The Linkielist

Linking ideas with the world

The Linkielist

About Robin Edgar

Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft

Buggy chkdsk in Windows update that caused boot failures and damaged file systems has been fixed

A Windows 10 update rolled out by Microsoft contained a buggy version of chkdsk that damaged the file system on some PCs and made Windows fail to boot.

The updates that included the fault are KB4586853 and KB4592438. Microsoft’s notes on these updates now incorporate a warning: “A small number of devices that have installed this update have reported that when running chkdsk /f, their file system might get damaged and the device might not boot.”

The notes further reveal: “This issue is resolved and should now be prevented automatically on non-managed devices,” meaning PCs that are not enterprise-managed. On managed PCs Microsoft recommended a group policy setting that rolls back the faulty update. If there are devices that have already hit the issue, Microsoft has listed troubleshooting steps which it says should fix the problem.

The chkdsk utility itself is not listed in the files that are patched by these updates, suggesting that the problem is with other system files called by chkdsk.

[…]

Source: Buggy chkdsk in Windows update that caused boot failures and damaged file systems has been fixed • The Register

No, Cellebrite cannot ‘break Signal encryption.’

Yesterday, the BBC ran a story with the factually untrue headline, “Cellebrite claimed to have cracked chat app’s encryption.” This is false. Not only can Cellebrite not break Signal encryption, but Cellebrite never even claimed to be able to.

Since we weren’t actually given the opportunity to comment in that story, we’re posting this to help to clarify things for anyone who may have seen the headline.

 

This world of ours

Last week, Cellebrite posted a pretty embarrassing (for them) technical article to their blog documenting the “advanced techniques” they use to parse Signal on an Android device they physically have with the screen unlocked.

This is a situation where someone is holding an unlocked phone in their hands and could simply open the app to look at the messages in it. Their post was about doing the same thing programmatically (which is equally simple), but they wrote an entire article about the “challenges” they overcame, and concluded that “…it required extensive research on many different fronts to create new capabilities from scratch.”

[…]

It’s also hard to know how such an embarrassing turn of events became anything other than a disaster for Cellebrite, but several news outlets, including the BBC, published articles about Cellebrite’s “success,” despite the existence of clarifying information already available online.

What really happened

  1. If you have your device, Cellebrite is not your concern. It is important to understand that any story about Cellebrite Physical Analyzer starts with someone other than you physically holding your device, with the screen unlocked, in their hands. Cellebrite does not even try to intercept messages, voice/video, or live communication, much less “break the encryption” of that communication. They don’t do live surveillance of any kind.
  2. Cellebrite is not magic. Imagine that someone is physically holding your device, with the screen unlocked, in their hands. If they wanted to create a record of what’s on your device right then, they could simply open each app on your device and take screenshots of what’s there. This is what Cellebrite Physical Analyser does. It automates the process of creating that record. However, because it’s automated, it has to know how each app is structured, so it’s actually less reliable than if someone were to simply open the apps and manually take the screenshots. It is not magic, it is mediocre enterprise software.
  3. Cellebrite did not “accidentally reveal” their secrets. This article, and others, were written based on a poor interpretation of a Cellebrite blog post about adding Signal support to Cellebrite Physical Analyzer. Cellebrite posted something with a lot of detail, then quickly took it down and replaced it with something that has no detail. This is not because they “revealed” anything about some super advanced technique they have developed (remember, this is a situation where someone could just open the app and look at the messages). They took it down for the exact opposite reason: it made them look bad. Articles about this post would have been more appropriately titled “Cellebrite accidentally reveals that their technical abilities are as bankrupt as their function in the world.”
  4. […]

Source: Signal >> Blog >> No, Cellebrite cannot ‘break Signal encryption.’

Dozens sue Amazon’s Ring after camera hack leads to threats and racial slurs – why do you have one anyway?

Dozens of people who say they were subjected to death threats, racial slurs, and blackmail after their in-home Ring smart cameras were hacked are suing the company over “horrific” invasions of privacy.

A new class action lawsuit, which combines a number of cases filed in recent years, alleges that lax security measures at Ring, which is owned by Amazon, allowed hackers to take over their devices. Ring provides home security in the form of smart cameras that are often installed on doorbells or inside people’s homes.

The suit against Ring builds on previous cases, joining together complaints filed by more than 30 people in 15 families who say their devices were hacked and used to harass them. In response to these attacks, Ring “blamed the victims, and offered inadequate responses and spurious explanations”, the suit alleges. The plaintiffs also claim the company has also failed to adequately update its security measures in the aftermath of such hacks.

[…]

The suit outlines examples of hackers taking over Ring cameras, screaming obscenities, demanding ransoms, and threatening murder and sexual assault.

One Ring user says he was asked through his camera as he watched TV one night, “What are you watching?” Another alleges his children were addressed by an unknown hacker through the device, who commented on their basketball play and encouraged them to approach the camera.

In one case, an older woman at an assisted living facility was allegedly told “tonight you die” and sexually harassed through the camera. Due to the distress caused by the hack she ultimately had to move back in with her family, feeling unsafe in the facility where she once lived.

[…]

Repeatedly, Ring blamed victims for not using sufficiently strong passwords, the suit claims. It says Ring should have required users to establish complicated passwords when setting up the devices and implement two-factor authentication, which adds a second layer of security using a second form of identification, such as a phone number.

However, as the lawsuit alleges, Ring was hacked in 2019 – meaning the stolen credentials from that breach may have been used to get into users’ cameras. That means the hacks that Ring has allegedly blamed on customers may have been caused by Ring itself. A spokesperson said the company did not comment on ongoing litigation.

The lawsuit also cites research from the Electronic Frontier Foundation and others that Ring violates user privacy by using a number of third-party trackers on its app.

The suit said that, at present, Ring “has not sufficiently improved its security practices or responded adequately to the ongoing threats its products pose to its customers”. Security and privacy experts have also criticized Ring’s response.

[…]

In addition to hacking concerns, Ring has faced increasing criticism for its growing surveillance partnership with police forces. Ring has now created law enforcement partnerships, which allow users to send footage and photos to police, in more than 1,300 cities.

“Ring’s surveillance-based business model is fundamentally incompatible with civil rights and democracy,” Greer said. “These devices, and the thinking behind them, should be melted down and never spoken of again.”

Source: Dozens sue Amazon’s Ring after camera hack leads to threats and racial slurs | Amazon | The Guardian

Why on Earth Is Someone Stealing Unpublished Book Manuscripts?

Earlier this month, the book industry website Publishers Marketplace announced that Little, Brown would be publishing “Re-Entry,” a novel by James Hannaham about a transgender woman paroled from a men’s prison. The book would be edited by Ben George.

Two days later, Mr. Hannaham got an email from Mr. George, asking him to send the latest draft of his manuscript. The email came to an address on Mr. Hannaham’s website that he rarely uses, so he opened up his usual account, attached the document, typed in Mr. George’s email address and a little note, and hit send.

“Then Ben called me,” Mr. Hannaham said, “to say, ‘That wasn’t me.’”

Mr. Hannaham was just one of countless targets in a mysterious international phishing scam that has been tricking writers, editors, agents and anyone in their orbit into sharing unpublished book manuscripts. It isn’t clear who the thief or thieves are, or even how they might profit from the scheme. High-profile authors like Margaret Atwood and Ian McEwan have been targeted, along with celebrities like Ethan Hawke. But short story collections and works by little-known debut writers have been attacked as well, even though they would have no obvious value on the black market.

In fact, the manuscripts do not appear to wind up on the black market at all, or anywhere on the dark web, and no ransoms have been demanded. When copies of the manuscripts get out, they just seem to vanish. So why is this happening?

[…]

Whoever the thief is, he or she knows how publishing works, and has mapped out the connections between authors and the constellation of agents, publishers and editors who would have access to their material. This person understands the path a manuscript takes from submission to publication, and is at ease with insider lingo like “ms” instead of manuscript.

Emails are tailored so they appear to be sent by a particular agent writing to one of her authors, or an editor contacting a scout, with tiny changes made to the domain names — like penguinrandornhouse.com instead of penguinrandomhouse.com, an “rn” in place of an “m” — that are masked, and so only visible when the target hits reply.

“They know who our clients are, they know how we interact with our clients, where sub-agents fit in and where primary agents fit in,” said Catherine Eccles, owner of a literary scouting agency in London. “They’re very, very good.”

This phishing exercise began at least three years ago, and has targeted authors, agents and publishers in places like Sweden, Taiwan, Israel and Italy. This year, the volume of these emails exploded in the United States, reaching even higher levels in the fall around the time of the Frankfurt Book Fair, which, like most everything else this year, was held online.

[…]

Often, these phishing emails make use of public information, like book deals announced online, including on social media. Ms. Sweeney’s second book, however, hadn’t yet been announced anywhere, but the phisher knew about it in detail, down to Ms. Sweeney’s deadline and the names of the novel’s main characters.

[…]

Ms. Sweeney’s first book was a best seller, so she, like well-known authors Jo Nesbo and Michael J. Fox, may be an obvious choice. But the scammer has also requested experimental novels, short story collections and recently sold books by first-time authors. Meanwhile, Bob Woodward’s book “Rage,” which came out in September, was never targeted, Mr. Woodward said.

“If this were just targeting the John Grishams and the J.K. Rowlings, you could come up with a different theory,” said Dan Strone, chief executive of the literary agency Trident Media Group. “But when you’re talking about the value of a debut author, there is literally no immediate value in putting it on the internet, because nobody has heard of this person.”

One of the leading theories in the publishing world, which is rife with speculation over the thefts, is that they are the work of someone in the literary scouting community. Scouts arrange for the sale of book rights to international publishers as well as to film and television producers, and what their clients pay for is early access to information — so an unedited manuscript, for example, would have value to them.

“The pattern it resembles is what I do,” said Kelly Farber, a literary scout, “which is I get everything.”

Cybercriminals regularly trade pirated movies and books on the dark web, alongside stolen passwords and Social Security numbers. Yet a broad search of dark web channels, like the Pirate Warez website, an underground forum for pirated goods, didn’t yield anything meaningful when searching for “manuscripts,” “unpublished” or “upcoming book,” or the titles of several purloined manuscripts.

[…]

Apparently nobody has posted them online out of spite or tried to entice eager fans to turn over their credit card information in exchange for an early glimpse. There have been no ransom demands of the authors by extortionists threatening to dump the authors’ years of work online if they don’t pay up. In this absence, and with no clear monetization strategy to the thief’s or thieves’ efforts, cybersecurity experts have been left scratching their heads.

[…]

“The trouble they went to — fabricating conversations with trusted people and sort of acting as if they are filling in the target on those conversations to grant themselves credibility — definitely demonstrates very specific targeting, and probably more effort than we see in most phishing emails,” said Roman Sannikov, a threat analyst at Recorded Future whom The Times asked to review the emails.

[…]

Source: Why on Earth Is Someone Stealing Unpublished Book Manuscripts? – The New York Times

Mysterious water rich asteroid the size of a dwarf planet is lurking in our solar system

There’s a giant asteroid somewhere out in the solar system, and it hurled a big rock at Earth.

The evidence for this mystery space rock comes from a diamond-studded meteor that exploded over Sudan in 2008.

NASA had spotted the 9-ton (8,200 kilograms), 13-foot (4 meters) meteor heading toward the planet well before impact, and researchers showed up in the Sudanese desert to collect an unusually rich haul of remains. Now, a new study of one of those meteorites suggests that the meteor may have broken off of a giant asteroid — one more or less the size of the dwarf planet Ceres, the largest object in the asteroid belt.

[…]

“Some of these meteorites are dominated by minerals providing evidence for exposure to water at low temperatures and pressures,” study co-author Vicky Hamilton, a planetary geologist at the Southwest Research Institute in Boulder, Colorado, said in the statement. “The composition of other meteorites points to heating in the absence of water.”

[…]

Amphibole is common enough on Earth, but it’s only appeared once before in trace amounts in a meteorite known as Allende — the largest carbonaceous chondrite ever found, which fell in Chihuahua, Mexico, in 1969

The high amphibole content of AhS suggests the fragment broke off a parent asteroid that’s never left meteorites on Earth before.

And samples brought back from the asteroids Ryugu and Bennu by Japan’s Hayabusa2 and NASA’s OSIRIS-REx probes, respectively, will likely reveal more space rock minerals that rarely turn up in meteorites, the researchers wrote in their study.

Maybe some types of carbonaceous chondrite just don’t survive the plunge through the atmosphere as well, Hamilton said, and that’s kept scientists from studying a flavor of chondrite that might be more common in space.

[…]

Source: Mysterious asteroid the size of a dwarf planet is lurking in our solar system | Live Science

French Film Company Somehow Trademarks ‘Planet’, Goes After Environmental NGOs For Using The Word

We cover a great many ridiculous and infuriating trademark disputes here, but it’s always the disputes around overly broad terms that never should have been trademarked to begin with that are the most frustrating. And that most irritating of those is when we get into geographic terms that never should be locked up by any single company or entity. Examples in the past have included companies fighting over who gets to use the name of their home city of “Detroit“, or when grocer Iceland Foods got so aggressive in its own trademark enforcement that the — checks notes — nation of Iceland had to seek to revoke the company’s EU trademark registration.

While it should be self-evident how antithetical to the purpose of trademark laws are to even approve of these kinds of marks, I will say that I didn’t see it coming that a company at some point would attempt to play trademark bully over the “planet.”

Powerful French entertainment company Canal Plus trademarked the term in France, but environmental groups are pushing back, saying they should be allowed to use the word “planet” to promote their projects to save it. Multiple cases are under examination by France’s intellectual property regulator INPI, including one coming to a head this week.

Canal Plus argues that the groups’ use of the terms “planete” in French, or “planet” in English, for marketing purposes violates its trademarks, registered to protect its Planete TV channels that showcase nature documentaries.

That this dispute is even a thing raises questions. Why in the world (heh) would any trademark office approve a mark solely on the word “planet”. Such a registration violates all kinds of rules and norms, explicit and otherwise. Geographic terms are supposed to have a high bar for trademark approval. Single word marks not inherently creative typically do as well. And, when trademarks for either are approved, they are typically done so in very narrow terms. That EUIPO somehow managed to approve a trademark that caused a film company to think it can sue or bully NGOs focused on environmental issues for using the word for the rock we all live on together should ring as absurd to anyone who finds out about it.

Certainly it did to those on the other end of Canal Plus’ bullying, as they seemed to think the whole thing was either a joke or attempt at fraud.

The head of environmental group Planete Amazone, Gert-Peter Bruch, thought it was a hoax when he first received a mail from Canal Plus claiming ownership of the planet brand.

[…]

But, as we often note, trademark bullying tends to work. Bruch’s organization is hammering out a deal with Canal Plus in an effort to keep using the word “planet.” That shouldn’t have to occur, but it is. Other groups are waiting on a ruling from the French National Intellectual Property Institute in the hopes that someone somewhere will be sane about all of this.

Source: French Film Company Somehow Trademarks ‘Planet’, Goes After Environmental NGOs For Using The Word | Techdirt

iPhone security flaw let spies hack dozens of Al Jazeera journalists using NSO tools

Journalists appear to have fallen prone to a particularly sophisticated digital espionage campaign. According to the Guardian, Citizen Lab has discovered that operators using NSO Group software, nicknamed Kismet, hacked the iPhones of 37 journalists (most from Al Jazeera) using an iMessage vulnerability that had been present for roughly a year. The zero-click attacks left no trace and would have allowed access to passwords, microphone audio and even snapping photos.

The exact motivations aren’t clear, but there were four operators that appear to have origins in Saudi Arabia and the United Arab Emirates and, in at least two cases, acted on the government’s behalf. One victim, Al Araby’s Rania Dridi, believed she might have been a target due to her discussions of women’s rights and her link to an outspoken critic of Saudi Arabia and the UAE. One target reportedly received spyware links like those used to snoop on UAE activist Ahmed Mansoor in 2016.

The exploit doesn’t appear to work in iOS 14.

Source: iPhone security flaw let spies hack dozens of Al Jazeera journalists | Engadget

Second hacking team was targeting SolarWinds at time of big breach, at least March

A second hacking group, different from the suspected Russian team now associated with the major SolarWinds data breach, also targeted the company’s products earlier this year, according to a security research blog by Microsoft.

“The investigation of the whole SolarWinds compromise led to the discovery of an additional malware that also affects the SolarWinds Orion product but has been determined to be likely unrelated to this compromise and used by a different threat actor,” the blog said.

Security experts told Reuters this second effort is known as “SUPERNOVA.” It is a piece of malware that imitates SolarWinds’ Orion product but it is not “digitally signed” like the other attack, suggesting this second group of hackers did not share access to the network management company’s internal systems.

It is unclear whether SUPERNOVA has been deployed against any targets, such as customers of SolarWinds. The malware appears to have been created in late March, based on a review of the file’s compile times.

The new finding shows how more than one sophisticated hacking group viewed SolarWinds, an Austin, Texas-based company that was not a household name until this month, as an important gateway to penetrate other targets.

Source: Second hacking team was targeting SolarWinds at time of big breach | Reuters

Microsoft Blog: Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers

Physicists Made an Insanely Precise Clock That Keeps Time Using Entanglement

Nothing keeps time like the beating heart of an atom. But even the crisp tick-tock of a vibrating nucleus is limited by uncertainties imposed by the laws of quantum mechanics.

Several years ago, researchers from MIT and the University of Belgrade in Serbia proposed that quantum entanglement could push clocks beyond this blurry boundary.

Now, we have a proof of concept in the form of an experiment. Physicists connected together a cloud of ytterbium-171 atoms with streams of photons reflected from a surrounding hall of mirrors and measured the timing of their tiny wiggles.

Their results show that entangling atoms in this way could speed up the time-measuring process of atomic nuclei clocks, making them more precise than ever. In principle, a clock based on this new approach would lose just 100 milliseconds since the dawn of time itself.

[…]

In this case, the team found entanglement made the measurement process roughly three times faster compared with clocks acting at the SQL.

That might not seem all that dramatic, but a speed boost could be just the thing we need to study some of the more subtle influences the Universe has on time.

“As the Universe ages, does the speed of light change? Does the charge of the electron change?” says lead researcher Vladan Vuletic from MIT.

“That’s what you can probe with more precise atomic clocks.”

It could even allow us to find the point at which general relativity falls apart, pointing to new physics that connects the defined curvature of space-time with the uncertain nature of quantum fields. Or allow us to better measure the fine time-warping characteristics of dark matter.

Source: Physicists Made an Insanely Precise Clock That Keeps Time Using Entanglement

Plants can be larks or night owls just like us

Plants have the same variation in body clocks as that found in humans, according to new research that explores the genes governing circadian rhythms in plants.

The research shows a single letter change in their DNA code can potentially decide whether a plant is a lark or a night owl. The findings may help farmers and crop breeders to select with clocks that are best suited to their location, helping to boost yield and even the ability to withstand .

[…]

To investigate the genetic basis of these local differences, the team examined varying in Swedish Arabidopsis plants to identify and validate genes linked to the changing tick of the clock.

Dr. Hannah Rees, a postdoctoral researcher at the Earlham Institute and author of the paper, said: “A plant’s overall health is heavily influenced by how closely its circadian clock is synchronised to the length of each day and the passing of seasons. An accurate body clock can give it an edge over competitors, predators and pathogens.

[..]

The team studied the genes in 191 different varieties of Arabidopsis obtained from across the whole of Sweden. They were looking for tiny differences in genes between these plants which might explain the differences in circadian function.

Their analysis revealed that a single DNA base-pair change in a specific gene—COR28—was more likely to be found in plants that flowered late and had a longer period length. COR28 is a known coordinator of flowering time, freezing tolerance and the ; all of which may influence local adaptation in Sweden.

“It’s amazing that just one base-pair change within the sequence of a single gene can influence how quickly the clock ticks,” explained Dr. Rees.

The scientists also used a pioneering delayed fluorescence imaging method to screen plants with differently-tuned circadian clocks. They showed there was over 10 hours difference between the clocks of the earliest risers and latest phased plants—akin to the plants working opposite shift patterns. Both geography and the genetic ancestry of the plant appeared to have an influence.

[…]

Source: Plants can be larks or night owls just like us

Microsoft (MSFT) Is Designing Its Own Chips in Move Away From Intel (INTC)

Microsoft Corp. is working on in-house processor designs for use in server computers that run the company’s cloud services, adding to an industrywide effort to reduce reliance on Intel Corp.’s chip technology.

The world’s largest software maker is using Arm Ltd. designs to produce a processor that will be used in its data centers, according to people familiar with the plans. It’s also exploring using another chip that would power some of its Surface line of personal computers. The people asked not to be identified discussing private initiatives. Intel’s stock dropped 6.3% to close at $47.46 in New York, leaving it down 21% this year.

The move is a major commitment by Microsoft to supplying itself with the most important piece of the hardware it uses. Cloud-computing rivals such as Amazon.com Inc. are already well down the road with similar efforts. They’ve argued their chips are better suited to some of their needs, bringing cost and performance advantages over off-the-shelf silicon primarily provided by Intel.

[…]

AMD is the second-largest maker of chips that run PCs and it’s been staging a comeback in the server market after being largely shut out by Intel for most of the last decade. AMD stock declined 1% on Friday. Xilinx Inc., another chipmaker that AMD is acquiring, slipped 1.8%.

[…]

“The incredible demand for computing fueled by new workloads like AI is driving more silicon experimentation in the cloud. Building on decades of x86 ecosystem innovation, we are committed to providing customers the world’s best CPUs and new products from GPUs to AI chips,” Intel said in a statement. “In this expanding market, we expect to gain share in many areas like AI training, 5G networks, graphics and autonomous driving.”

Source: Microsoft (MSFT) Is Designing Its Own Chips in Move Away From Intel (INTC) – Bloomberg

This spells big trouble for Intel as the tech giants are all pushing to build their own chips in house

Amazon and Apple Are Powering a Shift Away From Intel’s Chips

Forget servers; One day Facebook, Google and other web giants will make their own custom chips (2013 article)

The Tech Monopolies Go Vertical

 

Space Force Troops Finally Have A Name: Guardians

he fledgling U.S. Space Force has announced the name by which its members will be called: Guardians. This is one of the last remaining organizational changes for America’s newest branch to make to give it a distinct from its parent, the U.S. Air Force. The service already has its own unique unit designations, insignias and uniform devices, as well as a new motto, Semper Supra, or Always Above.

Vice President Mike Pence announced the Guardians moniker at a gathering at the White House on Dec. 18, 2020, with Space Force head General John Raymond, Secretary of the Air Force Barbara Barrett, and Acting Secretary of Defense Chris Miller also in attendance. This comes just days before the first anniversary of the service’s founding on Dec. 20 of last year. The Space Force’s Guardians will now join the U.S. Army’s Soldiers, the U.S. Navy’s Sailors, the U.S. Air Force’s Airmen, and, well, the U.S. Marine Corps’ Marines.

[…]

This is hardly the first time the general public has made references to popular media when talking about the Space Force. As Walter Shaub, former Director of the Office of Government Ethics, noted on Twitter after the name’s announcement, there have already been a number of Star Trek references when it comes to the Space Force, generally related to its heavy use of delta symbols in its official insignias and other devices, which are very visually reminiscent of the Starfleet Command logo from that fictional universe.

Space Force

A new Space Force Space Staff uniform badge with a prominent delta motif that was unveiled earlier in December 2020.

With the Guardian’s name in hand, one of the few remaining decisions Space Force has to make with regards to how to distinguish itself from the Air Force, as well as the other service, is the matter of ranks. A provision had been included in earlier versions of the annual defense policy bill, or National Defense Authorization Act (NDAA), for the 2021 Fiscal Year that demanded that Space Force use naval ranks.

William Shatner, the first actor to play Star Trek’s iconic Captain Kirk, went so far as to write an op-ed for Military Times earlier this year promoting that idea. “There was no Colonel Kirk,” he wrote.

However, that provision has since been dropped. If the current version of the Fiscal Year 2021 NDAA becomes law, Space Force will be free to continue its ongoing process to select a rank structure.

So, while we still don’t know what the names for their different ranks might look like in the future, we do know now that members of the Space Force have officially become Guardians.

Source: Space Force Troops Finally Have A Name: Guardians | The Drive

Toxic Fumes On Planes Are Knocking Out Pilots And Making Passengers Sick – Manufacturers, regulators refuse to do anything

When passengers board airliners, they expect everything to be sorted with the aircraft. Decades of safety innovations and regulations have made flying the safest form of travel. But as revealed in an explosive report by the Los Angeles Times, planes are filling up with toxic fumes, injuring crew and passengers alike, while the Federal Aviation Administration and airline industry do nothing.

In July 2015, Spirit Airlines Flight 708 landed in Boston and parked at its designated gate. However, there was one problem: the captain and co-pilot had no memory of landing or taxiing the Airbus A319. From the Los Angeles Times report:

The plane had begun its descent into Boston. Inside the cockpit, the captain was slumped in his seat. Sitting beside him, copilot Eric Tellmann was starting to pass out. Tellmann managed to strap on his oxygen mask, then grabbed the captain’s arm and forced him to follow suit. Reviving slowly, the captain looked at Tellmann through his mask, and his eyes grew wide with fear.A strange smell had permeated the plane that day. Passengers and flight attendants were coughing and wiping teary eyes. The pilots briefly lifted their masks and could still smell the odor as the runway drew nearer.

Tellmann and the captain parked the Airbus A319 at the gate. But they had no memory of landing or taxiing Spirit Airlines Flight 708. Tellmann went to the hospital for treatment and spent the next week at home in bed, vomiting and shaking and feeling “like a freight train had run over us,” he said in a letter to his union about the July 2015 event.

A mysterious smell. Strange symptoms. A trip to the emergency room.

The signs were all there: Something had gone seriously wrong with the plane’s air supply.

The air you breathe on a commercial jet airliner is known as bleed air. Bleed air comes from the engines and provides pressure for the cabin and air for the environmental control system. When it’s working as designed, it’s harmless. However, when there’s a problem like bad seals, hot engine oil and hydraulic fluid can leak into the air system, potentially releasing toxic fumes into the cabin.

When this happens it’s called a fume event. While the airlines and safety regulators have known about them for decades, they maintain these events aren’t common, and the levels of chemicals aren’t high enough to pose serious medical risks.

However, the Times’ investigation revealed some frightening data that suggests fume events are far more common than airlines admit:

But a Times investigation found that vapors from oil and other fluids seep into planes with alarming frequency across all airlines, at times creating chaos and confusion: Flight attendants vomit and pass out. Passengers struggle to breathe. Children get rushed to hospitals. Pilots reach for oxygen masks or gasp for air from opened cockpit windows.

Such events are documented in airport paramedic records, NASA safety reports, federal aviation records and other filings reviewed by The Times.

Tellmann, the Spirit Airlines pilot, was one of hundreds of airline crew members and passengers who reported being sickened or impaired on flights in recent years. A Times analysis of NASA safety reports from January 2018 to December 2019 identified 362 fume events that airline crew members reported to the agency, with nearly 400 pilots, flight attendants and passengers receiving medical attention. During at least 73 of those flights, pilots used emergency oxygen. Four dozen pilots were described as impaired to the point of being unable to perform their duties.

Because they’re made voluntarily, the NASA safety reports are the “tip of the iceberg,” according to a recent study by a researcher from the National Institute for Occupational Safety and Health.

Holiday travelers are flouting COVID-19 warnings while airlines tout the HEPA filters in aircraft. These filters, N95 masks and surgical masks don’t protect passengers from toxic fumes, however. Before the coronavirus pandemic, about five flights a day in the U.S. experienced a fume event, according to the Times.

So how did we get here? With weak regulations that favor private companies over people’s lives, of course. From the Times again:

Airlines have been asking Boeing to install air sensors for years. But the company decided against developing the technology. Senior Boeing engineers worried that data from sensors would prove damaging in lawsuits by sick passengers and crew members, according to internal emails and sworn depositions obtained by The Times.

An internal Boeing memo described it as a “risk” to give air sensors to even one airline, according to a deposition of a Boeing executive.

“Flight attendant, pilot unions, and congressional supporters could use this effort as evidence that sensors are needed and … to drive their agenda forward to have bleed air sensors required on all aircraft,” said the 2015 memo, which Boeing turned over in litigation.

[…]

The industry’s regulator, the Federal Aviation Administration, declined to comment on The Times’ findings and provided a statement saying it “currently has no plans” to require air sensors or filters.

“Studies have shown cabin air is as good as or better than the air found in offices and homes,” the FAA said.

But those studies looked at normal flights in which no fume events were reported. No major research has ever measured the chemicals in fume events as they occur.

In 2003, Congress ordered the FAA to measure the toxic chemical levels in such events, but the airlines refused to let flight attendants carry air samplers aboard, according to an FAA-funded research report.

Airbus, the world’s other major manufacturer of airliners, told the Times that the odors aren’t harmful and don’t pose any major risk to passengers and crew. Of course, without sensors or testing during a fume event, there’s no way to know that the air is indeed safe. It’s a vicious cycle, where lack of testing reinforces ignorance of risk. And while Federal authorities have never attributed any commercial airline crashes to fume events, they do keep forcing airliners to make unscheduled landings.

Oh, you thought it couldn’t get worse? Well, guess what: airlines aren’t required to tell passengers if a fume event has occurred or what chemicals they may have been exposed to. In fact, one of the main reasons sensors aren’t installed on planes is concern over lawsuit liability over injured parties:

A Boeing senior engineer, George Bates, acknowledged in a 2018 deposition that there were internal concerns that sensors would collect data that could be used by sick passengers or crew members in litigation against Boeing. “The biggest impeding factor is the legal issues,” Bates wrote in a 2008 email.

Bates elaborated in an internal email in 2011: “How long will it take until the readings have to be recorded and available not only for maintenance, but for the lawyers?” he wrote. Another Boeing engineer on the email chain agreed that making sensor data available was “crazy!”

Bates had expressed concern about fume events in the past when he noticed that Boeing 757s were being diverted about once every two weeks. Engine seals, he said, were leaking so much oil that crews complained of “blue smoke” thick enough that flight attendants couldn’t see halfway down the aisle.

“Given the number of … events for the 757 … I would have thought the FAA would have forced the issue,” Bates wrote in an email to colleagues. “Bottom line is I think we are looking for a tombstone before anyone with any horsepower is going to take interest.”

While most people recover from the effects of a fume event within a few days, others have been diagnosed with life-altering health conditions, some of which spelled the end of careers.

Source: Toxic Fumes On Planes Are Knocking Out Pilots And Making Passengers Sick

Should We Use Search History for Credit Scores? IMF Says Yes

With more services than ever collecting your data, it’s easy to start asking why anyone should care about most of it. This is why. Because people start having ideas like this.

In a new blog post for the International Monetary Fund, four researchers presented their findings from a working paper that examines the current relationship between finance and tech as well as its potential future. Gazing into their crystal ball, the researchers see the possibility of using the data from your browsing, search, and purchase history to create a more accurate mechanism for determining the credit rating of an individual or business. They believe that this approach could result in greater lending to borrowers who would potentially be denied by traditional financial institutions.

At its heart, the paper is trying to wrestle with the dawning notion that the institutional banking system is facing a serious threat from tech companies like Google, Facebook, and Apple. The researchers identify two key areas in which this is true: Tech companies have greater access to soft-information, and messaging platforms can take the place of the physical locations that banks rely on for meeting with customers.

[…]

But how would all this data be incorporated into credit ratings? Machine learning, of course. It’s black boxes all the way down.

The researchers acknowledge that there will be privacy and policy concerns related to incorporating this kind of soft-data into credit analysis. And they do little to explain how this might work in practice. The paper isn’t long, and it’s worth a read just to wrap your mind around some of the notions of fintech’s future and why everyone seems to want in on the payments game.

As it is, getting the really fine soft-data points would probably require companies like Facebook and Apple to loosen up their standards on linking unencrypted information with individual accounts. How they might share information would other institutions would be its own can of worms.

[…]

Yes, the idea of every move you make online feeding into your credit score is creepy. It may not even be possible in the near future. The IMF researchers stress that “governments should follow and carefully support the technological transition in finance. It is important to adjust policies accordingly and stay ahead of the curve.” When’s the last time a government did any of that?

Source: Should We Use Search History for Credit Scores? IMF Says Yes

Secret Agents Implicated In The Poisoning Of Opposition Leader Alexey Navalny Identified Thanks To Russia’s Black Market In Everybody’s Personal Data

Back in August, the Russian opposition leader Alexei Navalny was poisoned on a flight to Moscow. Despite initial doubts — and the usual denials by the Russian government that Vladimir Putin was involved — everyone assumed it had been carried out by the country’s FSB, successor to the KGB. Remarkable work by the open source intelligence site Bellingcat, which Techdirt first wrote about in 2014, has now established beyond reasonable doubt that FSB agents were involved:

A joint investigation between Bellingcat and The Insider, in cooperation with Der Spiegel and CNN, has discovered voluminous telecom and travel data that implicates Russia’s Federal Security Service (FSB) in the poisoning of the prominent Russian opposition politician Alexey Navalny. Moreover, the August 2020 poisoning in the Siberian city of Tomsk appears to have happened after years of surveillance, which began in 2017 shortly after Navalny first announced his intention to run for president of Russia.

That’s hardly a surprise. Perhaps more interesting for Techdirt readers is the story of how Bellingcat pieced together the evidence implicating Russian agents. The starting point was finding passengers who booked similar flights to those that Navalny took as he moved around Russia, usually earlier ones to ensure they arrived in time but without making their shadowing too obvious. Once Bellingcat had found some names that kept cropping up too often to be a coincidence, the researchers were able to draw on a unique feature of the Russian online world:

Due to porous data protection measures in Russia, it only takes some creative Googling (or Yandexing) and a few hundred euros worth of cryptocurrency to be fed through an automated payment platform, not much different than Amazon or Lexis Nexis, to acquire telephone records with geolocation data, passenger manifests, and residential data. For the records contained within multi-gigabyte database files that are not already floating around the internet via torrent networks, there is a thriving black market to buy and sell data. The humans who manually fetch this data are often low-level employees at banks, telephone companies, and police departments. Often, these data merchants providing data to resellers or direct to customers are caught and face criminal charges. For other batches of records, there are automated services either within websites or through bots on the Telegram messaging service that entirely circumvent the necessity of a human conduit to provide sensitive personal data.

The process of using these leaked resources to establish the other agents involved in the surveillance and poisoning of Navalny, and their real identities, since they naturally used false names when booking planes and cars, is discussed in fascinating detail on the Bellingcat site. But the larger point here is that strong privacy protections are good not just for citizens, but for governments too. As the Bellingcat researchers put it:

While there are obvious and terrifying privacy implications from this data market, it is clear how this environment of petty corruption and loose government enforcement can be turned against Russia’s security service officers.

As well as providing Navalny with confirmation that the Russian government at the highest levels was probably behind his near-fatal poisoning, this latest Bellingcat analysis also achieves something else that is hugely important. It has given privacy advocates a really powerful argument for why governments — even the most retrogressive and oppressive — should be passing laws to protect the personal data of every citizen effectively. Because if they don’t, clever people like Bellingcat will be able to draw on the black market resources that inevitably spring up, to reveal lots of things those in power really don’t want exposed.

Source: Secret Agents Implicated In The Poisoning Of Opposition Leader Alexey Navalny Identified Thanks To Russia’s Black Market In Everybody’s Personal Data | Techdirt

Artificial intelligence classifies supernova explosions with unprecedented accuracy

Artificial intelligence is classifying real supernova explosions without the traditional use of spectra, thanks to a team of astronomers at the Center for Astrophysics | Harvard & Smithsonian. The complete data sets and resulting classifications are publicly available for open use.

By training a to categorize supernovae based on their visible characteristics, the astronomers were able to classify real data from the Pan-STARRS1 Medium Deep Survey for 2,315 supernovae with an accuracy rate of 82-percent without the use of spectra.

The astronomers developed a that classifies different types of supernovae based on their light curves, or how their brightness changes over time. “We have approximately 2,500 supernovae with light curves from the Pan-STARRS1 Medium Deep Survey, and of those, 500 supernovae with spectra that can be used for classification,” said Griffin Hosseinzadeh, a postdoctoral researcher at the CfA and lead author on the first of two papers published in The Astrophysical Journal. “We trained the classifier using those 500 supernovae to classify the remaining supernovae where we were not able to observe the spectrum.”

Edo Berger, an at the CfA explained that by asking the to answer specific questions, the results become increasingly more accurate. “The machine learning looks for a correlation with the original 500 spectroscopic labels. We ask it to compare the supernovae in different categories: color, rate of evolution, or brightness. By feeding it real existing knowledge, it leads to the highest accuracy, between 80- and 90-percent.”

Although this is not the first machine learning project for supernovae classification, it is the first time that astronomers have had access to a real data set large enough to train an artificial intelligence-based supernovae classifier, making it possible to create machine learning algorithms without the use of simulations.

[…]

The project has implications not only for archival data, but also for data that will be collected by future telescopes. The Vera C. Rubin Observatory is expected to go online in 2023, and will lead to the discovery of millions of new supernovae each year. This presents both opportunities and challenges for astrophysicists, where limited telescope time leads to limited spectral classifications.

“When the Rubin Observatory goes online it will increase our discovery rate of supernovae by 100-fold, but our spectroscopic resources will not increase,” said Ashley Villar, a Simons Junior Fellow at Columbia University and lead author on the second of the two papers, adding that while roughly 10,000 supernovae are currently discovered each year, scientists only take spectra of about 10-percent of those objects. “If this holds true, it means that only 0.1-percent of discovered by the Rubin Observatory each year will get a spectroscopic label. The remaining 99.9-percent of data will be unusable without methods like ours.”

Unlike past efforts, where data sets and classifications have been available to only a limited number of astronomers, the from the new algorithm will be made publicly available. The astronomers have created easy-to-use, accessible software, and also released all of the data from Pan-STARRS1 Medium Deep Survey along with the new classifications for use in other projects. Hosseinzadeh said, “It was really important to us that these projects be useful for the entire supernova community, not just for our group. There are so many projects that can be done with these data that we could never do them all ourselves.” Berger added, “These projects are open data for open science.”

Source: Artificial intelligence classifies supernova explosions with unprecedented accuracy

Are we working more than ever? – Our World in Data

Working hours for the average worker have decreased dramatically over the last 150 years.

Why should we care?

The evidence presented here comes from decades of work from economic historians and other researchers. Of course, the data is not perfect — as we explain in a forthcoming post, measuring working hours with accuracy is difficult, and surveys and historical records have limitations, so estimates of working hours spanning centuries necessarily come with a margin of error. But for any given country, the changes across time are much larger than the error margins at any point in time: The average worker in a rich country today really does work many fewer hours than the average worker 150 years ago.

As the economists Diane Coyle and Leonard Nakamura explain, the study of working hours is crucial not only to measure macroeconomic productivity, but also to measure economic well-being beyond economic output. A more holistic framework for measuring ‘progress’ needs to consider changes in how people are allowed to allocate their time over multiple activities, among which paid work is only one.

The available evidence shows that, rather than working more than ever, workers in many countries today work much less than in the past 150 years. There are huge inequalities within and across countries, but substantial progress has been made.

Source: Are we working more than ever? – Our World in Data

Hackers used SolarWinds’ dominance against it in sprawling spy campaign

There was not a database or an IT deployment model out there to which his Austin, Texas-based company did not provide some level of monitoring or management, he told analysts on the Oct. 27 call.

“We don’t think anyone else in the market is really even close in terms of the breadth of coverage we have,” he said. “We manage everyone’s network gear.”

Now that dominance has become a liability – an example of how the workhorse software that helps glue organizations together can turn toxic when it is subverted by sophisticated hackers.

On Monday, SolarWinds confirmed that Orion – its flagship network management software – had served as the unwitting conduit for a sprawling international cyberespionage operation. The hackers inserted malicious code into Orion software updates pushed out to nearly 18,000 customers.

And while the number of affected organizations is thought to be much more modest, the hackers have already parlayed their access into consequential breaches at the U.S. Treasury and Department of Commerce.

[…]

Cybersecurity experts are still struggling to understand the scope of the damage.

The malicious updates – sent between March and June, when America was hunkering down to weather the first wave of coronavirus infections – was “perfect timing for a perfect storm,” said Kim Peretti, who co-chairs Atlanta-based law firm Alston & Bird’s cybersecurity preparedness and response team.

Assessing the damage would be difficult, she said.

“We may not know the true impact for many months, if not more – if not ever,” she said.

The impact on SolarWinds was more immediate. U.S. officials ordered anyone running Orion to immediately disconnect it. The company’s stock has tumbled more than 23% from $23.50 on Friday – before Reuters broke the news of the breach – to $18.06 on Tuesday.

[…]

One of those offering claimed access over the Exploit forum in 2017 was known as “fxmsp” and is wanted by the FBI “for involvement in several high-profile incidents,” said Mark Arena, chief executive of cybercrime intelligence firm Intel471. Arena informed his company’s clients, which include U.S. law enforcement agencies.

Security researcher Vinoth Kumar told Reuters that, last year, he alerted the company that anyone could access SolarWinds’ update server by using the password “solarwinds123”

[…]

Source: Hackers used SolarWinds’ dominance against it in sprawling spy campaign | Reuters

SolarWinds’ shares drop 22 per cent. But what’s this? $286m in stock sales just before hack announced?

Two Silicon Valley VC firms, Silver Lake and Thoma Bravo, sold hundreds of millions of dollars in SolarWinds shares just days before the software biz emerged at the center of a massive hacking campaign.

Silver Lake and Thoma Bravo deny anything untoward.

The two firms owned 70 per cent of SolarWinds, which produces networking monitoring software that was backdoored by what is thought to be state-sponsored Russian spies. This tainted code was installed by thousands of SolarWinds customers including key departments of the US government that were subsequently hacked via the hidden remote access hole.

News of the role SolarWinds’ hijacked Orion software played in the hacking spree emerged at the weekend, and on Monday the developer’s share price plummeted more than 20 per cent. It is currently down 22 per cent.

However, around a week before, Silver Lake sold $158m of SolarWinds’ shares and Thoma Bravo sold $128m, according to the Washington Post. The two outfits have six seats on SolarWinds’ board, meaning they will have access to confidential internal information before it is made public. It’s not clear when SolarWinds became aware that its Orion build system had been compromised to include the aforementioned backdoor.

[…]

We asked FireEye when precisely it told SolarWinds its Orion updates had been trojanized, and a representative told us: “I’m not able to address the timeline of events.”

Timing

There is a plausible explanation for all this: the VCs shed their stock-holdings on the same day SolarWinds’ long-standing CEO resigned.

The software house announced in August that Kevin Thompson would leave the company though it didn’t give a date. Thompson reportedly quit on Monday, December 7 – news that was not made public – and a new CEO was formally announced two days later, on December 9, the day after FireEye went public on December 8 with details of the intrusion into its own systems.

[…]

Source: SolarWinds’ shares drop 22 per cent. But what’s this? $286m in stock sales just before hack announced? • The Register

Air Force Flies AI Copilot on U-2 Spy Plane in first. Very Star Wars referenced

For Star Wars fans, an X-Wing fighter isn’t complete without R2-D2. Whether you need to fire up converters, increase power, or fix a broken stabilizer, that trusty droid, full of lively beeps and squeaks, is the ultimate copilot.

Teaming artificial intelligence (AI) with pilots is no longer just a matter for science fiction or blockbuster movies. On Tuesday, December 15, the Air Force successfully flew an AI copilot on a U-2 spy plane in California: the first time AI has controlled a U.S. military system.

[…]

With call sign ARTUµ, we trained µZero—a world-leading computer program that dominates chess, Go, and even video games without prior knowledge of their rules—to operate a U-2 spy plane. Though lacking those lively beeps and squeaks, ARTUµ surpassed its motion picture namesake in one distinctive feature: it was the mission commander, the final decision authority on the human-machine team

[…]

Our demo flew a reconnaissance mission during a simulated missile strike at Beale Air Force Base on Tuesday. ARTUµ searched for enemy launchers while our pilot searched for threatening aircraft, both sharing the U-2’s radar. With no pilot override, ARTUµ made final calls on devoting the radar to missile hunting versus self-protection. Luke Skywalker certainly never took such orders from his X-Wing sidekick!

[…]

to trust AI, software design is key. Like a breaker box for code, the U-2 gave ARTUµ complete radar control while “switching off” access to other subsystems.

[…]

Like a digital Yoda, our small-but-mighty U-2 FedLab trained µZero’s gaming algorithms to operate a radar—reconstructing them to learn the good side of reconnaissance (enemies found) from the dark side (U-2s lost)—all while interacting with a pilot. Running over a million training simulations at their “digital Dagobah,” they had ARTUµ mission-ready in just over a month.

[…]

That autonomous future will happen eventually. But today’s AI can be easily fooled by adversary tactics, precisely what future warfare will throw at it.

us air force maj “vudu”, u 2 dragon lady pilot for the 9th reconnaissance wing, prepares to taxi after returning from a training sortie at beale air force, california, dec 15, 2020
U.S. Air Force Maj. “Vudu”, U-2 Dragon Lady pilot for the 9th Reconnaissance Wing, prepares to taxi after returning from a training sortie at Beale Air Force, California, Dec. 15, 2020.

A1C Luis A.Ruiz-Vazquez

Like board or video games, human pilots could only try outperformingDARPA’s AI while obeying the rules of the dogfighting simulation, rules the AI had algorithmically learned and mastered. The loss is a wakeup call for new digital trickery to outfox machine learning principles themselves. Even R2-D2 confused computer terminals with harmful power sockets!

[…]

Source: Air Force Flies AI Copilot on U-2 Spy Plane: Exclusive Details

Lunar Samples Land on Earth, Completing China’s Most Challenging ‘Space Adventure’

For the first time in 44 years, a spacecraft has brought lunar samples to Earth. With the Chang’e 5 mission complete, China now joins a very exclusive club, reinforcing the country’s role as a major player in space exploration.

China is now only the third country to collect samples from the Moon and bring them to Earth. The last time this happened was in 1976, when the Soviet Union did the same as part of its Luna 24 mission. NASA, during the course of its six Apollo missions, managed to collect and retrieve 842 pounds of lunar regolith and rocks.

[…]

The capsule was 3,100 miles (5,000 km) above the southern Atlantic Ocean when it separated from the orbiter. Prior to making the big plunge, the capsule bounced off the atmosphere while traveling at 7 miles per second (11.2 km/s), which it did to reduce speed, bringing it down to a more manageable 5 miles per second (7.9 km/s). A parachute allowed it to safely drift to the surface, where it was retrieved by ground crews. As Xinhua reports, the recovery team will briefly inspect the capsule, and then fly it to Beijing for further analysis.

Specifically, the sealed samples will be “transferred to specially designed laboratories for analyses, experiments and tests so scientists can determine the extraterrestrial substances’ composition, structure and traits, thus deepening their knowledge about the history of the moon and the solar system,” according to CNSA. “A certain proportion of the samples will also be on public display to enhance science awareness among the public, especially young generations, sources close to the mission have said.”

[…]

Using its drill, the Chang’e 5 lander pulled 18 ounces (500 grams) of material from beneath the surface, while its robotic arm collected upwards of 3.5 pounds (1.5 kg). The research team will have to confirm these quantities once the capsule is opened. After storing the samples in a vacuum chamber, the lander planted a Chinese flag on the surface, bid farewell to the Moon, and then re-joined the orbiter on December 3. It marked the “first time a Chinese spacecraft has blasted off from an extraterrestrial body,” according to CNSA.

[…]

Source: Lunar Samples Land on Earth, Completing China’s Most Challenging ‘Space Adventure’

Pornhub removes all unverified videos from its platform after Mastercard and Visa drop them

Last week, infamous porn-hosting site Pornhub made a big change by cutting off “unverified” uploads. Now, the company is taking things a step further and has removed all content that wasn’t uploaded by either a “content partner” or a verified user. Overnight, Pornhub has removed millions of uploaded videos — and, according to Vice, the site will start reviewing and verifying that those videos meet its “trust and safety policy.”

This comes after a New York Times report last week highlighted how the site’s lax enforcement of its policies was leading to child exploitation. Other issues linked to the site include scads of revenge porn, or videos uploaded without the consent of people in them. Pornhub didn’t directly address the allegations in the Times report, but the two major changes to the company’s policies over the last week speak volumes.

*Cough* I think you’ll find it was Visa and Mastercard dropping their support for them

Today, Pornhub said that the  third-party Internet Watch Foundation had reported 118 incidents of child sexual abuse material on the Pornhub platform, compared to 84 million instances self-reported by Facebook. Pornhub also pointed out that, as of today, every piece of content on the site is from verified uploaders, “a requirement that platforms like Facebook, Instagram, TikTok, YouTube, Snapchat and Twitter have yet to institute.”

The company’s responses certainly have a ring of self-righteousness, especially as it says it’s being targeted “not because of our policies and how we compare to our peers, but because we are an adult content platform.” But with Mastercard and Visa both cutting off payments to Pornhub, the company has clear financial incentive to cleaning up its act.

Ah, all right, you found the reason why after all…

Source: Pornhub removes all unverified videos from its platform | Engadget

Jailbreak app store Cydia files its own antitrust lawsuit against Apple

Cydia, the original app store for jailbroken iPhones, has joined a wave of companies and regulators in targeting Apple over antitrust concerns. In a lawsuit it filed on Thursday, it accused Apple of “anti-competitive acquisition and maintenance of an illegal monopoly over iOS app distribution.”

Were that not the case, Cydia argues, users would “be able to choose how and where to locate and obtain iOS apps, and developers would be able to use the iOS app distributor of their choice.” Apple rejected accusations it has a monopoly and told Motherboard it would review the lawsuit.

Apple launched the App Store in 2008, the year after Cydia arrived. The unofficial store allows users who jailbreak their iPhone and iPad to download apps and add features that Apple hasn’t necessarily approved.

Over time, Apple has made jailbreaking its devices more difficult and Cydia isn’t as prominent or popular as it once was. In 2010, Cydia developer Jay “Saurik” Freeman said 4.5 million users were searching the store for apps.

Like the App Store, Cydia took a cut of app sales and revenue peaked at around $10 million in 2011 and 2012, according to the Washington Post. Freeman ended purchases from Cydia’s store in 2018.

The suit follows a number of high-profile moves against Apple for similar reasons. Back in August, Epic Games sued Apple over its App Store rules after trying to bypass them. A coalition of companies, including Epic and Spotify, has formed to pressure Apple and Google into changing their app store practices. Apple is also under antitrust scrutiny from regulators in Europe and the US.

Source: Jailbreak app store Cydia files its own antitrust lawsuit against Apple | Engadget

France fines Google $120M and Amazon $42M for dropping tracking cookies without consent

France’s data protection agency, the CNIL, has slapped Google and Amazon with fines for dropping tracking cookies without consent.

Google has been hit with a total of €100 million ($120 million) for dropping cookies on Google.fr and Amazon €35 million (~$42 million) for doing so on the Amazon .fr domain under the penalty notices issued today.

The regulator carried out investigations of the websites over the past year and found tracking cookies were automatically dropped when a user visited the domains in breach of the country’s Data Protection Act.

In Google’s case the CNIL has found three consent violations related to dropping non-essential cookies.

“As this type of cookies cannot be deposited without the user having expressed his consent, the restricted committee considered that the companies had not complied with the requirement provided for by article 82 of the Data Protection Act and the prior collection of the consent before the deposit of non-essential cookies,” it writes in the penalty notice [which we’ve translated from French].

Amazon was found to have made two violations, per the CNIL penalty notice.

CNIL also found that the information about the cookies provided to site visitors was inadequate — noting that a banner displayed by Google did not provide specific information about the tracking cookies the Google.fr site had already dropped.

Under local French (and European) law, site users should have been clearly informed before the cookies were dropped and asked for their consent.

In Amazon’s case its French site displayed a banner informing arriving visitors that they agreed to its use of cookies. CNIL said this did not comply with transparency or consent requirements — since it was not clear to users that the tech giant was using cookies for ad tracking. Nor were users given the opportunity to consent.

The law on tracking cookie consent has been clear in Europe for years. But in October 2019 a CJEU ruling further clarified that consent must be obtained prior to storing or accessing non-essential cookies. As we reported at the time, sites that failed to ask for consent to track were risking a big fine under EU privacy laws.

Source: France fines Google $120M and Amazon $42M for dropping tracking cookies without consent | TechCrunch

Astronomers Just Found Cosmic ‘Superhighways’ For Fast Travel Through The Solar System

Invisible structures generated by gravitational interactions in the Solar System have created a “space superhighway” network, astronomers have discovered.

These channels enable the fast travel of objects through space, and could be harnessed for our own space exploration purposes, as well as the study of comets and asteroids.

By applying analyses to both observational and simulation data, a team of researchers led by Nataša Todorović of Belgrade Astronomical Observatory in Serbia observed that these superhighways consist of a series of connected arches inside these invisible structures, called space manifolds – and each planet generates its own manifolds, together creating what the researchers have called “a true celestial autobahn”.

This network can transport objects from Jupiter to Neptune in a matter of decades, rather than the much longer timescales, on the order of hundreds of thousands to millions of years, normally found in the Solar System.

[…]

They collected numerical data on millions of orbits in the Solar System, and computed how these orbits fit with known manifolds, modelling the perturbations generated by seven major planets, from Venus to Neptune.

And they found that the most prominent arches, at increasing heliocentric distances, were linked with Jupiter; and most strongly with its Lagrange point manifolds. All Jovian close encounters, modelled using test particles, visited the vicinity of Jupiter’s first and second Lagrange points.

A few dozen or so particles were then flung into the planet on a collision course; but a vast number more, around 2,000, became uncoupled from their orbits around the Sun to enter hyperbolic escape orbits. On average, these particles reached Uranus and Neptune 38 and 46 years later, respectively, with the fastest reaching Neptune in under a decade.

[…]

Source: Astronomers Just Found Cosmic ‘Superhighways’ For Fast Travel Through The Solar System

Space manifolds act as the boundaries of dynamical channels enabling fast transportation into the inner- and outermost reaches of the Solar System. Besides being an important element in spacecraft navigation and mission design, these manifolds can also explain the apparent erratic nature of comets and their eventual demise. Here, we reveal a notable and hitherto undetected ornamental structure of manifolds, connected in a series of arches that spread from the asteroid belt to Uranus and beyond. The strongest manifolds are found to be linked to Jupiter and have a profound control on small bodies over a wide and previously unconsidered range of three-body energies. Orbits on these manifolds encounter Jupiter on rapid time scales, where they can be transformed into collisional or escaping trajectories, reaching Neptune’s distance in a mere decade. All planets generate similar manifolds that permeate the Solar System, allowing fast transport throughout, a true celestial autobahn.

[…]

igure 1 shows short-term FLI maps of the outer edge of the asteroid belt (∼3 AU) up to near the semimajor axis of Uranus (∼20 AU), for all elliptic eccentricities, and considering the seven-planet dynamical model (top) and the Sun-Jupiter-TP–restricted problem (bottom) in ORBIT9. The large stable island at 5.2 AU, nesting the Greeks, is clearly visible in both panels of Fig. 1, as is the niche for the Hildas at 3.97 AU. A shadow of the chaotic borders of the strongest resonance in the outer belt, the 2:1 mean-motion resonance (MMR) with Jupiter at 3.3 AU, begins to appear, indicating the relative weakness of such orbital resonances compared to the manifolds uncovered herein. The notable feature of Fig. 1, however, is the large “V-shaped” chaotic structure that emerges outside of roughly 5.6 AU, which is connected to a series of arches at increasing heliocentric distances that nearly follows the perihelion line (qj) of Jupiter. Chaos also emanates along the Jovian aphelion line (Qj) in elongated concentric curves, initiating near 4.8 AU.

Fig. 1 Global arch-like structure of space manifolds in the Solar System.

Short-term FLI maps of the region between the outer edge of the main asteroid belt at 3 AU to just beyond the semimajor axis of Uranus at 20 AU, for all elliptic eccentricities, adopting a dynamical model in ORBIT9 that contains the seven major planets (from Venus to Neptune) as perturbers (top) or Jupiter as the only perturber (bottom). Orbits located on stable manifolds appear with a lighter color, while darker regions correspond to trajectories off of them.

Source: The arches of chaos in the Solar System