The Linkielist

Linking ideas with the world

The Linkielist

About Robin Edgar

Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft

A keyboard? How quaint: Logitech and Baidu link arms to make an AI-enabled, voice-transcribing mouse

The Logitech Voice M380 wireless mouse looks and acts like a regular mouse but with a special button to initiate voice dictation. Baidu claimed recognition facilitates content creation at two to three times the speed of what one can type.

The device supports dictation in Chinese, English, and Japanese, and can translate content to English, Japanese, Korean, French, Spanish, and Thai. However, as of this month, you can only pick it up in China. There’s no word on when or if it will be available elsewhere.

Logitech M380 voice mouse

The Logitech M380 Baidu voice mouse. Click to enlarge

The mouse uses Baidu’s AI open platform Baidu Brain speech technology. The Chinese tech company said of the platform:

As of September 2020, Baidu Brain has developed more than 270 core AI capabilities and created over 310,000 models for developers.

Baidu Brain is made of a security module and four components: a foundation layer (uses open-source Chinese deep learning platform Paddle Paddle, Kunlun AI processors, and databases); the so-called “perception” layer (aggregates the company’s algorithm in voice technology, computer vision and AR/VR); a cognition layer (integrates new information); and a platform layer.

[…]

The mouse comes in three colours, graphite, rose, and off-white, and costs around $30 (£22, €25).

Source: A keyboard? How quaint: Logitech and Baidu link arms to make an AI-enabled, voice-transcribing mouse • The Register

Aussie biz Azimuth cracked San Bernardino shooter’s iPhone, ending Apple-FBI privacy standoff in 2015

Australian security firm Azimuth has been identified as the experts who managed to crack a mass shooter’s iPhone that was at the center of an encryption standoff between the FBI and Apple.

Until this week it had largely been assumed that Israeli outfit Cellebrite was hired to forcibly unlock an encrypted iPhone 5C used by Syed Farook – who in 2015 shot and killed colleagues at a work event in San Bernardino, California, claiming inspiration from ISIS.

Efforts by law enforcement to unlock and pore over Farook’s phone were unsuccessful, leading to the FBI taking Apple to court to force it to crack its own software to reveal the device’s contents. The Feds got an order from a judge instructing Apple to effectively break its own security to give agents access to the locked and encrypted handset.

But Apple heavily and publicly resisted, leading to a legal showdown that resulted in increasing alarm in the technology industry. Before the courts were forced to resolve the issue of access to encrypted data, however, the FBI announced it had found a way into the phone and dropped the case.

It later emerged the Feds had paid $900,000 to get into the phone… which had nothing of value on it. That isn’t too surprising since it was Farook’s work phone, after all.

[…]

Source: Report: Aussie biz Azimuth cracked San Bernardino shooter’s iPhone, ending Apple-FBI privacy standoff • The Register

Amazon Strong-arms Small Businesses to Share User Data

Amazon reportedly pressured smart-thermostat maker Ecobee to fork over data from its voice-enabled devices even when customers weren’t actively using them. When Ecobee pushed back, the e-commerce giant threatened to box the company out of high-profile selling events like Prime Day or refuse Alexa certification for future devices, according to a Wall Street Journal report this week.

Last year, Amazon approached Ecobee among other Alexa-enabled device sellers about sharing “proactive state” data from customers, several company executives confirmed to the Journal. With this data, Amazon would receive updates about the device’s status at all times even when customers weren’t using them, such as the temperature of their home or whether their doors are locked, among other examples.

[…]

However, when Ecobee initially refused to provide users’ proactive state data, Amazon warned that a refusal might bar the company from major selling events like Prime Day or prevent its future devices from receiving Alexa certification, said one of the people the Journal spoke with. Given that Amazon controls a huge chunk of the global e-commerce market (nearly 40% in the U.S. alone), that kind of move can bankrupt smaller companies like Ecobee.

[…]

In addition to stealing designs from other companies for its AmazonBasics line, Amazon also purportedly pressures industry partners to use its logistics arm, Fulfillment by Amazon, by threatening to make it more difficult to sell products on its marketplace, according to the Journal. Amazon even reportedly competes with the companies it invests in, of which Ecobee is one, using its position as a shareholder to access confidential information and develop similar products.

Last October, a House Judiciary antitrust subcommittee concluded what we all already knew: That Amazon and other tech giants have “monopoly power” in their respective markets and “abuse their power by charging exorbitant fees, imposing oppressive contract terms, and extracting valuable data from the people who rely on them.”

Source: Amazon Strong-arms Small Businesses to Share User Data

Microsoft received almost 25,000 requests for consumer data from law enforcement over the last six months

Microsoft has had a busy six months if its latest biannual digital trust report is anything to go by as law enforcement agencies crept closer to making 25,000 legal requests.

Requests for consumer data reached 24,798 during the second half of 2020, up from 24,093 during the previous six-month period, and quite a jump from the 21,781 for the same period in 2019.

“Non-content data” requests, which require a subpoena (or local equivalent), accounted for just over half of disclosures and were slightly down on the same period in 2019. Microsoft rejected 25.81 per cent of requests in the last six months of 2020, up on the 20.14 per cent of the same period in 2019.

As for where those requests came from, Microsoft highlighted a handful of countries including Brazil, France, Germany, the United Kingdom, and the United States. The US was the worst offender (going by quantity of requests) accounting for 5,682 (up from 4,315 for same period in 2019). Germany was not far behind with 4,976 (up from 3,310) while the UK submitted 3,558 requests (a small increase from 3,312 for the same period in 2019).

As well as consumer data, Microsoft received 109 requests from law enforcement agencies for enterprise cloud customer data in the second half of 2020. It was unable to bat back 40, where the company was “compelled” to provide some information. “19 cases,” it said, “required the disclosure of some customer content, and in 21 of the cases we were compelled to disclose non-content information only.”

Still, while that 25,000 figure may seem a little worrying, it is considerably less than the first sets of figures made available by Microsoft. For the latter half of 2013 the total requests were above 35,000.

Away from the criminal side of things, Microsoft also received a comparatively small number of emergency and civil legal requests. Of the latter, it rejected just over 75 per cent in the latter half of 2020.

The report makes for fascinating reading and, while the company is to be applauded for publishing it, the accompanying Privacy Report is an occasionally grim reminder of just how much information Microsoft can slurp from users. Particularly if the customer concerned decides to be helpful and check that Optional diagnostic data box.

[…]

Source: Microsoft received almost 25,000 requests for consumer data from law enforcement over the last six months • The Register

DARPA picks Lockheed Martin and Blue Origin to build nuclear spacecraft

[…]

To speed up the pace of NTP tech development, the Pentagon’s Defense Advanced Research Projects Agency (DARPA) has selected a trio of companies to build and demonstrate a nuclear-based propulsion system on a spacecraft above low-Earth orbit by 2025. The prime contractors include Jeff Bezos’ private space project Blue Origin, Lockheed Martin, and General Atomics.

Over the next 18 months, phase 1 of the DRACO (Demonstration Rocket for Agile Cislunar Operations) program will see the companies split across two tracks to develop a craft that has the ability to rapidly maneuver in cislunar space (between the Earth and the moon). The award win marks a new national security contract for Blue Origin, according to CNBC, while its DRACO counterparts are regulars on the defense circuit.

Bezos’ company and Lockheed Martin — granted $2.5 million and $2.9 million, respectively — will now work on competing designs for an operational spacecraft powered by an NTP system. DARPA awarded General Atomics $22 million to develop the nuclear reactor.

[…]

Source: DARPA picks Lockheed Martin and Blue Origin to build nuclear spacecraft | Engadget

Sound location inspired by bat ears could help robots navigate outdoors

Sound location technology has often been patterned around the human ear, but why do that when bats are clearly better at it? Virginia Tech researchers have certainly asked that question. They’ve developed a sound location system that mates a bat-like ear design with a deep neural network to pinpoint sounds within half a degree — a pair of human ears is only accurate within nine degrees, and even the latest technology stops at 7.5 degrees.

The system flutters the outer ear to create Doppler shift signatures related to the sound’s source. As the patterns are too complex to easily decipher, the team trained the neural network to provide the source direction for every received echo. And unlike human-inspired systems, it only needs one receiver and a single frequency.

[…]

Source: Sound location inspired by bat ears could help robots navigate outdoors | Engadget

US expels Russian diplomats in response to SolarWinds hack and election interference

The US is following through on promises of retaliation against Russia for its alleged involvement in the SolarWinds cyberattack. The AP reports that President Biden has expelled 10 Russian diplomats from Washington, DC, including members of intelligence services, in response to actions that include the SolarWinds hack. The White House also imposed sanctions on 32 “entities and individuals” as an answer to reported 2020 election interference attempts.

Biden formally blamed the Russia-backed cyberattack group Cozy Bear (aka APT29) as the culprit behind the SolarWinds breach. The FBI, NSA and CISA also issued a joint cybersecurity advisory warning of vulnerabilities Russian intelligence used to compromise networks. The Treasury Department, meanwhile, declared that six Russian technology companies were involved in creating the tools to enable “malicious cyber activities.”

[…]

The actions also encompass a number of non-technology concerns, such as bounties on US soldiers in Afghanistan, Russia’s ongoing actions in Crimea and the attempts to silence Russian opposition leader Alexei Navalny.

[…]

Source: US expels Russian diplomats in response to SolarWinds hack | Engadget

Blue Origin launches and lands space rockets without exploding. Unlike SpaceX.

Blue Origin has successfully completed a test launch and landing of its reuseable New Shepard rocket with an advanced capsule design, bringing the outfit one step closer to eventually sending up paying passengers.

The test flight, codenamed NS-15 as it’s the 15th to date, was conducted at 1651 UTC (1151 CDT) at a Blue Origin site near Van Horn, Texas, on Wednesday. Two Blue Origin employees climbed up the launch tower, entered the capsule, and were strapped into their seats, and followed final procedures to prepare for a fake take off. Just before the New Shepard was due to fly, however, they left the capsule, with just Mannequin Skywalker, the instrument-stuffed dummy Blue Origin uses, to make the short journey.

The flight was the first test of the new capsule design that’ll be more comfortable for people paying six-figure sums to go into space. New acoustic and temperature controls were tested, as well an improved radio and control systems. NASA wants to see all is right before putting humans on it.

You can watch the whole thing again here. Skip to 1:53:39 to get to the countdown.

NS-15 was completed in just over ten minutes, according to the mission’s broadcast. First, the capsule separated from the booster at about three minutes into the flight. After the booster reached its highest point – about 350,000 feet or 106.7 kilometres – it slowed down and reentered the atmosphere.

It was guided back onto is landing pad and performed a rocket burn to slow its speed down to five miles per hour at seven minutes into the flight for a soft landing. The capsule touched down around three minutes later.

[…]

Source: Blue Origin sends Mannequin Skywalker aloft again, testing out comfier capsule for future space tourists • The Register

Millions of passwords leaked by hacked webshop Allekabels.nl

Webshop Allekabels has leaked private data and passwords of millions of Dutch people. It may be the largest password data breach in the Netherlands ever.

Allekabels’ stolen database, containing the private data of some 3.6 million people, was put up for sale on a hacker forum at the end of January for a sum of 15,000 euros. Audio and computer cables are available for purchase via Allekabels, as well as suspension brackets and antennas.

RTL Nieuws has viewed and verified the stolen data.

This totals some 2.6 million unique email addresses linked to names, home addresses, telephone numbers, dates of birth and encrypted passwords.

At least 109,000 IBAN numbers of Allekabels customers were also stolen and traded.

[…]

Source: Miljoenen wachtwoorden op straat door hack webshop Allekabels.nl – Emerce

SolarWinds hack was done by Kremlin’s APT29 crew, say UK and US

Russia’s infamous APT 29, aka Cozy Bear, was behind the SolarWinds Orion attack, the US and UK governments said today as America slapped sanctions on Russian infosec companies as well as expelling diplomats from that country’s US embassy.

One of the sanctioned companies is Positive Technologies, familiar in the West for, among other things, in-depth research exposing vulnerabilities in Intel’s hardware security architecture.

Formal attribution of the SolarWind hacks, echoing tentative findings made by Kaspersky Lab, came in a US Treasury Department statement issued this afternoon.

The compromise saw Russian state intelligence operatives carefully compromise the build systems of SolarWinds’ network monitoring software Orion to distribute a backdoor into its 18,000 customers. Those customers included the UK and US governments, among many others

“The Russian Intelligence Services’ third arm, the SVR, is responsible for the 2020 exploit of the SolarWinds Orion platform and other information technology infrastructures. This intrusion compromised thousands of US government and private sector networks,” said the US Treasury.

The American attribution was echoed by the British government with Foreign Secretary Dominic Raab saying in a statement: “We see what Russia is doing to undermine our democracies. The UK and US are calling out Russia’s malicious behaviour, to enable our international partners and businesses at home to better defend and prepare themselves against this kind of action.”

The US Defence Department added: “Recent Russian SVR activities include compromising SolarWinds Orion software updates, targeting COVID-19 research facilities through deploying WellMess malware, and leveraging a VMware vulnerability that was a zero-day at the time for follow-on Security Assertion Markup Language (SAML) authentication abuse.”

The NCSC also said in a public statement that “the overall impact on the UK of the SVR’s exploitation of this software is low.” Government departments have refused to even talk about the impact of the Orion compromise despite it being in widespread use around Whitehall and further afield, lending credibility to the notion that UK.gov was more widely hit by the breach than it wants to admit.

[…]

Other sanctioned outfits included ERA Technopolis, aka Pasit; Neobit, an infosec firm which was also the alma mater for a Russian spy who sneaked into Microsoft back in 2010; the Russian state compsci research institution; and a Russian business called Advanced System Technology AO.

US persons are banned from doing business with any of the above.

Source: It was Russia wot did it: SolarWinds hack was done by Kremlin’s APT29 crew, say UK and US • The Register

Google Earth Now Shows Decades of Climate Change in Seconds

Google Earth has partnered with NASA, the U.S. Geological Survey, the EU’s Copernicus Climate Change Service, and Carnegie Mellon University’s CREATE Lab to bring users time-lapse images of the planet’s surface—24 million satellite photos taken over 37 years. Together they offer photographic evidence of a planet changing faster than at any time in millennia. Shorelines creep in. Cities blossom. Trees fall. Water reservoirs shrink. Glaciers melt and fracture.

“We can objectively see global warming with our own eyes,” said Rebecca Moore, director of Google Earth. “We hope that this can ground everyone in an objective, common understanding of what’s actually happening on the planet, and inspire action.”

Timelapse, the name of the new Google Earth feature, is the largest video on the planet, according to a statement from the company, requiring 2 million hours to process in cloud computers, and the equivalent of 530,000 high-resolution videos. The tool stitches together nearly 50 years of imagery from the U.S.’s Landsat program, which is run by NASA and the USGS. When combined with images from complementary European Sentinel-2 satellites, Landsat provides the equivalent of complete coverage of the Earth’s surface every two days. Google Earth is expected to update Timelapse about once a year.

The Timelapse images are stark. In Southwestern Greenland, warmer Atlantic waters and air temperatures are accelerating ice melt.

relates to Google Earth Now Shows Decades of Climate Change in Seconds
Claushavn, Greenland
Source: Google

Tree loss in Brazil in 2020 surged by a quarter over the prior year.

relates to Google Earth Now Shows Decades of Climate Change in Seconds
Mamoré River, Brazil
Source: Google

Solar farms are rising in China.

relates to Google Earth Now Shows Decades of Climate Change in Seconds
Longyangxia Solar Park, located in Gonghe County, Qinghai Province.
Source: Google

This image, below, illustrates what it took to make a viewable experience. The 24 million images had to be processed to remove clouds or other obstructions and then stitched together into the final product.

relates to Google Earth Now Shows Decades of Climate Change in Seconds
Twenty-four million satellite images from 1984 to 2020 were analyzed to identify and remove artifacts, like clouds.
Source: Google

“Now, our one, static snapshot of the planet”—Google Earth—“has become dynamic, providing ongoing visual evidence of Earth’s changes from climate and human behavior occurring across space and time, over four decades,” Moore said. “And this was made possible because of the U.S. government and European Union’s commitments to open and accessible data.”

Source: Google Earth Now Shows Decades of Climate Change in Seconds – Bloomberg

New Treatment Makes Teeth Grow Back

A new experimental treatment could someday give people a way to grow missing teeth, if early research on lab animals holds up.

Scientists at Japan’s Kyoto University and the University of Fukui developed a monoclonal antibody treatment that seems to trigger the body to grow new teeth, according to research published last month in the journal Science Advances. If upcoming experiments continue to work, it could eventually give us a way to regrow teeth lost in adulthood or those that were missing since childhood due to congenital conditions.

[…]

eventually the team found that blocking a gene called USAG-1 led to increased activity of Bone Morphogenic Protein (BMP), a molecule that determines how many teeth will grow in the first place, and allowed adult mice to regrow any that they were missing.

The experiment also worked on ferrets, which the researchers say is important because their teeth are far more humanlike than mouse teeth are.

“Ferrets are diphyodont animals with similar dental patterns to humans,” Kyoto researcher and lead study author Katsu Takahashi said in the press release. “Our next plan is to test the antibodies on other animals such as pigs and dogs.”

There’s still a long way to go before they reach human trials, but continued success in those upcoming trials would be a promising sign for the future of a clinical treatment that lets us naturally regrow our missing teeth.

Source: New Treatment Makes Teeth Grow Back

Northrop’s servicing robot extends the life of an orbiting satellite by five years

Intelsat’s IS-10-02 communications satellite was running low on fuel — it’s been in orbit since 2004, after all, and has already exceeded its original mission lifespan by five years. Thanks to Northrop Grumman’s Mission Extension Vehicle-2 (MEV-2), however, it gained another five years of life and will stay operational instead of being decommissioned. MEV-2 launched in August and has been making its way to the satellite in geosynchronous orbit since then. On Monday, it caught up to its target and clamped onto it to provide the IS-10-02 with more fuel.

According to TechCrunch, a representative described the robotic spacecraft as a “jetpack for the 10-02 satellite.” The spokesperson explained the docking process as follows:

“The MEV-2 docking system consists of a probe that we insert into the liquid apogee engine on the aft end of a satellite. Nearly 80% of satellites in orbit have this featuring, allowing the MEV service a variety of customers. The liquid apogee engine acts as a “cone to capture” to help guide the probe which once it passes through the throat of the engine, expands to capture the client satellite. The probe is then retracted pulling three stanchions, or feet, up against the launch adaptor ring, securely clamping the two vehicles together.”

This marks the first time a life-extension services vehicle was able to dock with an active satellite in its operational GEO orbital location. MEV-2’s predecessor, the MEV-1, clamped onto Intelsat’s IS-901 last year. That satellite was already out of fuel and was docked out of its original orbit at the time, though. As TechCrunch notes, Northrop Grumman had to ensure that MEV-2’s approach wouldn’t disrupt its target’s operation and orbit. By successfully doing so, the aerospace corporation proved that it’s possible to service active satellites, which means companies can potentially save millions by extending the life of their older space objects.

MEV-2 will stay with IS-10-02 before moving on to extend the life of another satellite. In addition to the MEV, the company is working on robotic vehicles that can do in-orbit repair, augmentation, assembly and inspection. Those vehicles will also be used to deliver life-extending pods to satellites to extend their mission lifespan without the need to remain docked with their targets. Northrop Grumman is hoping to launch both those technologies by 2024.

Source: Northrop’s servicing robot extends the life of an orbiting satellite by five years | Engadget

How to Keep Attackers From Locking You Out of WhatsApp

[…]

WhatsApp representatives told Forbes that the easiest way to protect yourself against this kind of an attack is to make sure you’ve associated an email address with your two-step verification process so the attacker won’t be able to spoof your identity. You can do that right now by pulling up WhatsApp, loading its Settings, tapping on Two-Step Verification, and inputting your email address (or checking to make sure you’ve already done so).

This isn’t going to block the attack per se, but it’ll make it a lot easier for WhatsApp’s customer service team to help you out should you find yourself in a “prevented from authenticating my account” feedback loop—which is what will happen if an attacker reaches out to WhatsApp posing as you, claiming that your account has been hacked and that WhatsApp should deactivate it. (You’ll then “receive” codes to revert the mistaken de-registration, only you won’t be able to input them because of the previous trick, which will have temporarily banned you for entering too many incorrect 2FA codes.)

[…]

Source: How to Keep Attackers From Locking You Out of WhatsApp

FBI deletes web shells from hundreds of compromised Microsoft Exchange servers before alerting admins

The FBI deleted web shells installed by criminals on hundreds of Microsoft Exchange servers across the United States, it was revealed on Tuesday.

The Feds were given approval by the courts to carry out the deletions, which occurred without first warning the servers’ owners, following the discovery and exploitation of critical vulnerabilities in the enterprise software.

Shortly after Microsoft raised the alarm early last month over the security holes in Exchange and provided fixes for the vulnerabilities, miscreants swarmed to exploit the programming blunders and hijack unpatched installations. (Certain groups were even breaking in Exchange servers via the holes before their existence was public knowledge.)

The FBI found hundreds of such compromised deployments with backdoors installed by one cyber-gang in particular, leading to agents asking the courts to allow them to go in and delete the malicious code. The court approved the action and the document was unsealed this week, 30 days later.

“Although many infected system owners successfully removed the web shells from thousands of computers, others appeared unable to do so, and hundreds of such web shells persisted unmitigated,” the Justice Department noted in an announcement. “Today’s operation removed one early hacking group’s remaining web shells, which could have been used to maintain and escalate persistent, unauthorized access to US networks.”

The FBI deleted the shells by issuing a command through the web shell to the server “which was designed to cause the server to delete only the web shell (identified by its unique file path),” it said. Critically, however, the Feds did not touch the servers themselves and so they remain unpatched and open to infiltration.

[…]

Source: FBI deletes web shells from hundreds of compromised Microsoft Exchange servers before alerting admins • The Register

What I very much like about this is that they got a court order approving the behaviour before going out and doing it.

$291 Adobe Cancelation Fee Sees Twitter Users Argue it’s ‘Morally Correct’ to Pirate Software

A $291 Adobe cancelation fee has provoked fierce criticism of the creative software company.

A post from a customer has gone viral on Twitter, after he discovered that he would have to pay nearly $300 to bring his Creative Cloud subscription to an end.

It has sparked a discussion about Adobe’s practices, with many others coming forward to say that they too have faced extremely steep cancelation fees when they’ve tried to cut ties with the company.

A screenshot uploaded to the micro-blogging site by Twitter user @Mrdaddguy showed that they faced a $291.45 fee to cancel their Adobe Creative Cloud plan.

At the time of publication the tweet has attracted more than 13,000 retweets, more than 4,000 quote tweets, and more than 70,000 likes.

Twitter users have been almost universally in agreement in their criticism of the company, with some describing the cancelation fee as “absurd”, “disgusting,” and likening it to being held hostage by the company.

“Adobe has been holding me hostage for the better part of a year on a free trial that magically converted to a yearlong subscription with a wild cancellation fee,” wrote Twitter user Laura Hudson. “Blink twice if they have you too.”

Some have weighed into the conversation by suggesting alternatives to Adobe’s suite of products, such as Clip Studio Paint, Procreate, Blender, Krita, Paint tool Sai, many of which are either free to use or available as one-time purchases.

Others, meanwhile, are arguing that Adobe’s penalty fees are so severe that it should be considered “morally correct” to pirate the company’s software in revenge.

“Adobe on their hands and knees begging us to pirate their software,” wrote Twitter user JoshDeLearner.

“This thread is a great reminder of why it’s morally correct to pirate Adobe products,” wrote Dozing Starlight. A multitude of similar tweets can be found here.

Source: $291 Adobe Cancelation Fee Sees Twitter Users Argue it’s ‘Morally Correct’ to Pirate Software – Newsweek

Clubhouse Data Leak – 1.3M SQL Database Leaked Online. Wait, they had 1.3M users? Doubt it

Days after scraped data from more than a billion Facebook and LinkedIn profiles, collectively speaking, was put for sale online, it looks like now it’s Clubhouse’s turn. The upstart platform seems to have experienced the same fate, with an SQL database containing 1.3 million scraped Clubhouse user records leaked for free on a popular hacker forum.

To see if any of your online accounts were exposed in previous security breaches, use our personal data leak checker with a library of 15+ billion breached records.

What was leaked?

The leaked database contains a variety of user-related information from Clubhouse profiles, including:

  • User ID
  • Name
  • Photo URL
  • Username
  • Twitter handle
  • Instagram handle
  • Number of followers
  • Number of people followed by the user
  • Account creation date
  • Invited by user profile name

[…]

Source: Clubhouse Data Leak – 1.3M SQL Database Leaked Online | CyberNews

I am surprised they have this many users. Clubhouse has a massive PR department but isn’t really relevant…

FSF doubles down on Richard Stallman’s return: Sure, he is ‘troubling for some’ but we need him, says org – doesn’t kneel for self entitled cancel culture idiots who can’t read Stallman’s actual quotes.

The Free Software Foundation (FSF) on Monday apologized for mishandling the announcement last month that founder Richard Stallman, or RMS, had been reelected to its board of directors – and published a statement from RMS both justifying his behavior and apologizing for it.

“FSF staff should have been informed and consulted first,” the FSF said. “The announcement by RMS at LibrePlanet was a complete surprise to staff, all those who worked so hard to organize a great event, to LibrePlanet speakers and to the exhibitors. We had hoped for a more inclusive and thoughtful process and we apologize that this did not occur.”

[…]

Source: FSF doubles down on Richard Stallman’s return: Sure, he is ‘troubling for some’ but we need him, says org • The Register

Your WhatsApp account can be suspended by anyone who has your phone number

It’s possible for an attacker to completely suspend your WhatsApp account, without any recourse for the individual user, and all they need is your phone number. At the time of writing there’s no solution for this issue.

This newly-discovered flaw uses two separate vectors. The attacker installs WhatsApp on a new device and enters your number to activate the chat service. They can’t verify it, because of course, the two-factor authentication system is sending the login prompts to your phone instead. After multiple repeated and failed attempts, your login is locked for 12 hours.

Here’s where the tricky part comes in: with your account locked, the attacker sends a support message to WhatsApp from their email address, claiming that their (your) phone has been lost or stolen, and that the account associated with your number needs to be deactivated. WhatsApp “verifies” this with a reply email, and suspends your account without any input on your end. The attacker can repeat the process several times in succession to create a semi-permanent lock on your account.

[…]

The attack is a proof-of-concept from a pair of security researchers, Luis Márquez Carpintero and Ernesto Canales Pereña, and was first reported by Forbes. The results are disturbing, but at the very least, this method can’t be used to actually gain access to an account, merely to block access by its legitimate owner. Confidential text messages and contacts are not exposed.

[…]

Source: Your WhatsApp account can be suspended by anyone who has your phone number

FLoC, The Ad-Targeting Tech Google Plans To Drop On Us All might be using you as a test subject to spy on closely in Chrome

About two weeks ago, millions of Google Chrome users were signed up for an experiment they never agreed to be a part of. Google had just launched a test run for Federated Learning of Cohorts—or FLoC–a new kind of ad-targeting tech meant to be less invasive than the average cookie. In a blog post announcing the trial, the company noted that it would only impact a “small percentage” of random users across ten different countries, including the US, Mexico, and Canada, with plans to expand globally as the trials run on.

These users probably won’t notice anything different when they click around on Chrome, but behind the scenes, that browser is quietly keeping a close eye on every site they visit and ad they click on. These users will have their browsing habits profiled and packaged up, and shared with countless advertisers for profit. Sometime this month, Chrome will give users an option to opt-out of this experiment, according to Google’s blog post—but as of right now, their only option is to block all third-party cookies in the browser.

That is if they even know that these tests are happening in the first place. While I’ve written my fair share about FLoC up until this point, the loudest voices I’ve seen pipe up on the topic are either marketing nerds, policy nerds, or policy nerds that work in marketing. This might be due to the fact that—aside from a few blog posts here or there—the only breadcrumbs Google’s given to people looking to learn more about FLoC are inscrutable pages of code, an inscrutable GitHub repo, and inscrutable mailing lists. Even if Google bothered asking for consent before enrolling a random sample of its Chrome user base into this trial, there’s a good chance they wouldn’t know what they were consenting to.

(For the record, you can check whether you’ve been opted into this initial test using this handy tool from the Electronic Frontier Foundation.)

[…]

The trackers that FLoC is meant to replace are known as “third-party cookies.” We have a pretty in-depth guide to the way this sort of tech works, but in a nutshell: these are snippets of code from adtech companies that websites can bake into the code underpinning their pages. Those bits of code monitor your on-site behavior—and sometimes other personal details—before the adtech org behind that cookie beams that data back to its own servers.

[…]

The catch is that Google still has all that juicy user-level data because it controls Chrome. They’re also still free to keep doing what they’ve always been doing with that data: sharing it with federal agencies, accidentally leaking it, and, y’know, just being Google.

[…]

“Isn’t that kind of… anti-competitive?”

It depends on who you ask. Competition authorities in the UK certainly think so, as do trade groups here in the US. It’s also been wrapped up into a Congressional probe, at least one class action, and a massive multi-state antitrust case spearheaded by Texas Attorney General Ken Paxton. Their qualms with FLoC are pretty easy to understand. Google already controls about 30% of the digital ad market in the US, just slightly more than Facebook—the other half of the so-called Duopoly—that controls 25% (for context, Microsoft controls about 4%).

While that dominance has netted Google billions upon billions of dollars per year, it’s recently netted multiple mounting antitrust investigations against the company, too. And those investigations have pretty universally painted a picture of Google as a blatant autocrat of the ad-based economy, and one that largely got away with abhorrent behavior because smaller rivals were too afraid—or unable—to speak up. This is why many of them are speaking up about FLoC now.

“But at least it’s good for privacy, right?”

Again, it depends who you ask! Google thinks so, but the EFF sure doesn’t. In March, the EFF put out a detailed piece breaking down some of the biggest gaps in FLoC’s privacy promises. If a particular website prompts you to give up some sort of first-party data—by having you sign up with your email or phone number, for example—your FLoC identifier isn’t really anonymous anymore.

Aside from that hiccup, the EFF points out that your FLoC cohort follows you everywhere you go across the web. This isn’t a big deal if my cohort is just “people who like to reupholster furniture,” but it gets really dicey if that cohort happens to inadvertently mold itself around a person’s mental health disorder or their sexuality based on the sites that person browses. While Google’s pledged to keep FloC’s from creating cohorts based on these sorts of “sensitive categories,” the EFF again pointed out that Google’s approach was riddled with holes.

[…]

Source: What You Need To Know About FLoC, The Ad-Targeting Tech Google Plans To Drop On Us All

Feature bloat: Psychology boffins find people tend to add elements to solve a problem rather than take things away

Scientists working on the psychology of problem solving may have hit upon why things always seem to get more complicated.

A newly uncovered heuristic – a mental shortcut or rule of thumb – shows bias towards adding features to find a solution, rather than subtracting existing features.

A simple experiment in Lego has provided some insight into the phenomenon.

A team led by Gabrielle Adams, assistant professor of public policy and psychology at the University of Virginia, presented 197 participants with a Lego tower, four Duplo blocks high, six-by-six nodules on the horizontal plane. Above the tower was an 8×8 flat roof supported in the corner by a single 2×2 block.

The objective was to stabilise the roof so it would not fall onto a figure below when a brick was placed on top of it.

All the participants were told they could alter the structure however they wanted to. A control group was told “each piece that you add costs ten cents” while a “subtraction-cue condition” group was told “each piece that you add costs 10 cents but removing pieces is free.”

The simplest and cheapest solution was to remove the single block supporting the roof and attach it directly to the tower. But only 41 per cent of participants went with this solution. The remainder decided to add three bricks to support the roof. However, for the group given the subtraction-cue condition, 61 per cent of participants took the first option.

Adams and team also studied how participants make a 10×10 grid of green and white boxes symmetrical on a computer screen. They found people tend to add green boxes to the emptier half of the grid rather than removing them from the fuller half, even when doing the latter would have been more efficient.

The researcher also studied how people completed this task under “cognitive load.” While working on the task, they were asked to press the “F” key whenever they saw a 5 in a string of numerals passing across the top of the screen. The result was that people systematically default to searching for additive transformations, and consequently overlook subtractive transformations.

[P]eople are biased towards creating solutions by adding features rather than taking them away…. A study also observed the tendency at an organisational level

The researchers seem to have discovered a heuristic that people are biased towards creating solutions by adding features rather than taking them away. A study also observed the tendency at an organisational level.

For example, looking at university archives, they found that an incoming president had requested suggestions for changes that would allow the institution to better serve its students and community. Only 11 per cent of the responses involved removing an existing regulation, practice or programme.

corner of a building. When a brick is placed on top, the roof will collapse onto the figurine. The researchers asked study participants to stabilise the structure so that it would support the brick above the figurine, and analysed the ways in which participants solved the problem.

Click to enlarge

The research, published in Nature, argued that the discovery could have far-reaching ramifications.

“As with many heuristics, it is possible that defaulting to a search for additive ideas often serves its users well,” the paper said. “However, the tendency to overlook subtraction may be implicated in a variety of costly modern trends, including overburdened minds and schedules, increasing red tape in institutions and humanity’s encroachment on the safe operating conditions for life on Earth.

“If people default to adequate additive transformations – without considering comparable (and sometimes superior) subtractive alternatives – they may be missing opportunities to make their lives more fulfilling, their institutions more effective and their planet more liveable.” ®

Source: Feature bloat: Psychology boffins find people tend to add elements to solve a problem rather than take things away • The Register

Real-time dialogue between experimenters and dreamers during REM sleep

 Here we show that individuals who are asleep and in the midst of a lucid dream (aware of the fact that they are currently dreaming) can perceive questions from an experimenter and provide answers using electrophysiological signals. We implemented our procedures for two-way communication during polysomnographically verified rapid-eye-movement (REM) sleep in 36 individuals. Some had minimal prior experience with lucid dreaming, others were frequent lucid dreamers, and one was a patient with narcolepsy who had frequent lucid dreams. During REM sleep, these individuals exhibited various capabilities, including performing veridical perceptual analysis of novel information, maintaining information in working memory, computing simple answers, and expressing volitional replies. Their responses included distinctive eye movements and selective facial muscle contractions, constituting correctly answered questions on 29 occasions across 6 of the individuals tested. These repeated observations of interactive dreaming, documented by four independent laboratory groups, demonstrate that phenomenological and cognitive characteristics of dreaming can be interrogated in real time.

Source: (PDF) Real-time dialogue between experimenters and dreamers during REM sleep

Actor in Hollywood Ponzi Scheme “sold” Netflix exculsives for $690 million

Zachary Horwitz never made it big on the Sunset Strip — there was the uncredited part in Brad Pitt’s “Fury” and a host of roles in low-budget thrillers and horror flicks. But federal charges suggest he had acting talent, duping several financial firms out of hundreds of millions of dollars and enabling him to live the Hollywood dream after all.

That meant chartered flights and a $6 million mansion — replete with wine cellar and home gym. Horwitz even included a bottle of Johnnie Walker Blue Label, which retails for more than $200, as a gift to investors along with his company’s “annual report.”

The claims are outlined in legal documents that U.S. prosecutors and the Securities and Exchange Commission released this week alleging Horwitz, 34, was running a massive Ponzi scheme. His scam: a made-up story that he had exclusive deals to sell films to Netflix Inc. and HBO. Dating back to 2014, the SEC said he raised a shocking $690 million in fraudulent funds. On Tuesday, Horwitz was arrested.

Horwitz, who went by the screen name “Zach Avery,” used fabricated contracts and fake emails to swindle at least five firms, according to the government. Investors were issued promissory notes through his firm 1inMM Capital to acquire the rights to movies that would be sold to Netflix and HBO for distribution in Latin America, Australia, New Zealand and other locations.

The claims of business relationships with the media companies were bogus, according to prosecutors, with a Netflix executive going so far as to send a cease-and-desist order to Horwitz and his attorney in February.

While Horwitz promised returns in excess of 35%, he was actually relying on new investors to pay off old ones, according to the SEC, which won a court order to freeze his assets. Ryan Hedges, Horwitz’s attorney, didn’t respond to requests for comment.

[…]

Source: Actor in Hollywood Ponzi Scheme Sent Scotch With Annual Reports – Bloomberg

Apple Never Made iMessage for Android to Lock Users In: Epic v Apple

As part of the ongoing legal battle between Fortnite maker Epic and Apple, some new information has come to light confirming the most annoying thing about Apple’s iMessage app: that Apple could make a cross-platform version of iMessage for Android phones, but it won’t because it would be bad for business.

This info comes from testimony that appears in Epic’s brief against Apple, which was posted recently on Reddit. In the document, there are several statements from well-known Apple execs describing the reasons why Apple never made a cross-platform version of iMessage for Android devices.

In one quote dating back to 2013, Eddy Cue—who is now Apple’s senior vice president for internet software and services—said that Apple “could have made a version [of iMessage] on Android that worked with iOS,” providing the possibility that “users of both platforms would have been able to exchange messages with one another seamlessly.”

Sadly, it seems multiple Apple execs were concerned that doing so would make it too easy for iPhone owners to leave the Apple ecosystem, with Apple’s senior vice president of software engineering, Craig Federighi, having said, “iMessage on Android would simply serve to remove [an] obstacle to iPhone families giving their kids Android phones”—a sentiment Epic’s brief says was also shared by Phil Schiller, who back then was in charge of overseeing Apple’s App Store.

It seems these sentiments have been known within Apple for quite some time. The brief describes a 2016 comment from a former Apple employee who said “the #1 most difficult [reason] to leave the Apple universe app is iMessage … iMessage amounts to serious lock-in,” with Schiller having affirmed the comment by saying, “moving iMessage to Android will hurt us more than help us, this email illustrates why.”

[…]

Source: Apple Never Made iMessage for Android to Lock Users In: Epic v Apple

Alibaba antitrust investigation: Beijing slaps e-commerce giant Alibaba with record US$2.8 billion fine in landmark case. US antitrust still going nowhere.

China’s antitrust regulators slapped a record fine on one of the country’s largest technology conglomerates, closing a months-long investigation that began

last Christmas Eve

and setting the precedent for the government to use anti-monopoly rules to regulate the country’s Big Tech.

Alibaba Group Holding, the world’s largest e-commerce company and owner of this newspaper, was fined 18.2 billion yuan (US$2.8 billion) by the State Administration for Market Regulation (SAMR).

The Hangzhou-based company “abused its dominant market position in China’s online retail platform service market since 2015 by forcing online merchants to open stores or take part in promotions on its platforms,” compelling the market to “

pick one from two

” in a breach of the country’s anti-monopoly law, the regulator said on Saturday.

Alibaba was ordered to correct its misconduct, and pay a fine equivalent to 4 per cent of its total 2019 revenue. The fine was nearly three times

the 6.1 billion yuan penalty paid by Qualcomm

, the world’s largest supplier of mobile chips, in 2015.

[…]

The antitrust investigation of Alibaba was part of the Chinese government’s effort to tame the unfettered growth of the country’s tech behemoths, and to ringfence financial security and prevent risk amid a period of slowing economic growth during the coronavirus pandemic. It has been widely watched, for ramifications that could potentially affect the entire ecosystem of businesses and economy centred around the internet.

The hefty fine was aimed at promoting the “healthy and continuous development of the country’s internet industry” and was by no means a denigration of the “important role of internet platforms in economic and social development,” and shows no change in the state’s “attitude of supporting internet platforms,” according to a commentary by the People’s Daily, the mouthpiece newspaper of the ruling Communist Party.

[…]

Source: Alibaba antitrust investigation: Beijing slaps e-commerce giant with record US$2.8 billion fine in landmark case | South China Morning Post