Launch startup Astra reaches orbit for the first time

The ranks of orbit-capable spaceflight companies just grew ever so slightly. TechCrunch reports Astra has reached orbit for the first time when its Rocket 3 booster launched shortly after 1AM Eastern today (November 20th). The startup put a mass simulator into a 310-mile-high orbit as part of a demonstration for the US Air Force’s Rapid Agile Launch Initiative, which shows how private outfits could quickly and flexibly deliver Space Force payloads.

This success has been a long time in coming. Astra failed to reach orbit three times before, including a second attempt where the rocket reached space but didn’t have enough velocity for an orbital insertion.

Company chief Chris Kemp stressed on Twitter that Astra was “just getting started” despite the success. It’s a significant moment all the same. Companies and researchers wanting access to space currently don’t have many choices — they either have to hitch a ride on one of SpaceX’s not-so-common rideshare missions or turn to a handful of options like Rocket Lab. Astra hopes to produce its relatively modest rockets quickly enough that it delivers many small payloads in a timely fashion. That, in turn, might lower prices and make space more viable.

Source: Launch startup Astra reaches orbit for the first time | Engadget

The Amazon lobbyists who kill U.S. consumer privacy protections

In recent years, Amazon.com Inc has killed or undermined privacy protections in more than three dozen bills across 25 states, as the e-commerce giant amassed a lucrative trove of personal data on millions of American consumers.

Amazon executives and staffers detail these lobbying victories in confidential documents reviewed by Reuters.

In Virginia, the company boosted political donations tenfold over four years before persuading lawmakers this year to pass an industry-friendly privacy bill that Amazon itself drafted. In California, the company stifled proposed restrictions on the industry’s collection and sharing of consumer voice recordings gathered by tech devices. And in its home state of Washington, Amazon won so many exemptions and amendments to a bill regulating biometric data, such as voice recordings or facial scans, that the resulting 2017 law had “little, if any” impact on its practices, according to an internal Amazon document.

[…]

Source: The Amazon lobbyists who kill U.S. consumer privacy protections

This is a detailed and creepy look at how Amazon undermines protections in the US and the amount and scope of data they collect.

Linux has a serious security problem that once again enables DNS cache poisoning using ICMP / ping information

As much as 38 percent of the Internet’s domain name lookup servers are vulnerable to a new attack that allows hackers to send victims to maliciously spoofed addresses masquerading as legitimate domains, like bankofamerica.com or gmail.com.

The exploit, unveiled in research presented today, revives the DNS cache-poisoning attack that researcher Dan Kaminsky disclosed in 2008. He showed that, by masquerading as an authoritative DNS server and using it to flood a DNS resolver with fake lookup results for a trusted domain, an attacker could poison the resolver cache with the spoofed IP address. From then on, anyone relying on the same resolver would be diverted to the same imposter site.

A lack of entropy

The sleight of hand worked because DNS at the time relied on a transaction ID to prove the IP number returned came from an authoritative server rather than an imposter server attempting to send people to a malicious site. The transaction number had only 16 bits, which meant that there were only 65,536 possible transaction IDs.

Kaminsky realized that hackers could exploit the lack of entropy by bombarding a DNS resolver with off-path responses that included each possible ID. Once the resolver received a response with the correct ID, the server would accept the malicious IP and store the result in cache so that everyone else using the same resolver—which typically belongs to a corporation, organization, or ISP—would also be sent to the same malicious server.

The threat raised the specter of hackers being able to redirect thousands or millions of people to phishing or malware sites posing as perfect replicas of the trusted domain they were trying to visit. The threat resulted in industry-wide changes to the domain name system, which acts as a phone book that maps IP addresses to domain names.

Under the new DNS spec, port 53 was no longer the default used for lookup queries. Instead, those requests were sent over a port randomly chosen from the entire range of available UDP ports. By combining the 16 bits of randomness from the transaction ID with an additional 16 bits of entropy from the source port randomization, there were now roughly 134 million possible combinations, making the attack mathematically infeasible.

Unexpected Linux behavior

Now, a research team at the University of California at Riverside has revived the threat. Last year, members of the same team found a side channel in the newer DNS that allowed them to once again infer the transaction number and randomized port number sending resolver-spoofed IPs.

 

The research and the SADDNS exploit it demonstrated resulted in industry-wide updates that effectively closed the side channel. Now comes the discovery of new side channels that once again make cache poisoning viable.

“In this paper, we conduct an analysis of the previously overlooked attack surface, and are able to uncover even stronger side channels that have existed for over a decade in Linux kernels,” researchers Keyu Man, Xin’an Zhou, and Zhiyun Qian wrote in a research paper being presented at the ACM CCS 2021 conference. “The side channels affect not only Linux but also a wide range of DNS software running on top of it, including BIND, Unbound and dnsmasq. We also find about 38% of open resolvers (by frontend IPs) and 14% (by backend IPs) are vulnerable including the popular DNS services such as OpenDNS and Quad9.”

OpenDNS owner Cisco said: “Cisco Umbrella/Open DNS is not vulnerable to the DNS Cache Poisoning Attack described in CVE-2021-20322, and no Cisco customer action is required. We remediated this issue, tracked via Cisco Bug ID CSCvz51632, as soon as possible after receiving the security researcher’s report.” Quad9 representatives weren’t immediately available for comment.

The side channel for the attacks from both last year and this year involve the Internet Control Message Protocol, or ICMP, which is used to send error and status messages between two servers.

“We find that the handling of ICMP messages (a network diagnostic protocol) in Linux uses shared resources in a predictable manner such that it can be leveraged as a side channel,” researcher Qian wrote in an email. “This allows the attacker to infer the ephemeral port number of a DNS query, and ultimately lead to DNS cache poisoning attacks. It is a serious flaw as Linux is most widely used to host DNS resolvers.” He continued:

The ephemeral port is supposed to be randomly generated for every DNS query and unknown to an off-path attacker. However, once the port number is leaked through a side channel, an attacker can then spoof legitimate-looking DNS responses with the correct port number that contain malicious records and have them accepted (e.g., the malicious record can say chase.com maps to an IP address owned by an attacker).

The reason that the port number can be leaked is that the off-path attacker can actively probe different ports to see which one is the correct one, i.e., through ICMP messages that are essentially network diagnostic messages which have unexpected effects in Linux (which is the key discovery of our work this year). Our observation is that ICMP messages can embed UDP packets, indicating a prior UDP packet had an error (e.g., destination unreachable).

We can actually guess the ephemeral port in the embedded UDP packet and package it in an ICMP probe to a DNS resolver. If the guessed port is correct, it causes some global resource in the Linux kernel to change, which can be indirectly observed. This is how the attacker can infer which ephemeral port is used.

Changing internal state with ICMP probes

The side channel last time around was the rate limit for ICMP. To conserve bandwidth and computing resources, servers will respond to only a set number of requests and then fall silent. The SADDNS exploit used the rate limit as a side channel. But whereas last year’s port inference method used UDP packets to probe which ports were designed to solicit ICMP responses, the attack this time uses ICMP probes directly.

“According to the RFC (standards), ICMP packets are only supposed to be generated *in response* to something,” Qian added. “They themselves should never *solicit* any responses, which means they are ill-suited for port scans (because you don’t get any feedback). However, we find that ICMP probes can actually change some internal state that can actually be observed through a side channel, which is why the whole attack is novel.”

The researchers have proposed several defenses to prevent their attack. One is setting proper socket options such as IP_PMTUDISC_OMIT, which instructs an operating system to ignore so-called ICMP messages, effectively closing the side channel. A downside, then, is that those messages will be ignored, and sometimes such messages are legitimate.

Another proposed defense is randomizing the caching structure to make the side channel unusable. A third is to reject ICMP redirects.

The vulnerability affects DNS software, including BIND, Unbound, and dnsmasq, when they run on Linux. The researchers tested to see if DNS software was vulnerable when running on either Windows or Free BSD and found no evidence it was. Since macOS uses the FreeBSD network stack, they assume it isn’t vulnerable either.

Source: Linux has a serious security problem that once again enables DNS cache poisoning | Ars Technica

Discord is quietly building an app empire of bots – The Verge

Discord has been quietly building its own app platform based on bots over the past few years. More than 30 percent of Discord servers now use bots, and 430,000 of them are used every week across Discord by its 150 million monthly active users. Now that bots are an important part of Discord, the company is embracing them even further with the ability to search and browse for bots on Discord.

A new app discovery feature will start showing up in Discord in spring 2022. Verified apps and bots (which total around 12,000 right now) will be discoverable through this feature. Developers will be able to opt into discoverability, once they’re fully prepared for a new influx of users that can easily find their bots.

Bots are powerful on Discord, offering a range of customizations for servers. Discord server owners install bots on servers to help moderate them or offer mini-games or features to their communities. There are popular bots that will spit out memes on a daily basis, bots that help you even create your own bot, or music bots that let Discord users listen to tunes together.

[…]

Source: Discord is quietly building an app empire of bots – The Verge

Apple magnanimously launches Self Service Repair for DIY iPhone, Mac fixes

Apple, having long stood in the way of customers who want to fix their own devices, now says it wants to help those who feel they have the right to repair their own products.

On Wednesday the iBiz announced Self Service Repair, “which will allow customers who are comfortable with completing their own repairs access to Apple genuine parts and tools.”

This may be something of a mixed blessing as Apple hardware is notoriously difficult to mend, due to the fact that special tools are often required, parts may be glued together, and components like Apple’s TouchID sensor and T2 security chip can complicate getting devices to work again once reassembled.

Kyle Wiens, CEO of DIY repair community iFixit, told The Register in an email that Apple’s reputation for making difficult to repair products is deserved, particularly for things like AirPods, Apple Pencil, and their keyboards which iFixit has rated 0 out of 10 for repairability.

“Some products that get a 1 are fixable, but it’s really really hard,” said Wiens. “And some like the new MacBook Pro get a 4. Not great but certainly fixable.”

The recently released iPhone 13 received a repairability rating of 5 out of 10. As it happens, Apple last week promised an iOS update to facilitate iPhone 13 screen repair without breaking FaceID.

Initially, Apple will provide more than 200 parts and tools for those determined to conduct common iPhone repairs, such as replacing the display screen, battery, and camera. The program will focus first on iPhone 12 and 13 devices, and will expand later to include M1-based Macs.

Starting early next year, DIY-inclined customers in the US will be able to order Apple-approved parts and tools from the Apple Self Service Repair Online Store – at Apple prices – instead of scouring eBay, Alibaba, and various grey market tool and parts sources. The program is expected to expand internationally at a later date.

A victory for the right to repair

Apple’s about-face follows years of lobbying, advocacy, and regulatory pressure by those who support the right to repair purchased products. Previously, the company said such fiddling represented a security risk. In 2017, the iGiant argued that a right to repair bill under consideration in Nebraska would make the state a Mecca for hackers if it passed.

“This is the clear result of tireless advocacy from the repair community and policy proposals on three continents,” said Wiens. “Right to repair investigations at the FTC and the Australian Productivity Commission are ongoing.

“Consumers deserve the right to repair their own products. Repair manuals should not be secret. We’ve been saying this for a long time, and it’s great to see that Apple finally agrees. We still need to pass legislation and guarantee a level playing field for the entire industry. Apple’s announcement shows that it’s possible to do the right thing. Hopefully Samsung will be next.”

Source: Apple launches Self Service Repair for DIY iPhone, Mac fixes • The Register

South Korea Is Giving Millions of Photos of all foreign travelers since 2019 to Facial Recognition Researchers

The South Korean Ministry of Justice has provided more than 100 million photos of foreign nationals who travelled through the country’s airports to facial recognition companies without their consent, according to attorneys with the non-governmental organization Lawyers for a Democratic Society.

While the use of facial recognition technology has become common for governments across the world, advocates in South Korea are calling the practice a “human rights disaster” that is relatively unprecedented.

“It’s unheard-of for state organizations—whose duty it is to manage and control facial recognition technology—to hand over biometric information collected for public purposes to a private-sector company for the development of technology,” six civic groups said during a press conference last week.

The revelation, first reported in the South Korean newspaper The Hankyoreh, came to light after National Assembly member Park Joo-min requested and received documents from the Ministry of Justice related to a April 2019 project titled Artificial Intelligence and Tracking System Construction Project. The documents show private companies secretly used biometric data to research and develop an advanced immigration screening system that would utilize artificial intelligence to automatically identify airport users’ identities through CCTV surveillance cameras and detect dangerous situations in real time.

Shortly after the discovery, civil liberty groups announced plans to represent both foreign and domestic victims in a lawsuit.

[…]

Despite this pushback, the use of the technology is increasingly used in commercial spaces and airports. This holiday season, Delta Airlines will be piloting a facial recognition boarding program in Atlanta, following similar moves by JetBlue. US Customs and Border Protection is already relying on facial recognition technology in dozens of locations.

While the South Korean government’s collaboration with the private sector is unprecedented in its scale, it  is not the only collaboration of its kind. In 2019, a Motherboard investigation revealed the Departments of Motor Vehicles in numerous states had been selling names, addresses and other personal data to insurance or tow companies and to private investigators.

Source: South Korea Is Giving Millions of Photos to Facial Recognition Researchers

Big tech fined 2% revenue if they force their own in-app payment system in S Korea

South Korean has again imposed new regulations on app stores, this time with a regime that will see operators fined up to two per cent of revenue if they force their proprietary in-app payment systems on developers.

“Considering that certain payment methods compulsory acts are serious illegal acts of app market operators, an enforcement ordinance has been prepared that imposes a fine of two per cent of sales and one per cent of sales for delayed screening or deletion,” the Korea Communications Commission (KCC), yesterday announced in a (Korean language) canned statement.

The new regulation follows the September 2021 introduction of the country’s Telecommunications Business Act, which prevents tech giants from restricting payment options on their platforms – either to pay for apps or for in-app purchases. The Act also prevents the likes of Google, Apple and others from taking a cut of in-app purchases facilitated by third-party services.

[….]

Source: Big tech fined if they force their own in-app payment system • The Register

Come on, EU, US, where are you guys?!

Project Collects ‘Every’ NFT In One Giant 20TB Download

Hours ago, a website appeared online with the express purpose of hosting a nearly 20TB torrent (that’s terabytes, folks, the big boys of digital data measurement) containing every NFT available through the Ethereum and Solana blockchains.

The NFT Bay, whose name and overall design riff on iconic torrent database The Pirate Bay, is the work of one Geoffrey Huntley, an Australian software and dev ops engineer. In a frequently asked questions document written up for annoying reporters like me, Huntley describes The NFT Bay as an “educational art project” designed to teach the public about what NFTs are and aren’t, in the hopes that fewer folks get swindled by the technology’s innumerable grifters.

A logo of a pirate ship underlined by text reading "The NFT Bay" in a fancy script.
Image: Geoffrey Huntley

“Fundamentally, I hope people learn to understand what people are buying when purchasing NFT art right now is nothing more than directions on how to access or download an image,” Huntley explained. “The image is not stored on the blockchain and the majority of images I’ve seen are hosted on web 2.0 storage, which is likely to end up as 404, meaning the NFT has even less value.

[…]

“[NFTs] are only valuable as tools for money laundering, tax evasion, and greater fool investment fraud,” wrote computer scientist Antsstyle in a scathing criticism of the technology, the long version of which is perhaps the most comprehensive breakdown of the ills posed by NFTs, cryptocurrency, and the blockchain on which they operate. “There is zero actual value to NFTs. Their sole purpose is to create artificial scarcity of an artwork to supposedly increase its value.”

Source: Project Collects ‘Every’ NFT In One Giant 20TB Download

Canadian teen arrested for stealing $36.5m of cryptocurrency

A Canadian teenager has been arrested for allegedly stealing $37 million worth of cryptocurrency ($46M Canadian) via a SIM swap scam, making it the largest virtual cash heist affecting a single person yet, according to police.

Together with the FBI and the US Secret Service Electronic Crimes Task Force, Hamilton Police in the Canadian province of Ontario launched a joint probe to investigate the breach of a US resident’s mobile phone account.

The victim was reportedly targeted with a SIM swap attack – their phone number was hijacked and ported to a different phone belonging to the attacker. The miscreant was then able to enter personal accounts via two-factor authentication requests and obtain details of the victim’s cryptocurrency wallet. From there, millions of dollars were siphoned off, it’s claimed.

“The joint investigation revealed that some of the stolen cryptocurrency was used to purchase an online username that was considered to be rare in the gaming community,” according to a statement from Hamilton Police.

“This transaction led investigators to uncover the account holder of the rare username,” it confirmed.

The teen was arrested for theft and possession of property. Police have seized over $5.5 million worth of cryptocurrencies in the case so far.

Source: Canadian teen arrested for stealing $36.5m of cryptocurrency • The Register

Thousands of Firefox users accidentally commit login cookies on GitHub

Thousands of Firefox cookie databases containing sensitive data are available on request from GitHub repositories, data potentially usable for hijacking authenticated sessions.

These cookies.sqlite databases normally reside in the Firefox profiles folder. They’re used to store cookies between browsing sessions. And they’re findable by searching GitHub with specific query parameters, what’s known as a search “dork.”

Aidan Marlin, a security engineer at London-based rail travel service Trainline, alerted The Register to the public availability of these files after reporting his findings through HackerOne and being told by a GitHub representative that “credentials exposed by our users are not in scope for our Bug Bounty program.”

Marlin then asked whether he could make his findings public and was told he’s free to do so.

“I’m frustrated that GitHub isn’t taking its users’ security and privacy seriously,” Marlin told The Register in an email. “The least it could do is prevent results coming up for this GitHub dork. If the individuals who uploaded these cookie databases were made aware of what they’d done, they’d s*** their pants.”

Marlin acknowledges that affected GitHub users deserve some blame for failing to prevent their cookies.sqlite databases from being included when they committed code and pushed it to their public repositories. “But there are nearly 4.5k hits for this dork, so I think GitHub has a duty of care as well,” he said, adding that he’s alerted the UK Information Commissioner’s Office because personal information is at stake.

[…]

Source: Thousands of Firefox users accidentally commit login cookies on GitHub • The Register

Warhammer 40K’s Imperium Is Genocidal – not a Good Thing, Maker Reminds Players

Some Warhammer 40,000 players think the game’s fascist Imperium of Man faction is awesome, and actually has a few good ideas. It does not. To clarify this point—which more than one Warhammer 40K fan appears to have missed—maker Games Workshop put out a statement saying that you do not, under any circumstances, “gotta hand it to them.”

“There are no goodies in the Warhammer 40,000 universe,” Games Workshop wrote on its website today. “None. Especially not the Imperium of Man…We believe in and support a community united by shared values of mutual kindness and respect. Our fantasy settings are grim and dark, but that is not a reflection of who we are or how we feel the real world should be.”

The statement comes just a couple weeks after controversy broke out when a player wore Nazi symbols to an unofficial tournament in Spain and the organizers apparently didn’t throw him out, despite complaints from other players.

[…]

Most fans get that Warhammer 40K is not real, and if it were, life in its universe would be exceedingly nasty, brutish, and short. But some of its aesthetic and lore have been co-opted by the alt-right, white supremacists, and other crypto-fascist groups. They think the Imperium of Man—a feudalistic galactic empire modeled after Rome, full of enslaved races, and ruled by a 10,000 year-old psychic kept alive by cyborg implants called the Emperor of Mankind—is a model on which to base their politics. During the 2016 presidential election it became the basis for the now famous internet meme: God Emperor Trump.

This all adds up to why Games Workshop had to take a break from its world building today, to make Warhammer 40K’s subtext text:

Like so many aspects of Warhammer 40,000, the Imperium of Man is satirical.

For clarity: satire is the use of humour, irony, or exaggeration, displaying people’s vices or a system’s flaws for scorn, derision, and ridicule. Something doesn’t have to be wacky or laugh-out-loud funny to be satire. The derision is in the setting’s amplification of a tyrannical, genocidal regime, turned up to 11. The Imperium is not an aspirational state, outside of the in-universe perspectives of those who are slaves to its systems. It’s a monstrous civilisation, and its monstrousness is plain for all to see.

But apparently not plainly enough. Games Workshop reiterated its stance against hate groups and others seeking to co-opt its creative work, including banning individuals wearing hate symbols at Warhammer-adjacent events.

“If you come to a Games Workshop event or store and behave to the contrary, including wearing the symbols of real-world hate groups, you will be asked to leave. We won’t let you participate,” the company wrote. “We don’t want your money. We don’t want you in the Warhammer community.”

It’s nice to have a corporate statement that doesn’t mince words for once.

Source: Warhammer 40K’s Imperium Is Genocidal, Maker Reminds Players

German state planning to switch 25,000 PCs to LibreOffice

The north-German state of Schleswig-Holstein plans to switch to open source software, including LibreOffice, in its administration and schools.

In doing so, the state wants to reduce its dependence on proprietary software, and eventually end it altogether. By the end of 2026, Microsoft Office is to be replaced by LibreOffice on all 25,000 computers used by civil servants and employees (including teachers), and the Windows operating system is to be replaced by GNU/Linux.

The necessary steps for this are specified in the planning of the Schleswig-Holstein state parliament (German), as digital minister Jan Philipp Albrecht explains in an interview with c’t (also German – Google Translate version here).

Lothar Becker and Thorsten Behrens from The Documentation Foundation, the non-profit entity behind LibreOffice, were invited to a meeting with those responsible (photos below). The focus was on cloud solutions, integration with LibreOffice and other systems, and video conferencing tools.

[…]

Source: German state planning to switch 25,000 PCs to LibreOffice

‘Gas station in space’: new plan to make rocket fuel from junk in Earth’s orbit

[…]

South Australian company Neumann Space has developed an “in-space electric propulsion system” that can be used in low Earth orbit to extend the missions of spacecraft, move satellites, or de-orbit them.

Now Neumann is working on a plan with three other companies to turn space junk into fuel for that propulsion system.

Japanese start-up Astroscale has already demonstrated how it can use satellites to capture bits of debris in space.

Nanorocks, in the US, is working on a plan using advanced robotics to store and cut up that debris while it is still in orbit. Another US company, Cislunar, is developing a space foundry to melt debris into metal rods.

And Neumann Space’s propulsion system can use those metal rods as fuel – their system ionises the metal which then creates thrust to move objects around orbit.

Chief executive officer Herve Astier said when Neumann was approached to be part of a supply chain to melt metal in space, he thought it was a futuristic plan, and would not be “as easy as it looks”.

“But they got a grant from Nasa so we built a prototype and it works,” he said.

“We did a live technology demonstration.“ One can grab a piece of debris, one can cut the debris open, one can melt the debris, and we can use that.”

[…]

Australian researchers are also working on the problem.

Saber Astronautics has won a Nasa grant to develop a drag sail, which will launch from a spacecraft at the end of its life and drag it out of orbit.

Sydney’s Electro Optic Systems, working with the University of Canberra, has developed laser technology that can nudge junk away from potential collisions, or towards the atmosphere.

The Australian Institute of Machine Learning has a grant to improve detection and tracking of debris, and a new surveillance radar in Western Australia will help with that too.

Recycling the junk, instead of capturing it or destroying it, is another dimension again.

Astier says it is still futuristic, but now he can see that it’s possible.

[…]

Source: ‘Gas station in space’: new plan to make rocket fuel from junk in Earth’s orbit | Space | The Guardian

Tesla drivers locked out of their cars by server error

Some Tesla drivers who fancied going for a spin on Saturday were unable to do so after an update to the cars’ companion app produced server errors.

Teslas don’t use conventional keys. Instead they require the presence of a fob, key card, or authenticated mobile phone app that links to the electric vehicles over Bluetooth. This is apparently easier and/or more convenient than a key, or something. Heck, everything’s better with Bluetooth, right?

Drivers that use the app to start their cars reported it couldn’t do the job and instead produced an error message.

Tesla founder and CEO Elon Musk personally replied to the above tweet, with the following information:

Measures like, maybe, letting people open their cars with keys? Just a suggestion.

Tesla appears not to have made any other public statement about the incident. The company put its support forums behind a regwall earlier in 2021 and owning a MuskMobile is a requirement for entry. Your correspondent is therefore unable to explore any official missives. Tesla’s Twitter account is silent on the matter and the electric car biz doesn’t bother with Facebook. The exact nature of the outage is therefore hard to divine.

[…]

Source: Tesla drivers locked out of their cars by server error • The Register

How Facebook and Google Actually Fund the Creation of Misinformation

MIT’s Technology Review shares data from a Facebook-run tool called CrowdTangle. It shows that by 2018 in the nation of Myanmar (population: 53 million), ” All the engagement had instead gone to fake news and clickbait websites.

“In a country where Facebook is synonymous with the internet, the low-grade content overwhelmed other information sources.” [T]he sheer volume of fake news and clickbait acted like fuel on the flames of already dangerously high ethnic and religious tensions. It shifted public opinion and escalated the conflict, which ultimately led to the death of 10,000 Rohingya, by conservative estimates, and the displacement of 700,000 more. In 2018, a United Nations investigation determined that the violence against the Rohingya constituted a genocide and that Facebook had played a “determining role” in the atrocities. Months later, Facebook admitted it hadn’t done enough “to help prevent our platform from being used to foment division and incite offline violence.” Over the last few weeks, the revelations from the Facebook Papers, a collection of internal documents provided to Congress and a consortium of news organizations by whistleblower Frances Haugen, have reaffirmed what civil society groups have been saying for years: Facebook’s algorithmic amplification of inflammatory content, combined with its failure to prioritize content moderation outside the US and Europe, has fueled the spread of hate speech and misinformation, dangerously destabilizing countries around the world.

But there’s a crucial piece missing from the story. Facebook isn’t just amplifying misinformation.

The company is also funding it.

An MIT Technology Review investigation, based on expert interviews, data analyses, and documents that were not included in the Facebook Papers, has found that Facebook and Google are paying millions of ad dollars to bankroll clickbait actors, fueling the deterioration of information ecosystems around the world.
Facebook pays them for permission to open their content within Facebook’s app (where Facebook controls the advertising) rather than having users clickthrough to the publisher’s own web site, reports Technology Review: Early on, Facebook performed little quality control on the types of publishers joining the program. The platform’s design also didn’t sufficiently penalize users for posting identical content across Facebook pages — in fact, it rewarded the behavior. Posting the same article on multiple pages could as much as double the number of users who clicked on it and generated ad revenue. Clickbait farms around the world seized on this flaw as a strategy — one they still use today… Clickbait actors cropped up in Myanmar overnight. With the right recipe for producing engaging and evocative content, they could generate thousands of U.S. dollars a month in ad revenue, or 10 times the average monthly salary — paid to them directly by Facebook. An internal company document, first reported by MIT Technology Review in October, shows that Facebook was aware of the problem as early as 2019… At one point, as many as 60% of the domains enrolled in Instant Articles were using the spammy writing tactics employed by clickbait farms, the report said…

75% of users who were exposed to clickbait content from farms run in Macedonia and Kosovo had never followed any of the pages. Facebook’s content-recommendation system had instead pushed it into their news feeds.
Technology Review notes that Facebook now pays billions of dollars to the publishers in their program. It’s a long and detailed article, which ultimately concludes that the problem “is now happening on a global scale.” Thousands of clickbait operations have sprung up, primarily in countries where Facebook’s payouts provide a larger and steadier source of income than other forms of available work. Some are teams of people while others are individuals, abetted by cheap automated tools that help them create and distribute articles at mass scale…

Google is also culpable. Its AdSense program fueled the Macedonia- and Kosovo-based farms that targeted American audiences in the lead-up to the 2016 presidential election. And it’s AdSense that is incentivizing new clickbait actors on YouTube to post outrageous content and viral misinformation.
Reached for comment, a Facebook spokesperson told Technology Review that they’d misunderstood the issue. And the spokesperson also said “we’ve invested in building new expert-driven and scalable solutions to these complex issues for many years, and will continue doing so.”

Google’s spokesperson confirmed examples in the article violated their own policies and removed the content, adding “We work hard to protect viewers from clickbait or misleading content across our platforms and have invested heavily in systems that are designed to elevate authoritative information.”

Source: How Facebook and Google Actually Fund the Creation of Misinformation – Slashdot

Beijing issues fines for 43 Big Tech M&A deals

China’s State Administration for Market Regulation (SAMR) has fined tech giants 43 times – with Alibaba, Baidu and Tencent told to pay up for failing to declare deals deemed to violate anti-monopoly legislation.

According to SAMR, more rigorous anti-monopoly law enforcement has seen businesses file more paperwork, sometimes about past transactions. SAMR’s own probes have spotted acquisitions that weren’t reported at the time.

Those efforts turned up 43 transactions, conducted between 2012 and 2021, that violated China’s 2008 Anti-Monopoly Law. Each count received a fine of ¥500,000 ($78,300). The regulatory body said that all were “assessed as having no effect of excluding or restricting competition”.

The market regulator posted about the fines on its WeChat account and Weibo page on Saturday.

State-sponsored media Global Times reported that Alibaba and Tencent each racked up more than ten cases.

[…]

China’s national anti-monopoly bureau was inaugurated on Thursday and guidelines for antitrust compliance of enterprises abroad were issued the same day.

The government in Beijing, and SAMR in particular, has been busy. Earlier this month the organization drafted new rules for internet platforms considered “super large” that hold them to higher standards than smaller, less influential ones in an attempt to stamp out anticompetitive behavior.

In September, the org ordered Alibaba, Tencent and more to stop blocking links to rivals. And it has been known to step in and outright ban mergers it deems imprudent.

[…]

Source: Beijing issues fines for 43 Big Tech M&A deals • The Register

It’s odd that China is leading the way in anti-monopolistic behaviour whilst the EU and US are lagging behind severely.