Intel’s $1.2bn EU antitrust fine cancelled by court 12 years after Intel didn’t pay up

Intel Corporation no longer has to pay a €1.06bn ($1.2bn, £890m) fine imposed by the European Commission (EC) in 2009 for abusing its dominance of the chip market.

On Wednesday, the General Court of the European Union annulled the EC antitrust penalty [PDF] after previously upholding it in 2014 [PDF].

After rival AMD complained in 2000 and again in 2003 that Intel was engaging in anti-competitive conduct by offering its hardware partners rebates for using Intel’s x86 chips, an EC antitrust investigation that got underway in 2004 and concluded in 2009 with a €1.06 billion penalty against Chipzilla.

The EC at the time found Intel’s conduct between October 2002 and December 2007 to be anti-competitive.

“The evidence gathered by the Commission led to the conclusion that Intel’s conditional rebates and payments induced the loyalty of key OEMs and of a major retailer, the effects of which were complementary in that they significantly diminished competitors’ ability to compete on the merits of their x86 CPUs,” the EC said in its 2009 decision. “Intel’s anti-competitive conduct thereby resulted in a reduction of consumer choice and in lower incentives to innovate.”

[…]

The ruling suggests that EU trustbusters won’t be able to constrain corporate behavior if alleged misconduct fails to fit within the limited definition of competitive abuse under EU law (Article 102 TFEU). According to the Associated Press, EC VP Margrethe Vestager said at a press briefing in Brussels that the EC needs more time to consider what comes next.

[…]

Source: Intel’s $1.2bn EU antitrust fine cancelled by court • The Register

Which begs the question – why is China leading the way in anti-competitive lawmaking?

LG Announces New Ad Targeting Features for TVs – wait, wtf, I bought my TV, not a service!

[… ]

there are plenty of cases where you throw down hundreds of dollars for a piece of hardware and then you end up being the product anyway. Case in point: TVs.

On Wednesday, the television giant LG announced a new offering to advertisers that promises to be able to reach the company’s millions of connected devices in households across the country, pummeling TV viewers with—you guessed it—targeted ads. While ads playing on your connected TV might not be anything new, some of the metrics the company plans to hand over to advertisers include targeting viewers by specific demographics, for example, or being able to tie a TV ad view to someone’s in-store purchase down the line.

If you swap out a TV screen for a computer screen, the kind of microtargeting that LG’s offering doesn’t sound any different than what a company like Facebook or Google would offer. That’s kind of the point.

[…]

Aside from being an eyesore that literally no TV user wants, these ads come bundled with their own privacy issues, too. While the kinds of invasive tracking and targeting that regularly happens with the ads on your Facebook feed or Google search results are built off of more than a decade’s worth of infrastructure, those in the connected television (or so-called “CTV”) space are clearly catching up, and catching up fast. Aside from what LG’s offering, there are other players in adtech right now that offer ways to connect your in-app activity to what you watch on TV, or the billboards you walk by with what you watch on TV. For whatever reason, this sort of tech largely sidesteps the kinds of privacy snafus that regulators are trying to wrap their heads around right now—regulations like CPRA and GDPR are largely designed to handle your data is handled on the web, not on TV.

[…]

The good news is that you have some sort of refuge from this ad-ridden hell, though it does take a few extra steps. If you own a smart TV, you can simply not connect it to the internet and use another device—an ad-free set-top box like an Apple TV, for instance—to access apps. Sure, a smart TV is dead simple to use, but the privacy trade-offs might wind up being too great.

Source: LG Announces New Ad Targeting Features for TVs

More Than 80% of NFTs Created for Free on OpenSea Are Fraud or Spam, Company Says

[…]

OpenSea has revealed just how much of the NFT activity on its platform is defined by fakery and theft, and it’s a lot. In fact, according to the company, nearly all of the NFTs created for free on its platform are either spam or plagiarized.

The revelation began with some drama. On Thursday, popular NFT marketplace OpenSea announced that it would limit how many times a user could create (or “mint”) an NFT for free on the platform using its tools to 50. So-called “lazy minting” on the site lets users skip paying a blockchain gas fee when they create an NFT on OpenSea (with the buyer eventually paying the fee at the time of sale), so it’s a popular option especially for people who don’t have deep pockets to jumpstart their digital art empire.

This decision set off a firestorm, with some projects complaining that this was an out-of-the-blue roadblock for them as they still needed to mint NFTs but suddenly couldn’t. Shortly after, OpenSea reversed course and announced that it would remove the limit, as well as provided some reasoning for the limit in the first place: The free minting tool is being used almost exclusively for the purposes of fraud or spam.

[…]

Source: More Than 80% of NFTs Created for Free on OpenSea Are Fraud or Spam, Company Says

Finnish diplomats were targeted by NSO Pegasus spyware

Finland’s government says the mobile devices of its diplomats have been hacked using Pegasus spyware.

The Finnish foreign ministry stated on Friday that some of its officials abroad had been targeted by the sophisticated software.

“The highly sophisticated malware has infected users’ Apple or Android telephones without their noticing and without any action from the user’s part,” the Foreign Ministry said in a statement.

“Through the spyware, the perpetrators may have been able to harvest data from the device and exploit its features.”

[…]

NSO says it only sells Pegasus to governments for the purpose of fighting crime and terrorism.

But an investigation last year revealed that the spyware had been used to target journalists, activists and politicians in a number of countries — including France, Spain, and Hungary.

A recent Citizen Lab report also found that critics of Poland’s right-wing government were hacked using Pegasus.

[…]

Source: Finnish diplomats were targeted by Pegasus spyware, says foreign ministry | Euronews

A Chinese Satellite Just Grappled Another And Pulled It Out Of Orbit

Chinese satellite was observed grabbing another satellite and pulling it out of its normal geosynchronous orbit and into a “super-graveyard drift orbit.” The maneuver raises questions about the potential applications of these types of satellites designed to maneuver close to other satellites for inspection or manipulation and adds to growing concerns about China’s space program overall.

On January 22, China’s Shijian-21 satellite, or SJ-21, disappeared from its regular position in orbit during daylight hours when observations were difficult to make with optical telescopes. SJ-21 was then observed executing a “large maneuver” to bring it closely alongside another satellite, a dead BeiDou Navigation System satellite. SJ-21 then pulled the dead satellite out of its normal geosynchronous orbit and placed it a few hundred miles away in what is known as a graveyard orbit. These distant orbits are designated for defunct satellites at the end of their lives and are intended to reduce the risk of collision with operational assets.

The unusual maneuver was observed by telescopes belonging to commercial space awareness firm Exoanalytic Solutions. During a webinar hosted by the Center for Strategic and International Studies (CSIS) this week, Exoanalytic Solutions’ Brien Flewelling said the SJ-21 satellite “appears to be functioning as a space tug.” Space Command did not respond to a request for comment, Breaking Defense reports.

Space Force has been increasingly turning to commercial space companies to provide a variety of data and services to boost its situational awareness, and to that end, Joint Task Force-Space Defense awarded Exoanalytic Solutions a contract in 2021 to provide space domain data. “Comms, data relay, remote sensing, and even ISR and some other things — [these] capabilities are increasingly available in the commercial market,” Space Force deputy Lt. Gen. David Thompson said last year.

SJ-21, or Shijian-21, was launched in October 2021 atop a Long March-3B rocket. The satellite is officially designated as an On-Orbit Servicing, Assembly, and Manufacturing, or OSAM satellite, a broad class of satellites designed with capabilities to get close to and interact with other satellites. Such systems could enable a wide range of applications including extending the life of existing satellites, assembling satellites in orbit, or performing other maintenance and repairs. According to Chinese state news outlets, SJ-21 was designed to “test and verify space debris mitigation technologies.”

[…]

Source: A Chinese Satellite Just Grappled Another And Pulled It Out Of Orbit

How normal am I? – Let an AI judge you

This is an art project by Tijmen Schep that shows how face detection algoritms are increasingly used to judge you. It was made as part of the European Union’s Sherpa research program.

No personal data is sent to our server in any way. Nothing. Zilch. Nada. All the face detection algorithms will run on your own computer, in the browser.

In this ‘test’ your face is compared with that of all the other people who came before you. At the end of the show you can, if you want to, share some anonimized data. That will then be used to re-calculate the new average. That anonymous data is not shared any further.

Source: How normal am I?

Stackable artificial leaf uses less power than lightbulb to capture 100 times more carbon than other systems

Engineers at the University of Illinois Chicago have built a cost-effective artificial leaf that can capture carbon dioxide at rates 100 times better than current systems. Unlike other carbon capture systems, which work in labs with pure carbon dioxide from pressurized tanks, this artificial leaf works in the real world. It captures carbon dioxide from more diluted sources, like air and flue gas produced by coal-fired power plants, and releases it for use as fuel and other materials.

[..]

Illustration of a carbon capture process designed by UIC College of Engineering scientists. Carbon dioxide from air or flue gas is absorbed by a dry organic solution to form bicarbonate ions, which migrate across a membrane and are dissolved in a liquid solution to concentrated CO2. Carbon atoms are shown in red, oxygen atoms are shown in blue and hydrogen atoms are shown in white. (Credit: Aditya Prajapati/UIC)

Using a previously reported theoretical concept, the scientists modified a standard artificial leaf system with inexpensive materials to include a water gradient — a dry side and a wet side — across an electrically charged membrane.

On the dry side, an organic solvent attaches to available carbon dioxide to produce a concentration of bicarbonate, or baking soda, on the membrane. As bicarbonate builds, these negatively charged ions are pulled across the membrane toward a positively charged electrode in a water-based solution on the membrane’s wet side. The liquid solution dissolves the bicarbonate back into carbon dioxide, so it can be released and harnessed for fuel or other uses.

The electrical charge is used to speed up the transfer of bicarbonate across the membrane.

When they tested the system, which is small enough to fit in a backpack, the UIC scientists found that it had a very high flux — a rate of carbon capture compared with the surface area required for the reactions — of 3.3 millimoles per hour per 4 square centimeters. This is more than 100 times better than other systems, even though only a moderate amount of electricity (0.4 KJ/hour) was needed to power the reaction, less than the amount of energy needed for a 1 watt LED lightbulb. They calculated the cost at $145 per ton of carbon dioxide, which is in line with recommendations from the Department of Energy that cost should not exceed around $200 per ton.

[…]

The UIC scientists report on the design of their artificial leaf and the results of their experiments in “Migration-assisted, moisture gradient process for ultrafast, continuous CO2 capture from dilute sources at ambient conditions,” which is published in Energy & Environmental Science.

[…]

Source: Stackable artificial leaf uses less power than lightbulb to capture 100 times more carbon than other systems | UIC Today

polkit has been allowing root for 12+ years

[…]Polkit, previously known as PolicyKit, is a tool for setting up policies governing how unprivileged processes interact with privileged ones. The vulnerability resides within polkit’s pkexec, a SUID-root program that’s installed by default on all major Linux distributions. Designated CVE-2021-4034, the vulnerability has been given a CVSS score of 7.8.

Bharat Jogi, director of vulnerability and threat research at Qualys, explained in a blog post that the pkexec flaw opens the door to root privileges for an attacker. Qualys researchers, he said, have demonstrated exploitation on default installations of Ubuntu, Debian, Fedora, and CentOS, and other Linux distributions are presumed to be vulnerable as well.

“This vulnerability has been hiding in plain sight for 12+ years and affects all versions of pkexec since its first version in May 2009,” said Jogi, pointing to commit c8c3d83, which added a pkexec command.

The problem occurs when pkexec‘s main() function processes command-line arguments and argc – the ARGument Count – is zero. The function tries to access the list of arguments anyway, and ends up trying to use an empty argv – the ARGument Vector of command-line argument strings. As a result, out-of-bounds memory gets read and written, which an attacker can exploit to inject an environment variable that can cause arbitrary code to be loaded from storage and run by the program as root.

[…]

At least the exploitation technique proposed by Qualys – injecting the GCONV_PATH variable into pkexec‘s environment to execute a shared library as root – leaves traces in log files.

[…]

Source: Linux system service polkit has make-me-root security flaw • The Register

Google Drive flags single-digit files over copyright

A funny thing happened on Google Drive overnight. Seemingly innocuous files started being flagged as violating the search behemoth’s terms of service over copyright infringement.

Dr Emily Dolson, assistant professor at Michigan State University, was one of those affected after she attempted to upload a file containing a single digit, “1”.

There wasn’t a lot of detail in the warning, only that Googles Drive’s Copyright Infringement policy had been violated and that no review could be requested for the restriction, both of which are a bit worrying for people concerned about the dead hand of AI being used as arbiter in such matters.

What had upset Google? The digit or the output04.txt filename? Certainly the number “1” does turn up in all manner of copyrighted works, although we don’t think anyone’s tried to trademark the character. Most recently, Snap made a spectacle of itself by trying to trademark the word “Spectacles”.

Could Google be trying to up the ante, and is it aware that Microsoft has its own cloud storage named OneDrive? Redmond already had to ditch SkyDrive after a well-known broadcaster took exception to it. We can’t imagine Nadella and co liking the sound of “Number Two Drive” for a variety of reasons.

More likely, the issue was more of a screw-up than conspiracy with both Google staffers and the Google Drive social media mouthpiece responding to confirm that the team was aware of the issue and working on it.

Additional users reported problems with other numbers, including “0”, while wags over on Hacker News pointed to the relevant Onion article.

Because there’s always an Onion article where automation drives swathes of the IT world beyond satire.

Things seem OK now (at least as far as our testing is concerned), although we have asked Google to explain itself. We will update this piece if it does so.

Whatever the fix was, we suspect it wasn’t this. ®

Source: Google Drive flags single-digit files over copyright

Flying car wins airworthiness certification – BBC News

A flying car capable of hitting speeds over 100mph (160kmh) and altitudes above 8,000ft (2,500m) has been issued with a certificate of airworthiness by the Slovak Transport Authority.

The hybrid car-aircraft, AirCar, is equipped with a BMW engine and runs on regular petrol-pump fuel.

It takes two minutes and 15 seconds to transform from car into aircraft.

The certification followed 70 hours of flight testing and more than 200 take-offs and landings, the company said.

Source: Flying car wins airworthiness certification – BBC News

How to Download Everything Amazon Knows About You (It’s a Lot)

[…]To be clear, data collection is far from an Amazon-specific problem; it’s pretty much par for the course when it comes to tech companies. Even Apple, a company vocal about user privacy, has faced criticism in the past for recording Siri interactions and sharing them with third-party contractors.

The issue with Amazon, however, is the extent to which they collect and archive your data. Just about everything you do on, with, and around an Amazon product or service is logged and recorded. Sure, you might not be surprised to learn that when you visit Amazon’s website, the company logs your browsing history and shopping data. But it goes far beyond that. Since Amazon owns Whole Foods, it also saves your shopping history there. When you watch video content through its platforms, it records all of that information, too.

Things get even creepier with other Amazon products. If you read books on a Kindle, Amazon records your reading activity, including the speed of your page turns (I wonder if Bezos prefers a slow or fast page flip); if you peered into your Amazon data, you might find something similar to what a Reuter’s reporter found: On Aug. 8 2020, someone on that account read The Mitchell Sisters: A Complete Romance Series from 4:52 p.m. through 7:36 p.m., completing 428 pages. (Nice sprint.)

If you have one of Amazon’s smart speakers, you’re on the record with everything you’ve ever uttered to the device: When you ask Alexa a question or give it a command, Amazon saves the audio files for the entire interaction. If you know how to access you data, you can listen to every one of those audio files, and relive moments you may or may not have realized were recorded.

Another Reuters reporter found Amazon saved over 90,000 recordings over a three-and-a-half-year period, which included the reporter’s children asking Alexa questions, recordings of those same children apologizing to their parents, and, in some cases, extended conversations that were outside the scope of a reasonable Alexa query.

Unfortunately, while you can access this data, Amazon doesn’t make it possible to delete much of it. You can tweak your privacy settings you stop your devices from recording quite as much information. However, once logged, the main strategy to delete it is to delete the entire account it is associated with. But even if you can’t delete the data while sticking with your account, you do have a right to see what data Amazon has on you, and it’s simple to request.

How to download all of your Amazon data

To start, , or go to Amazon’s Help page. You’ll find the link under Security and Privacy > More in Security & Privacy > Privacy > How Do I Request My Data? Once there, click the “Request My Data” link.

From the dropdown menu, choose the data you want from Amazon. If you want everything, choose “Request All Your Data.” Hit “Submit Request,” then click the validation link in your email. That’s it. Amazon makes it easy to see what the have on you, probably because they know you can’t do anything about it.

[Reuters]

Source: How to Download Everything Amazon Knows About You (It’s a Lot)

MoonBounce Malware Hides In Your BIOS Chip, Persists After Drive Formats

A new type of malware takes a decidedly more stealthy and hard-to-remove path into your OS — it hides in your BIOS chip and thus remains even after you reinstall your OS or format your hard drive.

Kaspersky has observed the growth of Unified Extensible Firmware Interface (UEFI) firmware malware threats since 2019, with most storing malware on the EFI System Partition of the PC’s storage device. However, a sinister development has been spotted over the New Year with a new UEFI malware, detected by Kasperksy’s firmware scanner logs, that implants malicious code into the motherboard’s Serial Peripheral Interface (SPI) Flash. The security researchers have dubbed this flash-resident UEFI malware ‘MoonBounce’.

[,…]

Below, a flow chart breaks down how MoonBounce boots and deploys from the moment your UEFI PC is switched on, through Windows loading, and into being a usable but infected PC.

(Image credit: Kaspersky Labs)

APT41 Fingerprints Detected

Another important branch of the work done by security researchers like Kaspersky is looking into who is behind the malware that it discovers, what the purposes of the malware are, and what specific targets the malware is primed for.

Concerning MoonBounce, Kaspersky seems pretty certain that this malware is the product of APT41, “a threat actor that’s been widely reported to be Chinese-speaking.” In this case, the smoking gun is a “unique certificate” that the FBI has previously reported as signaling the use of APT41-owned infrastructure. APT41 has a history of supply chain attacks, so this is a continuation of a central thread of APT41’s nefarious operations.

Safety Measures

To help avoid falling victim to MoonBounce or similar UEFI malware, Kaspersky suggests a number of measures. It recommends users keep their UEFI firmware updated directly from the manufacturer, verify that BootGuard is enabled where available, and enable Trust Platform Modules. Last but not least, it recommends a security solution that scans system firmware for issues so measures can be taken when UEFI malware is detected.

Source: MoonBounce Malware Hides In Your BIOS Chip, Persists After Drive Formats | Tom’s Hardware

Image to Lithophane Generator

Turn your pictures into 3D stl files of lamp lithophanes, flat lithophanes, night light lithophanes, and more by using the lithophane makers below. Learn more about how to use LithophaneMaker.com by watching my YouTube tutorials. Click on a lithophane picture or title to go to the tool that created that lithophane. Instructions on how to use the lithophane makers are on their page, and general instructions on how to 3D print a lithophane are on the 3D Printing page. Give me feedback by joining the Lithophane Maker User’s group on Facebook.

Heart Lithophane Maker

images/Heart Lithophane.jpgTurn your pictures into beautiful heartfelt gifts for your loved ones! The new user interface for this tool lets you crop your pictures on the first page, then click the button at the top that says CLICK HERE TO VIEW LITHOPHANE for you to see the lithophane and adjust its dimensions. You can lower the value by the rendering resolution to make the lithophane look more like the final product, or increase the value to make the lithophane render quicker.

Lithophane Lamp Maker

images/Lithophane Lamp Schematic.JPGTurn up to four pictures into a lithophane lamp model using this tool. The tool provides an interface that will work will most lamps. A cutout cylinder with a ledge makes it possible to put the lamp lithophane directly over the lamp’s light socket and underneath the light. The default settings work for a lamp that I have at my own house, but I suggest you measure the light bulb socket that you’re going to put the lithophane lamp over.

Lithophane Light Box Maker

images/Lithophane Light Box Schematic.jpgTurn your photos into a lithophane light box. The lithophane light box was designed to easily take light sockets like the ones you can find here. You can design a customized lithophane light box and crop your photos in just a few minutes using this tool.

Night Light Lithophane Maker

images/Night Light Lithophane.JPGClick the picture above to access the night light lithophane maker. The default settings for the night light lithophane make the lithophane with night lights can be bought here. This webtool gives you the ability to design the night light lithophane to be able to interface with almost any night light!

Flat Lithophane Maker

images/Lithophane Frame.JPGTurn a photo into a hangable flat lithophane stl with this tool. This tool automatically surrounds the lithophane with a frame and some holes for hanging the lithophane. Some twine and suction cups can be used to attach the lithophane to a window, and pretty much any will work. We used this twine and these suction cups.

Lithophane Globe Maker

images/Spherical Lithophane Example.JPGDesign a spherical lithophane with an optional lunar background. The lithophane interfaces with a light bulb through a cylindrical base, and can have a hole at the other end if desired. You can select the aspect ratio of your picture and crop it in this tool as well.

Curved Lithophane Maker

images/Curved Lithophane.jpgThis lithophane design tool creates curved lithophanes or completely round votive lithophanes. You can adjust the dimensions of the lithophane that are shown in the picture to get exactly what you want.

Ceiling Fan Lithophane Maker

images/SchematicCFL.jpgThis image to stl generator turns pictures into a ceiling fan lithophane. You can turn up to four pictures into a cylindrical lithophane that has hooks that fit into a circular lithophane that is also designed here. The circular lithophane has 1 or 2 holes that allow you to attach to the ceiling fan’s pull string fixture.

Circular Lithophane Maker

images/Lithophane Tag.jpgThis tool with crop an image into a circle and create a flat 3d stl from your photo. The 3d model can have a positive or negative image, so that you can make a lithophane or inverse with this tool. The 3d model is designed to be printed horizontally, and the model comes with a hole for attaching it to a string, hook, collar, or whatever you have in mind!

Color Lithophane Maker

images/Color Lithophane Picture.pngThis lithophane tool turns a picture into a the stl files you need to print a color lithophane.

Christmas Tree Lithophane Maker

images/Christmas Tree Lithophane.jpgTurn your picture into a Christmas Tree Lithophane with this tool! These lithophanes can be placed on a table, or hung from a tree. I have found compared two lighting options. This tea light is bright enough to illuminate the lithophane in regular room lighting, but has a battery life of 30 hours and I recommend a clamp diameter of 28.5mm for it. This tea light lasts for 100 hours, but doesn’t illuminate the lithophane well in a dark room (but not a bright one), and needs a clamp diameter of 36mm.

.

Source: Image to Lithophane Generator

‘Dark Souls 3’ security hole lets attackers hijack your PC

You might not want to play a Dark Souls game online for a while — not that you necessarily can. As Dexerto and The Verge report, attackers have discovered a security exploit in Dark Souls 3 (and potentially Elden Ring) for Windows that lets attackers remotely execute control and effectively hijack your PC. Streamers like The_Grim_Sleeper have learned about the potential damage first-hand — in his case, the intruder launched Microsoft PowerShell and ran a text-to-speech script blasting him for his gameplay.

The exploiter might not have malicious intent. A post on the SpeedSouls Discord claimed the hacker was trying to warn developer FromSoftware about the Dark Souls 3 vulnerability, but turned to compromising streamers to highlight the problem. Few people beyond the perpetrator are aware of how to use it, but there’s already a patch for the unofficial Blue Sentinel anti-cheat tool.

FromSoftware and its publisher Bandai Namco have since responded to the exploit. They’ve temporarily shut down the player-versus-player servers for Dark Souls 3 and its predecessors while the security team investigates the flaws.

[…]

Source: ‘Dark Souls 3’ security hole lets attackers hijack your PC | Engadget

The IEA wants to make their data available to the public – now it is on governments of the world’s rich countries to make this happen

To tackle climate change we need good data. This data exists; it is published by the International Energy Agency (IEA). But despite being an institution that is largely publicly funded, most IEA data is locked behind paywalls.

[…]

In 2020 we launched a campaign to unlock this data; we started on Twitter (one example), last year we wrote a detailed article about the problem here on OWID, and our letter in Nature.

[…]

The IEA has just announced that it aims to make all of its data and analysis freely available and open-access. This was put forward by the IEA’s executive director, Fatih Birol, and has been approved by its governing board already.

There is one step left. Next month – on February 2nd and 3rd – the IEA will ask for approval from its member countries. That means it is on the governments of the world’s rich countries to make this happen. If they do not approve it, it would be a missed opportunity to accelerate our action on addressing climate change.

This would be a massive achievement. The benefits of closing the small funding gap that remains greatly outweigh the costs.

There is now large support for the IEA data to be freely available – from researchers to journalists; policymakers to innovators. Many have called for the IEA data to be public.  Many thanks to everyone who has joined in pushing this forwards – below we share the links to several articles, petitions, and open letters that have made this possible.

Open letter to the International Energy Agency and its member countries: please remove paywalls from global energy data and add appropriate open licenses – by Robbie Morrison, Malte Schaefer and the OpenMod community

Energy watchdog urged to give free access to government data – Jillian Ambrose, in The Guardian

Opening up energy data is critical to battling climate change – Christa Hasenkopf, in Devex

Researchers are excited by ‘tantalising’ prospect of open IEA energy data – Joe Lo, in Climate Home

Open petition letter: Free IEA Data – A site by Skander Garroum and Christoph Proeschel on which you can write a letter to your country’s government.

[…]

Source: The IEA wants to make their data available to the public – now it is on governments of the world’s rich countries to make this happen – Our World in Data

Totally Bogus DMCA Takedowns From Giant Publishers Completely Nuke Book Review Blog Off The Internet

Just as we’re in the midst of a Greenhouse series all about SOPA, copyright industry lobbyists, and former copyright industry lawyers now running the Copyright Office are conspiring to make copyright law worse and to favor Hollywood and give the big giant legacy copyright companies more control and power over the internet.

And, yet, we pay almost no attention to how they massively abuse the power they already have under copyright law to silence people. The latest example is the book review blog, Fantasy Book Critic. I’d link to it, but as I’m writing this all you now see is a message that says “Sorry, the blog at fantasybookcritic.blogspot.com has been removed.”

Why? Because two of the largest publishing companies in the world, Penguin Random House and HarperCollins, hired a ridiculously incompetent service provider called “Link-Busters” which specializes in bullshit automated DMCA takedowns for the publishing industry. Link-Busters’ website looks like basically all of these sketchy, unreliable services, promising to “protect IP” and (even more ridiculously) “turn piracy into profits.”

[…]

On Monday, Link-Busters, on behalf of Penguin Random House and HarperCollins sent over 50 bullshit takedown notices to Google, claiming that various reviews on Fantasy Book Critic were actually infringing copies of the books they were reviewing. Each notice listed many, many blog posts on the site. This is just a small sample of four such notices.

The actual notices do contain some links to websites that appear to have pirated copies of some books available, but also lots of links to Fantasy Book Critic’s reviews. The whole thing just seems incredibly sloppy by Link-Busters. Some of the “allegedly infringing” books in some of these notices didn’t even include links to allegedly infringing pages.

And then some show the only allegedly “infringing” links being… Fantasy Book Critic’s reviews:

That link, which again, does not exist any more, can be seen on the Internet Archive where you see that not only is it clearly a review, and not piracy, but it directly links visitors to places where they can buy the book.

[…]

the real problem here is that there are no consequences whatsoever for Link-Busters or Penguin Random House or HarperCollins. While the DMCA has Section 512(f), which is supposed to punish false notifiers, in practice it is a dead letter. This means, Link-Busters can spam Google with wild abandon with blatantly false DMCA notices and face zero consequences. But, more importantly, publishing giants like Penguin Random House and HarperCollins (which are currently suing libraries for offering lendable ebooks), can get away with this abuse of the law over and over again.

Fantasy Book Critic was reduced to begging on Twitter for Google to look more closely at Link-Busters bogus notifications and to restore their blog. They even contacted Link-Busters which admitted that they fucked up (though, perhaps they should have checked before sending these bogus notices?)

[…]

Source: Totally Bogus DMCA Takedowns From Giant Publishers Completely Nuke Book Review Blog Off The Internet | Techdirt

Safari 15 could leak Google account info to malicious sites

An improperly implemented API that stores data on browsers has caused a vulnerability in Safari 15 that leaks user internet activity and personal identifiers.

The vulnerability was discovered by fraud detection service Fingerprint JS, which has contacted the WebKit maintainers and provided a public source code repository.

As of 28 November last year, the issue had not been fixed, so the team at Fingerprint JS decided to make the finding public to encourage the expedition of its repair.

[…]

not only can a malicious website learn the user’s identity, it can stitch together multiple separate accounts from the same user without that person even doing anything, other than running a window in the background. The malicious website can open other websites, if programmed in an iframe or popup, and thus open a Pandora’s box of leaking data.

Fingerprint JS made a video explaining the process:

[…]

Source: Safari 15 could leak Google account info to malicious sites • The Register

Security Holes Found in My2022 App for Beijing Winter Olympics

An app that visitors to the 2022 Olympics Games in Beijing are obligated to download is also a cybersecurity nightmare that threatens to expose much of the data that it collects, according to a new report.

MY2022, the mandatory app for visitors at this year’s Winter Games, offers a variety of services—including tourism recommendations, Covid-related health monitoring, and GPS navigation.

[…]

According to a new report from digital researchers with Citizen Lab at the University of Toronto, the app is so insecure that it may violate China’s own data security law, the Chinese Personal Information Protection Law, which went into effect late last year and is supposed to ensure basic data protections for Chinese citizens. The app may also be in violation of Google’s Unwanted Software Policy, which helps weed out malicious apps in the Android ecosystem, as well as Apple’s App Store guidelines, the report notes.

[…]

the app often fails to validate SSL certificates—meaning that it doesn’t verify where it’s actually sending the data that it transmits. This sets users up for potential man-in-the-middle cyberattacks, in which an attacker could spoof a connection to a legitimate website and thereby thieve data sent by the app. At the same time, researchers found that the app also transmits certain kinds of metadata without any kind of SSL encryption or other security protection at all—leaving it wide open for public inspection in certain cases.

In summation, despite collecting large amounts of sensitive health and travel information on its users (think: passport details, medical history, demographic data, and so on), MY2022 lacks safeguards to protect it.

[…]

They note that much of the data that has been left vulnerable to theft is already being openly collected by the Chinese government (the app’s privacy policy explains this)—so there would be little reason to implement a surveillance workaround. The report also notes that digital security is not so great in the Chinese app ecosystem overall, and, thus, it might be the case that the MY2022 developers simply created a shitty app, not a sneaky one.

[…]

Source: Security Holes Found in My2022 App for Beijing Winter Olympics

WhatsApp Ordered To Help US Agents Spy On Chinese Phones using 1986 pen register act

U.S. federal agencies have been using a 35-year-old American surveillance law to secretly track WhatsApp users with no explanation as to why and without knowing whom they are targeting. In Ohio, a just-unsealed government surveillance application reveals that in November 2021, DEA investigators demanded the Facebook-owned messaging company track seven users based in China and Macau. The application reveals the DEA didn’t know the identities of any of the targets, but told WhatsApp to monitor the IP addresses and numbers with which the targeted users were communicating, as well as when and how they were using the app. Such surveillance is done using a technology known as a pen register and under the 1986 Pen Register Act, and doesn’t seek any message content, which WhatsApp couldn’t provide anyway, as it is end-to-end encrypted.

As Forbes previously reported, over at least the last two years, law enforcement in the U.S. has repeatedly ordered WhatsApp and other tech companies to install these pen registers without showing any probable cause. As in those previous cases, the government order to trace Chinese users came with the statement that the Justice Department only needed to provide three “elements” to justify tracking of WhatsApp users. They include: the identity of the attorney or the law enforcement officer making the application; the identity of the agency making the application; and a certification from the applicant that “the information likely to be obtained is relevant to an ongoing criminal investigation being conducted by that agency.” “Other than the three elements described above, federal law does not require that an application for an order authorizing the installation and use of a pen register and a trap and trace device specify any facts,” the government wrote in the latest application.

Source: WhatsApp Ordered To Help US Agents Spy On Chinese Phones – Slashdot

OpenSubtitles Hacked, 7 Million Subscribers’ Details Leaked Online

[…]

“In August 2021 we received message on Telegram from a hacker, who showed us proof that he could gain access to the user table of opensubtitles.org, and downloaded a SQL dump from it. He asked for a BTC ransom to not disclose this to public and promise to delete the data,” the post reads.

“We hardly agreed, because it was not low amount of money. He explained us how he could gain access, and helped us fix the error. On the technical side, he was able to hack the low security password of a SuperAdmin, and gained access to an unsecured script, which was available only for SuperAdmins. This script allowed him to perform SQL injections and extract the data.”

Hacker Gained Access to All User Data

According to ‘oss’, the hacker gained access to email addresses, usernames and passwords, but promised that the data would be erased after the payment was made. That promise was not kept.

While no member data was leaked last August, on January 11, 2022, OpenSubtitles received new correspondence from a “collaborator of the original hacker” who made similar demands. Contacting the original hacker for help bore no fruit and on January 15 the site learned that the data had been leaked online the previous day.

Indeed, searches on data breach site Have I Been Pwned reveals that the database is now in the wild, containing all of the data mentioned by OpenSubtitles and more.

 

OpenSubtitles Hacked
 

“In August 2021, the subtitling website Open Subtitles suffered a data breach and subsequent ransom demand. The breach exposed almost 7M subscribers’ personal data including email and IP addresses, usernames, the country of the user and passwords stored as unsalted MD5 hashes,” the site reports.

[…]

Source: OpenSubtitles Hacked, 7 Million Subscribers’ Details Leaked Online * TorrentFreak

Crypto.com Finally Acknowledges $34 Million Stolen by Hackers

Trading platform Crypto.com lost about $34 million worth of cryptocurrency in a hack on Monday, according to a new blog post by the company published overnight. The company had previously declined to say much about the hack, which forced users to stop withdrawals for most of the day, and only reassured customers they wouldn’t lose any money.

Hackers made off with 4,836.26 ethereum, 443.93 bitcoin, and approximately $66,200 in other crypto coins from precisely 483 users, according to the company. Crypto.com, which has about 10 million users, halted all withdrawals on Monday for about 14 hours after “suspicious activity” was detected, and forced all users to reset their two-factor authentication methods.

The ethereum that was taken is worth about $15.3 million and the bitcoin is worth $18.6 million at today’s conversion rate, bringing the grand total to about $34 million in lost funds. But Crypto.com is quick to note that no users have lost any money because the company has topped up their accounts.

[…]

The unknown hackers are currently trying to launder their stolen crypto using crypto mixers, as Gizmodo reported yesterday. The ethereum is being laundered through an app called Tornado Cash, which bills itself as a privacy tool. The bitcoin appears to be getting laundered through an unknown bitcoin mixer, sometimes known as a tumbler or peel chain.

[…]

Source: Crypto.com Finally Acknowledges $34 Million Stolen by Hackers

The Worst Passwords in the Last Decade (And New Ones You Shouldn’t Use)

Have you immortalized your beloved dog, Charlie, in all of your online passwords? While he may be tasked to protect your home (or at least his food bowl), your heartfelt dedication might actually be compromising your digital safety.

Many passwords believed to be deeply personal to you are, in fact, quite common – making them easier to crack – and they could be putting you at an increased risk of being targeted by cybercriminals.

With this in mind, we’ve looked at the world’s most popular passwords in the last decade and found that millions of people worldwide are choosing the same passwords year after year.

Not only that, but there are common trends cropping up time and time again that are influencing the passwords we’re selecting – from your favorite pets and sports teams, to celebrities and movie titles.

Ready to take a look at the world’s worst passwords? Let’s dive in and find out why ‘Charlie’ might not be such a good boy after all.

Passwords: The Statistics

Although many of us know the dangers of weak passwords, it doesn’t stop us from choosing them. We rely on passwords to protect some of our most sensitive information, from dates of birth and addresses, to security codes, and credit card data.

Yet, still, we often opt for the same easy-to-guess passwords that cybercriminals can hack in a matter of seconds. Criminals use a variety of methods to hack our accounts, with one of the most popular being credential stuffing. Attackers find lists of compromised credentials – usually available from data leaks or purchased from the dark web – and combine stolen usernames and passwords together across hundreds of websites until they get access to your account. But usually, it’s not just one account.

The majority of us use the exact same password across several accounts to avoid the frustration of being locked out of accounts and having to remember longer, complicated passwords. But the risks associated with weak passwords cannot be ignored.

Password hacks are responsible for 81% of all data security breaches, making them the leading cause of compromised personal data. Reusing weak passwords gives hackers access to all of our apps and site logins in no time at all, leaving you vulnerable to fraud, identity theft, and other harmful cyber attacks.

We’re certainly not short of options to secure our passwords, either. There are plenty of password generators, managers, and other tools available to create unhackable passwords. Password managers, such as the CyberGhost Password Manager, even remember them for you, so you don’t have to.

Many websites also make stronger passwords a requirement, specifying the number of characters you should use, or that they should include a mixture of numbers, letters, and symbols. Some won’t even let you create an account if they think you’re using a fragile password.

So, what’s our excuse for making weak passwords to protect all of our personal or confidential information? Nothing, really.

The World’s Most Common Passwords in the Last Decade

Millions of passwords are hacked every year. And if we’ve learned anything from the lists of leaked passwords, it’s that they’re anything but unique.

Here’s a roundup of the world’s most common passwords over the last decade. If your password falls into these categories, it’s time to change it – and fast.

Number Sequences & Variations

Passwords involving number sequences and variations have stayed high on the list of the most used passwords year after year. They’re also some of the most hacked passwords, because they’re incredibly easy to crack.

Rather than a completely random set of numbers, these passwords usually follow a sequence, either in numerical order, or a few numbers repeated several times. Some users add letters and other characters to try to make these passwords more complicated, but again, these follow an easy-to-guess sequence.

The most common password is ‘123456’. It is actually the most used and compromised password in the world, occurring in 23.2 million cyber breaches in 2019.

Many use their dates of birth, which, while more unique, are still very weak. It doesn’t take long for a cybercriminal to figure out your birthday – usually a quick scroll of your social media profile will give them all they need. Birthdays can also be easily sequenced and decoded, since databases holding this information are readily available to anyone.

Hackers also often use algorithms to crack passwords, whereby computers guess simple numerical sequences at rapid speed. In a mere few seconds, a cybercriminal has access to your account. Essentially, you’re fighting against computer processing powers – and you’ll never win.

The Password

Ironically, millions of people worldwide choose the word ‘password’ as their password.

As it were, ‘password’ has actually remained in first or second place consistently for years, though recently more of us have been using variations that we think are more tricky to decode by adding numbers or switching out letters for numbers, including ‘password1’ or ‘passw0rd’.

We’ve even seen foreign variations of ‘password’ hitting the list, with ‘senha’ being a popular choice. For those of you wondering, ‘senha’ is Portuguese for ‘password’.

In 2019, ‘password’ was one of the most widely used passwords across breached accounts, occurring in 3.6 million breaches.

Other translations for password aren’t as popular though, especially those with special characters, perhaps because they’re harder to type in.

That said, if you’re tempted to use a foreign variation of ‘password’, it’s best not to. It doesn’t take long for a cybercriminal to work their way through the many different global languages before they get access to your account.

Keyboard Patterns

Keyboard patterns have long been popular passwords, with ‘qwerty’ ranking highly in all lists over the last 10 years. But many of us have tried to get more creative in recent years, adding in diagonal and backwards variations, numbers, and more characters.

Being creative with keyboard patterns doesn’t necessarily make them stronger, though. ‘qwerty’ is one of the most hacked passwords in the world, actually ranking higher than ‘password’ itself.

In 2019, ‘qwerty’ was involved in 4 million cybersecurity breaches.

Variations of ‘qwerty’ have gradually grown in popularity, probably as a result of many people realizing just how popular (and hackable) the word is on its own. Adding a few numbers onto the end or changing the pattern backwards is still a recipe for disaster.

Movies & TV Shows

Movies and TV shows are a very popular category when it comes to passwords. We’ve seen movie titles and series names pop up regularly over the last decade, with some of them shared by millions of us around the world.

While it can be tempting to set your all-time favorite movie and TV series as your password, doing so makes you vulnerable to hackers – especially if it’s very well-known or it’s premiered recently.

In 2014, ‘starwars’ made the list of popular passwords, coinciding with the long-anticipated release of Star Wars: The Force Awakens. Since then, it’s stayed high in the list, making us question how often people are actually changing their passwords once they’ve chosen them. Even the password ‘yoda’ has been hacked over 37,000 times.

The password ‘ninja’ also ranked highly back in 2012. That same year, the reboot of the highly popular kids TV show, Teenage Ninja Turtles, hit our screens. It seems there’s a pattern developing here, doesn’t it?

If you’re a lover of Pokémon and James Bond, think again before you set either of these as your password. Both ‘pokemon’ and ‘bond007’ are widely used. Hackers will try alphanumeric variations, too, including ‘p0kemon’, so even switching out a couple of characters doesn’t mean you’re safe.

Names

Unsurprisingly, names top the list of most popular passwords year after year.

If your name features on the list of the world’s most popular names, avoid using it as your password at all costs. ‘Michael’ for example, ranks at spot 18 of the world’s most popular names, and has consistently made it to the top 20 most used passwords.

Other common names also follow the same pattern. Some to avoid include ‘Ashley’, ‘Jessica’, ‘Jennifer’, ‘Thomas’, and ‘Daniel’. But, honestly, even those with more obscure names aren’t safe. Remember, it only takes a cybercriminal a few minutes to find your details and enter your name with your email to log in to one of your accounts.

It’s not just your first names you need to worry about, either. You’ll definitely remember the name of your child as your password, but it leaves you and your information vulnerable.

Trends show that the most popular baby names each year coincide with common passwords. ‘Maverick’, for example, reached spot 39 of the world’s most popular baby names in 2021. And it’s since become an in-demand password choice.

Animals & Pets

Animals are a consistent hot topic for passwords, although not necessarily the popular, domestic animals you’d expect.

Likely, many of the domesticated animals including cats and dogs aren’t long enough to meet character requirements for passwords. But also, perhaps many of us are trying to think out of the box and choose animals that are tougher to guess. We aren’t succeeding, though.

Both ‘dragon’ and ‘monkey’ have ranked consistently high in the last decade. While we don’t know the real reasons people choose these words, we do know that people tend to create passwords based on things they like.

Dragons in particular have weaved their way into our culture many times, from Game of Thrones to Dungeons & Dragons, so is it any wonder millions of us are choosing this mythical creature to lock our accounts?

Another likely influence is astrology. Both ‘monkey’ and ‘dragon’ are animals in the Chinese or lunar zodiac, and could be representative of a large population in Asian countries (and elsewhere) choosing these animals for their passwords. ‘tiger’ and ‘rabbit’ also made the lists – another two of the twelve Chinese zodiacs.

Popular pet names are also a common theme. We compared names we found with the world’s most popular pet names list, and found a direct link. If your favorite childhood pet was named ‘Bailey’, ‘Buster, or the beloved ‘Charlie’, it’s time to change your password. In fact, just steer clear of choosing a password that includes your pet’s name full stop.

Sports & Team Names

Choosing your favorite sport or team as your password makes it easy to remember, but also easily guessable.

Sports and team names have been consistently used as passwords for many years. In fact, sports is one of the most common themes for passwords, of all the categories we identified.

In particular, ‘football’, ‘soccer’, ‘golf’, ‘hockey’, ‘baseball’, and ‘basketball’ are some of the most frequently used passwords. ‘football’ has long been a top choice of password, ranking in the top 10 for the last decade. It’s only in more recent years that we’ve seen new sports contenders moving up the list.

We can also see trends in actual team names, especially across popular US sports, including American football and basketball. ‘Lakers’, ‘Eagles’, ‘Yankees’, and ‘Cowboys’ all made it into the list of the most popular passwords.

‘Liverpool’ topped the league of most guessable passwords, accounting for 280,723 cyber breaches.

In the UK, recent statistics show a similar trend with football (soccer) teams. Passwords using the words Liverpool, Chelsea, Arsenal, ManUtd, and Everton were all involved in a significant number of cyber breaches in 2019.

Cars & Vehicles

In the last decade, car models in particular have ranked highly in the world’s most used passwords.

Some of the most frequently used include ‘mercedes’, ‘ferrari’, ‘corvette’, ‘porsche’, and ‘mustang’.

‘Mustang’ moved up the list in 2014 coinciding with the release of the 50th year limited edition model. Interestingly, the Ford Mustang was also featured in Fast & Furious 6, which was released the year prior in 2013, likely influencing people’s preference for this password.

Similarly, the Corvette was used in the Transformers: Age of Extinction (2014) movie, as well as Gran Turismo 6, a popular video game released in December 2013. While both cars are popular regardless, clearly car-driven movies are a driving force for password decisions.

It’s not just cars to watch out for, either. ‘harley’ features as a widely used password, probably after the famous Harley Davidson motorcycles.

IT & Technology

The constant evolution of technology coincides quite naturally with the rise in tech-related passwords. This is likely linked to the ever-growing necessity for testing by IT departments.

In the last 10 years, we’ve seen a high number of dummy accounts created by developers to test applications and websites. Passwords such as ‘test’, ‘admin’, ‘master’, and ‘login’, have all become more common since 2019, including the many different variations swapping out letters for numbers and adding in symbols.

More often than not, IT departments reuse the same default passwords to test accounts. But this is putting organizations at risk, with many falling victim to botnet attacks as a result of weak, hackable passwords.

Cybercriminals use repetitive, password-guessing tech to break through systems and compromise company devices by guessing combinations of passwords. Weak passwords such as ‘test1’, ‘welcome’, and ‘letmein’ are easily guessable, and only take bots a matter of seconds to correctly decode.

The technology industry is set to explode even more in the next 3 years, with a forecasted growth rate of 104% in emerging tech. Based on recent trends, it’s likely we can expect many more passwords linked to testing and admin in the future.

Applications, Games & Sites

Applications, games, and websites consistently show up in the lists of popular passwords. Worryingly, however, many people are probably choosing a password correlating to the site they’re using, such as ‘google’ to access Gmail accounts and Google Drive, making them some of the worst possible passwords to use.

Both ‘Adobe’ and ‘Photoshop’ were incredibly popular between 2011-2013, as well as variations of these words, but they have since dropped off lists in favor of new, mainstream apps. That doesn’t mean they’re safe to use though – these passwords are easy to guess and hack.

Video-editing apps have grown in popularity with ‘dubsmash’ and ‘animoto’ appearing on lists since 2019. Most probably, this is due to the rise of TikTok with more of us creating videos to post on the platform.

In 2020, ‘evite’ climbed up the rankings, likely as a result of the data breach it experienced in 2019 which compromised data from over 100 million accounts. Again, this is further evidence that users were simply using the name of the platform as their passwords for their accounts.

Characters & Celebrities

We’re constantly seeing celebrities and characters pop up in the news, online, and on our TV screens, so it’s no wonder, really, that famous people also find their way into our passwords.

Superheroes are an especially popular choice for passwords, with ‘superman’ and ‘batman’ being used by millions worldwide every year since 2011. But another key trend we’ve seen is fictional characters, especially those from children’s movies and TV shows. ‘tigger’, ‘snoopy’, and ‘scooby’ are all used frequently year after year.

Even the name ‘Justin’ hit the list of most used passwords in 2020, possibly linked to the well-known singer Justin Bieber who released a number one album that year. Similarly, ‘Donald’ (probably after Donald Trump) shot up the list in 2018 during his time as president.

Key Events

Key global events play a key part in password choices, showing that clearly, whatever is at the forefront of our minds is influencing the words that end up protecting our accounts.

In 2011, ‘princess’ became one of the most popular passwords. Incidentally, this coincides with the Royal Wedding of Prince William and Princess Kate, which was watched by more than 160 million viewers around the globe.

We can see similar trends in more recent years.

In 2016, ‘football’ climbed up rankings as one of the most chosen passwords. That same year, football experienced some of the most memorable sports moments to date, including the Euros in France, the summer Olympics in Rio (where Brazil won gold in football), and Leicester City winning the UK Premier League against all odds.

Fast forward to 2020, and the same trend remerged. ‘Soccer’ hit the list of most popular passwords, following the 2020 Euros and Champions League Final, perhaps relating to an increase in audiences tuning in from the US and Australia where ‘soccer’ is more often used to refer to football.

Politics

The political climate is one that’s certainly been turbulent in recent years, with many unprecedented political events around the world and rising conflict. And the world’s most popular password lists reflect that, too.

In 2018, ‘donald’ became one of the most widely used passwords, after Donald Trump’s election as president of the United States in 2017.

Interestingly, we also saw ‘freedom’ become a top password choice in the same year, coinciding with the drastic change in the political climate influenced by Donald Trump.

In 2017, ‘ranger’ also hit the most-used password lists, following the globally shared story of a park ranger’s facial expressions in response to Donald Trump’s salary donation.

The politics category is perhaps not as saturated as others when it comes to passwords, but it clearly shows how the global climate is influencing our password decisions. If we’ve learned anything so far, it’s not to use any president’s or prime minister’s name as your password.

Nature

 A common – perhaps expected – theme for passwords over the last decade is nature, including plants, seasons, and even actual weather.

Some of the most-used passwords include ‘summer’, ‘flower’, ‘sunshine’, and ‘winter’, which have made lists year after year. But we’ve even seen ‘thunder’ being used, albeit lower down in the lists.

Expletives

Surprisingly, millions of people around the world choose to use expletives as passwords to protect their accounts and confidential information.

Many of the expletives chosen center around the ‘f’ word and variations, including the word with added numbers and other characters, such as ‘f**k1’. Many, however, are related to sexual expletives which we won’t go into detail here.

Some are less offensive, with ‘biteme’ being a common choice of password, as well as ‘iwantu’.

Interestingly, the number of expletives as passwords has gradually increased in the last decade, perhaps because swearing is generally on the rise around the world, too. The number of expletives used in American literature has soared in the last 60 years. In comparison to the 1950s, books published in the modern day are 28 times more likely to include swear words.

According to a BBFC survey, a third of people say they use offensive language more frequently than they did five years ago. Those that fall into the Generation Z category (born after 1996) are the most frequent culprits, 46% of people said they use strong language.

With expletives finding their way into our daily conversations more often, it comes as no surprise, then, that they’re some of our top choices for passwords.

Miscellaneous Categories

A number of passwords can be miscellaneously grouped into common trends over the years. In particular, colors, food, and locations are common choices for passwords.

In the food category, we’ve seen words such as ‘chocolate’, ‘cheese’, ‘butter’, and ‘cookies’ pop up very frequently. Considering the dramatic increase in health and lifestyle resources in recent years (from apps to social media influencers), it’s perhaps reassuring to see that people struggle to choose healthy foods even when setting passwords.

Some of the most common color-related passwords include ‘purple’, ‘blue’, and ‘orange’. Location-wise, it seems US cities and states are most frequently used, with ‘Dallas’, ‘Phoenix’, and ‘Dakota’ all making the top lists – though this may also indicate how often US accounts are targeted by hackers.

Another common theme over the last decade is words relating to love, and in particular ‘iloveyou’. More recently, people have used foreign variations on this three-word phrase, including the Vietnamese translation ‘anh yeu em’ (without spaces, of course).

The Future of Passwords (And Which Ones Not to Use)

Based on the trends we’ve seen over the previous decade, we have a good idea of what passwords people will be using in future and, certainly, which themes will be influencing our security decisions.

The Non-Movers

The usual culprits have made the top 10-20 most popular password lists for 10 years (and more), so there’s no doubt we’ll still be seeing them for years to come.

Numerical sequences, keyboard patterns, and variations of ‘password’ will be around for a long while yet, even with us knowing how hackable these passwords are.

So, if any of your passwords still involve ‘123456’, ‘qwerty’, or ‘passw0rd’, change them immediately.

Rising Names

The world’s most popular names are directly linked to the most-used passwords. In fact, names make up a large majority of the world’s most popular passwords, so we can say with certainty that they’re going nowhere.

New, upcoming baby names are also something to watch out for, as well as the usual contenders. Some of the most common baby names for the next year include Zion, Maeve, Kai, Luca, Mia, and Nova. There’s no doubt cybercriminals will be trying these names to access your accounts, so keep them locked out with a better password.

Pet names are likely to have an influence, too. Steer away from this year’s top dog names, including Bella, Luna, Lola, Max, Alfie, and – you guessed it – Charlie.

Applications & Websites

Based on recents trends, we may possibly see more passwords relating to apps rising in popularity, including Discord, Twitch, Headspace, and Duolingo.

Streaming sites may also find their way into our password choices, especially new contenders with a rapidly growing customer base. ‘Paramount+’ (launched in 2021) and ‘Disney+’ (from 2019) are both names you should avoid in your passwords.

In all honesty, though, even the less popular apps and websites aren’t safe. Cybercriminals can easily use bot attacks to try heaps of different apps and websites names and get access to your accounts.

Movies & TV Shows

Trends over the last decade show that we’re consistently choosing names of popular movies and TV shows, especially ones that are current, eagerly anticipated, or have been released that year.

2022 is set to be a huge year for the film industry, seeing the release of some of the biggest films to date. For that reason, avoid choosing words such as ‘Avatar’, ‘Mission Impossible’ ‘Spiderman’, ‘Jurassic’, and ‘Thor’.

Another trend we’ve noticed is that family-friendly films are a consistent thread. Perhaps parents are trying to set up accounts for their children or install parental controls, and choosing family films or TV shows as easy-to-remember passwords. But if we’ve learned anything so far, it’s that simple password solutions are often the worst.

Key Events

As well as a big year of movies, 2022 will be home to large sporting events. Sports in particular have been a driving force for passwords, from team names and sport types, to key events. So, we know this is something to watch out for.

Some of the biggest events happening next year include the Beijing 2022 Winter Olympics (February), Super Bowl (February), Commonwealth Games (July), MLB All-Star Game (July), and the FIFA World Cup (November). Any password relating to these major events, even if you think it’s unique, should be avoided at all costs.

Presidential elections are also likely to have an influence on password choices, as the ever-changing political climate takes hold.

In particular, Brazil is holding elections during 2022, so as tempting as ‘Bolsonaro’ may be as a new password for your accounts, don’t do it. The US is also holding mid-term elections, which will be a hot topic of debate and most probably a key driver for politically driven password inspiration in 2022.

Top Tips For Unhackable Passwords

Creating a password that’s strong enough to protect your accounts and easy enough for you to remember can feel like a tricky task. But strong passwords really are important for keeping your private information secure and fighting off hackers.

Here are some top tips for creating unhackable passwords.

    • Keep passwords long: All passwords should be at least 12 characters long – the longer the password, the tougher it is to crack.
    • Choose unique words: Avoid picking words that are easy to guess (such as those that fall into all of the categories we’ve identified). And don’t choose words or numbers easily linked to you, such as your date of birth, address, or nickname.
    • Use a mixture of characters, letters, and symbols: Passwords that use a mixture of characters, letters, and symbols are harder to guess. You should also use a combination of upper and lowercase letters. Don’t just add ‘123’ to the end of a word, as that’s just as easy to guess as the word itself.
    • Create new passwords for different accounts: Don’t use the same password across each account. If a hacker manages to guess the password, they get access to everything, rather than just the one account. To make passwords easier to remember, you could choose a similar word but add something unique to it, such as new numbers or symbols.
    • Switch it up: Make sure you regularly change your passwords to minimize the risk of your accounts being compromised. Aim for at least every 3 months, and don’t recycle old passwords.

Human-generated passwords tend to have commonalities, so it’s always safer to opt for a password generator. This generates passwords for you based on a random sequence of letters, numbers, and symbols, which are (nearly) impossible to crack and completely unique.

Without a password manager, these random passwords can be difficult to remember though. Ideally, you should opt for a password manager that can be downloaded as an app or in your browser, such as the CyberGhost Password Manager. This automatically stores passwords for you in an encrypted vault and enters them as needed to log in to your accounts, even across different devices.

Another thing to consider is using a VPN to add another layer of protection while you’re browsing the web.

Even if a hacker can’t guess your password, they may be able to intercept your web traffic and get access to your device. This is especially risky on public Wi-Fi networks, which can be unsecured and rife with hackers looking for opportunities to harvest your credentials.

With access to your device, hackers can easily find your stored passwords, steal your information, and subject you to several cybersecurity threats. However, a VPN encrypts all of your web traffic, adding a layer of security to help prevent cybercriminals from finding you online or hacking your device.

You can add yet more security by using multi-factor authentication. This means that any cybercriminal trying to access your account will also have to enter a second piece of information alongside your password, such as a one-time code sent to your cell phone or an answer to a secret question.

Beyond password managers and two-factor authentication, you should still be taking steps to secure your passwords.

The Bottom Line: Strengthen Your Passwords to Strengthen Your Privacy

Stronger passwords might mean it takes you a few seconds longer to log in to your account, but it’s worth it to protect your information and to keep cybercriminals away.

You might just save yourself from a risky data breach exposing your confidential information. After all, identity theft and fraud are very much real. Data breaches are increasing around the world and hackers are finding new, clever ways to harvest our credentials. We really can’t afford to be lazy with our passwords.

So, even if your dog, Charlie, is your one and only, the reality is his name is being used as a password for millions of other accounts. Maybe it’s time to let Charlie rest and dig out the password manager instead.

Source: The Worst Passwords in the Last Decade (And New Ones You Shouldn’t Use) – CyberGhost Privacy Hub

Massive rugby ball-shaped exoplanet spotted 1,500 ly away

Just over 1,500 light-years away in the constellation of Hercules there’s a rugby ball-shaped exoplanet orbiting a star. It’s the first time astronomers have been able to detect such an unusual shape of an alien world.

Most planets are more or less spherical due to gravitational forces that pull matter equally in from all sides, yet WASP-103b appears to be elongated. The planet is in an orbit close to its host star, and experiences strong tidal forces that appear to have deformed its surface.

[…]

The findings were published in a paper in Astronomy & Astrophysics on Tuesday.

[…]

Tidal interactions between a star and its companions can suck exoplanets in, making the time it takes for a complete orbit to shorten over time. But the orbital period for WASP-103b appears to be increasing, meaning its getting further away from its star.

The team isn’t quite sure why the planet seems to be getting more distant, and are trying to confirm the data in future observations.

Source: Massive rugby ball-shaped exoplanet spotted 1,500 ly away • The Register

The AI software that could turn you in to a music star

If you have ever dreamed of earning money from a stellar music career but were concerned you had little talent, don’t let that put you off – a man called Alex Mitchell might be able to help.

Mr Mitchell is the founder and boss of a website and app called Boomy, which helps its users create their own songs using artificial intelligence (AI) software that does most of the heavy lifting.

You choose from a number of genres, click on “create song”, and the AI will compose one for you in less than 30 seconds. It swiftly picks the track’s key, chords and melody. And from there you can then finesse your song.

A man using the Boomy appImage source, Boomy
Image caption,

The Boomy app can be used on the move

You can do things such as add or strip-out instruments, change the tempo, adjust the volumes, add echoes, make everything sound brighter or softer, and lay down some vocals.

California-based, Boomy, was launched at the end of 2018, and claims its users around the world have now created almost five million songs.

The Boomy website and app even allows people to submit their tracks to be listed on Spotify and other music streaming sites, and to earn money every time they get played.

While Boomy owns the copyright to each recording, and receives the funds in the first instance, the company says it passes on 80% of the streaming royalties to the person who created the song.

Mr Mitchell adds that more than 10,000 of its users have published over 100,000 songs in total on various streaming services.

[…]

But, how good are these Boomy created songs? It has to be said that they do sound very computer generated. You wouldn’t mistake them for a group of people making music using real instruments.

[…]

Mr Mitchell says that what has changed in recent years is that technological advancements in AI have meant song-writing software has become much cheaper.

So much so that Boomy is able to offer its basic membership package for free. Other AI song creator apps, such as Audoir’s SAM, and Melobytes, are also free to use.

[…]

general director of the San Francisco Opera, and it could no longer have “two singers, or even a singer and pianist, in the same room”.

But when he tried running rehearsals with his performers online, “traditional video conference platforms didn’t work”, because of the latency, or delays in the audio and video. They were out of sync.

So, Mr Shilvock turned to a platform called Aloha that has been developed by Swedish music tech start-up Elk. It uses algorithms to reduce latencies.

Elk spokesman, Björn Ehler, claims that while video platforms like Zoom, Skype, and Google Meet have a latency of “probably 500 to 600 milliseconds”, the Swedish firm has got this down to just 20.

Mr Shilvock says that, when working remotely, Aloha has “allowed me to hear a singer breathe again”.

[…]

in Paris, Aurélia Azoulay-Guetta says that, as an amateur classical musician, she “realised how painful it is to just carry, store, and travel with a lot of physical sheet music for rehearsals, and how much time we waste”.

So she and her fellow co-founder “decided to junk our jobs” and launch a start-up called Newzik, which allows music publishers and composers to digitally distribute their sheet music to orchestras. […] her solution replaces the stress of musicians having to turn physical, paper pages with their hands during performance or rehearsal. Instead, they now turn a turn a digital page via a connected pedal.

[…]

Portuguese start-up Faniak.

Founder and chief executive, Nuno Moura Santos, describes its app as “like a Google Drive on steroids”, allowing musicians – who are often freelancers -to more easily do their admin all in one place, “so they can spend more time writing and playing music”.

[…]

 

Source: The AI software that could turn you in to a music star – BBC News