Windows 11 is closing a loophole that let you skip making a Microsoft account

Microsoft is no longer playing around when it comes to requiring every Windows 11 device be set up with an internet-connected account. In its latest Windows 11 Insider Preview, the company says it will take out a well-known bypass script that let end users skip the requirement of connecting to the internet and logging in with a Microsoft account to get through the initialization process of a new PC.

As reported by Windows Central, Microsoft already requires users to connect to the internet, but there’s a way to bypass it: the bypassnro command. For those setting up computers for businesses or secondary users, or simply, on principle refuse to link their computer to a Microsoft account, the command is super simple to activate during the Windows setup process.

Microsoft cites security as one reason it’s making this change:

We’re removing the bypassnro.cmd script from the build to enhance security and user experience of Windows 11. This change ensures that all users exit setup with internet connectivity and a Microsoft Account.

Since the bypassnro command is disabled in the latest beta build, it will likely be pushed to production versions within weeks. All hope is not yet lost, as of right now the script can be reactivated with a registry edit by opening a command prompt during the initial setup (Press Shift + F10) and running the command:

reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /v BypassNRO /t REG_DWORD /d 1 /f shutdown /r /t 0”

However, there’s no guarantee Microsoft will allow this additional workaround for long. There are other workarounds as well, such as using the unattended.xml automation that lets you skip the initial setup “out-of-box experience.” It’s not straightforward, though, but it makes more sense for IT departments setting up multiple computers.

As of late, Microsoft has been making it harder for people to upgrade to Windows 11 while also nudging them to move on from Windows 10, which will lose support in October. The company is cracking down on the ability to install Windows 11 on older PCs that don’t support TPM 2.0, and hounding you with full-screen ads to buy a new PC. Microsoft even removed the ability to install Windows 11 with old product keys.

Source: Windows 11 is closing a loophole that let you skip making a Microsoft account | The Verge

I don’t want a cloud based user account to run an OS on my own PC.

Scientists May Have Discovered How To Extract Power From the Earth’s Rotation

No more burning fossil fuels, playing with fissile material, damming rivers, erecting wind mills, or making solar panels. All of our energy needs could potentially be supplied by the angular kinetic energy of the Earth — and because of the mass of the planet, doing so would slow its rotation down by a mere 7ms per century. [Which is similar to speed changes caused by natural phenomena such as the Moon’s pull and changing dynamics inside the planet’s core.”]

Normally this would be considered impossible as the Earth’s large and uniform field does not induce a current in conductors, but researchers believe that a hollow cylinder of manganese, zinc and iron can alter the interaction with our planetary magnetic field and allow the extraction of energy from it. So far, the results are positive but still below the level where they cannot be explained by multiple possible causes of experimental error. Further research is required to confirm the effect.

“The effect was identified only in a carefully crafted device and generated just 17 microvolts,” reports Scientific American, “a fraction of the voltage released when a single neuron fires — making it hard to verify that some other effect isn’t causing the observations.”

But if another group can verify the results, the experiment’s lead says the next logical step is trying to scale up the device to generate a useful amount of energy.

Source: Scientists May Have Discovered How To Extract Power From the Earth’s Rotation

Over a million private photos from MAD Mobile dating apps exposed online

Researchers have discovered nearly 1.5 million pictures from specialist dating apps – many of which are explicit – being stored online without password protection, leaving them vulnerable to hackers and extortionists.

Anyone with the link was able to view the private photos from five platforms developed by M.A.D Mobile: kink sites BDSM People and Chica, and LGBT apps Pink, Brish and Translove.

These services are used by an estimated 800,000 to 900,000 people.

M.A.D Mobile was first warned about the security flaw on 20 January but didn’t take action until the BBC emailed on Friday.

They have since fixed it but not said how it happened or why they failed to protect the sensitive images.

woman in red bondage outfit
This is one of the photos that anyone could have accessed. We have cropped the face and blurred it to enhance privacy

Ethical hacker Aras Nazarovas from Cybernews first alerted the firm about the security hole after finding the location of the online storage used by the apps by analysing the code that powers the services.

He was shocked that he could access the unencrypted and unprotected photos without any password.

[…]

In an email M.A.D Mobile said it was grateful to the researcher for uncovering the vulnerability in the apps to prevent a data breach from occurring.

But there’s no guarantee that Mr Nazarovas was the only hacker to have found the image stash.

“We appreciate their work and have already taken the necessary steps to address the issue,” a M.A.D Mobile spokesperson said. “An additional update for the apps will be released on the App Store in the coming days.”

The company did not respond to further questions about where the company is based and why it took months to address the issue after multiple warnings from researchers.

Usually security researchers wait until a vulnerability is fixed before publishing an online report, in case it puts users at further risk of attack.

But Mr Nazarovas and his team decided to raise the alarm on Thursday while the issue was still live as they were concerned the company was not doing anything to fix it.

[…]

In 2015 malicious hackers stole a large amount of customer data about users of Ashley Madison, a dating website for married people who wish to cheat on their spouse.

Source: Over a million private photos from dating apps exposed online

Meniscus injuries may soon be treated by customizable hydrogel

Meniscus tears are common knee injuries that have long frustrated patients and doctors due to limited repair options.A new 3D-printed hydrogel made from cow meniscus could transform how these injuries heal, according to results of a pre-clinical study published in Bioactive Materials. from researchers in the Perelman School of Medicine at the University of Pennsylvania.

The meniscus is a complex structure that serves as a critical shock absorber in the knee. and one-size-fits-all treatments aren’t always effective. Through creating a treatment adaptable to the different needs of patients, the researchers believe they may have unlocked a better fix no matter where the injury occurs in a meniscus.

“We developed a hydrogel that can be adjusted based on the patient’s age and the stiffness requirements of the injured tissue, which is important because the meniscus has different biochemical and biomechanical properties that vary depending upon the location in the tissue,” said the study’s senior author, Su Chin Heo, PhD, an assistant professor of Orthopaedic Surgery in the McKay Orthopaedic Research Lab at Penn. “Current treatments, including graft-base methods, do not fully recreate these complex differences, leading to poor healing.”

[…]

“In our animal studies, we’ve seen the hydrogel integrate well with the surrounding tissue, potentially offering patients a more complete recovery,” said the study’s first author Se-Hwan Lee, PhD, a post-doctoral fellow in the McKay Lab. “It’s a more precise, biologically matched solution. We believe this could outperform current treatments.”

The team is now transitioning from small mammal studies to large animal models.

“Our first clinical goal will be to treat smaller, localized meniscus tears,” Heo said. “Once we have success there, I believe we could expand to more complex injuries in the meniscus.”

[…]

Source: Meniscus injuries may soon be treated by customizable hydrogel | ScienceDaily

Your TV is watching you watch and selling that data

[…]Your TV wants your data

The TV business traditionally included three distinct entities. There’s the hardware, namely the TV itself; the entertainment, like movies and shows; and the ads, usually just commercials that interrupt your movies and shows. In the streaming era, tech companies want to control all three, a setup also known as vertical integration. If, say, Roku makes the TV, supplies the content, and sells the ads, then it stands to control the experience, set the rates, and make the most money. That’s business!

Roku has done this very well. Although it was founded in 2002, Roku broke into the market in 2008 after Netflix invested $6 million in the company to make a set-top box that enabled any TV to stream Netflix content. It was literally called the Netflix Player by Roku. Over the course of the next 15 years, Roku would grow its hardware business to include streaming sticks, which are basically just smaller set-top-boxes; wireless soundbars, speakers, and subwoofers; and after licensing its operating system to third-party TV makers, its own affordable, Roku-branded smart TVs

[…]

The shift toward ad-supported everything has been happening across the TV landscape. People buy new TVs less frequently these days, so TV makers want to make money off the TVs they’ve already sold. Samsung has Samsung Ads, LG has LG Ad Solutions, Vizio has Vizio Ads, and so on and so forth. Tech companies, notably Amazon and Google, have gotten into the mix too, not only making software and hardware for TVs but also leveraging the massive amount of data they have on their users to sell ads on their TV platforms. These companies also sell data to advertisers and data brokers, all in the interest of knowing as much about you as possible in the interest of targeting you more effectively. It could even be used to train AI.

[…]

Is it possible to escape the ads?

Breaking free from this ad prison is tough. Most TVs on the market today come with a technology called automatic content recognition (ACR) built in. This is basically Shazam for TV — Shazam itself helped popularize the tech — and gives smart TV platforms the ability to monitor what you’re watching by either taking screenshots or capturing audio snippets while you’re watching. (This happens at the signal level, not from actual microphone recordings from the TV.)

Advertisers and TV companies use ACR tech to collect data about your habits that are otherwise hard to track, like if you watch live TV with an antenna. They use that data to build out a profile of you in order to better target ads. ACR also works with devices, like gaming consoles, that you plug into your TV through HDMI cables.

Yash Vekaria, a PhD candidate at UC Davis, called the HDMI spying “the most egregious thing we found” in his research for a paper published last year on how ACR technology works. And I have to admit that I had not heard of ACR until I came across Vekaria’s research.

[…]

Unfortunately, you don’t have much of a choice when it comes to ACR on your TV. You probably enabled the technology when you first set up your TV and accepted its privacy policy. If you refuse to do this, a lot of the functions on your TV won’t work. You can also accept the policy and then disable ACR on your TV’s settings, but that could disable certain features too. In 2017, Vizio settled a class-action lawsuit for tracking users by default. If you want to turn off this tracking technology, here’s a good guide from Consumer Reports that explains how for most types of smart TVs.

[…]

it does bug me, just on principle, that I have to let a tech company wiretap my TV in order to enjoy all of the device’s features.

[…]

Source: Roku’s Moana 2 controversy is part of a bigger ad problem | Vox

Are Vehicle Infotainment Screens Headed for the Scrap Heap?

[…] As much as carmakers seem to love infotainment screens, consumers are less enthusiastic about them. Just 15% of drivers in 2024 said they would want a full-width infotainment display. Windshield base displays with less functionality are slightly more popular but still appeal to just 18% of those planning on buying a new car.

The growing pushback against vehicle touch screens is ultimately a matter of safety and convenience. While having all your controls in one place sounds useful, navigating between menus to find the right settings can be frustrating, slow, and unsafe if done while driving. It also means basic car functions may be at the mercy of software glitches and lag.

In 2021, Tesla had to recall vehicles because an issue with the flash memory in Tesla infotainment systems made the rearview camera unviewable and took defrost and turn signal functions offline. More recently, a class-action lawsuit against Stellantis alleges that defective infotainment screens led to backup camera failures and distracting audio glitches.

Those same shortcomings, alongside the obvious distracting features of an iPad in your center console, pose safety concerns, too. Navigating between menus takes focus off the road, especially when adjusting a setting takes more steps than it used to. Given that 6,000 pedestrians a year already die in traffic accidents, anything that takes a driver’s eyes off the road isn’t ideal.

Some car brands have started responding to these concerns by toning down the “screenification” of their vehicles. Volkswagen announced it will bring back physical buttons after backlash against its more screen-heavy models. VW CEO Thomas Schäfer said the reliance on touch screens “did a lot of damage” to the brand’s reputation among frustrated drivers.

When VW pivoted to a touch screen-centric interface, Capital One’s Auto Navigator called the controls “aggravating,” as did many other reviewers. Yahoo Autos called it the worst infotainment system they had ever come across. In light of these responses, it’s easy to see why VW would want to move back to physical buttons.

Given this growing push against infotainment touch screens, automakers will likely respond. However, how they choose to balance demands for safety and convenience with new tech is less certain.

Some companies think the solution is to keep digital displays but change how they operate. BMW unveiled a new heads-up display (HUD) at CES 2025 that puts more information along the bottom of the windshield instead of keeping it on the dash. As BMW board member Frank Weber explained, this system means “the driver decides themselves which information they want to display in their own field of vision.” Infotainment-style customization remains present, but it stays within the line of sight while looking at the road.

BMW’s new HUD also lets drivers control these settings through physical buttons on the steering wheel, not just a touch screen. That way, hands can remain on the wheel and eyes can remain forward. Hyundai and Kia have followed a similar approach, giving users a choice between touch or analog controls.

Voice commands have emerged as another alternative. Mercedes introduced ChatGPT-backed voice controls in 2023, and Apple gave CarPlay voice functionality with iOS 18. These don’t make screens go away, but they do offer a way to use them that doesn’t require taking your hands off the wheel or eyes off the road.

As the industry explores these voice-activated solutions, it’s clear that the evolution of infotainment systems is far from over. Growing attention on common issues should kick-start some much-needed changes.

Source: Are Vehicle Infotainment Screens Headed for the Scrap Heap?

Voice commands are spotty at best and incredibly frustrating to use. BMW decided to go buttonless only last year and is sadly sticking to its’ guns whilst the rest of the world is moving on.

Bring back the buttons!

Turkish F-16s Are Using Tablets To Control Locally Made Weapons

Turkey has begun using tablet computers in the cockpits of its F-16 fighters to help with the rapid integration of new locally-developed weapons. This has interesting parallels with Ukraine’s use of such devices to allow its Soviet-era jets to employ Western air-to-ground weapons — something you can read more about here.

The tablet can be seen in the cockpit of an F-16 in a recent video showing a test launch of the domestically developed SOM-J standoff missile. The tablet is mounted on the Input Control Panel (ICP), which is located on the center console beneath the head-up display. The ICP is used to select weapons, navigation settings, and radio communications, among other functions. At the same time, the pilot has another tablet on their knee, something that has become increasingly common, augmenting the information available via the aircraft’s mission systems and helping eliminate cumbersome paper books in the cockpit.

In this context, the tablet is part of the UBAS, also known in English as the Aircraft Independent Firing System. Using Turkish-designed software, the UBAS provides a weapons interface for the use of Turkish-made stores, like the SOM-J.

[…]

Tablet-based workarounds to integrate new weapons on existing aircraft platforms are now something of a growth area.

In the case of Ukraine, which we have explored in depth in the past, its Soviet-era fighters lack the kinds of data bus interfaces that would ensure seamless compatibility with Western-made weapons.

Cockpit of a Ukrainian Su-27 Flanker fitted with a tablet device. via X

Last year, U.S. Undersecretary of Defense for Acquisition and Sustainment Dr. William LaPlante explained:

“There’s also a series of … we call it ‘air-to-ground,’ it’s what we call it euphemistically … think about the aircraft that the Ukrainians have, and not even the F-16, but they have a lot of the Russian and Soviet-era aircraft. Working with the Ukrainians, we’ve been able to take many Western weapons and get them to work on their aircraft, where it’s basically controlled by an iPad by the pilot. And they’re flying it in conflict like a week after we get it to him.”

As well as tablets in the cockpit, Ukrainian aircraft are also using specialized pylons on which the Western-made weapons are carried. You can read more about those here.

[…]

For Turkey, the situation is essentially reversed, with the problem being how to integrate new Turkish-made weapons onto older U.S.-made F-16s.

Turkey has a fairly unusual position regarding the kind of upgrades it can make to its F-16 fleet, a result of the sometimes-strained relations between Ankara and Washington.

[…]

Now, thanks to UBAS, these aircraft can also carry a range of Turkish-made ordnance and this can be added without having to modify the F-16’s software, which features proprietary updates released in the form of ‘tapes.’ Even without access to the software, Turkey can add new weapons to the jets using UBAS.

While the system has been shown to be used for employment of the SOM-J, it likely provides a similar interface with other locally developed stores.

[…]

As well as appearing in the cockpits of Turkish F-16s, UBAS has been installed in Soviet-era Su-25 Frogfoot attack jets operated by Azerbaijan, as part of a Turkish upgrade.

In the first part of this upgrade, known as Merhale-1, the Su-25 adds the UBAS system that allows it to employ Turkish-made KGK-82/83 and TEBER-82 precision-guided bombs, as well as SOM-B1 standoff missiles.

[…]

The Azerbaijan example underscores the unique position Turkey has, thanks to its rapidly exploding defense aerospace sector, especially in terms of munitions and drones — this was not nearly the case in the past. Were UBAS to open up a gateway for integration of multiple weapons on U.S.-made fighters, this would be a huge deal on multiple levels. For export, especially, it could be very significant, allowing foreign operators a quick and rapid way of integrating Turkish weapons, for example, on their U.S.-made aircraft.

Overall, these developments in Turkey underscore the fact that tablets are increasingly providing a vital interface between aircraft and weapons of different origins. Tablets also look like they are becoming critical to the control of Collaborative Combat Aircraft (CCA) drones and other uncrewed platforms, at least initially. They also now play a major role in a variety of training applications.

As such, tablets are proving to be a useful way of adding a host of new capabilities to older platforms and doing so relatively cheaply and quickly.

Source: Turkish F-16s Are Using Tablets To Control Locally Made Weapons

Yes, let’s “Make it Fair” – by recognising that copyright has failed to reward creators properly

A few weeks ago, the UK’s regional and national daily news titles ran similar front covers, exhorting the government there to “Make it Fair”. The campaign Web site explained:

Tech companies use creative content, such as news articles, books, music, film, photography, visual art, and all kinds of creative work, to train their generative AI models.

Publishers and creators say that doing this without proper controls, transparency or fair payment is unfair and threatens their livelihoods.

Under new UK proposals, creators will be able to opt out of their works being used for training purposes, but the current campaign wants more than that:

Creators argue this [opt-out] puts the burden on them to police their work and that tech companies should pay for using their content.

The campaign Web site then uses a familiar trope:

Tech giants should not profit from stolen content, or use it for free.

But the material is not stolen, it is simply analysed as part of the AI training. Analysing texts or images is about knowledge acquisition, not copyright infringement. Once again, the copyright industries are trying to place a (further) tax on knowledge. Moreover, levying that tax is completely impractical. Since there is no way to determine which works were used during training to produce any given output, the payments would have to be according to their contribution to the training material that went into creating the generative AI system itself. A Walled Culture post back in October 2023 noted that the amounts would be extremely small, because of the sheer quantity of training data that is used. Any monies collected from AI companies would therefore have to be handed over in aggregate, either to yet another inefficient collection society, or to the corporate intermediaries. For this reason, there is no chance that creators would benefit significantly from any AI tax.

We’ve been here before. Five years ago, I wrote a post about the EU Copyright Directive’s plans for an ancillary copyright, also known as the snippet or link tax. One of the key arguments by the newspaper publishers was that this new tax was needed so that journalists were compensated when their writing appeared in search results and elsewhere. As I showed back then, the amounts involved would be negligible. In fact, few EU countries have even bothered to implement the provision on allocating a share to journalists, underlining how pointless it all was. At the time, the European Commission insisted on behalf of its publishing friends that ancillary copyright was absolutely necessary because:

The organisational and financial contribution of publishers in producing press publications needs to be recognised and further encouraged to ensure the sustainability of the publishing industry.

Now, on the new Make it Fair Web site we find a similar claim about sustainability:

We’re calling on the government to ensure creatives are rewarded properly so as to ensure a sustainable future for AI and the creative industries.

As with the snippet tax, an AI tax is not going to do that, since the sums involved as so small. A post on the News Media Association reveals what is the real issue here:

The UK’s creative industries have today launched a bold campaign to highlight how their content is at risk of being given away for free to AI firms as the government proposes weakening copyright law.

Walled Culture has noted many times it is a matter of dogma for the industries involved that copyright must only ever get stronger, as if they were a copyright ratchet. The fear is evidently that once it has been “weakened” in some way, a precedent would be set, and other changes might be made to give more rights to ordinary people (perish the thought) rather than to companies. It’s worth pointing out that the copyright world is deploying its usual sleight of hand here, writing:

The government must stand with the creative industries that make Britain great and enforce our copyright laws to allow creatives to assert their rights in the age of AI.

A fair deal for artists and writers isn’t just about making things right, it is essential for the future of creativity and AI.

Who could be against this call for the UK government to defend the poor artists and writers? No one, surely? But the way to do that, according to Make it Fair, is to “stand with the creative industries”. In other words, give the big copyright companies more power to act as gatekeepers, on the assumption that their interests are perfectly aligned with those of the struggling creators.

They are not. As Walled Culture the book explores in some detail (free digital versions available), the vast majority of those “artists and writers” invoked by the “Make it Fair” campaign are unable to make a decent living from their work under copyright. Meanwhile, huge global corporations enjoy fat profits as a result of that same creativity, but give very little back to the people who did all the work.

There are serious problems with the new AI offerings, and big tech companies definitely need to be reined in for many things, but not for their basic analysis of text and images. If publishers really want to “Make it Fair”, they should start by rewarding their own authors fairly, with more than the current pittance. And if they won’t do that, as seems likely given their history of exploitation, creators should explore some of the ways they can make a decent living without them. Notably, many of these have no need for a copyright system that is the epitome of unfairness, which is precisely why publishers are so desperate to defend it in this latest coordinated campaign.

Source: Yes, let’s “Make it Fair” – by recognising that copyright has failed to reward creators properly – Walled Culture

I won’t connect my dishwasher to your stupid cloud – why not just use buttons? Also planned obsolesence is a bitch

I bought a Bosch 500 series because that’s what Consumer Reports recommended, and more importantly, I could find one in stock.

Bosch dishwasher open control panel

After my dad and I got it installed, I went to run a rinse cycle, only to find that that, along with features like delayed start and eco mode, require an app.

Bosch dishwasher Home Connect logo

Not only that, to use the app, you have to connect your dishwasher to WiFi, set up a cloud account in something called Home Connect, and then, and only then, can you start using all the features on the dishwasher.

Video

This blog post is a lightly-edited transcript of my latest YouTube video on Level 2 Jeff:

GE Dishwasher – Planned Obsolescence

So getting back first to that old GE dishwasher, it was, I don’t know, I think that planned obsolescence is something that applies to many consumer products today.

Companies know if they design something to last only 5 or 10 years, that means in 5 or 10 years someone’s going to have to buy a whole new one.

And on my GE Amana dishwasher, it started having weird power issues, like the controls would just not light up unless I reset the circuit breaker for a few minutes. That started happening more often, and this past Saturday it just wouldn’t come on no matter what, even after I tested and re-wired it all the way from the panel up to the dishwasher’s internal power connector.

So it was dead.

Next up, I looked at what it took to get a control board. Well… $299 for a control board that was ‘special order’ and might not even fix the problem? That’s a non-starter for my $600, 8-year-old dishwasher.

Even if I got it fixed, the front panel was starting to rust out at the hinge points (leaving some metal jaggies that my soon-to-be-crawling 6 month old could slice his fingers on), and other parts of the machine were showing signs of rust/potential future leaks…

[…]

The touch sensor, you kind of touch it and the firmware—like this new dishwasher actually takes time to boot up! I had to reset it like three times and my wife meanwhile was like laughing at me like look at this guy who does tech stuff and he can’t even figure out how to change the cycle on it.

That took about five minutes, sadly.

But eventually I pulled out the manual book because I was like… “this is actually confusing.”

It should be like: I touch the button and it changes to that mode! But that was not how it was working.

I wanted to run just a rinse cycle to make sure the water would go in, the water would pump out through the sump, and everything worked post-install.

But I couldn’t find a way to do a rinse cycle on the control panel.

So I looked in the manual and found this note:

Bosch dishwasher manual mention of Home Connect

It says options with an asterisk—including Rinse, Machine Care (self-cleaning), HalfLoad, Eco, and Delay start, are “available through Home Connect app only and depending on your model.”

The 500 series model I bought isn’t premium enough to feature a 7-segment display like the $400-more-expensive 800 series, so these fancy modes are hidden behind an app and cloud service.

I was like, “Okay, I’ll look up this app and see if I can use it over Bluetooth or locally or whatever.”

Nope! To use the app, you have to connect your dishwasher to your Wi-Fi, which lets the dishwasher reach out on the internet to this Home Connect service.

You have to set up an account on Home Connect, set up the Home Connect app on your phone, and then you can control your dishwasher through the Internet to run a rinse cycle.

That doesn’t make any sense to me.

[…]

What should be done?

When I posted on social media about this, a lot of people told me to return it.

But I spent four hours installing this thing built into my kitchen.

I hooked it up to the water, it’s running through cycles… it is working. I’ll give them that. It does the normal stuff, but you know, there are some features that don’t work without the app.

At a minimum, I think what Bosch should do is make it so that the dishwasher can be accessed locally with no requirement for a cloud account. (Really, it’d be even better to have all the functions accessible on the control panel!)

Anyone building an IoT device, here is my consumer-first, e-waste-reduction maxim:

First local, then cloud.

Cloud should be an add-on.

It should be a convenience for people who don’t know how to do things like connect to their dishwasher with an app locally.

And it’s not that hard.

A little ESP32, a little $1 chip that you can put in there could do all this stuff locally with no cloud requirement at all.

I think that there might be some quants or people who want to make a lot of money building all these cloud services.

[…]

Source: I won’t connect my dishwasher to your stupid cloud | Jeff Geerling

what the actual fuck. I don’t want to connect my dishwasher, fridge, washing machine, dryer, whatever to the cloud either.

Turns out that sharks do actually make sounds

Elasmobranchs are an evolutionarily ancient group of cartilaginous fishes that can hear underwater sounds but are not historically viewed as active sound producers. Three recent reports of several species of rays producing clicks in response to approaching divers have cast doubt on this long prevailing view and resulted in calls for more research into sound production in elasmobranchs. This study shows that the rig, Mustelus lenticulatus, produces clicks (mean SPLrms = 156.3 dB re. 1 μPa ± 0.9 s.e.m. at approx. 30 cm) when handled underwater, representing the first documented case of deliberate sound production by a shark

[…]

Source: Evidence of active sound production by a shark | Royal Society Open Science

The sun has literally set on the British Empire

[…]thanks to cosmic geometry, a major chapter in world history has just now come to a close. As first highlighted last year on Reddit, the spring equinox on March 20 marked the sun’s passage over the celestial equator, kicking off half a year of darkness around the South Pole. And given last year’s deal with Mauritius, this means Thursday night at 10:50 PM EST (2:50 AM on March 21 in London), the sun finally, literally set on the British empire.

A world map with shaded middle region indicating night
The spring equinox on March 20 prededed the British empire’s literal sunset. Credit: Reddit / TuTiempo.net

It didn’t stay dark for Britain too long, however. About an hour after dusky conditions on the Pitcairn Islands, light began to peek over the horizon roughly 10,000 miles away in Akrotiri and Dhekelia, two non-contiguous British territories located on the island of Cyprus.

[…]

Source: The sun has literally set on the British Empire | Popular Science

How much foreign aid is spent domestically rather than overseas?

Much of foreign aid is spent on goods that are shipped overseas: food supplies, medicines, or humanitarian assistance in emergency situations.

But a surprising amount of what’s reported as foreign aid is not sent abroad; it’s spent domestically. Foreign aid budgets in rich countries can include the costs of hosting refugees, some scholarships to foreign students, and some administrative costs that are spent domestically. These domestic expenses are reported by countries to the OECD, which tracks and measures foreign aid allocations, so they are included in the widely quoted aid figures you’ll typically see. We’ll refer to these combined costs as “aid money spent at home”.

In 2023, 22% of total foreign aid for all countries was spent at home. The DAC countries are a group of 32 high-income countries; from this point onwards, we’ll refer to them as “rich donor countries”.

In this article, we’ll look at how aid money spent at home varies across countries and categories, how this has changed over time, and what this means for the amount of money available for support overseas.

More foreign aid is spent domestically, mostly to host refugees

So, in 2023, 22% of foreign aid was spent domestically in rich donor countries. That was a record year, both in absolute and relative terms. Domestic spending has more than tripled from $14 billion to $48 billion since 2010. As a share of total aid, it has increased from 10% to 22%.

[…]

Source: How much foreign aid is spent domestically rather than overseas? – Our World in Data

Personal info feared stolen from sperm bank California Crybank

[…]The IT break-in occurred between April 20 and April 22, last year, according to a notification filed this month with the US state’s attorney general’s office. California Cryobank spotted unauthorized activity on certain computers on April 21, isolated the affected machines, and launched an investigation.

The sperm bank hasn’t disclosed how many individuals were affected, but says the files potentially accessed or acquired include names, Social Security numbers, driver’s license numbers, financial account details, and health insurance information [PDF].

California Cryobank has touted itself as having the largest sperm supply in the world, distributing to all 50 US states and more than 30 countries internationally.

The biz did not immediately respond to The Register‘s questions about the break-in, including how many customers were affected and if the miscreants deployed ransomware and demanded an extortion payment. One wonders why it’s taken almost a year for this all to come to light, so to speak.

[…]

Source: Personal info feared stolen from sperm bank • The Register

Cyberattack on nonprofit affects over 500k PA school workers

The Pennsylvania State Education Association (PSEA) says a July 2024 “security incident” exposed sensitive personal data on more than half a million individuals, including financial and health info.

The nonprofit, which represents more than 178,000 education professionals in the US state of Pennsylvania, confirmed data was stolen during a July 6 attack. According to The Office of the Maine Attorney General, the breach affected a total of 517,487 people

[…]

The org’s disclosure notice stated: “…we determined that the data acquired by the unauthorized actor contained some personal information belonging to individuals whose information was contained within certain files within our network.

“We took steps, to the best of our ability and knowledge, to ensure that the data taken by the unauthorized actor was deleted. We want to make the impacted individuals aware of the incident and provide them with steps they can take to further protect their information.”

Although PSEA’s disclosure didn’t explicitly mention ransomware or extortion, it did say that steps were taken to ensure the stolen data was deleted — a claim that typically implies some level of communication with the attackers, often seen in double extortion cases.

Adding weight to that suspicion, the Rhysida ransomware gang publicly claimed responsibility for the attack in September 2024, suggesting ransomware was involved.

[…]

PSEA emphasized that not every individual had the same data elements compromised. The exposed information may include an individual’s full name in combination with one or more other type of personal data.

The possible data types stolen include the usual personally identifiable information (PII) such as full names and dates of birth, and identity documents such as driver’s licenses, state IDs, and social security numbers (SSNs).

In addition to basic PII, the nonprofit also said account numbers, account PINs, security codes, passwords, routing numbers, payment card numbers, card PINs, and expiration dates might have been taken.

The list doesn’t stop there: Passport numbers, taxpayer ID numbers, usernames and passwords, health insurance information, and finally medical information are potentially in the hands of cybercriminals.

[…]

Source: Cyberattack on nonprofit affects over 500k PA school workers • The Register

HP settles lawsuit for $0 after bricking printers that don’t use HP ink

HP Inc. has settled a class action lawsuit in which it was accused of unlawfully blocking customers from using third-party toner cartridges – a practice that left some with useless printers – but won’t pay a cent to make the case go away.

One of the named plaintiffs in the case is called Mobile Emergency Housing Corp (MEHC) and works with emergency management organizations and government agencies to provide shelters for disaster victims and first responders across the US and Caribbean.

According to court documents [PDF], MEHC bought an HP Color LaserJet Pro M254 in August 2019. In October 2020, the org used toner cartridges from third-party supplier Greensky rather than pay for HP’s premium-priced toner.

A month later, HP sent or activated a firmware update – part of its so-called “Dynamic Security” measures – rendering MEHC’s printers incompatible with third-party toner cartridges like those from Greensky.

When MEHC’s CEO Joseph James tried to print out a document, he got the following error message.

The same thing happened to another plaintiff, Performance Automotive, which purchased an HP Color LaserJet Pro MFP M281fdw in 2018 and also installed a firmware update that prevented the machine from working when third-party toner cartridges were present.

HP is not shy about why it does this: In 2024 CEO Enrique Lores told the Davos World Economic Forum “We lose money on the hardware, we make money on the supplies.”

[…]

Incidentally, HP’s printing division reported $4.5 billion in net revenue in fiscal year 2024.

Lores has also argued that using third-party suppliers is a security risk, claiming malware could theoretically be slipped into cartridge controller chips. The Register is unaware of this happening outside a lab. He’s also pitched HP’s own gear as the greener choice, pointing to its cartridge recycling program.

MEHC, Performance Automotive, (and many readers) disagree and would like to choose their own toner.

Thus, a lawsuit was launched, but rather than fight its case in court, HP has, once again, chosen to settle the case privately with no admission of guilt.

“HP denies that it did anything wrong,” its settlement notice reads. “HP agrees under the Settlement to continue making certain disclosures about its use of Dynamic Security, and to continue to provide printer users with the option to either install or decline to install firmware updates that include Dynamic Security.”

[…]

Source: HP settles lawsuit after killing first responder’s printers • The Register

Microsoft blames Outlook outage on another dodgy code change

Users of Microsoft’s email service might be feeling a distinct sense of déjà vu after the web version of Outlook last night blocked access to Exchange Online mailboxes.

According to Microsoft, the problem was due to “a recent change made to a portion of Outlook on the web infrastructure, that may have resulted in impact.”

Reverting the change did the trick, and service was restored, but the question must be asked – does Microsoft test its changes before deploying to production?

The problems, according to DownDetector, began around 1730 UTC on March 19 and appeared to be worldwide. The company admitted to them via social media shortly after, saying: “We’re investigating reports of an issue affecting users’ ability to access Outlook on the web.”

Half an hour later, the company admitted it made a change that might be responsible. That change was reverted, and services started returning to normal.

This sort of incident is becoming depressingly commonplace. A lengthy outage occurred at the beginning of March which Microsoft also blamed on some dodgy code.

[…]

Source: Microsoft blames Outlook outage on another dodgy code change • The Register

No Headphones, No Problem: This Acoustic Trick Bends Sound Through Space to Find You

What if you could listen to music or a podcast without headphones or earbuds and without disturbing anyone around you? Or have a private conversation in public without other people hearing you?

Our newly published research introduces a way to create audible enclaves – localized pockets of sound that are isolated from their surroundings. In other words, we’ve developed a technology that could create sound exactly where it needs to be.

The ability to send sound that becomes audible only at a specific location could transform entertainment, communication and spatial audio experiences.

[…]

The science of audible enclaves

We found a new way to send sound to one specific listener: through self-bending ultrasound beams and a concept called nonlinear acoustics.

Ultrasound refers to sound waves with frequencies above the human hearing range, or above 20 kHz. These waves travel through the air like normal sound waves but are inaudible to people. Because ultrasound can penetrate through many materials and interact with objects in unique ways, it’s widely used for medical imaging and many industrial applications.

[…]

Normally, sound waves combine linearly, meaning they just proportionally add up into a bigger wave. However, when sound waves are intense enough, they can interact nonlinearly, generating new frequencies that were not present before.

This is the key to our technique: We use two ultrasound beams at different frequencies that are completely silent on their own. But when they intersect in space, nonlinear effects cause them to generate a new sound wave at an audible frequency that would be heard only in that specific region.

Diagram of ultrasound beams bending around a head and intersection in an audible pocket
Audible enclaves are created at the intersection of two ultrasound beams.
Jiaxin Zhong et al./PNAS, CC BY-NC-ND

Crucially, we designed ultrasonic beams that can bend on their own. Normally, sound waves travel in straight lines unless something blocks or reflects them. However, by using acoustic metasurfaces – specialized materials that manipulate sound waves – we can shape ultrasound beams to bend as they travel. Similar to how an optical lens bends light, acoustic metasurfaces change the shape of the path of sound waves. By precisely controlling the phase of the ultrasound waves, we create curved sound paths that can navigate around obstacles and meet at a specific target location.

The key phenomenon at play is what’s called difference frequency generation. When two ultrasonic beams of slightly different frequencies, such as 40 kHz and 39.5 kHz, overlap, they create a new sound wave at the difference between their frequencies – in this case 0.5 kHz, or 500 Hz, which is well within the human hearing range. Sound can be heard only where the beams cross. Outside of that intersection, the ultrasound waves remain silent.

This means you can deliver audio to a specific location or person without disturbing other people as the sound travels.

[…]

This isn’t something that’s going to be on the shelf in the immediate future. For instance, challenges remain for our technology. Nonlinear distortion can affect sound quality. And power efficiency is another issue – converting ultrasound to audible sound requires high-intensity fields that can be energy intensive to generate.

Despite these hurdles, audio enclaves present a fundamental shift in sound control. By redefining how sound interacts with space, we open up new possibilities for immersive, efficient and personalized audio experiences.

Jiaxin Zhong, Postdoctoral Researcher in Acoustics, Penn State and Yun Jing, Professor of Acoustics, Penn State. This article is republished from The Conversation under a Creative Commons license. Read the original article.

Source: No Headphones, No Problem: This Acoustic Trick Bends Sound Through Space to Find You

A Win for human rights: France Rejects Backdoor Mandate

In a moment of clarity after initially moving forward a deeply flawed piece of legislation, the French National Assembly has done the right thing: it rejected a dangerous proposal that would have gutted end-to-end encryption in the name of fighting drug trafficking. Despite heavy pressure from the Interior Ministry, lawmakers voted Thursday night (article in French) to strike down a provision that would have forced messaging platforms like Signal and WhatsApp to allow hidden access to private conversations.

The vote is a victory for digital rights, for privacy and security, and for common sense.

The proposed law was a surveillance wishlist disguised as anti-drug legislation. Tucked into its text was a resurrection of the widely discredited “ghost” participant model—a backdoor that pretends not to be one. Under this scheme, law enforcement could silently join encrypted chats, undermining the very idea of private communication. Security experts have condemned the approach, warning it would introduce systemic vulnerabilities, damage trust in secure communication platforms, and create tools ripe for abuse.

The French lawmakers who voted this provision down deserve credit. They listened—not only to French digital rights organizations and technologists, but also to basic principles of cybersecurity and civil liberties. They understood that encryption protects everyone, not just activists and dissidents, but also journalists, medical professionals, abuse survivors, and ordinary citizens trying to live private lives in an increasingly surveilled world.

A Global Signal

France’s rejection of the backdoor provision should send a message to legislatures around the world: you don’t have to sacrifice fundamental rights in the name of public safety. Encryption is not the enemy of justice; it’s a tool that supports our fundamental human rights, including the right to have a private conversation. It is a pillar of modern democracy and cybersecurity.

As governments in the U.S., U.K., Australia, and elsewhere continue to flirt with anti-encryption laws, this decision should serve as a model—and a warning. Undermining encryption doesn’t make society safer. It makes everyone more vulnerable.

[…]

Source: A Win for Encryption: France Rejects Backdoor Mandate | Electronic Frontier Foundation

‘Technical issue’ at Google deletes some customer maps timeline data

The data was stored in Google Maps’ Timeline feature, which – for those of you who let Google track you around the world – preserves a record of locations you visit. That sounds creepy and perhaps creepier still once you realize Google makes it possible for photos to appear on the Timeline too, so that users can have a visual record of their travels.

Over the weekend, users noticed their Timelines went missing.

Google seems to have noticed, too, as The Register has seen multiple social media posts in which Timelines users share an email from the search and ads giant in which it admits “We briefly experienced a technical issue that caused the deletion of Timeline data for some people.”

The email goes on to explain that most users that availed themselves of a feature that enables encrypted backups will be able to restore their Maps Timelines data.

Users who did not make those backups can’t restore their data. Those who did make backups need to manually restore their info using a procedure Google included in its email.

[…]

This isn’t the first time Google has messed up users’ historical data: In 2023 the company shortened its default data retention time for location info from 18 to three months, but some users missed the announcement and then complained as their data was purged.

[…]

Source: ‘Technical issue’ at Google deletes some customer data • The Register

China bans facial recognition without consent and in all public places. And it needs to be encrypted.

China’s Cyberspace Administration and Ministry of Public Security has outlawed the use of facial recognition without consent.

The two orgs last Friday published new rules on facial recognition and an explainer that spell out how orgs that want to use facial recognition must first conduct a “personal information protection impact assessment” that considers whether using the tech is necessary, impacts on individuals’ privacy, and risks of data leakage.

Organizations that decide to use facial recognition must data encrypt biometric data, and audit the information security techniques and practices they use to protect facial scans.

Chinese that go through that process and decide they want to use facial recognition can only do so after securing individuals’ consent.

The rules also ban the use of facial recognition equipment in public places such as hotel rooms, public bathrooms, public dressing rooms, and public toilets.

The measures don’t apply to researchers or to what machine translation of the rules describes as “algorithm training activities” – suggesting images of citizens’ faces are fair game when used to train AI models.

The documents linked to above don’t mention whether government agencies are exempt from the new rules. The Register fancies Beijing will keep using facial recognition whenever it wants to as its previously expressed interest in a national identity scheme that uses the tech, and used it to identify members of ethnic minorities.

Source: China bans facial recognition in hotels, bathrooms • The Register

23andMe files for bankruptcy: How to delete your data before it’s sold off

23andMe has capped off a challenging few years by filing for Chapter 11 bankruptcy today. Given the uncertainty around the future of the DNA testing company and what will happen to all of the genetic data it has collected, now is a critical time for customers to protect their privacy. California Attorney General Rob Bonta has recommended that past customers of the genetic testing business delete their information as a precautionary measure. Here are the steps to deleting your records with 23andMe.

  1. Log into your 23andMe account.
  2. Go to the “Settings” tab of your profile.
  3. Click View on the section called “23andMe Data.”
  4. If you want to retain a copy for your own records, download your data now.
  5. Go to the “Delete Data” section
  6. Click “Permanently Delete Data.”
  7. You will receive an email from 23andMe confirming the action. Click the link in that email to complete the process.

While the majority of an individual’s personal information will be deleted, 23andMe does keep some information for legal compliance. The details are in the company’s privacy policy.

There are a few other privacy-minded actions customers can take. First, anyone who opted to have 23andMe store their saliva and DNA can request that the sample be destroyed. That choice can be made from the Preferences tab of the account settings menu. Second, you can review whether you granted permission for your genetic data and sample to be used in scientific research. The allowance can also be checked, and revoked if you wish, from the account settings page; it’s listed under Research and Product Consents.

Source: How to delete your 23andMe data

Boeing Wins F-47 Next Generation Air Dominance Fighter Contract

In the biggest development for U.S. Air Force tactical air power in more than two decades, Boeing has been announced as the winner of the service’s Next Generation Air Dominance (NGAD) ‘fighter’ initiative. As the centerpiece of the NGAD effort, the new crewed sixth-generation stealth combat jet, now designated the F-47, is set to change air combat forever, with the Air Force hoping to begin fielding it in the next decade.

[…]

The Engineering and Manufacturing Development (EMD) contract for NGAD is expected to be worth approximately $20 billion, although, across the life of the program, the company is in line to receive hundreds of billions of dollars in orders. Each copy of the jet, once series production commences, has been estimated in the past to cost upwards of $300 million. That is if the original concept for the aircraft has not changed.

A Lockheed Martin rendering of a notional sixth-generation combat jet. Lockheed Martin

It’s worth recalling that, while the NGAD terminology is frequently used to refer to the crewed combat jet that will be at the center of the effort, the program of the same name is a much broader initiative. As such, it includes the development of Collaborative Combat Aircraft (CCA) drones with high degrees of autonomy, as well as new jet engines, weapons, electronic warfare suites, sensors, networking ecosystems, battle management capabilities, and more.

The NGAD combat jet program evolved from plans for what was originally referred to as a Penetrating Counter-Air (PCA) platform, which emerged publicly in the mid-2010s. The PCA concept was an outgrowth of previous work the Air Force had done in cooperation with the Defense Advanced Research Projects Agency (DARPA). That includes the Aerospace Innovation Initiative, which was publicly announced in 2015 and produced at least one classified flying demonstrator design.

In contrast to previous fighter competitions, NGAD has been cloaked in secrecy from the outset. Indeed, for a long time, the Air Force didn’t even disclose which companies were in the running for NGAD.

[…]

Boeing has recently suffered some notable setbacks in both its commercial and defense businesses. Trump had previously slammed the company over its contract to build two new Air Force One planes, which are running behind schedule. In the context of NGAD, however, the company’s entire future as a fighter-builder could be at stake. Notably, the company announced back in 2023 that it was going to shutter the F/A-18E/F Super Hornet line and indicated it would refocus in part on advanced combat jet efforts. The firm has made significant investments in its St. Louis, Missouri, facility to prepare it for sixth-generation fighter production. Boeing — alongside Northrop Grumman — is still in the running for the Navy’s F/A-XX. As for tactical jet production, Boeing is currently building F-15 Advanced Eagles and the Air Force’s T-7 jet trainer and will be for foreseeable future.

[…]

Trump’s Air Force NGAD announcement comes at a time at which the president has been seeking to cut costs throughout the U.S. government, including slashing tens of billions of dollars from existing defense programs. NGAD has been a significant source of uncertainty over the past year, having been put on pause in May 2024 as the service reviewed its requirements amid concerns about the affordability of the aircraft, capability needs, and shifting priorities.

Ultimately, it seems the service’s need for a sixth-generation fighter in a potential Indo-Pacific conflict secured the future of the program.

“We tried a whole bunch of different options, and there was no more viable option than NGAD to achieve air superiority in this highly contested environment,” Air Force Maj. Gen. Joseph Kunkel, director of Force Design, Integration, and Wargaming within the office of the deputy chief of staff for Air Force Futures, said earlier this month.

[…]

According to Trump, an experimental version of the F-47 “has secretly been flying for almost five years.” This is in line with the announcement of September 2020, from Dr. Will Roper, then Assistant Secretary of the Air Force for Acquisition, Technology and Logistics, that a previously undisclosed NGAD demonstrator had begun flight testing. Since then, it’s been reported that at least three NGAD-related demonstrators have flown.

The president also announced an aspiration to have the F-47 enter series production before the end of his term in office, which ends in January 2029.

[..]

Perhaps most surprisingly, Trump said that U.S. allies “are calling constantly” with a view to obtaining an export version of the NGAD fighter. He said that the United States would be selling them to “certain allies … perhaps toned-down versions. We’d like to tone them down about 10 percent which probably makes sense, because someday, maybe they’re not our allies, right?”

[…]

Source: Boeing Wins F-47 Next Generation Air Dominance Fighter Contract (Updated)

Apple Music Is Down, you can’t listen to your music because cloud

If you wanted to play some tunes on your iPhone this afternoon, but found nothing would play, it’s not just you: As of Tuesday afternoon ET, Apple Music is down.

Apple’s System Status website currently confirms Apple Music’s downtime. As of this piece, the site shows the following status for Apple Music:

Apple Music – Outage

Today, 2:26 PM – ongoing

Some users are affected

Users may be experiencing intermittent issues with this service.

All other Apple services, including the App Store, FaceTime, iMessage, and all iCloud services, are currently online.

Source: It’s Not Just You, Apple Music Is Down | Lifehacker

FTC removes posts critical of Big Tech from its website

The Federal Trade Commission (FTC) has removed over 300 blog posts published during the agency’s leadership under former chair Lina Khan, Wired reports. These include posts that are critical of companies like Amazon and Microsoft for their handling of customer data.

The FTC did not respond to a request for comment.

As FTC chair during the Biden years, Khan was known as a tough enforcer of antitrust law, seeking to hold mega-corporations accountable for their potential to stifle competition in American markets. In an interview with TechCrunch, she once referred to Big Tech leaders as “mob bosses.” But in the Trump era, the FTC is unlikely to be as vigilant about Big Tech.

The deletion of these blogs could potentially violate laws on how government data is handled; meanwhile, the behavior is consistent with the Trump administration’s ongoing campaign to remove certain words and phrases from public and private government documents. These terms include “Black,” “disability,” “feminism,” “genders,” “Latinx,” “LGBTQ,” “transgender,” “victims,” and “women,” among others.

Source: FTC removes posts critical of Big Tech from its website | TechCrunch

Amazon annihilates Alexa privacy settings, turns on continuous, nonconsensual audio uploading

Even by Amazon standards, this is extraordinarily sleazy: starting March 28, each Amazon Echo device will cease processing audio on-device and instead upload all the audio it captures to Amazon’s cloud for processing, even if you have previously opted out of cloud-based processing:

https://arstechnica.com/gadgets/2025/03/everything-you-say-to-your-echo-will-be-sent-to-amazon-starting-on-march-28/

It’s easy to flap your hands at this bit of thievery and say, “surveillance capitalists gonna surveillance capitalism,” which would confine this fuckery to the realm of ideology (that is, “Amazon is ripping you off because they have bad ideas”). But that would be wrong. What’s going on here is a material phenomenon, grounded in specific policy choices and by unpacking the material basis for this absolutely unforgivable move, we can understand how we got here – and where we should go next.

Start with Amazon’s excuse for destroying your privacy: they want to do AI processing on the audio Alexa captures, and that is too computationally intensive for on-device processing. But that only raises another question: why does Amazon want to do this AI processing, even for customers who are happy with their Echo as-is, at the risk of infuriating and alienating millions of customers?

For Big Tech companies, AI is part of a “growth story” – a narrative about how these companies that have already saturated their markets will still continue to grow.

[…]

every growth stock eventually stops growing. For Amazon to double its US Prime subscriber base, it will have to establish a breeding program to produce tens of millions of new Americans, raising them to maturity, getting them gainful employment, and then getting them to sign up for Prime. Almost by definition, a dominant firm ceases to be a growing firm, and lives with the constant threat of a stock revaluation as investors belief in future growth crumbles and they punch the “sell” button, hoping to liquidate their now-overvalued stock ahead of everyone else.

[…]

The hype around AI serves an important material need for tech companies. By lumping an incoherent set of poorly understood technologies together into a hot buzzword, tech companies can bamboozle investors into thinking that there’s plenty of growth in their future.

[…]

let’s look at the technical dimension of this rug-pull.

How is it possible for Amazon to modify your Echo after you bought it? After all, you own your Echo. It is your property. Every first year law student learns this 18th century definition of property, from Sir William Blackstone:

That sole and despotic dominion which one man claims and exercises over the external things of the world, in total exclusion of the right of any other individual in the universe.

If the Echo is your property, how come Amazon gets to break it? Because we passed a law that lets them. Section 1201 of 1998’s Digital Millennium Copyright Act makes it a felony to “bypass an access control” for a copyrighted work:

https://pluralistic.net/2024/05/24/record-scratch/#autoenshittification

That means that once Amazon reaches over the air to stir up the guts of your Echo, no one is allowed to give you a tool that will let you get inside your Echo and change the software back. Sure, it’s your property, but exercising sole and despotic dominion over it requires breaking the digital lock that controls access to the firmware, and that’s a felony punishable by a five-year prison sentence and a $500,000 fine for a first offense.

[…]

Giving a manufacturer the power to downgrade a device after you’ve bought it, in a way you can’t roll back or defend against is an invitation to run the playbook of the Darth Vader MBA, in which the manufacturer replies to your outraged squawks with “I am altering the deal. Pray I don’t alter it any further”

[…]

Amazon says that the recordings your Echo will send to its data-centers will be deleted as soon as it’s been processed by the AI servers. Amazon’s made these claims before, and they were lies. Amazon eventually had to admit that its employees and a menagerie of overseas contractors were secretly given millions of recordings to listen to and make notes on:

https://archive.is/TD90k

And sometimes, Amazon just sent these recordings to random people on the internet:

https://www.washingtonpost.com/technology/2018/12/20/amazon-alexa-user-receives-audio-recordings-stranger-through-human-error/

Fool me once, etc. I will bet you a testicle* that Amazon will eventually have to admit that the recordings it harvests to feed its AI are also being retained and listened to by employees, contractors, and, possibly, randos on the internet.

*Not one of mine

Source: Pluralistic: Amazon annihilates Alexa privacy settings, turns on continuous, nonconsensual audio uploading (15 Mar 2025) – Pluralistic: Daily links from Cory Doctorow