Dutch privacy watchdog SDBN sues twitter for collecting and selling data via Mohub (wordfeud, duolingo, etc) without notifying users

The Dutch Data Protection Foundation (SDBN) wants to enforce a mass claim for 11 million people through the courts against social media company X, the former Twitter. Between 2013 and 2021, that company owned the advertising platform MoPub, which, according to the privacy foundation, illegally traded in data from users of more than 30,000 free apps such as Wordfeud, Buienradar and Duolingo.

SDBN has been trying to reach an agreement with X since November last year, but according to the foundation, without success. That is why SDBN is now starting a lawsuit at the Rotterdam court. Central to this is MoPub’s handling of personal data such as religious beliefs, sexual orientation and health. In addition to compensation, SDBN wants this data to be destroyed.

The foundation also believes that users are entitled to profit contributions. A lot of money can be made by sharing personal data with thousands of companies, says SDBN chairman Anouk Ruhaak. Although she says it is difficult to find out exactly which companies had access to the data. “By holding X. Corp liable, we hope not only to obtain compensation for all victims, but also to put a stop to this type of practice,” said Ruhaak. “Unfortunately, these types of companies often only listen when it hurts financially.”

Source: De Ondernemer | Privacystichting SDBN wil via rechter massaclaim bij…

Join the claim here

Google Pays $10 Billion a Year To Maintain Monopoly, US Says

Alphabet’s Google pays more than $10 billion a year to maintain its position as the default search engine on web browsers and mobile devices, stifling competition, the US Justice Department said Tuesday at the start of a high-stakes antitrust trial in Washington. From a report: “This case is about the future of the internet and whether Google’s search engine will ever face meaningful competition,” Kenneth Dintzer, a government lawyer, said in his opening statement. “The evidence will show they demanded default exclusivity to block rivals.” Dintzer said Google became a monopoly by at least 2010 and today controls more than 89% of the online search market.

“The company pays billions for defaults because they are uniquely powerful,” he said. “For the last 12 years, Google has abused its monopoly in general search.” The monopolization trial is the first pitting the federal government against a US technology company in more than two decades. The Justice Department and 52 attorneys general from states and US territories allege Google illegally maintained its monopoly by paying billions to tech rivals, smartphone makers and wireless providers in exchange for being set as the preselected option or default on mobile phones and web browsers.

Source: Google Pays $10 Billion a Year To Maintain Monopoly, US Says – Slashdot

Hackers Claim It Only Took a 10-Minute Phone Call To Shut Down MGM Resorts – stock down 6% already

An anonymous reader quotes a report from Engadget: The ALPHV/BlackCat ransomware group claimed responsibility for the MGM Resorts cyber outage on Tuesday, according to a post by malware archive vx-underground. The group claims to have used common social engineering tactics, or gaining trust from employees to get inside information, to try and get a ransom out of MGM Resorts, but the company reportedly refuses to pay. The conversation that granted initial access took just 10 minutes, according to the group.

“All ALPHV ransomware group did to compromise MGM Resorts was hop on LinkedIn, find an employee, then call the Help Desk,” the organization wrote in a post on X. Those details came from ALPHV, but have not been independently confirmed by security researchers. The international resort chain started experiencing outages earlier this week, as customers noticed slot machines at casinos owned by MGM Resorts shut down on the Las Vegas strip. As of Wednesday morning, MGM Resorts still shows signs that it’s experiencing downtime, like continued website disruptions. In a statement on Tuesday, MGM Resorts said: “Our resorts, including dining, entertainment and gaming are currently operational.” However, the company said Wednesday that the cyber incident has significantly disrupted properties across the United States and represents a material risk to the company.

“[T]he major credit rating agency Moody’s warned that the cyberattack could negatively affect MGM’s credit rating, saying the attack highlighted ‘key risks’ within the company,” reports CNBC. “The company’s corporate email, restaurant reservation and hotel booking systems remain offline as a result of the attack, as do digital room keys. MGM on Wednesday filed a 8-K report with the Securities and Exchange Commission noting that on Tuesday the company issued a press release ‘regarding a cybersecurity issue involving the Company.'” MGM’s share price has declined more than 6% since Monday.

Source: Hackers Claim It Only Took a 10-Minute Phone Call To Shut Down MGM Resorts – Slashdot

These Live Translation Earbuds Are $157

These Mymanu CLIK S are a pair of bluetooth earbuds that pair with an app on your phone to offer live translations of over 37 languages, including Spanish, German, French, Japanese, Arabic, Chinese, Finnish, Thai, Korean, and Japanese. The earbuds cost $157, and the app is included.

Obviously, these earbuds can be ideal for international travelers. They use an exclusive translation app called MyJuno, which is also where you can see the full list of translatable languages.

The CLIK S can translate for individual or group speakers, but only individual speakers get their translations played live in your earbud. You just select the relevant languages in the app, then hold the button on your earbud when you want to talk. A translation will be visible on your phone and will play audibly. When your conversation partner wants to talk, they just speak into your phone. For groups of speakers, the CLIK S will keep a written log of the conversation.

Fully charged, these earbuds can last for up to 10 hours, and the charging case can extend that to 30 hours. You can get the Mymanu CLIK S Translation Earbuds for $157, though prices can change at any time.

Source: These Live Translation Earbuds Are $157

The maestro: The man who built the biggest match-fixing ring in tennis

On the morning of his arrest, Grigor Sargsyan was still fixing matches. Four cellphones buzzed on his nightstand with calls and messages from around the world.

Sargsyan was sprawled on a bed in his parents’ apartment, making deals between snatches of sleep. It was 3 a.m. in Brussels, which meant it was 8 a.m. in Thailand. The W25 Hua Hin tournament was about to start.

Sargsyan was negotiating with professional tennis players preparing for their matches, athletes he had assiduously recruited over years. He needed them to throw a game or a set — or even just a point — so he and a global network of associates could place bets on the outcomes.

That’s how Sargsyan had become rich. As gambling on tennis exploded into a $50 billion industry, he had infiltrated the sport, paying pros more to lose matches, or parts of matches, than they could make by winning tournaments.

Sargsyan had crisscrossed the globe building his roster, which had grown to include more than 180 professional players across five continents. It was one of the biggest match-fixing rings in modern sports, large enough to earn Sargsyan a nickname whispered throughout the tennis world: the Maestro.

This Washington Post investigation of Sargsyan’s criminal enterprise, and how the changing nature of gambling has corrupted tennis, is based on dozens of interviews with players, coaches, investigators, tennis officials and match fixers.

[…]

Source: The maestro: The man who built the biggest match-fixing ring in tennis

Google Chrome’s Privacy Sandbox: any site can now query all your habits

[…]

Specifically, the web giant’s Privacy Sandbox APIs, a set of ad delivery and analysis technologies, now function in the latest version of the Chrome browser. Website developers can thus write code that calls those APIs to deliver and measure ads to visitors with compatible browsers.

That is to say, sites can ask Chrome directly what kinds of topics you’re interested in – topics automatically selected by Chrome from your browsing history – so that ads personalized to your activities can be served. This is supposed to be better than being tracked via third-party cookies, support for which is being phased out. There are other aspects to the sandbox that we’ll get to.

While Chrome is the main vehicle for Privacy Sandbox code, Microsoft Edge, based on the open source Chromium project, has also shown signs of supporting the technology. Apple and Mozilla have rejected at least the Topics API for interest-based ads on privacy grounds.

[…]

“The Privacy Sandbox technologies will offer sites and apps alternative ways to show you personalized ads while keeping your personal information more private and minimizing how much data is collected about you.”

These APIs include:

  • Topics: Locally track browsing history to generate ads based on demonstrated user interests without third-party cookies or identifiers that can track across websites.
  • Protected Audience (FLEDGE): Serve ads for remarketing (e.g. you visited a shoe website so we’ll show you a shoe ad elsewhere) while mitigating third-party tracking across websites.
  • Attribution Reporting: Data to link ad clicks or ad views to conversion events (e.g. sales).
  • Private Aggregation: Generate aggregate data reports using data from Protected Audience and cross-site data from Shared Storage.
  • Shared Storage: Allow unlimited, cross-site storage write access with privacy-preserving read access. In other words, you graciously provide local storage via Chrome for ad-related data or anti-abuse code.
  • Fenced Frames: Securely embed content onto a page without sharing cross-site data. Or iframes without the security and privacy risks.

These technologies, Google and industry allies believe, will allow the super-corporation to drop support for third-party cookies in Chrome next year without seeing a drop in targeted advertising revenue.

[…]

“Privacy Sandbox removes the ability of website owners, agencies and marketers to target and measure their campaigns using their own combination of technologies in favor of a Google-provided solution,” James Rosewell, co-founder of MOW, told The Register at the time.

[…]

Controversially, in the US, where lack of coherent privacy rules suit ad companies just fine, the popup merely informs the user that these APIs are now present and active in the browser but requires visiting Chrome’s Settings page to actually manage them – you have to opt-out, if you haven’t already. In the EU, as required by law, the notification is an invitation to opt-in to interest-based ads via Topics.

Source: How Google Chrome’s Privacy Sandbox works and what it means • The Register

Clever Camera Trick Allows view of Sun’s Corona

[…]

Using Solar Orbiter’s Extreme Ultraviolet Imager (EUI), the team of scientists behind the mission was able to record part of the Sun’s atmosphere at extreme ultraviolet wavelengths. The last-minute modification to the instrument involved adding a small, protruding “thumb” to block the bright light coming from the Sun such that the fainter light of its atmosphere could be made visible.

“It was really a hack,” Frédéric Auchère, an astrophysicist at the Institute of Astrophysics of the Université Paris-Sud in France, and a member of the EUI team, said in a statement. “I had the idea to just do it and see if it would work. It is actually a very simple modification to the instrument.”

EUI produces high-resolution images of the structures in the Sun’s atmosphere. The team behind the instrument added a thumb to a safety door on EUI, which slides out of the way to let light into the camera so it can capture images of the Sun. If the door stops halfway, however, the thumb ends up shielding the bright light coming from the Sun’s disc in the center so that the fainter ultraviolet light coming from the corona (the outermost part of the atmosphere) can be visible.

A new way to view the Sun

The result is an ultraviolet image of the Sun’s corona. An ultraviolet image of the Sun’s disc has been superimposed in the middle, in the area left blank by the thumb hack, according to ESA.

The corona is usually hidden by the bright light of the Sun’s surface, and can mostly be seen during a total solar eclipse. The camera hack sort of mimics that same effect of the eclipse by blocking out the Sun’s light. The Sun’s corona has long baffled scientists as it is much hotter than the surface of the Sun with temperatures reaching 1.8 million degrees Fahrenheit (1 million degrees Celsius), one of the greatest mysteries surrounding our host star.

“We’ve shown that this works so well that you can now consider a new type of instrument that can do both imaging of the Sun and the corona around it,” Daniel Müller, ESA’s Project Scientist for Solar Orbiter, said in a statement.

[…]

Source: Clever Camera Trick Unlocks Hidden Secrets of Sun’s Atmosphere

China Breached Microsoft Engineer Account Compromised the Email Accounts of US Officials – By finding key in crash dumps

An anonymous reader shared this report from Bloomberg: China-linked hackers breached the corporate account of a Microsoft engineer and are suspected of using that access to steal a valuable key that enabled the hack of senior U.S. officials’ email accounts, the company said in a blog post. The hackers used the key to forge authentication tokens to access email accounts on Microsoft’s cloud servers, including those belonging to Commerce Secretary Gina Raimondo, Representative Don Bacon and State Department officials earlier this year.

The U.S. Cybersecurity and Infrastructure Security Agency and Microsoft disclosed the breach in June, but it was still unclear at the time exactly how hackers were able to steal the key that allowed them to access the email accounts. Microsoft said the key had been improperly stored within a “crash dump,” which is data stored after a computer or application unexpectedly crashes…

The incident has brought fresh scrutiny to Microsoft’s cybersecurity practices.
Microsoft’s blog post says they corrected two conditions which allowed this to occur. First, “a race condition allowed the key to be present in the crash dump,” and second, “the key material’s presence in the crash dump was not detected by our systems.” We found that this crash dump, believed at the time not to contain key material, was subsequently moved from the isolated production network into our debugging environment on the internet connected corporate network. This is consistent with our standard debugging processes. Our credential scanning methods did not detect its presence (this issue has been corrected).

After April 2021, when the key was leaked to the corporate environment in the crash dump, the Storm-0558 actor was able to successfully compromise a Microsoft engineer’s corporate account. This account had access to the debugging environment containing the crash dump which incorrectly contained the key. Due to log retention policies, we don’t have logs with specific evidence of this exfiltration by this actor, but this was the most probable mechanism by which the actor acquired the key.

Source: How a Breached Microsoft Engineer Account Compromised the Email Accounts of US Officials – Slashdot

MGM Resorts Hit By Cyberattack; Hotels and Casinos Impacted

[…]

On Monday, local news outlets in Las Vegas caught wind of various complaints from patrons of MGM businesses; some said ATMs at associated hotels and casinos didn’t appear to be working; others said their hotel room keys had stopped functioning; still others noted that bars and restaurants located within MGM complexes had suddenly been shuttered. If you head to MGM’s website, meanwhile, you’ll note it’s definitely not working the way that it’s supposed to.

MGM put out a short statement Monday saying that it had been the victim of an undisclosed “cybersecurity issue.” The Associated Press notes that computer outages connected to said issue appear to be impacting MGM venues across the U.S.—in Vegas but also in places as far flung as Mississippi, Ohio, Michigan, and large parts of the northeast.

[…]

Source: MGM Resorts Hit By Cyberattack; Hotels and Casinos Impacted

Google taken to court in NL for large scale privacy breaches

The Foundation for the Protection of Privacy Interests and the Consumers’ Association are taking the next step in their fight against Google. The tech company is being taken to court today for ‘large-scale privacy violations’.

The proceedings demand, among other things, that Google stop its constant surveillance and sharing of personal data through online advertising auctions and also pay damages to consumers. Since the announcement of this action on May 23, 2023, more than 82,000 Dutch people have already joined the mass claim.

According to the organizations, Google is acting in violation of Dutch and European privacy legislation. The tech giant collects users’ online behavior and location data on an immense scale through its services and products. Without providing enough information or having obtained permission. Google then shares that data, including highly sensitive personal data about health, ethnicity and political preference, for example, with hundreds of parties via its online advertising platform.

Google is constantly monitoring everyone. Even when using third-party cookies – which are invisible – Google continues to collect data through other people’s websites and apps, even when someone is not using its products or services. This enables Google to monitor almost the entire internet behavior of its users.

All these matters have been discussed with Google, to no avail.

The Foundation for the Protection of Privacy Interests represents the interests of users of Google’s products and services living in the Netherlands who have been harmed by privacy violations. The foundation is working together with the Consumers’ Association in the case against Google. Consumers’ Association Claimservice, a partnership between the Consumers’ Association and ConsumersClaim, processes the registrations of affiliated victims.

More than 82,000 consumers have already registered for the Google claim. They demand compensation of 750 euros per participant.

A lawsuit by the American government against Google starts today in the US . Ten weeks have been set aside for this. This mainly revolves around the power of Google’s search engine.

Essentially, Google is accused of entering into exclusive agreements to guarantee the use of its search engine. These are agreements that prevent alternative search engines from being pre-installed, or from Google’s search app being removed.

Source: Google voor de rechter gedaagd wegens ‘grootschalige privacyschendingen’ – Emerce (NL)

BMW Ends Heated Seat Subscriptions Because People Hated It

Last year, BMW underwent media and customer hellfire over its decision to offer a monthly subscription for heated seats. While seat heating wasn’t the only option available for subscription, it was the one that seemed to infuriate everyone the most, since it concerned hardware already present in the car from the factory. After months of customers continuously expressing their displeasure with the plan, BMW has finally decided to abandon recurring charges for hardware-based functions.

“What we don’t do any more—and that is a very well-known example—is offer seat heating by [monthly subscriptions]” BMW marketing boss Pieter Nota said to Autocar. “It’s either in or out. We offer it by the factory and you either have it or you don’t have it.”

BMW’s move wasn’t solely about charging customers monthly for heated seats. Rather, the luxury automaker wanted to streamline production and reduce costs there by physically installing heated seats in every single car, since 90% of all BMWs are bought with seat heaters anyway. Then, owners who didn’t spec heated seats from the factory could digitally unlock them later with either a monthly subscription or a one-time perma-buy option. Nota still believes it was a good idea.

[…]

BMW was absolutely double dipping with heated seat subscriptions. The company started down that route to reduce production costs, making each car cheaper to build by streamlining the process. Fair enough. However, those reduced costs weren’t then passed down to buyers via lower MSRPs. Customers were technically paying for those heated seats anyway, no matter whether they wanted them. Then, BMW was not only charging extra to use a feature already installed in the car, but also subjecting it to subscription billing, even though seat heating is static hardware not designed to change or improve over time.

Customers weren’t happy, and rightfully made their grievance known. While it’s good that BMW ultimately buckled to the public’s wishes here, it doesn’t seem like the automaker’s board members truly understand why the outrage happened in the first place.

[…]

Source: BMW Ends Heated Seat Subscriptions Because People Hated It

Kokoon / Philips Sleep Headphones (Designed for Ultimate Comfort)

Philips and sleep specialists Kokoon have partnered to create an unparalleled sleep headphone.

The Philips Sleep Headphones, powered by Kokoon, blends sleep science and ergonomic know-how with Philips’ century-long reputation for crafting top-notch products.

[…]

Experience a comfort revolution. After numerous nights of testing, our team has crafted an earbud that flawlessly conforms to the shape of your ear for maximum comfort during side sleeping.

[…]

Sleep soundly with advanced biosensors that detect when you drift off and adjust sound levels accordingly, ensuring a peaceful and uninterrupted night.

[…]

Our biosensors introduce white noise during the night to assist with blocking out disruptive sounds such as snoring or external noise. Discover a more peaceful sleeping environment.

[…]

Get a better night’s sleep with sounds backed by science. Select from a variety of options including meditations, soundscapes, binaural beats, and more to ease into slumber.

[…]

Source: Kokoon Sleep Headphones (Designed for Ultimate Comfort) | Kokoon

The Grammys will consider that viral song with Drake and The Weeknd AI vocals for awards after all

The person behind an AI-generated song that went viral earlier this year has submitted the track for Grammy Awards consideration. The Recording Academy has stated that such works aren’t eligible for certain gongs. However, Ghostwriter, the pseudonymous person behind “Heart on My Sleeve,” has submitted the track in the best rap song and song of the year categories, according to Variety. Both of those are songwriting honors. The Academy has suggested it’s open to rewarding tracks that are mostly written by a human, even if the actual recording is largely AI-generated.

Ghostwriter composed the song’s lyrics rather than leaving them up to, say, ChatGPT. But rather than sing or rap those words, they employed a generative AI model to mimic the vocals of Drake and The Weeknd, which helped the song to pick up buzz. The artists’ label Universal Music Group wasn’t happy about that and it filed copyright claims to remove “Heart on My Sleeve” from streaming services. Before that, though, the track racked up hundreds of thousands of listens on Spotify and more than 15 million on TikTok.

[…]

It seems there’s one major roadblock as things stand, though. For a song to be eligible for a Grammy, it needs to have “general distribution” across the US through the likes of brick-and-mortar stores, online retailers and streaming services. Ghostwriter is reportedly aware of this restriction, but it’s unclear how they plan to address that.

In any case, this may well be a canary in the coal mine for rewarding the use of generative AI in art.

[…]

Source: The Grammys will consider that viral song with Drake and The Weeknd AI vocals for awards after all

This is like saying that any song with a guitar or any song with a synthesizer won’t be considered for a Grammy

A US senator has a grip on the Confirmation Process for Military Officers and is using it to blackmail the government

Senator Tuberville’s blanket hold on general officer nominations reaches its six-month anniversary this week. This all seems to have started with a reckless idea dreamed up by a staffer with no experience in the Senate who then left the Senator’s employment after taking credit for it in a Washington Post exposé. From its shaky foundations, the hold strategy has now morphed into a take-no-prisoners stand against federal funding of abortion and “wokeness” in the military. Tuberville appears to have no concept of an end game except total victory. Barring capitulation by the Senator, which doesn’t seem to be in the cards, the rest of the Senate needs to come up with a Plan B.

There are now 301 general and flag officer positions, including five spots on the Joint Chiefs of Staff, which are impacted by these holds. By year’s end, that number may rise to 650. Tuberville argues that there is no readiness impact for having acting officers in place. He may eventually be right in the sense that the military is a mission-driven organization and will adjust whether or not the Senate acts. Since military rotations are on a two-year cycle, fairly soon every general and admiral in the military will be in an acting position. This may be the likeliest future outcome.

[…]

Regular order and unscripted debates on amendments died long ago and as a result, the Senate can’t pass annual authorization bills except for the defense policy bill. The civilian nominations process is broken with over 180 confirmed positions still unfilled two and a half years into the current administration, and now the military nominations process has come unglued.

Trying to convince Senator Tuberville to withdraw his holds has been an exercise in futility. There is equally no appetite to modify the rules for holds and bundle these confirmations as that might set undesirable precedents. That leaves the option of doing nothing or altering what positions the Senate is required to confirm. The latter should be considered.

Until the Tuberville holds, the Senate routinely considered 50,000 military nominees a year primarily by unanimous consent. The biggest question one must ask is why? All military officers above the O-4 level (a major or lieutenant commander) must go through Senate confirmation for each promotion. This is referred to as a constitutional responsibility and yet an O-4 is the equivalent to a GS-13 in the civil service, while general officers are the equivalent of the Senior Executive Service (SES). The Senate does not confirm the nearly 490,000 federal employees at the GS-13 level or above nor the over 8,000 members of the SES even though they are all technically officers of the federal government as defined by the Constitution.

[…]

What would parity look like? Currently, 61 civilians at the Department of Defense (DoD) require Senate confirmation. That is a good starting point to consider for military generals, but just focusing on the 41 four-star generals in service according to the latest DoD data is probably enough. Confirming just these officers could take over four months of floor time if holds were placed on them. Still, the Senate now needs to structure its rules and plan its calendar around standing holds on all nominations—civilian or military. That means limiting the number of individuals that require confirmation.

Source: The Senate Can No Longer Have Nice Things: Ending the Confirmation Process for Military Officers | American Enterprise Institute – AEI

Grasping entropy: Teachers and students investigate thermodynamics through a hands-on model

Though a cornerstone of thermodynamics, entropy remains one of the most vexing concepts to teach budding physicists in the classroom. As a result, many people oversimplify the concept as the amount of disorder in the universe, neglecting its underlying quantitative nature.

 

In The Physics Teacher, researcher T. Ryan Rogers designed a hand-held model to demonstrate the concept of for students. Using everyday materials, Rogers’ approach allows students to confront the topic with new intuition—one that takes specific aim at the confusion between entropy and disorder.

“It’s a huge conceptual roadblock,” Rogers said. “The good news is that we’ve found that it’s something you can correct relatively easily early on. The bad news is that this misunderstanding gets taught so early on.”

While many classes opt for the imperfect, qualitative shorthand of calling entropy “disorder,” it’s defined mathematically as the number of ways energy can be distributed in a system. Such a definition merely requires students to understand how particles store energy, formally known as “degrees of freedom.”

To tackle the problem, Rogers developed a model in which small objects such as dice and buttons are poured into a box, replicating a simple thermodynamic system. Some particles in the densely filled box are packed in place, meaning they have fewer degrees of freedom, leading to an overall low-entropy system.

As students shake the box, they introduce energy into the system, which loosens up locked-in particles. This increases the overall number of ways energy can be distributed within the box.

“You essentially zoom in on entropy so students can say, ‘Aha! There is where I saw the entropy increase,'” Rogers said.

As students shake further, the particles settle into a configuration that more evenly portions out the energy among them. The catch: at this point of high entropy, the particles fall into an orderly alignment.

“Even though it looks more orientationally ordered, there’s actually higher entropy,” Rogers said.

All the who participated in the lesson were able to reason to the correct definition of entropy after the experiment.

Next, Rogers plans to extend the reach of the model by starting a conversation about entropy with other educators and creating a broader activity guide for ways to use the kits for kindergarten through college. He hopes his work inspires others to clarify the distinction in their classrooms, even if by DIY means.

“Grapes and Cheez-It crackers are very effective, as well,” Rogers said.

The article, “Hands-on Model for Investigating Entropy and Disorder in the Classroom,” is authored by T. Ryan Rogers and is published in The Physics Teacher.

More information: T. Ryan Rogers, Hands-on Model for Investigating Entropy and Disorder in the Classroom, The Physics Teacher (2023). DOI: 10.1119/5.0089761

Source: Grasping entropy: Teachers and students investigate thermodynamics through a hands-on model

Microsoft to stop forcing Windows 11 users into Edge in EU countries

Microsoft will finally stop forcing Windows 11 users in Europe into Edge if they click a link from the Windows Widgets panel or from search results. The software giant has started testing the changes to Windows 11 in recent test builds of the operating system, but the changes are restricted to countries within the European Economic Area (EEA).

“In the European Economic Area (EEA), Windows system components use the default browser to open links,” reads a change note from a Windows 11 test build released to Dev Channel testers last month. I asked Microsoft to comment on the changes and, in particular, why they’re only being applied to EU countries. Microsoft refused to comment.

Microsoft has been ignoring default browser choices in its search experience in Windows 10 and the taskbar widget that forces users into Edge if they click a link instead of their default browser. Windows 11 continued this trend, with search still forcing users into Edge and a new dedicated widgets area that also ignores the default browser setting.

[…]

Source: Microsoft to stop forcing Windows 11 users into Edge in EU countries – The Verge

Big Tech failed to police Russian disinformation: EU study

[…]

The independent study of the DSA’s risk management framework published by the EU’s executive arm, the European Commission, concluded that commitments by social media platforms to mitigate the reach and influence of global online disinformation campaigns have been generally unsuccessful.

The reach of Kremlin-sponsored disinformation has only increased since the major platforms all signed a voluntary Code of Practice on Disinformation in mid-2022.

“In theory, the requirements of this voluntary Code were applied during the second half of 2022 – during our period of study,” the researchers said. We’re sure you’re just as shocked as we are that social media companies failed to uphold a voluntary commitment.

Between January and May of 2023, “average engagement [of pro-Kremlin accounts rose] by 22 percent across all online platforms,” the study said. By absolute numbers, the report found, Meta led the pack on engagement with Russian misinformation. However, the increase was “largely driven by Twitter, where engagement grew by 36 percent after CEO Elon Musk decided to lift mitigation measures on Kremlin-backed accounts,” researchers concluded. Twitter, now known as X, pulled out of the disinformation Code in May.

Across the platforms studied – Facebook, Instagram, Telegram, TikTok, Twitter and YouTube – Kremlin-backed accounts have amassed some 165 million followers and have had their content viewed at least 16 billion times “in less than a year.” None of the platforms we contacted responded to questions.

[…]

The EU’s Digital Services Act and its requirements that VLOPs (defined by the Act as companies large enough to reach 10 percent of the EU, or roughly 45 million people) police illegal content and disinformation became enforceable late last month.

Under the DSA, VLOPs are also required “to tackle the spread of illegal content, online disinformation and other societal risks,” such as, say, the massive disinformation campaign being waged by the Kremlin since Putin decided to invade Ukraine last year.

[…]

Now that VLOPs are bound by the DSA, will anything change? We asked the European Commission if it can take any enforcement actions, or whether it’ll make changes to the DSA to make disinformation rules tougher, but have yet to hear back.

Two VLOPs are fighting their designation: Amazon and German fashion retailer Zalando. The two orgs claim that as retailers, they shouldn’t be considered in the same category as Facebook, Pinterest, and Wikipedia.

[…]

Source: Big Tech failed to police Russian disinformation: EU study • The Register

TV Museum Will Die in 48 Hours Unless Sony Retracts YouTube Copyright Strikes on 40 – 60 year old TV shows

Rick Klein and his team have been preserving TV adverts, forgotten tapes, and decades-old TV programming for years. Now operating as a 501(c)(3) non-profit, the Museum of Classic Chicago Television has called YouTube home since 2007. However, copyright notices sent on behalf of Sony, protecting TV shows between 40 and 60 years old, could shut down the project in 48 hours.

[…]

After being reborn on YouTube as The Museum of Classic Chicago Television (MCCTv), the last sixteen years have been quite a ride. Over 80 million views later, MCCTv is a much-loved 501(c)(3) non-profit Illinois corporation but in just 48 hours, may simply cease to exist.

In a series of emails starting Friday and continuing over the weekend, Klein began by explaining his team’s predicament, one that TorrentFreak has heard time and again over the past few years. Acting on behalf of a copyright owner, in this case Sony, India-based anti-piracy company Markscan hit the MCCTv channel with a flurry of copyright claims. If these cannot be resolved, the entire project may disappear.

[…]

No matter whether takedowns are justified, unjustified (Markscan hit Sony’s own website with a DMCA takedown recently), or simply disputed, getting Markscan’s attention is a lottery at best, impossible at worst. In MCCTv’s short experience, nothing has changed.

“Our YouTube channel with 150k subscribers is in danger of being terminated by September 6th if I don’t find a way to resolve these copyright claims that Markscan made,” Klein told TorrentFreak on Friday.

“At this point, I don’t even care if they were issued under authorization by Sony or not – I just need to reach a live human being to try to resolve this without copyright strikes. I am willing to remove the material manually to get the strikes reversed.”

[…]

Complaints Targeted TV Shows 40 to 60 years old

[…]

Two episodes of the TV series Bewitched dated 1964 aired on ABC Network and almost sixty years later, archive copies of those transmissions were removed from YouTube for violating Sony copyrights, with MCCTv receiving a strike.

[…]

Given that copyright law locks content down for decades, Klein understands that can sometimes cause issues, although 16 years on YouTube suggests that the overwhelming majority of rightsholders don’t consider his channel a threat. If they did, the option to monetize the recordings can be an option.

No Competition For Commercial Offers

Why most rightsholders have left MCCTv alone is hard to say; perhaps some see the historical value of the channel, maybe others don’t know it exists. At least in part, Klein believes the low quality of the videos could be significant.

“These were relatively low picture quality broadcast examples from various channels from various years at least 30-40 years ago, with the original commercial breaks intact. Also mixed in with these were examples of ’16mm network prints’ which are surviving original film prints that were sent out to TV stations back in the day from when the show originally aired. In many cases they include original sponsorship notices, original network commercials, ‘In Color’ notices, etc.,” he explains.

[…]

Klein says the team is happy to comply with Sony’s wishes and they hope that given a little leeway, the project won’t be consigned to history. Perhaps Sony will recall the importance of time-shifting while understanding that time itself is running out for The Museum of Classic Chicago Television.

Source: TV Museum Will Die in 48 Hours Unless Sony Retracts YouTube Copyright Strikes * TorrentFreak

Mozilla investigates 25 major car brands and finds privacy is shocking

[…]

The foundation, the Firefox browser maker’s netizen-rights org, assessed the privacy policies and practices of 25 automakers and found all failed its consumer privacy tests and thereby earned its Privacy Not Included (PNI) warning label.

If you care even a little about privacy, stay as far away from Nissan’s cars as you possibly can

In research published Tuesday, the org warned that manufacturers may collect and commercially exploit much more than location history, driving habits, in-car browser histories, and music preferences from today’s internet-connected vehicles. Instead, some makers may handle deeply personal data, such as – depending on the privacy policy – sexual activity, immigration status, race, facial expressions, weight, health, and even genetic information, the Mozilla team found.

Cars may collect at least some of that info about drivers and passengers using sensors, microphones, cameras, phones, and other devices people connect to their network-connected cars, according to Mozilla. And they collect even more info from car apps – such as Sirius XM or Google Maps – plus dealerships, and vehicle telematics.

Some car brands may then share or sell this information to third parties. Mozilla found 21 of the 25 automakers it considered say they may share customer info with service providers, data brokers, and the like, and 19 of the 25 say they can sell personal data.

More than half (56 percent) also say they share customer information with the government or law enforcement in response to a “request.” This isn’t necessarily a court-ordered warrant, and can also be a more informal request.

And some – like Nissan – may also use this private data to develop customer profiles that describe drivers’ “preferences, characteristics, psychological trends, predispositions, behavior, attitudes, intelligence, abilities, and aptitudes.”

Yes, you read that correctly. According to Mozilla’s privacy researchers, Nissan says it can infer how smart you are, then sell that assessment to third parties.

[…]

Nissan isn’t the only brand to collect information that seems completely irrelevant to the vehicle itself or the driver’s transportation habits.

Kia mentions sex life,” Caltrider said. “General Motors and Ford both mentioned race and sexual orientation. Hyundai said that they could share data with government and law enforcement based on formal or informal requests. Car companies can collect even more information than reproductive health apps in a lot of ways.”

[…]

the Privacy Not Included team contacted Nissan and all of the other brands listed in the research: that’s Lincoln, Mercedes-Benz, Acura, Buick, GMC, Cadillac, Fiat, Jeep, Chrysler, BMW, Subaru, Dacia, Hyundai, Dodge, Lexus, Chevrolet, Tesla, Ford, Honda, Kia, Audi, Volkswagen, Toyota and Renault.

Only three – Mercedes-Benz, Honda, and Ford – responded, we’re told.

“Mercedes-Benz did answer a few of our questions, which we appreciate,” Caltrider said. “Honda pointed us continually to their public privacy documentation to answer your questions, but they didn’t clarify anything. And Ford said they discussed our request internally and made the decision not to participate.”

This makes Mercedes’ response to The Register a little puzzling. “We are committed to using data responsibly,” a spokesperson told us. “We have not received or reviewed the study you are referring to yet and therefore decline to comment to this specifically.”

A spokesperson for the four Fiat-Chrysler-owned brands (Fiat, Chrysler, Jeep, and Dodge) told us: “We are reviewing accordingly. Data privacy is a key consideration as we continually seek to serve our customers better.”

[…]

The Mozilla Foundation also called out consent as an issue some automakers have placed in a blind spot.

“I call this out in the Subaru review, but it’s not limited to Subaru: it’s the idea that anybody that is a user of the services of a connected car, anybody that’s in a car that uses services is considered a user, and any user is considered to have consented to the privacy policy,” Caltrider said.

Opting out of data collection is another concern.

Tesla, for example, appears to give users the choice between protecting their data or protecting their car. Its privacy policy does allow users to opt out of data collection but, as Mozilla points out, Tesla warns customers: “If you choose to opt out of vehicle data collection (with the exception of in-car Data Sharing preferences), we will not be able to know or notify you of issues applicable to your vehicle in real time. This may result in your vehicle suffering from reduced functionality, serious damage, or inoperability.”

While technically this does give users a choice, it also essentially says if you opt out, “your car might become inoperable and not work,” Caltrider said. “Well, that’s not much of a choice.”

[…]

Source: Mozilla flunks 25 major car brands for data privacy fails • The Register

Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach

In November 2022, the password manager service LastPass disclosed a breach in which hackers stole password vaults containing both encrypted and plaintext data for more than 25 million users. Since then, a steady trickle of six-figure cryptocurrency heists targeting security-conscious people throughout the tech industry has led some security experts to conclude that crooks likely have succeeded at cracking open some of the stolen LastPass vaults.

[…]

Since late December 2022, Monahan and other researchers have identified a highly reliable set of clues that they say connect recent thefts targeting more than 150 people, Collectively, these individuals have been robbed of more than $35 million worth of crypto.

Monahan said virtually all of the victims she has assisted were longtime cryptocurrency investors, and security-minded individuals. Importantly, none appeared to have suffered the sorts of attacks that typically preface a high-dollar crypto heist, such as the compromise of one’s email and/or mobile phone accounts.

[…]

Monahan has been documenting the crypto thefts via Twitter/X since March 2023, frequently expressing frustration in the search for a common cause among the victims. Then on Aug. 28, Monahan said she’d concluded that the common thread among nearly every victim was that they’d previously used LastPass to store their “seed phrase,” the private key needed to unlock access to their cryptocurrency investments.

[…]

Bax, Monahan and others interviewed for this story say they’ve identified a unique signature that links the theft of more than $35 million in crypto from more than 150 confirmed victims, with roughly two to five high-dollar heists happening each month since December 2022.

[…]

But the researchers have published findings about the dramatic similarities in the ways that victim funds were stolen and laundered through specific cryptocurrency exchanges. They also learned the attackers frequently grouped together victims by sending their cryptocurrencies to the same destination crypto wallet.

A graphic published by @tayvano_ on Twitter depicting the movement of stolen cryptocurrencies from victims who used LastPass to store their crypto seed phrases.

By identifying points of overlap in these destination addresses, the researchers were then able to track down and interview new victims. For example, the researchers said their methodology identified a recent multi-million dollar crypto heist victim as an employee at Chainalysis, a blockchain analysis firm that works closely with law enforcement agencies to help track down cybercriminals and money launderers.

Chainalysis confirmed that the employee had suffered a high-dollar cryptocurrency heist late last month, but otherwise declined to comment for this story.

[…]

I’ve been urging my friends and family who use LastPass to change all of their passwords and migrate any crypto that may have been exposed, despite knowing full well how tedious that is.”

[…]

Source: Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach – Krebs on Security

Paper Cups Are Bad for the Environment Too, Study Finds

[…]

A study published last month in the journal Environmental Pollution outlines how paper cups can leach toxic materials into the surrounding environment. This is because paper cups are often coated in a layer of polylactic acid, otherwise known as PLA. It’s a bioplastic and is touted as a biodegradable alternative to traditional plastic. However, researchers found that it caused adverse health effects in aquatic midge larvae.

Researchers at the University of Gothenburg tested the effects of both plastic cups and paper cups on the midge larvae. Both types of cups were put in water or sediments for up to four weeks. The larvae were then put into aquariums that contained the sediment and water that once held the plastic and paper cups. The contaminated sediment and water were tested separately.

“We observed a significant growth inhibition with all the materials tested when the larvae were exposed in contaminated sediment,” the researchers wrote in the study. “Developmental delays were also observed for all materials, both in contaminated water and sediment.”

They found that growth challenges and developmental delays were observed in environments where the cups leached into them for only one week. The negative effects of the exposure increased in the water and sediment that held the paper and plastic cups for longer periods of time. This challenges the belief that bioplastics are safer. PLA does break down faster than traditional fossil fuel-based plastic material, but the study results show that they aren’t much safer.

“Bioplastics does not break down effectively when they end up in the environment, in water,” Bethanie Carney Almroth, a professor at the University of Gothenburg and study author, said in a press release. “There may be a risk that the plastic remains in nature and resulting microplastics can be ingested by animals and humans, just as other plastics do. Bioplastics contain at least as many chemicals as conventional plastic.”

Other previous studies have found that the plastic coating in paper cups can also create microplastics that enter the liquid in the cup. In 2019, a research group based out of India filled paper cups with hot water and found that there were an alarming amount of microplastic particles in a paper cup after filling the cups with hot liquids, Wired reported. The researchers found that there were about 25,000 particles per 100 ml cup after 15 minutes.

[…]

Source: Paper Cups Are Bad for the Environment Too, Study Finds

Watch Oscilloscope Kickstarter rewards sent – 10 years after backing

It may have taken ten years to come through on this particular Kickstarter, but a promise is a promise. In late August 2023, backers who had since likely forgotten all about the project started receiving their oscilloscope watches from creator [Gabriel Anzziani]. Whatever the reason(s) for the delay, the watch looks great, and is miles ahead of the prototype pictures.

As you may have guessed, it functions as both a watch and an oscilloscope. The watch has 12- and 24-hour modes as well as an alarm and calendar, and the ‘scope has all the features of the Xprotolab dev board, which [Gabriel] also created: ‘scope, waveform generator, logic analyzer, protocol sniffer, and frequency counter.

Internally, it has an 8-bit Xmega microcontroller which features an internal PDI, and the display is a 1.28″ e-ink display. When we covered this ten years ago, the screen was the type of Sharp LCD featured in the Pebble watch. [Gabriel]’s ‘scope watch features eight buttons around the edge which are user-programmable. One of [Gabriel]’s goals was for people to make their own apps.

Of course, the Kickstarter rewards are no longer available, but if you want to build your own small, digital ‘scope, check out this DIY STM32 project.

Source: The ‘Scope Of This Kickstarter? Ten Years. | Hackaday

Some Galaxies Contain Double Supermassive Black Holes

Blazars occupy an intriguing spot in the cosmic zoo. They’re bright active galactic nuclei (AGN) that blast out cosmic rays, are bright in radio emission, and sport huge jets of material traveling in our direction at nearly the speed of light. For some blazars, their jets look curvy and snaky and astronomers have questions.

[…]

“We present evidence and discuss the possibility that it is in fact the precession of the jet source, either caused by a supermassive binary black hole at the footpoint of the jet or – less likely – by a warped accretion disk around a single black hole, that is responsible for the observed variability,” said Britzen from the Max Planck Institute for Radio Astronomy in Bonn, Germany.

[…]

Britzen and the team investigated an object called OJ 287 to see if it could give some clues. It appears to have two black holes—essentially a black hole binary—at its core. Studies of this galaxy and 12 other AGNS led to the conclusion that jet curvature may provide a smoking gun clue to the existence of binary black holes in galaxy cores.

[…]

One black hole is emitting the jet and the other one’s gravitational influence affects the appearance and behavior of the jet. According to Michal Zajacek, who is a co-author of the study with Britzen, it helps explain the jet’s appearance. “Physics of accretion disks and jets is rather complex but their bulk kinematics can be compared to simple gyroscopes,” he said. “If you exert an external torque on an accretion disk, for instance by an orbiting secondary black hole, it will precess and nutate, and along with it the jet as well, similar to the Earth’s rotation axis that is affected by the Moon and the Sun.”

 A magnetized radio jet (yellow), precessing due to a pair of supermassive black holes. The larger one is shown in black at the center of the accretion disk. It contains warmer (blue) and cooler (red) gas. The white arrow indicates the spin of the larger black hole. The second black hole orbits (orange) around the central supermassive black hole and the orange arrow shows the orientation of its orbital angular momentum. Due to misalignment, torque from the secondary drives the precession of the accretion disk as well as the launched jet (green circle and arrows).  Radio emission is indicated with white curved lines. These show how the jet swirls around and produces variations in radio emission. Courtesy: Michal Zaja?ek/UTFA MUNI
 A magnetized radio jet (yellow), precessing due to a pair of supermassive black holes. The larger one is (black) at the center of the accretion disk. It contains warmer (blue) and cooler (red) gas. The white arrow indicates the spin of the larger black hole. The second black hole orbits (orange) around the central supermassive black hole and the orange arrow shows the orientation of its orbital angular momentum. Due to misalignment, torque from the secondary drives the precession of the accretion disk as well as the launched jet (green circle and arrows).  White curved lines indicate radio emission. Courtesy: Michal Zaja?ek/UTFA MUNI

Searching for the Black Hole Binaries

If this is the case for other blazars, the meandering jet and brightness variability may well be the clue astronomers need to probe for other binary black holes. It’s not an easy task to find the black holes, even though the AGNS themselves are bright, according to Britzen. “We still lack the sufficient resolution to probe the existence of supermassive binary black holes directly,” she said. “But jet precession seems to provide the best signature of these objects, whose existence is expected not only by the black hole / AGN community but also from the gravitational wave/pulsar community who recently published evidence for the existence of a cosmic gravitational background due to the gravitational waves emitted by the mergers of massive black holes through cosmic history.”

[…]

Source: Some Galaxies Contain Double Supermassive Black Holes – Universe Today

antiX 23: Ultralightweight minimal Debian 12 desktop

The latest release of antiX is Linux how it used to be, in the good way. It’s not the friendliest, but it does everything – and, wow, it’s fast.

The “proudly antifascist” antiX project has released its latest edition, based on Debian 12. This release is codenamed Arditi del Popolo – “the People’s Daring Ones” – after a 1920s Italian antifascist group formed to oppose Mussolini’s regime. antiX is not, as the name might imply, opposed to the X window system: its main editions are graphical, with a choice of environments (although there is a super-minimal, text-only edition if that’s what you want).

Instead, antiX seems to be opposed to pretty much all of the modern trends in desktop Linux, the sorts of technologies that old-timers often consider bloated or inefficient. It doesn’t use systemd or elogind. It doesn’t have Wayland, or heavyweight cross-distro packaging tools such as Flatpak or Snap. It doesn’t even have any of the standard desktop environments. By antiX standards, we suspect that a “desktop environment” would count as bloat.

(If you prefer a familiar desktop, then antiX 23 is one of the parent distros of MX Linux 23, which offers both Xfce and KDE variants.)

Instead of an integrated desktop, antiX provides a broad selection of tools that provide all the functionality of a desktop: app launchers, status monitors, wireless networking, file managers, whatever you need. Not only is it present, but you get a selection of alternatives, and in many cases there are both graphical and shell-based tools available. Despite all this, the 64-bit edition with kernel 6.1 still idles at under 200MB of memory in use, which is startlingly good for a 2023 distro. The Reg standard recommendation for a lightweight desktop Linux is the Raspberry Pi Desktop, which is based on Debian 11 and LXDE. antiX is built from newer components, but even so it uses less memory and it’s faster too.

So in a way, it reminds The Reg FOSS Desk of the good aspects of Linux the way it was in the 20th century. The full edition comes with lots of applications, including a few of the standard big names, such as Firefox ESR and LibreOffice. Aside from them, though, most are less well-known alternatives, ones that are smaller, faster, and take less memory.

antiX 23 with IceWM and a couple of ROX Filer windows open. Looks like a desktop, works like a desktop – but faster

antiX 23 with IceWM and a couple of ROX Filer windows open. Looks like a desktop, works like a desktop – but faster

What’s missing are the bad parts. From modern Linux, the multiple huge, lumbering tools, all too often written in relatively sluggish interpreted programming languages, each of which pulls in a gigabyte of dependencies; and worse still, allegedly “local applications” which are actually web applets implemented in Javascript, so each tool drags an entire embedded web browser around with it. And from 1990s Linux, the rough edges: this is a modern distro, with modern hardware support, and the standard installation gives you a complete graphical environment with sound, networking and so on all pre-configured and working.

It stands in contrast to most other contemporary minimal distros such as Alpine Linux, Arch Linux or Void Linux, to pick some random examples. While these are all very capable distros, you must do a substantial amount of manual installation and configuration post-installation if you want a graphical desktop and the usual assortment of text editors, media players, communications tools, and so on. They also have their own idiosyncratic packaging tools etc. so to get started with customizing your new distro, you’ll probably have to spend some time on Google finding the commands and their syntax.

antiX is based on Debian, which, as we said when celebrating its 30th birthday recently, is the most widely used family of Linux distros there is – so it uses the familiar apt commands for managing software.

antiX 23 with JWM and the zzz file manager. It's different, but not very. We're not convinced it really needs both

antiX 23 with JWM and the zzz file manager. It’s different, but not very. We’re not convinced it really needs both

So it’s a cut-down Debian “Bookworm”, with some of the controversial bits – such as systemd and the fancy desktop environments – taken out. You get a choice of two init systems: the default sysvinit or the more modern runit. These aren’t installation options, as they are in Devuan, say: you must choose and download the appropriate installation image. There are both 32-bit and 64-bit x86 editions.

The full edition offers four window managers: IceWM, JWM, Fluxbox, and Herbsluftwm. IceWM offers a fairly rich Windows-like setup, with a taskbar, start menu, and some preconfigured system monitors and applets. JWM offers a more basic, no-frills version of the same layout. Fluxbox drops all that stuff for an even more minimalistic overlapping window manager. All include the Conky desktop status display. Finally, Herbsluftwm is an extremely minimal tiling window manager.

But the choices don’t end there. antiX also includes two different file managers, ROX Filer and zzz, both of which provide desktop icons and multi-folder-window style navigation. Optionally, ROX Filer has its own desktop panel too for an approximate simulation of RISC OS desktop, which means you get two different desktop panels.

There are also “minimal” login options, which don’t load a file manager. This means the (extremely basic) slimski login screen offers no less than 13 desktop options.

This is emblematic of the main issue with antiX: if anything, it offers too much choice. There are full, light, and minimal editions; sysvinit and runit editions; and i686 and x86-64 editions. There are over a dozen different combinations of window manager and file managers. The top-level app menu has 14 entries, with both a “Control Centre” and a “Settings” submenu. One of the menu entries is called “Applications” and contains the usual hierarchical list of apps, but some are also on the top level, and there’s a “Personal” menu where you can pin your favourites. This is accessible from the Start button analog in the two window managers which have one, and by right-clicking the desktop in all three which have a desktop. For all the main app categories – text editors, and web browsers, media players, and so on – there are multiple options, sometimes three or four of them.

Considering that this is one of the most lightweight Linux distros, it’s an embarrassment of riches. There are so many options, choices, themes, and settings, most of them with multiple ways to get at them, that even for an experienced user, it’s bewildering. There are even 16 different downloads on offer: Full, Base, Core, and Net, two init systems, and two CPU architectures.

The Fluxbox window manager, with its virtual desktop switcher control at the bottom, and ROX Session's panel at the top. With some tweaking, it could be very like RISC OS

The Fluxbox window manager, with its virtual desktop switcher control at the bottom, and ROX Session’s panel at the top. With some tweaking, it could be very like RISC OS

While with Alpine or Void, you can achieve an extremely lightweight, fully graphical desktop system, you must do this by installing and configuring most of it yourself. With antiX, to get to a setup you are happy with, you will still have to do quite a lot of custom configuration, but it will be removing tools that you don’t want. Of course, there are package management tools to help you do that: there’s Package Installer, and Program Remover, and Synaptic, and a menu-driven shell-based package manager, and of course apt – and apt-get and aptitude.

When you download, install, and boot antiX, it feels amazingly tiny and fast by modern standards. We have the older release 21 on our elderly Atom-based Sony Vaio P, and it makes that geriatric sub-netbook feel sprightly. Then you log in, start to browse the application menu, and find a Swiss army knife, where there’s a tool for everything. The trouble is, each blade unfolds to reveal another Swiss army knife. It’s almost fractal.

Back when Ubuntu first launched in 2004, it scored over Debian because someone had done the curation of programs for you. You got what was arguably the best completely FOSS desktop at the time, GNOME 2, and one best-of-breed app in each category of essential program – one web browser, one email client, one media player, and so on, all nicely set up and integrated into a harmonious whole. And when it started out, it was relatively slim and lightweight and fast. With Debian, you had to choose all this for yourself, which gives you great freedom, but requires considerable expertise, and the result might not feel very coherent and require quite some fine tuning. Now, both are pretty big, and these days Ubuntu offers a choice of 10 different desktop flavors, plus Server and Core and container images and more.

This is where MX Linux scores over this, its much smaller parent distro. The MX team does that curation for you. With antiX, you get the freedom to pick and choose from a profusion of tools, many of which you’ve probably never heard of and so wouldn’t know to install. But you will probably want to break out the hammer and chisel, and sculpt it down into something you find pleasing.

It’s a very interesting distro, if you know a bit of what you’re doing and want to learn and experiment and customize it. It’s also very lightweight in resource usage, and will run well on some ancient hardware that most modern distros won’t even attempt to boot on.

But we can’t help but feel that, as its name hints, it’s a bit anarchic. It feels designed by committee, where everyone got their choices included. Some judicious pruning and selection would really help buff it to a shine.

Source: antiX 23: Ultralightweight minimal Debian 12 • The Register

Australian Government, Of All Places, Says Age Verification Is A Privacy & Security Nightmare

In the past I’ve sometimes described Australia as the land where internet policy is completely upside down. Rather than having a system that protects intermediaries from liability for third party content, Australia went the opposite direction. Rather than recognizing that a search engine merely links to content and isn’t responsible for the content at those links, Australia has said that search engines can be held liable for what they link to. Rather than protect the free expression of people on the internet who criticize the rich and powerful, Australia has extremely problematic defamation laws that result in regular SLAPP suits and suppression of speech. Rather than embrace encryption that protects everyone’s privacy and security, Australia requires companies to break encryption, insisting only criminals use it.

It’s basically been “bad internet policy central,” or the place where good internet policy goes to die.

And, yet, there are some lines that even Australia won’t cross. Specifically, the Australian eSafety commission says that it will not require adult websites to use age verification tools, because it would put the privacy and security of Australians’ data at risk. (For unclear reasons, the Guardian does not provide the underlying documents, so we’re fixing that and providing both the original roadmap and the Australian government’s response

[…]

Of course, in France, the Data Protection authority released a paper similarly noting that age verification was a privacy and security nightmare… and the French government just went right on mandating the use of the technology. In Australia, the eSafety Commission pointed to the French concerns as a reason not to rush into the tech, meaning that Australia took the lessons from French data protection experts more seriously than the French government did.

And, of course, here in the US, the Congressional Research Service similarly found serious problems with age verification technology, but it hasn’t stopped Congress from releasing a whole bunch of “save the children” bills that are built on a foundation of age verification.

[…]

Source: Australian Government, Of All Places, Says Age Verification Is A Privacy & Security Nightmare | Techdirt