like a handful of other publishers "is upending the way that authors get paid, eschewing advances and offering a higher percentage of profits instead." It is worth watching because its team includes several of the most important publishing people of the twenty-first century. And if it works, it will offer a model for tightening the connection between book culture and capitalism, a leap forward for the forces of efficiency and the fantasies of frictionless markets, ushering in a world where literature succeeds if and only if it sells.... Authors Equity's website presents its vision in strikingly neoliberal corporatespeak. The company has four Core Principles: Aligned Incentives; Bespoke Teams; Flexibility and Transparency; and Long-Term Collaboration. What do they mean by these MBA keywords? Aligned Incentives is explained in the language of human capital: "Our profit-share model rewards authors who want to bet on themselves." Authors, that is, take on more of the financial risk of publication. At a traditional publishing house, advances provide authors with guaranteed cash early in the process that they can use to live off while writing. With Authors Equity, nothing is guaranteed and nothing given ahead of time; an author's pay depends on their book's profits. In an added twist, "Profit participation is also an option for key members of the book team, so we're in a position to win together." Typically, only an author's agent's income is directly tied to an author's financial success, but at Authors Equity, others could have a stake. This has huge consequences for the logic of literary production. If an editor, for example, receives a salary and not a cut of their books' profits, their incentives are less immediately about profit, offering more wiggle room for aesthetic value. The more the people working on books participate in their profits, the more, structurally, profit-seeking will shape what books look like. "Bespoke Teams" is a euphemism for gigification. With a tiny initial staff of six, Authors Equity uses freelance workers to make books, unlike traditional publishers, which have many employees in many departments... Their fourth Core Principle - Long-Term Collaboration - addresses widespread frustration with a systemic problem in traditional publishing: the fetishization of debut authors who receive decent or better advances, fail to earn out, and then struggle to have a career. It's a real problem and one where authors' interests and capitalist rationalization are, as it were, aligned. Authors Equity sees that everyone might profit when an author can build a readership and develop their skill. The article concludes with this prediction. "It's not impossible that we'll look back in twenty years and see its founding as auguring the beginning of the startup age in publishing." Food for thought... Pulp-fiction mystery writer Mickey Spillane once said, "I'm a writer, not an author. The difference is, a writer makes money."Read more of this story at Slashdot.
"It's a bad day for bugs," joked TechCrunch on Wednesday. "Earlier today, Sentry announced its AI Autofix feature for debugging production code..." And then the same day, BleepingComputer reported that GitHub "introduced a new AI-powered feature capable of speeding up vulnerability fixes while coding."This feature is in public beta and automatically enabled on all private repositories for GitHub Advanced Security customers. Known as Code Scanning Autofix and powered by GitHub Copilot and CodeQL, it helps deal with over 90% of alert types in JavaScript, Typescript, Java, and Python... After being toggled on, it provides potential fixes that GitHub claims will likely address more than two-thirds of found vulnerabilities while coding with little or no editing. "When a vulnerability is discovered in a supported language, fix suggestions will include a natural language explanation of the suggested fix, together with a preview of the code suggestion that the developer can accept, edit, or dismiss," GitHub's Pierre Tempel and Eric Tooley said... Last month, the company also enabled push protection by default for all public repositories to stop the accidental exposure of secrets like access tokens and API keys when pushing new code. This was a significant issue in 2023, as GitHub users accidentally exposed 12.8 million authentication and sensitive secrets via more than 3 million public repositories throughout the year. GitHub will continue adding support for more languages, with C# and Go coming next, according to their announcement. "Our vision for application security is an environment where found means fixed."Read more of this story at Slashdot.
"If you've ever jokingly wondered if your search or viewing history is going to 'put you on some kind of list,' your concern may be more than warranted," writes Mashable :In now unsealed court documents reviewed by Forbes, Google was ordered to hand over the names, addresses, telephone numbers, and user activity of Youtube accounts and IP addresses that watched select YouTube videos, part of a larger criminal investigation by federal investigators. The videos were sent by undercover police to a suspected cryptocurrency launderer... In conversations with the bitcoin trader, investigators sent links to public YouTube tutorials on mapping via drones and augmented reality software, Forbes details. The videos were watched more than 30,000 times, presumably by thousands of users unrelated to the case. YouTube's parent company Google was ordered by federal investigators to quietly hand over all such viewer data for the period of Jan. 1 to Jan. 8, 2023... "According to documents viewed by Forbes, a court granted the government's request for the information," writes PC Magazine, adding that Google was asked "to not publicize the request."The requests are raising alarms for privacy experts who say the requests are unconstitutional and are "transforming search warrants into digital dragnets" by potentially targeting individuals who are not associated with a crime based simply on what they may have watched online. That quote came from Albert Fox-Cahn, executive director at the Surveillance Technology Oversight Project, who elaborates in Forbes' article. "No one should fear a knock at the door from police simply because of what the YouTube algorithm serves up. I'm horrified that the courts are allowing this." Thanks to long-time Slashdot reader schwit1 for sharing the article.Read more of this story at Slashdot.
Long-time Slashdot reader HanzoSpam shared an announcement from the University of California San Diego. The school's researchers teamed with materials-science company Algenesis to show "that their plant-based polymers biodegrade - even at the microplastic level - in under seven months.""We're trying to find replacements for materials that already exist, and make sure these replacements will biodegrade at the end of their useful life instead of collecting in the environment," stated Professor of Chemistry and Biochemistry Michael Burkart, one of the paper's authors and an Algenesis co-founder. "That's not easy." "When we first created these algae-based polymers about six years ago, our intention was always that it be completely biodegradable," said another of the paper's authors, Robert Pomeroy, who is also a professor of chemistry and biochemistry and an Algenesis co-founder. "We had plenty of data to suggest that our material was disappearing in the compost, but this is the first time we've measured it at the microparticle level...." "This material is the first plastic demonstrated to not create microplastics as we use it," said Stephen Mayfield, a paper coauthor, School of Biological Sciences professor and co-founder of Algenesis. "This is more than just a sustainable solution for the end-of-product life cycle and our crowded landfills. This is actually plastic that is not going to make us sick." Creating an eco-friendly alternative to petroleum-based plastics is only one part of the long road to viability. The ongoing challenge is to be able to use the new material on pre-existing manufacturing equipment that was originally built for traditional plastic, and here Algenesis is making progress. They have partnered with several companies to make products that use the plant-based polymers developed at UC San Diego, including Trelleborg for use in coated fabrics and RhinoShield for use in the production of cell phone cases. "When we started this work, we were told it was impossible," stated Burkart. "Now we see a different reality. There's a lot of work to be done, but we want to give people hope. It is possible."Read more of this story at Slashdot.
Long-time Slashdot reader theodp writes:Last month there was a special Google-funded edition of Highlights for Children, the 77-year-old magazine targetting children between the ages of 6 and 12. This edition was based on Google's "Be Internet Awesome" curriculum, and 1.25 million copies of the print magazine were distributed to children, schools, and other organizations. It's all part of a new partnership between Google and Highlights. A Google.org blog post calls out the special issue's Goofus and Gallant cartoon, in which always-does-the-wrong-thing Goofus "promised Kayden he wouldn't share the silly photo, but he shares it anyway", while always-does-the-right-thing Gallant "asks others if it's OK to share their photos"... theodp's orignal submission linked ironically to Slashdot's earlier story, "Google Hit With Lawsuit Alleging It Stole Data From Millions of Users To Train Its AI Tools." But even beyond that, it's not always clear what the cartoon is teaching. (In one picture it looks like they're condemning Goofus for not intervening in a flame war between two other people - "Be Kind!") Still, for me the biggest surprise is that Goofus and Gallant even have laptops. (How old are these kids, that they're already uploading photos of the other children onto the internet?!) Will 6- to 12-year-old children start demanding that their parents buy them their own laptop now - since even Goofus and Gallant already have them?Read more of this story at Slashdot.
Gizmodo reports that increased activity on the Moon "may affect the unique radio silence on the lunar far side, an ideal location for radio telescopes to pick up faint signals from the cosmic past."This week, the International Academy of Astronautics (IAA) held the first Moon Farside Protection Symposium in Italy to advocate for preserving radio silence on the far side of the Moon. The symposium hopes to raise awareness about the threat facing the far side of the Moon and develop approaches to shielding it from artificial radio emissions.... NASA has shown interest in using the lunar radio silence, proposing an ultra-long-wavelength radio telescope inside a crater on the far side of the Moon. The Lunar Crater Radio Telescope is designed to observe the universe at frequencies below 30 megahertz, which are largely unexplored by humans since those signals are reflected by the Earth's ionosphere, according to NASA. At those low frequencies, radio telescopes on the Moon can detect near-Earth objects approaching our planet before other observatories, it can search for signals of alien civilizations, and study organic molecules in interstellar space... As more missions head towards the Moon, however, that perfect silence is increasingly being compromised. Earlier this week, for example, China launched a satellite to relay communication between ground operations on Earth and an upcoming mission on the far side of the Moon. The satellite, Queqiao-2, is the first of a constellation of satellites that China hopes to deploy by 2040 to communicate with future crewed missions on the Moon and Mars. As part of its Artemis program, NASA is aiming to build the Lunar Gateway, a space station designed to orbit the Moon to support future missions to the lunar surface and Mars. In advance of this, a NASA-funded cubesat, called CAPSTONE, has entered into a unique halo orbit to demonstrate the stability and practicality of this trajectory for future lunar missions... CAPSTONE marks the beginning of something big - establishing a permanent communication link between Earth and lunar assets, and ensuring the steady, uninterrupted flow of data. NASA and its Chinese counterparts have eerily similar plans for lunar exploration, and the Moon is currently a 'free-for-all' with no regulations set in place as to who can own our dusty orbital companion. "In other words, things are about to get real loud out there as far as radio transmissions are concerned."Read more of this story at Slashdot.
An anonymous reader shared this report from The Register:Chinese spies exploited a couple of critical-severity bugs in F5 and ConnectWise equipment earlier this year to sell access to compromised U.S. defense organizations, UK government agencies, and hundreds of other entities, according to Mandiant. The Google-owned threat hunters said they assess, "with moderate confidence," that a crew they track as UNC5174 was behind the exploitation of CVE-2023-46747, a 9.8-out-of-10-CVSS-rated remote code execution bug in the F5 BIG-IP Traffic Management User Interface, and CVE-2024-1709, a path traversal flaw in ConnectWise ScreenConnect that scored a perfect 10 out of 10 CVSS severity rating. UNC5174 uses the online persona Uteus, and has bragged about its links to China's Ministry of State Security (MSS) - boasts that may well be true. The gang focuses on gaining initial access into victim organizations and then reselling access to valuable targets... Just last month, Mandiant noticed the same combination of tools, believed to be unique to this particular Chinese gang, being used to exploit the ConnectWise flaw and compromise "hundreds" or entities, mostly in the U.S. and Canada. Also between October 2023 and February 2024, UNC5174 exploited CVE-2023-22518 in Atlassian Confluence, CVE-2022-0185 in Linux kernels, and CVE-2022-3052, a Zyxel Firewall OS command injection vulnerability, according to Mandiant. These campaigns included "extensive reconnaissance, web application fuzzing, and aggressive scanning for vulnerabilities on internet-facing systems belonging to prominent universities in the U.S., Oceania, and Hong Kong regions," the threat intel team noted. More details from The Record. "One of the strangest things the researchers found was that UNC5174 would create backdoors into compromised systems and then patch the vulnerability they used to break in. Mandiant said it believes this was an 'attempt to limit subsequent exploitation of the system by additional unrelated threat actors attempting to access the appliance.'"Read more of this story at Slashdot.
In an interview Saturday, CNN first asked Steve Wozniak about Apple's "walled garden" approach - and whether there's any disconnect between Apple's stated interest in user security and privacy, and its own self-interest? Wozniak responded, "I think there are things you can say on all sides of it."I'm kind of glad for the protection that I have for my privacy and for you know not getting hacked as much. Apple does a better job than the others. And tracking you - tracking you is questionable, but my gosh, look at what we're accusing TikTok of, and then go look at Facebook and Google... That's how they make their business! I mean, Facebook was a great idea. But then they make all their money just by tracking you and advertising. And Apple doesn't really do that as much. I consider Apple the good guy. So then CNN directly asked Wozniak's opinion about the proposed ban on TikTok in the U.S. "Well, one, I don't understand it. I don't see why. I mean, I get a lot of entertainment out of TikTok - and I avoid the social web. But I love to watch TikTok, even if it's just for rescuing dog videos and stuff. And so I'm thinking, well, what are we saying? We're saying 'Oh, you might be tracked by the Chinese'. Well, they learned it from us. I mean, look, if you have a principle - a person should not be tracked without them knowing it? It's kind of a privacy principle - I was a founder of the EFF. And if you have that principle, you apply it the same to every company, or every country. You don't say, 'Here's one case where we're going to outlaw an app, but we're not going to do it in these other cases.' So I don't like the hypocrisy. And that's always obviously common from a political realm.Read more of this story at Slashdot.
Long-time Slashdot reader theodp writes: Among the amazing features of the in-process analytical database DuckDB, writes software engineer Paul Gross in DuckDB as the New jq, is that it has many data importers included without requiring extra dependencies. This means it can natively read and parse JSON as a database table, among many other formats. "Once I learned DuckDB could read JSON files directly into memory," Gross explains, "I realized that I could use it for many of the things where I'm currently using jq. In contrast to the complicated and custom jq syntax, I'm very familiar with SQL and use it almost daily." The stark difference of the two programming approaches to the same problem - terse-but-cryptic jq vs. more-straightforward-to-most SQL - also raises some interesting questions: Will the use of Generative AI coding assistants more firmly entrench the status quo of the existing programming paradigms on whose codebases it's been trained? Or could it help bootstrap the acceptance of new, more approachable programming paradigms? Had something like ChatGPT been around back in the Programming Windows 95 days, might people have been content to use Copilot to generate reams of difficult-to-maintain-and-enhance Windows C code using models trained on the existing codebases instead of exploring easier approaches to Windows programming like Visual BASIC?Read more of this story at Slashdot.
"Hollywood is bracing for another actors strike, this time against the videogame industry," according to MarketWatch:"We're currently in bargaining with all the major game studios, and the major sticking point is AI," SAG-AFTRA National Executive Director Duncan Crabtree-Ireland said Thursday. "Actors at all levels are at risk of digital replication. We have strike authorization on that contract and it is, at this point - we could end up going on strike...." The union, which navigated its way to a new film and TV contract after a 118-day strike against the Hollywood studios last year, is again focusing on regulating artificial intelligence and its impact on wages and jobs. "It will be a recurring issue with each successive contract" every three years, Crabtree-Ireland said. Some studios are already using AI-generated voices to save money, the article points out. "Actors and actresses should be very much afraid," Chris Mattmann, an adjunct research professor at the University of Southern California's Computer Science Department, says in the article. "Within three seconds, gen AI can effectively clone a voice." The strike could affect Microsoft's Activision Publishing and Disney, as well as other major game publishers including Electronic Arts, Epic Games, and Warner Bros.Read more of this story at Slashdot.
"It was three years of my, life you?" a 93-year-old William Shatner tells the Guardian when asked about playing Captain Kirk on the original Star Trek series from 1967 to 1969:It gladdens him to see how much joy the series has brought its many fans, but the richest rewards came in his introduction to science fiction, which activated and nurtured a lifelong curiosity about our species. He reminisces about meeting the great writers of the genre fondly yet frankly, honest enough to sort Ray Bradbury into "the category right below friend, I think". He devoured their novels and developed a fascination with the principle of defamiliarization, that concepts taken for granted can be understood anew when viewed through the vantage of a stranger in a strange land. "Good science fiction is humanity, moved into a different milieu," he says. Even on a grander scale, "The universe charms him with its mysteries," writes the Guardian, calling it "the key to maintaining wonder through nearly a century of life. He likes the not-knowing." You can see this at play when the TV starship captain became a real-life spacefarer in 2021: Liberated by weightlessness, he found himself utterly transformed by the rush of perspective one can only assume miles above the Earth. "It's very personal, what you see from up there, what you read into the stillness," he says. "I saw the blankness of space as death, but an astronaut will see something else entirely. And when I looked back at the Earth, I saw life." The question of mortality hangs over Shatner, albeit not in a morbid way. He's entranced by the paradox of death, that the absolute unknowability of what happens will be inevitably supplanted by the certainty of finding out... For a man accustomed to boldly going where no man has gone before, it's all just the next phase of a single ongoing adventure. In fact, Shatner told Jimmy Kimmel Friday that he was always disappointed by the way he'd performed Captain Kirk's death. "I think you die the way you live," Shatner says. "So Captain Kirk always had these grotesque things happening... but without fear. But with joy, and love, and an opportunity to see what's better." So when performing Kirk's death, he'd imagined him actually gazing upon death itself - and looking upon it with wonder. "I ad libbed the 'Oh my'." Shatner's regret? That it "sounded fearful. And I didn't want to be fearful." "Would you like a do-over?" Kimmel asks. (Adding "I've got some debris...") And Shatner agrees, performing - one more time - the death of Captain Kirk. The video also includes an appropriate clip from a newly-released documentary about Shatner's life. "Don't do it half-heartedly," Shatner says at one point. "Whatever it is you do - do it fully. Do it passionately. Do it with your whole being."Read more of this story at Slashdot.
It was March 24, 1999 that The Matrix premiered, premembers the Wall Street Journal. "To rewatch The Matrix is to be reminded of how primitive our technology was just 25 years ago. We see computers with bulky screens, cellphones with keypads and a once-ubiquitous feature of our society known as 'pay phones,' central to the plot of the film." But the article's headline warns that "25 Years Later, We're All Trapped in 'The Matrix'".[I]n a strange way, the film has become more relevant today than it was in 1999. With the rise of the smartphone and social media, genuine human interaction has dropped precipitously. Today many people, like Cypher, would rather spend their time in the imaginary realms offered by technology than engage in a genuine relationship with other human beings. In the film, one of the representatives of the AI, the villainous Agent Smith, played by Hugo Weaving, tells Morpheus that the false reality of the Matrix is set in 1999 because that year was "the peak of your civilization. I say your civilization, because as soon as we started thinking for you it really became our civilization." Indeed, not long after "The Matrix" premiered, humanity hooked itself up to a matrix of its own. There is no denying that our lives have become better in many ways thanks to the internet and smartphones. But the epidemic of loneliness and depression that has swept society reveals that many of us are now walled off from one another in vats of our own making... For today's dwellers in the digital cave, the path back into the light doesn't involve taking a pill, as in "The Matrix," or being rescued by a philosopher. We ourselves have the power to resist the extremes of the digital world, even as we remain linked to it. You can find hints of an unplugged "Zion" in the Sabbath tables of observant Jews, where electronic devices are forbidden, and in university seminars where laptops are banned so that students can engage with a text and each other. Twenty-five years ago, "The Matrix" offered us a modern twist on Plato's cave. Today we are once again asking what it will take to find our way out of the lonely darkness, into the brilliance of other human souls in the real world.Read more of this story at Slashdot.
Indian Express calls it "the ultimate smartphone killer". (Coming soon, its laser-on-your-palm feature will display stock prices, sports scores, and flight statuses.) Humane's Ai Pin can even translate what you say, repeating it out loud in another language (with 50 different languages supported). And it can read you summaries of what's on your favorite web sites, so "You can just surf the web with your voice," according to a new video released this week. The video also shows it answering specific questions like "What's that song by 21 Savage with the violin intro?" (And later, while the song is playing, answering more questions like "This was sampled from another song. What song was that?") But then co-founder Imran Chaudhri - an iPhone designer and one of several former Apple employees at Humane - demonstrated a "Vision" feature that's coming soon. Holding a Sony Walkman he asks the Pin to "Look at this and tell me when it first came out" - and the Pin obliges. ("The Sony Walkman WM-F73 was released in 1986...") In another demo it correctly supplied the designer of an Air Jordan basketball shoe. They're also working on integrating this into a Nutrition Tracking application. (A demonstrator held a doughnut and asked the Pin to identify how much sugar was in it.) If you tell the Pin that you've eaten the doughnut, it can then calculate your intake of carbs, protein, and fats. And in the video the Pin responded within seconds to the command "Make a spreadsheet about top consumer tech reviewers on YouTube [with] real names, subscriber counts, and URLs." It performed the research and created the spreadsheet, which appears on the demonstrator's laptop, apparently logged in to Humane's cloud-based user platform. In the video Humane's co-founder stresses that its Ai Pin does all this without downloading applications, "which allows me to stay present in the moment and flow." But while it can also make phone calls and sends text messages, Imran Chaudhri adds that "Ai Pin is a completely new form factor for compute. It's never been about replacing. It's always been about creating new ways to interact with what you need. So instead of having to sit down to use a computer, or reaching in to your pocket and pulling out your phone and navigating apps, Ai Pin allows you to simply act on something the moment you think about it - letting AI do all the work for you." Or, as they say later "This is about technology adapting and reacting to you. Not you having to adapt to it." There's also talk about their "AI OS" - named Cosmos - with the Pin described as "our first entry point" into that operating system, with other devices planned to support it in the future. (Mashable's reporter notes that Humane's Ai Pin is backed by OpenAI CEO Sam Altman, and writes "I was impressed with how well it worked.")The video even ends with an update for SDK developers. In the second half of 2024, "you're going to be able to connect your services to the Ai Pin using REST APIs and OAuth." Phase two will let developers run their code directly on Humane's cloud platform - while Phase three will see developers codes on Ai Pin devices, "to get access to the mic, the camera, the sensors, and the laser. We are so excited to see what you're gonna build." Humane says its Ai Pin will start shipping at the end of March, with priority orders arriving starting on April 11th.Read more of this story at Slashdot.
CNN looks back to when "dial-up internet (and its iconic dial tone) was 'still a thing...""File-sharing services like Napster and LimeWire were just beginning to take off... And in sweaty dorm rooms and sparse basements across the world, people brought their desktop monitors together to set up a local area network (LAN) and play multiplayer games - "Half-Life," "Counter-Strike," "Starsiege: Tribes," "StarCraft," "WarCraft" or "Unreal Tournament," to name just a few. These were informal but high-stakes gatherings, then known as LAN parties, whether winning a box of energy drinks or just the joy of emerging victorious. The parties could last several days and nights, with gamers crowded together among heavy computers and fast food boxes, crashing underneath their desks in sleeping bags and taking breaks to pull pranks on each other or watch movies... It's this nostalgia that prompted writer and podcaster Merritt K to document the era's gaming culture in her new photobook "LAN Party: Inside the Multiplayer Revolution." After floating the idea on X, the social media platform formerly known as Twitter, she received an immediate - and visceral - response from old-school gamers all too keen to share memories and photos from LAN parties and gaming conventions across the world... It's strange to remember that the internet was once a place you went to spend time with other real people; a tethered space, not a cling-film-like reality enveloping the corporeal world from your own pocket.... Growing up as a teenager in this era, you could feel a sense of hope (that perhaps now feels like naivete) about the possibilities of technology, K explained. The book is full of photos featuring people smiling and posing with their desktop monitors, pride and fanfare apparent... "It felt like, 'Wow, the future is coming,'" K said. "It was this exciting time where you felt like you were just charting your own way. I don't want to romanticize it too much, because obviously it wasn't perfect, but it was a very, very different experience...." "We've kind of lost a lot of control, I think over our relationship to technology," K said. "We have lost a lot of privacy as well. There's less of a sense of exploration because there just isn't as much out there." One photo shows a stack of Mountain Dew cans (remembering that by 2007 the company had even released a line of soda called "Game Fuel"). "It was a little more communal," the book's author told CNN. "If you're playing games in the same room with someone, it's a different experience than doing it online. You can only be so much of a jackass to somebody who was sitting three feet away from you..." They adds that that feeling of connecting to people in other places "was cool. It wasn't something that was taken for granted yet."Read more of this story at Slashdot.
There's actually "a global trend toward increased air safety," notes a Wall Street Journal columnist. And even in the case of the two fatal Boeing crashes five years ago, he stresses that they were "were two different crashes," with the second happening only "after Boeing and the FAA issued emergency directives instructing pilots how to compensate for Boeing's poorly designed flight control software. "The story should have ended after the first crash except the second set of pilots behaved in unexpected, unpredictable ways, flying a flyable Ethiopian Airlines jet into the ground."Boeing is guilty of designing a fallible system and placing an undue burden on pilots. The evidence strongly suggests, however, that the Ethiopian crew was never required to master the simple remedy despite the global furor occasioned by the first crash. To boot, they committed an additional error by overspeeding the aircraft in defiance of aural, visual and stick-shaker warnings against doing so. It got almost no coverage, but on the same day the Ethiopian government issued its final findings on the accident in late 2022, the U.S. National Transportation Safety Board, in what it called an "unusual step," issued its own "comment" rebuking the Ethiopian report for "inaccurate" statements, for ignoring the crew's role, for ignoring how readily the accident should have been avoided. So the Wall Street Journal columnist challenges whether profit incentives played any role in Boeing's troubles:In reality, the global industry was reorganized largely along competitive profit-and-loss lines after the 1970s, and yet this coincided with enormous increases in safety, notwithstanding the sausage factory elements occasionally on display (witness the little-reported parking of hundreds of Airbus planes over a faulty new engine). The point here isn't blame but to note that 100,000 repetitions likely wouldn't reproduce the flukish second MAX crash and everything that followed from it. Rather than surfacing Boeing's deeply hidden problems, it seems the second crash gave birth to them. The subsequent 20-month grounding and production shutdown, combined with Covid, cost Boeing thousands of skilled workers. The pressure of its duopoly competition with Airbus plus customers clamoring for their backordered planes made management unwisely desperate to restart production. January's nonfatal door-plug blowout of an Alaska Airlines 737 appears to have been a one-off when Boeing workers failed to reinstall the plug properly after removing it to fix faulty fuselage rivets. Not a one-off, apparently, are faulty rivets as Boeing has strained to hire new staff and resume production of half-finished planes. Boeing will sort out its troubles eventually by applying the oldest of manufacturing insights: Training, repetition, standardization and careful documentation are the way to error-free complex manufacturing. As he sees it, "The second MAX crash caught Boeing up in a disorienting global media and political storm that it didn't know how to handle and, indeed, has handled fairly badly."Read more of this story at Slashdot.
Tetris creator Alexey Pajitnov and others spoke at the Game Developers Conference about Tetris Reversed, reports VentureBeat - and told the story of "a lost prototype of a Tetris game that was never published."But little did Pajitnov know that an engineer in charge of the game, Vedran Klanac, had kept a copy of it. Through the help of intermediaries, he showed it to Pajitnov and the two shared their memories of what happened to the lost game... Pajitnov has lived in the U.S. since 1991, where he has been involved in the development of games such as Pandora's Box and worked with companies such as Microsoft and WildSnake Software... Klanac is the CEO of Ocean Media, and he is originally from Zagreb, Croatia. He was an aerospace engineer who started his career in the games industry with Croteam where he built the physics engine for Serious Sam 2. Since 2006, he has been running Ocean Media, a game publishing company with a focus on consoles. During the last 20 years, he was involved in production as a programmer and executive producer in more than 200 projects. And it turns out he was the programmer who created the Tetris Reversed code based on instructions from Pajitnov, who had passed them on through a middleman. In 2011, programmer Vedran Klanac went to the NLGD Festival of Games in Utrecht, The Netherlands. He listened to a talk on a charitable effort from Martin de Ronde, a cofounder of game studio Guerrilla Games. Klanac said in an interview with GamesBeat that he listened to De Ronde's talk and offered to help. De Ronde came back months later saying he had an agreement with Pajitnov about creating a new prototype for a Tetris game. De Ronde asked if Klanac if he wanted to make Tetris Reversed by Pajitnov. "Are you kidding me?" Klanac reacted. The idea is still to survive as long as you can, according to the article - but the entire playfield was accessible. "For the first time in public, they showed the video of the prototype in action," according to the article, which also records Pajitnov reaction. "When you see the gameplay video, and when you look at the design elements. This is Tetris for like 300 IQ people." No word on yet on whether the game will ever be officially published.Read more of this story at Slashdot.
Slashdot reader christoban writes:In what may be an issue for Sun-obscuring strategies to combat global warming, it turns out that during solar eclipses, low level cumulus clouds rapidly disappear, reducing by a factor of 4, researchers have found.The news comes from the science magazine Eos (published by the nonprofit organization of atmosphere/ocean/space scientists, the American Geophysical Union).Victor J. H. Trees, a geoscientist at Delft University of Technology in the Netherlands, and his colleagues recently analyzed cloud cover data obtained during an annular eclipse in 2005, visible in parts of Europe and Africa. They mined visible and infrared imagery collected by two geostationary satellites operated by the European Organisation for the Exploitation of Meteorological Satellites. Going to space was key, Trees said. "If you really want to quantify how clouds behave and how they react to a solar eclipse, it helps to study a large area. That's why we want to look from space...." [T]hey tracked cloud evolution for several hours leading up to the eclipse, during the eclipse, and for several hours afterward. Low-level cumulus clouds - which tend to top out at altitudes around 2 kilometers (1.2 miles) - were strongly affected by the degree of solar obscuration. Cloud cover started to decrease when about 15% of the Sun's face was covered, about 30 minutes after the start of the eclipse. The clouds started to return only about 50 minutes after maximum obscuration. And whereas typical cloud cover hovered around 40% in noneclipse conditions, less than 10% of the sky was covered with clouds during maximum obscuration, the team noted. "On a large scale, the cumulus clouds started to disappear," Trees said... The temperature of the ground matters when it comes to cumulus clouds, Trees said, because they are low enough to be significantly affected by whatever is happening on Earth's surface... Beyond shedding light on the physics of cloud dissipation during solar eclipses, these new findings also have implications for future geoengineering efforts, Trees and his collaborators suggested. Discussions are underway to mitigate the effects of climate change by, for instance, seeding the atmosphere with aerosols or launching solar reflectors into space to prevent some of the Sun's light from reaching Earth. Such geoengineering holds promise for cooling our planet, researchers agree, but its repercussions are largely unexplored and could be widespread and irreversible. These new results suggest that cloud cover could decrease with geoengineering efforts involving solar obscuration. And because clouds reflect sunlight, the efficacy of any effort might correspondingly decrease, Trees said. That's an effect that needs to be taken into account when considering different options, the researchers concluded. Another article on the site warns that "Planting Trees May Not Be as Good for the Climate as Previously Believed." "The climate benefits of trees storing carbon dioxide is partially offset by dark forests' absorption of more heat from the Sun, and compounds they release that slow the destruction of methane in the atmosphere."Read more of this story at Slashdot.
BleepingComputer reports on "a new denial-of-service attack dubbed 'Loop DoS' targeting application layer protocols." According to their article, the attack "can pair network services into an indefinite communication loop that creates large volumes of traffic."Devised by researchers at the CISPA Helmholtz-Center for Information Security, the attack uses the User Datagram Protocol (UDP) and impacts an estimated 300,000 host and their networks. The attack is possible due to a vulnerability, currently tracked as CVE-2024-2169, in the implementation of the UDP protocol, which is susceptible to IP spoofing and does not provide sufficient packet verification. An attacker exploiting the vulnerability creates a self-perpetuating mechanism that generates excessive traffic without limits and without a way to stop it, leading to a denial-of-service (DoS) condition on the target system or even an entire network. Loop DoS relies on IP spoofing and can be triggered from a single host that sends one message to start the communication. According to the Carnegie Mellon CERT Coordination Center (CERT/CC) there are three potential outcomes when an attacker leverages the vulnerability: - Overloading of a vulnerable service and causing it to become unstable or unusable. - DoS attack on the network backbone, causing network outages to other services. - Amplification attacks that involve network loops causing amplified DOS or DDOS attacks. CISPA researchers Yepeng Pan and Professor Dr. Christian Rossow say the potential impact is notable, spanning both outdated (QOTD, Chargen, Echo) and modern protocols (DNS, NTP, TFTP) that are crucial for basic internet-based functions like time synchronization, domain name resolution, and file transfer without authentication... The researchers warned that the attack is easy to exploit, noting that there is no evidence indicating active exploitation at this time. Rossow and Pan shared their findings with affected vendors and notified CERT/CC for coordinated disclosure. So far, vendors who confirmed their implementations are affected by CVE-2024-2169 are Broadcom, Cisco, Honeywell, Microsoft, and MikroTik. To avoid the risk of denial of service via Loop DoS, CERT/CC recommends installing the latest patches from vendors that address the vulnerability and replace products that no longer receive security updates. Using firewall rules and access-control lists for UDP applications, turning off unnecessary UDP services, and implementing TCP or request validation are also measures that can mitigate the risk of an attack. Furthermore, the organization recommends deploying anti-spoofing solutions like BCP38 and Unicast Reverse Path Forwarding (uRPF), and using Quality-of-Service (QoS) measures to limit network traffic and protect against abuse from network loops and DoS amplifications. Thanks to long-time Slashdot reader schneidafunk for sharing the article.Read more of this story at Slashdot.
America's Justice Department "is considering whether to allow Julian Assange to plead guilty to a reduced charge of mishandling classified information," reports the Wall Street Journal, citing "people familiar with the matter." Though Assange faces trial for publishing thousands of confidential U.S. documents in 2010, this development opens up "the possibility of a deal that could eventually result in his release from a British jail," reports the Journal. Where things stand currently:A U.K. court is currently considering whether to allow a last-ditch appeal by the 52-year-old. After U.S. prosecutors charged him in 2019, U.K. law-enforcement officials apprehended him, and he has been in a London prison ever since... Britain's High Court is expected to decide within weeks whether to grant Assange a further right to appeal his extradition to the U.S. If the court rules against him, the U.S. government will likely have 28 days to come and collect Assange and bring him to face trial. But...Justice Department officials and Assange's lawyers have had preliminary discussions in recent months about what a plea deal could look like to end the lengthy legal drama, according to people familiar with the matter, a potential softening in a standoff filled with political and legal complexities. The talks come as Assange has spent some five years behind bars. U.S. prosecutors face diminishing odds that he would serve much more time even if he were convicted stateside. The discussions remain in flux, and talks could fizzle. Any deal would require approval at the highest levels of the Justice Department. Barry Pollack, a lawyer for Assange, said he has been given no indication that the department will take a deal. A Justice Department spokesman declined to comment. If prosecutors allow Assange to plead to a U.S. charge of mishandling classified documents - something his lawyers have floated as a possibility - it would be a misdemeanor offense. Under such a deal, Assange potentially could enter that plea remotely, without setting foot in the U.S. The time he has spent behind bars in London would count toward any U.S. sentence, and he would likely be free to leave prison shortly after any deal was concluded. U.S. authorities "gave a package of assurances, including a pledge he could be transferred to his native Australia to serve any sentence," according to the article.The Australian government, which has largely been supportive of Assange, could shorten any sentence once he landed on Australian soil, said Nick Vamos, a partner at London law firm Peters & Peters and a former head of extradition for England and Wales's Crown Prosecution Service. "I honestly think as soon as he arrived in Australia he would be released," he said.Read more of this story at Slashdot.
"My favorite kind of science fiction involves stories rooted in real science..." writes NPR's reviewer. "[T]here is something special about seeing characters wrestle with concepts closer to our current understanding of how the universe works." The Verge calls it an "impressive" and "leaner" story than the book, arguing "it's a good one - and very occasionally a great one" that introduces the author's key ideas, though channelling "the book's spirit but not its brilliance." And Slate calls it a "downright transformative" adaptation, "jettisoning most of the novel's characters and plucking scenes from all three books," while accusing it of "making the trilogy's expansive and philosophical story into something much more pedestrian and digestible." But Reuters notes there's huge interest in China over this adaptation (by the co-creator of Mem>Game of Thrones) for the first Asian novel to win the Hugo Award for best science fiction novel. "The new series was trending on Chinese social media platform Weibo on Friday," reports Reuters, "with 21 million views so far." (The show came in first on Weibo's "top hot" trend rankings, they add, "despite Netflix being officially inaccessible in China. Chinese viewers would have had to watch the Netflix series from behind a VPN or on a pirate site.") So what was their verdict? CNN reports Netflix's adaptation "has split opinions in China and sparked online nationalist anger over scenes depicting a violent and tumultuous period in the country's modern history."Among the country's more patriotic internet users, discussions on the adaptation turned political, with some accusing the big-budget American production of making China look bad. The show opens with a harrowing scene depicting Mao Zedong's Cultural Revolution, which consumed China in bloodshed and chaos for a decade from 1966... "Netflix you don't understand 'The Three Body Problem' or Ye Wenjie at all!" read a comment on social media platform Weibo. "You only understand political correctness!" Others came to the show's defense, saying the scene closely follows depictions in the book - and is a truthful reenactment of history. "History is far more absurd than a TV series, but you guys pretend not to see it," read one comment on Douban, a popular site for reviewing movies, books and music. Author Liu said in an interview with the New York Times in 2019 that he had originally wanted to open the book with scenes from Mao's Cultural Revolution, but his Chinese publisher worried they would never make it past government censors and buried them in the middle of the narrative. The English version of the book, translated by Ken Liu, put the scenes at the novel's beginning, with the author's blessing... Various other aspects of the show, from its casting and visual effects to the radical changes to the story's original setting and characters, also attracted the ire of Chinese social media users. Many compared it to a Chinese television adaptation released last year - a much lengthier and closer retelling of the book that ran to 30 episodes and was highly rated on Chinese review platforms. The Netflix adaptation featured an international cast and placed much of the action in present-day London - thus making the story a lot less Chinese.Read more of this story at Slashdot.
Slashdot reader sciencehabit shared this report from Science magazine:Nurturing a growing fetus requires a series of profound physical, hormonal, and chemical changes that may rewire every major organ in the body and can cause serious health complications such as hypertension and preeclampsia. But does being pregnant actually take years off your life...? Today in Cell Metabolism, scientists report that the stress of pregnancy can cause a person's biological age to increase by up to 2 years - a trend that may reverse itself in the months that follow. In some cases, the authors write, those who breastfeed their children after giving birth may end up biologically "younger" than during early pregnancy. The finding represents yet another piece of "compelling" evidence that events during and after pregnancy can have far-reaching health consequences, says Elizabeth Bertone-Johnson, an epidemiologist at the University of Massachusetts Amherst who wasn't involved in the new study... The discovery that biological aging isn't necessarily a linear process "came as a real surprise," says Kieran O'Donnell, a perinatal researcher at the Yale School of Medicine... But blood samples from 68 participants, collected 3 months after giving birth, revealed a dramatic about-face. Although being pregnant had initially aged their cells between 1 and 2 years, says O'Donnell, their biological age now appeared to be 3 to 8 years younger than it had been during early pregnancy - with different epigenetic clocks algorithms providing slightly bigger or smaller estimates.Read more of this story at Slashdot.
"On December 28 2023, bugreport 12604 was filed in the curl issue tracker," writes cURL lead developer Daniel Stenberg: The title stated of the problem in this case was quite clear: flag -cacert behavior isn't consistent between macOS and Linux , and it was filed by Yuedong Wu. The friendly reporter showed how the curl version bundled with macOS behaves differently than curl binaries built entirely from open source. Even when running the same curl version on the same macOS machine. The curl command line option --cacert provides a way for the user to say to curl that this is the exact set of CA certificates to trust when doing the following transfer. If the TLS server cannot provide a certificate that can be verified with that set of certificates, it should fail and return error. This particular behavior and functionality in curl has been established since many years (this option was added to curl in December 2000) and of course is provided to allow users to know that it communicates with a known and trusted server. A pretty fundamental part of what TLS does really. When this command line option is used with curl on macOS, the version shipped by Apple, it seems to fall back and checks the system CA store in case the provided set of CA certs fail the verification. A secondary check that was not asked for, is not documented and plain frankly comes completely by surprise. Therefore, when a user runs the check with a trimmed and dedicated CA cert file, it will not fail if the system CA store contains a cert that can verify the server! This is a security problem because now suddenly certificate checks pass that should not pass. "We don't consider this something that needs to be addressed in our platforms," Apple Product Security responded. Stenberg's blog post responds, "I disagree." Long-time Slashdot reader lee1 shares their reaction:I started to sour on MacOS about 20 years ago when I discovered that they had, without notice, substituted their own, nonstandard version of the Readline library for the one that the rest of the Unix-like world was using. This broke gnuplot and a lot of other free software... Apple is still breaking things, this time with serious security and privacy implications.Read more of this story at Slashdot.
"Microsoft confirmed that a memory leak introduced with the March 2024 Windows Server security updates is behind a widespread issue causing Windows domain controllers to crash," BleepingComputer reported Thursday. Friday Microsoft wrote that the issue "was resolved in the out-of-band update KB5037422," only available via the Microsoft Update Catalog. (The update "is not available from Windows Update and will not install automatically.") BleepingComputer reported the leak only affected "enterprise systems using the impacted Windows Server platform," and home users were not affected. But Microsoft confirmed it impacted all domain controller servers with the latest Windows Server 2012 R2, 2016, 2019, and 2022 updates:As BleepingComputer first reported on Wednesday and as many admins have warned over the last week, affected servers are freezing and restarting unexpectedly due to a Local Security Authority Subsystem Service (LSASS) process memory leak introduced with this month's cumulative updates. "Since installation of the March updates (Exchange as well as regular Windows Server updates) most of our DCs show constantly increasing lsass memory usage (until they die)," one admin said. "Our symptoms were ballooning memory usage on the lsass.exe process after installing KB5035855 (Server 2016) and KB5035857 (Server 2022) to the point that all physical and virtual memory was consumed and the machine hung," another Windows admin told BleepingComputer. The leak "is observed when on-premises and cloud-based Active Directory Domain Controllers service Kerberos authentication requests," Microsoft wrote. "Extreme memory leaks may cause LSASS to crash, which triggers an unscheduled reboot of underlying domain controllers..." "We strongly recommend you do not apply the March 2024 security update on DCs and install KB5037422 instead..."Read more of this story at Slashdot.
An anonymous reader quotes a report from Wired: Former president Donald Trump'sTruth Social, a shameless Twitter clone, is set to become a publicly traded company as soon as next week. Shareholders of Digital World Acquisition Corp. voted on Friday to merge with Trump Media and Technology Group, the company behind Truth Social. The vote is a culmination of a years-long saga attempting to merge Trump Media with a publicly traded company in what's known as a SPAC deal. The company will trade under the ticker DJT once it goes public. [...] Truth Social looks nearly identical to Twitter, with some key distinctions. Instead of "tweeting," users post a "truth." A "retweet" is called a "retruth." Unlike many right-wing Twitter clones, the site functions well, has remained mostly online, and actually appears to have a somewhat active user base. But since launching in February 2022, after Trump was kicked off of mainstream platforms for inciting violence during the January 6 riot at the Capitol, the company has been mired in controversy.Read more of this story at Slashdot.
Jessica Lyons reports via The Register: Vulnerabilities in common Electronic Logging Devices (ELDs) required in US commercial trucks could be present in over 14 million medium- and heavy-duty rigs, according to boffins at Colorado State University. In a paper presented at the 2024 Network and Distributed System Security Symposium, associate professor Jeremy Daily and systems engineering graduate students Jake Jepson and Rik Chatterjee demonstrated how ELDs can be accessed over Bluetooth or Wi-Fi connections to take control of a truck, manipulate data, and spread malware between vehicles. "These findings highlight an urgent need to improve the security posture in ELD systems," the trio wrote [PDF]. The authors did not specify brands or models of ELDs that are vulnerable to the security flaws they highlight in the paper. But they do note there's not too much diversity of products on the market. While there are some 880 devices registered, "only a few tens of distinct ELD models" have hit the road in commercial trucks. A federal mandate requires most heavy-duty trucks to be equipped with ELDs, which track driving hours. These systems also log data on engine operation, vehicle movement and distances driven -- but they aren't required to have tested safety controls built in. And according to the researchers, they can be wirelessly manipulated by another car on the road to, for example, force a truck to pull over. The academics pointed out three vulnerabilities in ELDs. They used bench level testing systems for the demo, as well as additional testing on a moving 2014 Kenworth T270 Class 6 research truck equipped with a vulnerable ELD. [...] For one of the attacks, the boffins showed how anyone within wireless range could use the device's Wi-Fi and Bluetooth radios to send an arbitrary CAN message that could disrupt of some of the vehicle's systems. A second attack scenario, which also required the attacker to be within wireless range, involved connecting to the device and uploading malicious firmware to manipulate data and vehicle operations. Finally, in what the authors described as the "most concerning" scenario, they uploaded a truck-to-truck worm. The worm uses the compromised device's Wi-Fi capabilities to search for other vulnerable ELDs nearby. After finding the right ELDs, the worm uses default credentials to establish a connection, drops its malicious code on the next ELD, overwrites existing firmware, and then starts the process over again, scanning for additional devices. "Such an attack could lead to widespread disruptions in commercial fleets, with severe safety and operational implications," the researchers warned.Read more of this story at Slashdot.
An AI tool named Mia, tested by the NHS, successfully detected signs of breast cancer in 11 women which had been missed by human doctors. The BBC reports: The tool, called Mia, was piloted alongside NHS clinicians and analyzed the mammograms of over 10,000 women. Most of them were cancer-free, but it successfully flagged all of those with symptoms, as well as an extra 11 the doctors did not identify. At their earliest stages, cancers can be extremely small and hard to spot. The BBC saw Mia in action at NHS Grampian, where we were shown tumors that were practically invisible to the human eye. But, depending on their type, they can grow and spread rapidly. Barbara was one of the 11 patients whose cancer was flagged by Mia but had not been spotted on her scan when it was studied by the hospital radiologists. Because her 6mm tumor was caught so early she had an operation but only needed five days of radiotherapy. Breast cancer patients with tumors which are smaller than 15mm when discovered have a 90% survival rate over the following five years. Barbara said she was pleased the treatment was much less invasive than that of her sister and mother, who had previously also battled the disease. Without the AI tool's assistance, Barbara's cancer would potentially not have been spotted until her next routine mammogram three years later. She had not experienced any noticeable symptoms. "These results are encouraging and help to highlight the exciting potential AI presents for diagnostics. There is no question that real-life clinical radiologists are essential and irreplaceable, but a clinical radiologist using insights from validated AI tools will increasingly be a formidable force in patient care." said Dr Katharine Halliday, President of the Royal College of Radiologists.Read more of this story at Slashdot.
An anonymous reader quotes a report from InterestingEngineering: A concept that began as a doodle at a conference years ago is now becoming a reality. RocketStar Inc. has showcased (PDF) its advanced nuclear-based propulsion technology called the FireStar Drive. It is said to be the world's first electric device for spacecraft propulsion boosted by nuclear fusion. Recently, the company announced the successful initial demonstration of this electric propulsion technology. The FireStar Drive harnesses the power of nuclear fusion to improve the performance of RocketStar's "water-fueled pulsed plasma thruster." A spacecraft's thrusters perform various functions, including propulsion, orbital changes, and even docking with other orbiting platforms. Moreover, the device employs a unique sort of aneutronic nuclear fusion, which is a fusion reaction that generates few to no neutrons as a byproduct. "The base thruster generates high-speed protons through the ionization of water vapor," noted the press release. Therefore, these protons collide with the nucleus of a boron atom, which starts the fusion reaction. The FireStar Drive begins a fusion process by adding boron into the thruster exhaust, resulting in high-energy particles that increase thrust. RocketStar's current thruster is dubbed M1.5. Plans to test the FireStar Drive are now ongoing. The in-space technological demonstration will take place aboard D-Orbit's patented OTV ION Satellite Carrier. The SpaceX Transporter rideshare mission will likely launch the demo test in July and October 2024. Furthermore, the team plans to undertake ground tests this year, with more in-space demonstrations scheduled for February 2025. The FireStar Drive will undergo testing as a payload aboard Rogue Space System's Barry-2 spacecraft in the same month. The thruster M1.5 is already ready for delivery to clients.Read more of this story at Slashdot.
"There is a new side channel attack against Apple 'M' series CPUs that does not appear to be fixable without a major performance hit," writes Slashdot reader EncryptedSoldier. SecurityWeek reports: A team of researchers representing several universities in the United States has disclosed the details of a new side-channel attack method that can be used to extract secret encryption keys from systems powered by Apple CPUs. The attack method, dubbed GoFetch, has been described as a microarchitectural side-channel attack that allows the extraction of secret keys from constant-time cryptographic implementations. These types of attacks require local access to the targeted system. The attack targets a hardware optimization named data memory-dependent prefetcher (DMP), which attempts to prefetch addresses found in the contents of program memory to improve performance. The researchers have found a way to use specially crafted cryptographic operation inputs that allow them to infer secret keys, guessing them bits at a time by monitoring the behavior of the DMP. They managed to demonstrate end-to-end key extraction attacks against several crypto implementations, including OpenSSL Diffie-Hellman Key Exchange, Go RSA, and the post-quantum CRYSTALS-Kyber and CRYSTALS-Dilithium. The researchers have conducted successful GoFetch attacks against systems powered by Apple M1 processors, and they have found evidence that the attack could also work against M2 and M3 processors. They have also tested an Intel processor that uses DMP, but found that it's 'more robust' against such attacks. The experts said Apple is investigating the issue, but fully addressing it does not seem trivial. The researchers have proposed several countermeasures, but they involve hardware changes that are not easy to implement or mitigations that can have a significant impact on performance. Apple told SecurityWeek that it thanks the researchers for their collaboration as this work advances the company's understanding of these types of threats. The tech giant also shared a link to a developer page that outlines one of the mitigations mentioned by the researchers. The researchers have published a paper (PDF) detailing their work. Ars Technica's Dan Goodin also reported on the vulnerability.Read more of this story at Slashdot.
Lindsay Clark reports via The Register: The UK Information Commissioner's Office has received a complaint detailing the mismanagement of personal data at the Nursing and Midwifery Council (NMC), the regulator that oversees worker registration. Employment as a nurse or midwife depends on enrollment with the NMC in the UK. According to whistleblower evidence seen by The Register, the databases on which the personal information is held lack rudimentary technical standards and practices. The NMC said its data was secure with a high level of quality, allowing it to fulfill its regulatory role, although it was on "a journey of improvement." But without basic documentation, or the primary keys or foreign keys common in database management, the Microsoft SQL Server databases -- holding information about 800,000 registered professionals -- are difficult to query and manage, making assurances on governance nearly impossible, the whistleblower told us. The databases have no version control systems. Important fields for identifying individuals were used inconsistently -- for example, containing junk data, test data, or null data. Although the tech team used workarounds to compensate for the lack of basic technical standards, they were ad hoc and known by only a handful of individuals, creating business continuity risks should they leave the organization, according to the whistleblower. Despite having been warned of the issues of basic technical practice internally, the NMC failed to acknowledge the problems. Only after exhausting other avenues did the whistleblower raise concern externally with the ICO and The Register. The NMC stores sensitive data on behalf of the professionals that it registers, including gender, sexual orientation, gender identity, ethnicity and nationality, disability details, marital status, as well as other personal information. The whistleblower's complaint claims the NMC falls well short of [the standards required under current UK law for data protection and the EU's General Data Protection Regulation (GDPR)]. The statement alleges that the NMC's "data management and data retrieval practices were completely unacceptable." "There is not even much by way of internal structure of the databases for self-documentation, such as primary keys, foreign keys (with a few honorable exceptions), check constraints and table constraints. Even fields that should not be null are nullable. This is frankly astonishing and not the practice of a mature, professional organization," the statement says. For example, the databases contain a unique ten-digit number (or PRN) to identify individuals registered to the NMC. However, the fields for PRNs sometimes contain individuals' names, start with a letter or other invalid data, or are simply null. The whistleblower's complaint says that the PRN problem, and other database design deficiencies, meant that it was nearly impossible to produce "accurate, correct, business critical reports ... because frankly no one knows where the correct data is to be found." A spokesperson for the NMC said the register was "organized and documented" in the SQL Server database. "For clarity, the register of all our nurses, midwives and nursing practitioners is held within Dynamics 365 which is our system of record. This solution and the data held within it, is secure and well documented. It does not rely on any SQL database. The SQL database referenced by the whistleblower relates to our data warehouse which we are in the process of modernizing as previously shared."Read more of this story at Slashdot.
Instagram has been limiting recommended political content by default without notifying users. Ars Technica reports: Instead, Instagram rolled out the change in February, announcing in a blog that the platform doesn't "want to proactively recommend political content from accounts you don't follow." That post confirmed that Meta "won't proactively recommend content about politics on recommendation surfaces across Instagram and Threads," so that those platforms can remain "a great experience for everyone." "This change does not impact posts from accounts people choose to follow; it impacts what the system recommends, and people can control if they want more," Meta's spokesperson Dani Lever told Ars. "We have been working for years to show people less political content based on what they told us they want, and what posts they told us are political." To change the setting, users can navigate to Instagram's menu for "settings and activity" in their profiles, where they can update their "content preferences." On this menu, "political content" is the last item under a list of "suggested content" controls that allow users to set preferences for what content is recommended in their feeds. There are currently two options for controlling what political content users see. Choosing "don't limit" means "you might see more political or social topics in your suggested content," the app says. By default, all users are set to "limit," which means "you might see less political or social topics." "This affects suggestions in Explore, Reels, Feed, Recommendations, and Suggested Users," Instagram's settings menu explains. "It does not affect content from accounts you follow. This setting also applies to Threads." "Did [y'all] know Instagram was actively limiting the reach of political content like this?!" an X user named Olayemi Olurin wrote in an X post. "I had no idea 'til I saw this comment and I checked my settings and sho nuff political content was limited." "This is actually kinda wild that Instagram defaults everyone to this," another user wrote. "Obviously political content is toxic but during an election season it's a little weird to just hide it from everyone?"Read more of this story at Slashdot.
An anonymous reader quotes a report from the New York Times: General Motors said Friday that it had stopped sharing details about how people drove its cars with two data brokers that created risk profiles for the insurance industry. The decision followed a New York Times report this month that G.M. had, for years, been sharing data about drivers' mileage, braking, acceleration and speed with the insurance industry. The drivers were enrolled -- some unknowingly, they said -- in OnStar Smart Driver, a feature in G.M.'s internet-connected cars that collected data about how the car had been driven and promised feedback and digital badges for good driving. Some drivers said their insurance rates had increased as a result of the captured data, which G.M. shared with two brokers, LexisNexis Risk Solutions and Verisk. The firms then sold the data to insurance companies. Since Wednesday, "OnStar Smart Driver customer data is no longer being shared with LexisNexis or Verisk," a G.M. spokeswoman, Malorie Lucich, said in an emailed statement. "Customer trust is a priority for us, and we are actively evaluating our privacy processes and policies."Read more of this story at Slashdot.
The Dutch pirate site blocklist has expanded with two new targets, shadow libraries Anna's Archive and Library Genesis. The court order was obtained by local anti-piracy group BREIN, acting on behalf of major publishers. Interestingly, Z-Library isn't listed in the blocking order, despite explicit warnings previously issued by BREIN. TorrentFreak reports: All blocking requests were submitted by local anti-piracy group BREIN, which acts on behalf of rightsholders. These include the major Hollywood studios but BREIN's purview is much broader. Last week, it obtained the latest blocking order, this time on behalf of the publishing industry. Issued by the Rotterdam District Court, the order requires a local Internet provider to block two well-known shadow libraries; "Anna's Archive" and "Library Genesis" (LibGen). News of this new court order was shared by BREIN which notes that both sites were found to make copyright infringing works available on a large scale. At the time of writing, a published copy is not available but, based on the covenant, all large Internet providers are expected to implement the blockades. "These types of illegal shadow libraries are very harmful. The only ones who benefit are the anonymous owners of these illegal services. Authors and publishers see no return on their efforts and investments," BREIN comments. "Copyright holders deserve an honest living. There are numerous legal ways to obtain ebooks. If desired, this can also be done very cheaply; through the library for example." The Rotterdam court issued a so-called 'dynamic' blocking order, meaning that rightsholders can update the targeted domains and IP addresses if the sites switch to new ones in the future. This also applies to mirrors and increases the blockades' effectiveness, as there is no need to return to court. Previously, Internet provider KPN challenged these 'dynamic' orders, suggesting that they are too broad. The court rejected this argument, however, noting that the process hasn't led to any major problems thus far. BREIN further reports that Google is voluntarily offering a helping hand. As reported in detail previously, the search engine removes blocked domains from its local search results after being notified about an ISP blocking order. "The effectiveness of the blocking measure is increased because Google cooperates in combating these infringements and, at the request of BREIN, completely removes all references to websites that are blocked by order of the Dutch court from the search results," BREIN writes.Read more of this story at Slashdot.
Boom Supersonic's first aircraft, the XB-1, completed its first flight today and met "all of its test objectives." From a report: This initial test only saw the aircraft 7,120 feet above sea level and fly at a top speed of 238 knots (274 mph) -- far from Mach 1, the speed of sound. The first flight of XB-1 took place at the Mojave Air & Space Port in California, in the same airspace where the X-1 broke the sound barrier, the X-15 conducted test flights for altitude and speed records, and the SR-71 Blackbird was also tested. According to Boom, the XB-1 will be testing, among other things: Augmented reality vision system: Two nose-mounted cameras, digitally augmented with attitude and flight path indications, feed a high-resolution pilot display enabling excellent runway visibility. This system allows for improved aerodynamic efficiency without the weight and complexity of a movable nose.Digitally-optimized aerodynamics: Engineers used computational fluid dynamics simulations to explore thousands of designs for XB-1. The result is an optimized design that combines safe and stable operation at takeoff and landing with efficiency at supersonic speeds.Carbon fiber composites: XB-1 is almost entirely made from carbon fiber composite materials, enabling it to realize a sophisticated aerodynamic design in a strong, lightweight structure.Supersonic intakes: XB-1's engine intakes slow supersonic air to subsonic speeds, efficiently converting kinetic energy into pressure energy and allowing conventional jet engines to power XB-1 from takeoff through supersonic flight. Another thing being tested by XB-1 is the construction of a safety culture. With XB-1 now a flying test vehicle, there are many flights ahead before we get to Overture One's first flight, much less dramatically expanding access to supersonic flight. This work will require much engineering and a resilient safety culture. But the first flight of the first step was carried out by Boom Supersonic today, March 22, 2024.Read more of this story at Slashdot.