About Robin Edgar

Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft

OpenAI Sells out to Microsoft: exclusive license for mega-brain GPT-3 for anything and everything

Microsoft has bagged exclusive rights to use OpenAI’s GPT-3 technology, allowing the Windows giant to embed the powerful text-generating machine-learning model into its own products.

“Today, I’m very excited to announce that Microsoft is teaming up with OpenAI to exclusively license GPT-3, allowing us to leverage its technical innovations to develop and deliver advanced AI solutions for our customers, as well as create new solutions that harness the amazing power of advanced natural language generation,” Microsoft CTO Kevin Scott said on Tuesday.

Right now, GPT-3 is only available to a few teams hand picked by OpenAI. The general-purpose text-in-text-out tool is accessible via an Azure-hosted API, and is being used by, for instance, Reddit to develop automated content moderation algorithms, and by academics investigating how the language model could be used to spread spam and misinformation at a scale so large it would be difficult to filter out.

GPT-3 won’t be available on Google Cloud, Amazon Web Services etc

Microsoft has been cosying up to OpenAI for a while; it last year pledged to invest $1bn in the San Francisco-based startup. As part of that deal, OpenAI got access to Microsoft’s cloud empire to run its experiments, and Microsoft was named its “preferred partner” for commercial products. Due to the exclusive license now brokered, GPT-3 won’t be available on rival cloud services, such as Google Cloud and Amazon Web Services.

[…]

GPT-3 is a massive model containing 175 billion parameters, and was trained on all manner of text scraped from the internet. It’s able to perform all sorts of tasks, including answering questions, translating languages, writing prose, performing simple arithmetic, and even attempting code generation. Although impressive, it remains to be seen if it can be utilized in products for the masses rather than being an object of curiosity.

Source: Get ready for Clippy 9000: Microsoft exclusively licenses OpenAI’s mega-brain GPT-3 for anything and everything • The Register

Because everybody loves a monopolist

Another body for the Google graveyard: Chrome Web Store payments, citing alternatives – unlike Apple. Costs were 5%, also unlike Apple’s 30%.

Google has decided to shut down the Chrome Web Store payments API permanently after what was supposed to be a temporary closure at the start of the year.

In January, the internet advertising biz halted the publication of Chrome apps, extensions, and themes in the Chrome Web Store that were either paid-for or took in-app payments, following a flood of fraudulent transactions.

By February, developers could again submit paid items to be reviewed for inclusion in the Chrome Web Store. But the following month, Google again disabled Chrome Web Store payments, citing the challenges presented by the emergence of the COVID-19 pandemic.

“We understand that these changes may cause inconvenience, and we apologize for any interruption of service,” the Silicon Valley giant’s Chrome Web Store (CWS) team said in its email to developers in March.

It was also in January that Google announced plans to phase out Chrome apps, only to revise its schedule in August. Chrome apps, also known as Chrome packaged apps, are web apps tied to Chrome that were intended to behave like native apps by being launchable from the desktop, outside of the browser window.

On Monday, another email went out to registered extension developers informing them that Chrome Web Store payments will stop functioning in February next year.

“When we launched the Chrome Web Store 11 years ago, there weren’t a lot of ways for our developers to take payment from users,” the message to extension developers stated. “Today, there is a thriving ecosystem of payment providers offering a far more diverse set of features than a single provider could hope to. Now that our developers have so many great options to choose from, we can comfortably sunset our own payments integration.”

As of this week, the inability to create new paid extensions and to implement in-app purchases using the CWS payment API, ongoing since March, became permanent. On December 1, 2020, free trials will be disabled and the “Try Now” button in the CWS will vanish. On February 1, 2021 active CWS items and in-purchases will no longer be able to make transactions, though querying license information for previously paid-for purchases and subscriptions will still be allowed.

And at some indeterminate time after that, the licensing API will no longer function. The payments deprecation schedule is explained on the Chrome developer website.

Most developers do not charge directly for their extensions. Among the roughly 190,000 extensions in the Chrome Web Store, about nine per cent are either paid or implement in-app purchasing, according to Extension Monitor. These account for about 2.6 per cent of some 1.2bn installs.

Google doesn’t make data available to discern how many of paid CWS items use the CWS payment system and how many use third-party services such as Stripe or Braintree. Unlike Apple’s iOS App Store, Google does not require developers to use its payment system for their apps or extensions.

[…]

 

Source: Another body for the Google graveyard: Chrome Web Store payments. Bad news if you wanted to bank some income from these apps • The Register

Facebook says it may quit Europe over ban on sharing data with US

Facebook has warned that it may pull out of Europe if the Irish data protection commissioner enforces a ban on sharing data with the US, after a landmark ruling by the European court of justice found in July that there were insufficient safeguards against snooping by US intelligence agencies.

In a court filing in Dublin, Facebook’s associate general counsel wrote that enforcing the ban would leave the company unable to operate.

“In the event that [Facebook] were subject to a complete suspension of the transfer of users’ data to the US,” Yvonne Cunnane argued, “it is not clear … how, in those circumstances, it could continue to provide the Facebook and Instagram services in the EU.”

Facebook denied the filing was a threat, arguing in a statement that it was a simple reflection of reality. “Facebook is not threatening to withdraw from Europe,” a spokesperson said.

“Legal documents filed with the Irish high court set out the simple reality that Facebook, and many other businesses, organisations and services, rely on data transfers between the EU and the US in order to operate their services. A lack of safe, secure and legal international data transfers would damage the economy and hamper the growth of data-driven businesses in the EU, just as we seek a recovery from Covid-19.”

The filing is the latest volley in a legal battle that has lasted almost a decade. In 2011, Max Schrems, an Austrian lawyer, began filing privacy complaints with the Irish data protection commissioner, which regulates Facebook in the EU, about the social network’s practices.

Those complaints gathered momentum two years later, when the Guardian revealed the NSA’s Prism program, a vast surveillance operation involving direct access to the systems of Google, Facebook, Apple and other US internet companies. Schrems filed a further privacy complaint, which was eventually referred to the European court of justice.

That court found in 2015 that, because of the existence of Prism, the “Safe Harbour” agreement, which allowed US companies to transfer the data of EU citizens back home, was invalid.

The EU then attempted a second legal agreement for the data transfers, a so-called privacy shield; that too was invalidated in July this year, with the court again ruling that the US does not limit surveillance of EU citizens.

In September, the Irish data protection commissioner began the process of enforcing that ruling. The commissioner issued a preliminary order compelling the social network to suspend data transfers overseas.

In response, Nick Clegg, the company’s head of global affairs and communications, published a blogpost that argued that “international data transfers underpin the global economy and support many of the services that are fundamental to our daily lives”.

“In the worst-case scenario, this could mean that a small tech start-up in Germany would no longer be able to use a US-based cloud provider,” he wrote. “A Spanish product development company could no longer be able to run an operation across multiple time zones. A French retailer may find they can no longer maintain a call centre in Morocco.”

Clegg added: “We support global rules that can ensure consistent treatment of data around the world.”

Source: Facebook says it may quit Europe over ban on sharing data with US | Technology | The Guardian

Yep, mr Clegg. But the law is the law. And it’s a good law. Having EU Citizens’ private data in the hands of the megalomanic 4th Reich US government is not a good idea – in the EU people like the idea of having rights and privacy.

COVID-19 Conspiracy Theories Are a Public Health Threat

Public health crises have spawned conspiracy theories as far back as when the Black Death ravaged Europe in the 1300s, as people desperately try to make sense of the chaotic forces disrupting their lives. While modern science offers a better understanding of how diseases infect people and how to contain them, COVID-19 conspiracy theories are spreading rapidly via social media, unreliable news outlets and from our own political leaders, including U.S. President Donald Trump. The result: many Americans now believe pandemic-related conspiracy theories—and, alarmingly, those same people are less likely to take steps to prevent the virus from spreading.

In a University of Pennsylvania Annenberg Public Policy Center study published Monday in Social Science & Medicine, researchers surveyed a group of 840 U.S. adults—first in late March, and then again in mid-July—to determine how Americans’ beliefs and actions regarding the pandemic changed over time. Overall, they found that COVID-19 conspiracy theories are not only commonplace, they’re gaining traction. Back in March, 28% of people believed a debunked rumor that the Chinese government created the coronavirus as a bioweapon; that number rose to 37% by July. About 24% believed that the U.S. Centers for Disease Control and Prevention exaggerated the virus’ danger to hurt Trump politically despite a lack of evidence; by July, that figure rose to 32%. And in March, about 15% of respondents said they believed that the pharmaceutical industry created the virus to boost drug and vaccine sales—another unfounded theory—compared to 17% in July.

Whether or not someone thinks NASA hired Stanley Kubrick to fake the moon landing has little bearing on the world beyond that person. But in the case of a pandemic—which requires people to follow public health guidance in order to keep one another safe—conspiratorial thinking can have disturbing consequences. Indeed, the Annenberg study found that only 62% of people who were most likely to believe the coronavirus conspiracies said they wear a mask every day when they’re around other people away from home, compared to 95% of non-believers. Furthermore, people who believe COVID-19 conspiracy theories were 2.2 times less likely to say they wanted to receive a vaccine in March; by July, they were 3.5 times less likely to want to be vaccinated.

“Belief in pandemic conspiracy theories appears to be an obstacle to minimizing the spread of COVID-19,” said Dan Romer, Annenberg Public Policy Center research director and a study co-author, in a statement.

Where are people picking up COVID-19 conspiracy theories? Believers were more likely to be heavy users of social media and viewers of conservative media like Fox News, the study found. Meanwhile, people who watch other television news channels were more likely to follow public health guidance and to desire vaccination.

While the researchers say they understand how pandemic conspiracy theories are spreading, they say it’s still a challenge to get believers to reconsider once they’re sucked in. Other research suggests that simply correcting false information doesn’t usually work—and can even cause some people to believe conspiracies even more deeply.

“Conspiracy theories are difficult to displace because they provide explanations for events that are not fully understood, such as the current pandemic, play on people’s distrust of government and other powerful actors, and involve accusations that cannot be easily fact-checked,” said Kathleen Hall Jamieson, Annenberg Public Policy Center director and study co-author, in a statement.

Source: COVID-19 Conspiracy Theories Are a Public Health Threat | Time

Some managed Netgear switches suddenly need a cloud account to use its full UI. Also may not update security. Time to change vendor.

Netgear has decided that users of some of its managed network switches don’t need access to the equipment’s full user interface – unless they register their details with Netgear first.

For instance, owners of its 64W Power-over-Ethernet eight-port managed gigabit switch GC108P, and its 126W variant GC108PP, need to hand over information about themselves to the Netgear Cloud to get full use out of the devices.

“Starting from firmware version 1.0.5.4, product registration is required to unlock full access to the local browser user interface,” said the manufacturer in a note on its website referencing a version released in April this year.

The latest build, 1.0.5.8, released last week, continues that registration requirement. These rules also appear to apply to a dozen or so models of Netgear’s kit, including its GS724TPP 24-port managed Ethernet switch.

“I recently bought a couple of Netgear Managed Switches for business, and in their datasheet they list local-only management as a feature. Only after they arrived we discovered that you only get limited functionality in the local-only management mode, you have to register the switches to your Netgear Cloud account to get access to the full functionality,” fumed one netizen on a Hacker News discussion thread. “I would not have bought the switches if I had knew I needed to register them to Netgear Cloud to have access to the full functionality specified in the data sheet.”

It appears the Silicon Valley giant is aware that not everyone will rush to create a cloud account to manage their network hardware because it has published a list of functions that one can freely access without said registration – for now, anyway.

We’ve asked Netgear to explain the move. The manufacturer most recently made the headlines when, after being informed of a security flaw in a large number of product lines, promptly abandoned half of them rather than issue a patch.

Professor Alan Woodward of the University of Surrey, England, opined: “It’s a conundrum because it is software and you do have only a licence to use it: you don’t own it so one might argue this helps protect intellectual property rights. However, that’s different for the hardware which is pretty useless without the software.”

Woodward pointed to Netgear’s online privacy policy, which, like every other company on the internet, states that data from customers and others can be hoovered up for marketing purposes, research and so on (see section 11).

Source: Before you buy that managed Netgear switch, be aware you may need to create a cloud account to use its full UI • The Register

Trump Pushes to Reap Extensive Biometric Data From Immigrants, Americans, never delete them

Six million would-be U.S. immigrants face expanded collection of their biometric data, including iris scans, palm-, and voice-prints, facial recognition images, and DNA, under a proposed federal rule. The Department of Homeland Security also for the first time would gather that data from American citizens sponsoring or benefiting from a visa application.

Years in the making, the biometrics immigration rule has garnered more than 160 comments since its Sept. 11 publication. The 30-day comment period closes on Oct 13. A final version could be in place by Inauguration Day.

Immigration and privacy advocates have voiced concerns over who will have to comply with the new requirements, why President Donald Trump is making this push so late in his term, and what it means for a federal agency already claiming a lack of resources.

“The only words to describe this proposed rule is breathtaking,” said Doug Rand, who worked on technology and immigration policy in the Obama White House and then joined the Federation of American Scientists. “It’s clearly designed to drastically expand surveillance of immigrants, U.S. citizens, employers.”

The 300-plus-page plan updates current biometrics requirements so that “any applicant, petitioner, sponsor, beneficiary, or individual filing or associated with an immigration benefit or request, including U.S. citizens, must appear for biometrics collection without regard to age unless the agency waives or exempts the requirement.”

The DHS estimates an additional 2.17 million new biometrics submissions will be collected annually, an increase from the current 3.9 million, under the rule.

[…]

The DHS already collects fingerprints from some visa applicants. The new rule would expand that biometrics-gathering to iris images, palm- and voice- prints. The agency wants authority to require or request DNA testing to prove familial relationships where kinship is in question. The DNA data could be stored indefinitely, under the proposed rule.

[…]

While the current proposal doesn’t expressly reference employers, that doesn’t mean it couldn’t be applied to employer-backed visa holders down the road, said Michael Nowlan, co-leader of Clark Hill’s Immigration Business unit. “It’s just amazing to me how broad this is.”

One potential scenario for employers petitioning for visa-holding workers or sponsoring foreign workers for green cards is that legal counsel or even a human resources officer may be required to submit biometrics on the company’s behalf.

[…]

Should Trump win re-election, his administration can use this period of uncertainty to accelerate this regulation and carry it out in the new year. If Trump loses, and his team makes it final it before Democrat Joe Biden takes office, it’s a “huge headache” for the next administration, Rand said.

“It’s basically like burning down the house on your way out,” Rand said.

Source: Trump Pushes to Reap Biometric Data From Immigrants, Americans

This kind of data is dangerous in and of itself. Keeping it in a centralised database is a horrible idea – history has shown us again and again that these are abused and unsafe. And this is data about people that the people themselves, as well as their families, descendants, can’t change. Ever.

Microsoft Sysmon now logs data copied to the Windows Clipboard

Microsoft has released Sysmon 12, and it comes with a useful feature that logs and captures any data added to the Windows Clipboard.

This feature can help system administrators and incident responders track the activities of malicious actors who compromised a system.

Those not familiar with Sysmon, otherwise known as System Monitor, it is a Sysinternals tool that monitors Windows systems for malicious activity and logs it to the Windows event log.

Sysmon 12 adds clipboard capturing

With the release of Sysmon 12, users can now configure the utility to generate an event every time data is copied to the Clipboard. The Clipboard data is also saved to files that are only accessible to an administrator for later examination.

As most attackers will utilize the Clipboard when copying and pasting long commands, monitoring the data stored in the Clipboard can provide useful insight into how an attack was conducted.

To get started, download Sysmon 12 from its dedicated Sysinternal’s page or https://live.sysinternals.com/sysmon.exe.

Once downloaded, run it from an elevated command prompt, as it needs administrative privileges to run.

Simply running Sysmon.exe without any arguments will display a help screen, and for more detailed information, you can go to the Sysinternals’ Sysmon page.

Sysmon 12 help
Sysmon 12 help

Without any configuration, Sysmon will monitor basic events such as process creation and file time changes.

It is possible to configure it to log many other types of information by creating a Sysmon configuration file, which we will do to enable the new ‘CaptureClipboard’ directive.

For a very basic setup that will enable Clipboard logging and capturing, you can use the configuration file below:

Configuration file enabling the CaptureClipboard feature
Configuration file enabling the CaptureClipboard feature

To start Sysmon and direct it to use the above configuration file, you would enter the following command from an elevated command prompt:

sysmon -i sysmon.cfg.xml

Once started, Sysmon will install its driver and begin collecting data quietly in the background.

All Sysmon events will be logged to ‘Applications and Services Logs/Microsoft/Windows/Sysmon/Operational‘ in the Event Viewer.

With the CaptureClipboard feature enabled, when data is copied into the Clipboard it will generate an ‘Event 24 – Clipboard Changed’ entry in Event Viewer, as shown below.

Event 24 - Clipboard Changed
Event 24 – Clipboard Changed

The event log entry will display what process stored the data in the clipboard, the user who copied it, and when it was done. It will not, though, show the actual data that was copied.

The copied data is instead saved to the protected C:\Sysmon C:\Sysmon folder in files named clip-SHA1_HASH, where the hash is provided in the event above.

For example, the event displayed above would have the Clipboard contents stored in the C:\Sysmon\CLIP-CC849193D18FF95761CD8A702B66857F329BE85B file.

This C:\Sysmon folder is protected with a System ACL, and to access it, you need to download the psexec.exe program and launch a cmd prompt with System privileges using the following command:

psexec -sid cmd

After the new System command prompt is launched, you can go into the C:\Sysmon folder to access the saved Clipboard data.

Protected C:\Sysmon folder
Protected C:\Sysmon folder

When opening the CLIP-CC849193D18FF95761CD8A702B66857F329BE85B file, you can see that it contains a PowerShell command that I copied into the clipboard from Notepad.exe.

Capture Clipboard data
Capture Clipboard data

This PowerShell command is used to clear Shadow Volume Copies in Windows, which can be used by an attacker who wants to make it harder to restore deleted data.

Having this information illustrates how useful this feature can be when performing incident response.

Another useful feature added in Sysmon 11 will automatically create backups of deleted files, allowing administrators to recover files used in an attack.

Source: Microsoft Sysmon now logs data copied to the Windows Clipboard

The Air Force Has Already Flown a Secret Plane That Could Be Its Next Fighter

The U.S. Air Force has quietly built and flown a brand-new aircraft prototype that could become its next-generation fighter, the service’s top acquisition official announced Tuesday.

Dr. Will Roper, assistant secretary of the Air Force for acquisition, technology and logistics, revealed during the virtual 2020 Air, Space and Cyber conference that the new aircraft is part of the Next Generation Air Dominance (NGAD) program, which defies the traditional categorization of a single platform, featuring a network of advanced fighter aircraft, sensors and weapons in a growing and unpredictable threat environment.

“NGAD right now is designing, assembling, testing in the digital world — exploring things that would have cost time and money to wait for physical world results,” he said. “NGAD has come so far that the full-scale flight demonstrator has already flown in the physical world.”

During a roundtable with reporters, Roper declined to give specifics on the project, except that the craft was created using digital engineering, which allows the service to bypass the regular manufacturing process for parts and gives developers more flexibility to design and change blueprints. The service announced Monday that any weapon made using digital concepts will have an “e-” prefix in an effort to showcase these innovative processes.

The new aircraft has “broken a lot of records and is showing digital engineering isn’t a fluke,” Roper said. He declined to comment on whether the defense industry has taken part in the endeavor.

While he touted the expedited process of digital methods, “we don’t want our adversaries to know what they are,” Roper added.

The news comes four years after the Air Force laid out initial plans for what its future fighter jets might look like.

Source: The Air Force Has Already Flown a Secret Plane That Could Be Its Next Fighter | Military.com

All you need to know about FinCEN documents leak

Leaked documents involving about $2tn of transactions have revealed how some of the world’s biggest banks have allowed criminals to move dirty money around the world.

They also show how Russian oligarchs have used banks to avoid sanctions that were supposed to stop them getting their money into the West.

It’s the latest in a string of leaks over the past five years that have exposed secret deals, money laundering and financial crime.

What are the FinCEN files?

The FinCEN files are more than 2,500 documents, most of which were files that banks sent to the US authorities between 2000 and 2017. They raise concerns about what their clients might be doing.

These documents are some of the international banking system’s most closely guarded secrets.

Banks use them to report suspicious behaviour but they are not proof of wrongdoing or crime.

They were leaked to Buzzfeed News and shared with a group that brings together investigative journalists from around the world, which distributed them to 108 news organisations in 88 countries, including the BBC’s Panorama programme.

Hundreds of journalists have been sifting through the dense, technical documentation, uncovering some of the activities that banks would prefer the public not to know about.

Getty
FinCEN Files

  • 2,657documents including
  • 2,121 Suspicious Activity Reports

Source: ICIJ

Two acronyms you need to know

FinCEN is the US Financial Crimes Investigation Network. These are the people at the US Treasury who combat financial crime. Concerns about transactions made in US dollars need to be sent to FinCEN, even if they took place outside the US.

Suspicious activity reports, or SARs, are an example of how those concerns are recorded. A bank must fill in one of these reports if it is worried one of its clients might be up to no good. The report is sent to the authorities.

Why does this matter?

If you are planning to profit from a criminal enterprise, one of the most important things to have in place is a way of laundering the money.

Laundering money is the process of taking dirty money – the proceeds of crimes such as drug dealing or corruption – and getting it into an account at a respected bank where it will not be linked with the crime.

The same process is needed if you are a Russian oligarch whom Western countries have taken sanctions against to stop you getting your money into the West.

Banks are supposed to make sure they don’t help clients to launder money or move it around in ways that break the rules.

By law, they have to know who their clients are – it’s not enough to file SARs and keep taking dirty money from clients while expecting the authorities to deal with the problem. If they have evidence of criminal activity they should stop moving the cash.

Fergus Shiel from the International Consortium of Investigative Journalists (ICIJ) said the leaked files were an “insight into what banks know about the vast flows of dirty money across the globe”.

He said the documents also highlighted the extraordinarily large amounts of money involved. The documents in the FinCEN files cover about $2tn of transactions and they are only a tiny proportion of the SARs submitted over the period.

What has been revealed?

  • HSBC allowed fraudsters to move millions of dollars of stolen money around the world, even after it learned from US investigators the scheme was a scam.
  • JP Morgan allowed a company to move more than $1bn through a London account without knowing who owned it. The bank later discovered the company might be owned by a mobster on the FBI’s 10 Most Wanted list.
  • Evidence that one of Russian President Vladimir Putin’s closest associates used Barclays Bank in London to avoid sanctions which were meant to stop him using financial services in the West. Some of the cash was used to buy works of art.
  • The UK is called a “higher risk jurisdiction” like Cyprus, according to the intelligence division of FinCEN. That’s because of the number of UK registered companies that appear in the SARs. Over 3,000 UK companies are named in the FinCEN files – more than any other country.
  • The United Arab Emirates’ central bank failed to act on warnings about a local firm which was helping Iran evade sanctions.
  • Deutsche Bank moved money launderers’ dirty money for organised crime, terrorists and drug traffickers. More details (BuzzFeed News)
  • Standard Chartered moved cash for Arab Bank for more than a decade after clients’ accounts at the Jordanian bank had been used in funding terrorism.
Image copyright EPA
Image caption Canary Wharf, the heart of London’s banking network

Why is this leak different?

There have been a number of big leaks of financial information in recent years, including:

The FinCEN papers are different because they are not just documents from one or two companies – they come from a number of banks.

They highlight a range of potentially suspicious activity involving companies and individuals and also raise questions about why the banks which had noticed this activity did not always act on their concerns.

FinCEN said the leak could impact on US national security, compromise investigations, and threaten the safety of institutions and individuals who file the reports.

But last week it announced proposals to overhaul its anti-money laundering programmes.

The UK has also unveiled plans to reform its register of company information to clamp down on fraud and money laundering.

Source: All you need to know about FinCEN documents leak

The Hype Machine by Sinan Aral: how does social media form our decisions

Drawing on two decades of his own research and business experience, Aral goes under the hood of the biggest, most powerful social networks to tackle the critical question of just how much social media actually shapes our choices, for better or worse. Aral shows how the tech behind social media offers the same set of behavior-influencing levers to both Russian hackers and brand marketers—to everyone who hopes to change the way we think and act—which is why its consequences affect everything from elections to business, dating to health. Along the way, he covers a wide array of topics, including how network effects fuel Twitter’s and Facebook’s massive growth to the neuroscience of how social media affects our brains, the real consequences of fake news, the power of social ratings, and the impact of social media on our kids.

In mapping out strategies for being more thoughtful consumers of social media, The Hype Machine offers the definitive guide to understanding and harnessing for good the technology that has redefined our world overnight.

Source: The Hype Machine by Sinan Aral: 9780525574514 | PenguinRandomHouse.com: Books

For more information on Dark Patterns and how they affect you, click here

And for another roundup of information on this: How programmers addict you to social media, games and your mobile phone

In A Complete Fluke, A Euro/Jap Spacecraft Is About To Fly Past Venus – And Could Look For Signs Of Life

Earlier this week, scientists announced the discovery of phosphine on Venus, a potential signature of life. Now, in an amazing coincidence, a European and Japanese spacecraft is about to fly past the planet – and could confirm the discovery.

On Monday, September 14, a team of scientists said they had found evidence for phosphine in the atmosphere of Venus. The region in which it was found, about 50 kilometers above the surface, is outside the harsh conditions on the Venusian surface, and could be a habitat for airborne microbes.

[…]

And as luck would have it, a joint mission comprising two spacecraft – one from the European Space Agency (ESA) and the other from the Japanese space agency (JAXA) – is about to fly past Venus that could tell us for sure.

BepiColombo, launched in 2018, is on its way to enter orbit around Mercury, the innermost planet of the Solar System. But to achieve that it plans to use two flybys of Venus to slow itself down, one on October 15, 2020, and another on August 10, 2021.

The teams running the spacecraft already had plans to observe Venus during the flyby. But now, based on this detection of phosphine from telescopes on Earth, they are now planning to use both of these flybys to look for phosphine using an instrument on the spacecraft.

“We possibly could detect phosphine,” says ESA’s Johannes Benkhoff, BepiColombo’s Project Scientist. “But we do not know if our instrument is sensitive enough.”

The instrument on the European side of the mission, called MERTIS (MErcury Radiometer and Thermal Infrared Spectrometer), is designed to study the composition of the surface of Mercury. However, the team believe they can also use it to study the atmospheric composition of Venus during both flybys.

On this first flyby, the spacecraft will get no closer than 10,000 kilometers from Venus. That’s very far, but potentially still close enough to make a detection.

“There actually is something in the spectral range of MERTIS,” says Jörn Helbert from the German Aerospace Center, co-lead on the MERTIS instrument. “So we are now seeing if our sensitivity is good enough to do observations.”

As this first flyby is only weeks away, however, the observation campaign of the spacecraft is already set in stone, making the chance of a discovery slim. More promising is the second flyby next year, which will not only give the team more time to prepare, but also approach just 550 kilometers from Venus.

“[On the first flyby] we have to get very, very lucky,” says Helbert . “On the second one, we only have to get very lucky. But it’s really at the limit of what we can do.”

Source: In A Complete Fluke, A European Spacecraft Is About To Fly Past Venus – And Could Look For Signs Of Life

Epic’s new filing claims Apple lied about Fortnite’s popularity: Apple used Google Trends data!

There’s a new development in the high-profile game of chicken between Apple and Epic. The Fortnite developer’s latest legal filing claims that Apple “cherry-picked” Google data in its own legal filing earlier this week to support its narrative that Fortnite’s declining popularity is the impetus behind all this drama.

Apple has repeatedly argued that Epic started the legal battle over Fortnite in its App Store as a publicity stunt because the game’s hype has started to flatline. In a filing Tuesday, it said that interest in Fortnite had fallen “by nearly 70%” between October 2019 and July 2020 according to Google Trends and that Epic’s lawsuit “appears to be part of a marketing campaign designed to reinvigorate interest in Fortnite.”

But Epic’s calling bullshit on those claims, citing its own user engagement data as proof that the Fortnite hype train is still chugging along just fine, thank you.

“Over the period of time that Apple cherry-picked for its Google search volume comparison… the number of daily active users on Fortnite actually increased by more than 39%,” the company wrote in reply papers filed late Friday evening.

Not to mention that Apple’s decision to cite Google Trends, of all things, is already suspect to begin with. It measures the volume of searches for any given term, but even if people aren’t searching for Fortnite on Google as much as they used to be, that doesn’t prove a correlation between how many people are still playing or downloading the game. I’d put money on this being an Occam’s broom scenario: Apple just went with that statistic because it was the only one they found that proved their point.

As a recap, Apple booted Fortnite off its App Store in August after Epic’s theatrical attempt to circumvent its so-called “Apple Tax,” which requires that developers fork over 30% of revenue from in-app purchases for the privilege of having their app on iOS. The two have been playing a melodramatic game of tit-for-tat ever since. Epic immediately sued, of course, then Apple terminated its App Store developer account for iOS. After that, Epic vowed not to push the Aug. 27 Fortnite update to iOS or macOS in retaliation, and Apple launched a countersuit for compensatory and punitive damages, calling Epic’s actions a deliberate attempt to undermine its iOS ecosystem.

The drama is still playing out in court, with a full court hearing scheduled for Sept. 28. In the case’s first hearing in August, a judge ruled that Apple could kick Fortnite off its App Store but not Epic’s Unreal Engine. Epic has also asked the court to restore both Fortnite and its developer account in the App Store.

It’s likely these two will continue to take jabs at one another throughout this legal drama, so you might as well settle in and grab some popcorn as these incendiary press releases keep flying.

Source: Epic’s new filing claims Apple lied about Fortnite’s popularity

The F-35 Lightning II can’t fly in lightning once again

The most widely used variant of the F-35 Joint Strike Fighter is currently unable to fly in thunderstorms after the discovery of damage to one of the systems it uses to protect itself from lightning, its prime contractor Lockheed Martin said Wednesday.

To safely fly in conditions where lightning is present, the F-35 relies on its Onboard Inert Gas Generation System, or OBIGGS, which pumps nitrogen-enriched air into the fuel tanks to inert them. Without this system, a jet could explode if struck by lightning.

However, damage to one of the tubes that distributes inert gas into the fuel tank was discovered during routine depot maintenance of an F-35A at Hill Air Force Base’s Ogden Logistics Complex in Utah, Lockheed said in a statement.

[…]

“As a safety precaution, the JPO recommended to unit commanders that they implement a lightning flight restriction for the F-35A, which restricts flying within 25 miles of lightning or thunderstorms,” Lockheed said. “We are working with the F-35 Joint Program Office (JPO) on a root cause corrective action investigation to determine next steps.”

[…]

Bloomberg, which obtained a JPO memo dated June 5, reported that flawed tubes were found in 14 of the 24 “A” models inspected.

The JPO did not respond immediately to a request for comment.

For a plane nicknamed “Lightning II,” the F-35′s lightning protection systems have, ironically, become an embarrassing problem issue for the jet at times throughout its development.

The F-35 was prohibited from flying within 25 miles of lightning in the early 2010s after the Pentagon’s weapons tester discovered deficiencies with the original OBIGGs system in getting enough inert gas into the fuel tanks. Those restrictions were rescinded after the OBIGGS was redesigned in 2014.

Source: The F-35 Lightning II can’t fly in lightning once again

Facebook Accused of Watching Instagram Users Through Cameras. FB claims “bug”

Facebook is again being sued for allegedly spying on Instagram users, this time through the unauthorized use of their mobile phone cameras. Bloomberg reports: The lawsuit springs from media reports in July that the photo-sharing app appeared to be accessing iPhone cameras even when they weren’t actively being used. Facebook denied the reports and blamed a bug, which it said it was correcting, for triggering what it described as false notifications that Instagram was accessing iPhone cameras.

In the complaint filed Thursday in federal court in San Francisco, New Jersey Instagram user Brittany Conditi contends the app’s use of the camera is intentional and done for the purpose of collecting “lucrative and valuable data on its users that it would not otherwise have access to.” By “obtaining extremely private and intimate personal data on their users, including in the privacy of their own homes,” Instagram and Facebook are able to collect “valuable insights and market research,” according to the complaint.

Source: Facebook Accused of Watching Instagram Users Through Cameras – Slashdot

Iranian Hackers Beat Encrypted Apps like Telegram, WhatsApp – since 2014

Iranian hackers, most likely employees or affiliates of the government, have been running a vast cyberespionage operation equipped with surveillance tools that can outsmart encrypted messaging systems — a capability Iran was not previously known to possess, according to two digital security reports released Friday.

The operation not only targets domestic dissidents, religious and ethnic minorities and antigovernment activists abroad, but can also be used to spy on the general public inside Iran, said the reports by Check Point Software Technologies, a cybersecurity technology firm, and the Miaan Group, a human rights organization that focuses on digital security in the Middle East.

The reports, which were reviewed by The New York Times in advance of their release, say that the hackers have successfully infiltrated what were thought to be secure mobile phones and computers belonging to the targets, overcoming obstacles created by encrypted applications such as Telegram and, according to Miaan, even gaining access to information on WhatsApp. Both are popular messaging tools in Iran. The hackers also have created malware disguised as Android applications, the reports said.

[…]

According to the report by Check Point’s intelligence unit, the cyberespionage operation was set up in 2014, and its full range of capabilities went undetected for six years.

[…]

The hackers appeared to have a clear goal: stealing information about Iranian opposition groups in Europe and the United States and spying on Iranians who often use mobile applications to plan protests, according to the Miaan report.

Among the most prominent victims of the attacks, the reports said, are the Mujahedeen Khalq, or M.E.K., an insurgent group that the Iranian authorities regard as a terrorist organization; a group known as the Association of Families of Camp Ashraf and Liberty Residents; the Azerbaijan National Resistance organization; citizens of Iran’s restive Sistan and Balochistan Province; and Hrana, an Iranian human rights news agency. Human rights lawyers and journalists working for Voice of America have also been targeted, Miaan said.

According to Check Point, the hackers use a variety of infiltration techniques, including phishing, but the most widespread method is sending what appear to be tempting documents and applications to carefully selected targets.

[…]

These documents contained malware code that activated a number of spyware commands from an external server when the recipients opened them on their desktops or phones. According to the Check Point report, almost all of the targets have been organizations and opponents of the government who have left Iran and are now based in Europe. Miaan documented targets in the United States, Canada and Turkey as well as the European Union.

The spyware enabled the attackers to gain access to almost any file, log clipboard data, take screenshots and steal information. According to Miaan, one application empowered hackers to download data stored on WhatsApp.

In addition, the attackers discovered a weakness in the installation protocols of several encrypted applications including Telegram, which had always been deemed relatively secure, enabling them to steal the apps’ installation files.

These files, in turn, allow the attackers to make full use of the victims’ Telegram accounts. Although the attackers cannot decipher the encrypted communications of Telegram, their strategy makes it unnecessary. Rather, they use the stolen installation files to create Telegram logins to activate the app in the victims’ names on another device. This enables the attackers to secretly monitor all Telegram activity of the victims.

“This cutting-edge surveillance operation succeeded in going under the radar for at least six years,” said Lotem Finkelstein, head of threat intelligence at Check Point. “The group maintained a multi-platform, targeted attack, with both mobile, desktop and web attack vectors, that left no evasion path for victims on the target list.”

[…]

Source: Iranian Hackers Can Beat Encrypted Apps like Telegram, Researchers Say – The New York Times

Estée Lauder products will launch to space. NASA astronauts will fllm them floating around the ISS

The International Space Station has served as the world’s most unique laboratory for two decades, hosting hundreds of scientific experiments, crews of astronauts and even the occasional slime.

But now, NASA, one of the space station’s primary operators, is preparing to oversee the largest push of business activity aboard the ISS. Later this month, up to 10 bottles of a new Estée Lauder (EL) skincare serum will launch to the space station, a NASA spokesperson told CNN Business. NASA astronauts are expected to film the items in the microgravity environment of the ISS and the company will be able to use that footage in ad campaigns or other promotional material.
The details of those plans were first reported by New Scientist magazine.
If the footage is used in a commercial, it would not be the first advertisement filmed in space; nor will it be the first time NASA has worked with corporate advertisers. But it will mark one of the most high-profile cases of NASA offering up the American portion of the space station for capturing zero-gravity footage of a product.
The Estée Lauder partnership will continue NASA’s years-long push to encourage private-sector spending on space projects as the space agency looks to stretch its budget beyond the ISS and focus on taking astronauts back into deep space. Those efforts include allowing the space station to be used for marketing and entertainment purposes.

Source: Estée Lauder products will launch to space. NASA astronauts will fllm them floating around the ISS – CNN

Google bans stalkerware apps from Android store. Which is cool but… why were they allowed in the first place?

In an update to its Android Developer Program Policy, Google on Wednesday said stalkerware apps in its app store can no longer be used to stalk non-consenting adults.

Stalkerware, which the web giant defines as “code that transmits personal information off the device without adequate notice or consent and doesn’t display a persistent notification that this is happening,” may still be used for keeping track of one’s kids.

But starting October 1, 2020, the ad biz says it’s no longer acceptable for Android apps in the Google Play Store to track another person, such as a spouse, without permission, unless there’s a persistent visible notification that data is being transmitted.

The ban follows a similar prohibition in August on Google-served ads for “spyware and technology used for intimate partner surveillance,” which reportedly hasn’t worked very well.

In recent years, computer security experts have argued that the privacy and security risks in intimate relationships remain haven’t been adequately anticipated or addressed.

But rules against invasive behavior aren’t necessarily effective. Via Twitter, Michael Veale, a lecturer at University College London, observed that a 2018 research paper “found that ‘abusers frequently exploit dual-use applications—tools whose main purpose is legitimate but that can be easily repurposed to function as spyware,’ so banning explicit stalkerware of questionable efficacy.”

Google will continue to allow non-stalkerware apps (i.e. policy compliant apps) to monitor and track people, provided the programs are not marketed as surveillance apps, they disclose any such functions, and they present the requisite persistent notification and icon.

Monitoring apps of the permissible sort continue to be subject to removal for violating applicable laws in the locations where they’re published, and may not link to resources (e.g. servers, SDKs) that provide policy violating functions or non-compliant APKs hosted outside the Google Play Store.

Google’s developer policy update also includes a ban on misrepresentation, both for apps and developer accounts. Apps or accounts that impersonate a person or organization, or attempt to conceal the app’s purpose or ownership, or engage in coordinated misleading activity, are no longer allowed.

Source: Google bans stalkerware apps from Android store. Which is cool but… why were they allowed in the first place? • The Register

To answer the question: The tech giants will do almost anything to get  your location information because it allows them to know and control you better.

The Weather Channel app settles suit over selling location data of 49m people without consent

Private Intel Firm Buys Location Data to Track People to their ‘Doorstep’ sourced from innocuous seeming apps

How Location Tracking Actually Works on Your Smartphone (and how to manipulate it – kind of)

Google collects Android location data even if you turn it off and don’t have a SIM card inserted

US carmakers collect and keep driven locations

And some more links

The Weather Channel app settles suit over selling location data of 49m people without consent

IBM and the Los Angeles city attorney’s office have settled a privacy lawsuit brought after The Weather Channel app was found to be selling user location data without proper disclosure. The lawsuit was filed last year, at which point the app had 45 million active users.

IBM has changed the way that users are informed, and also agreed to donate $1M worth of technology to assist LA County with its coronavirus contact tracing efforts …

 

Associated Press reports.

The operator of The Weather Channel mobile app has agreed to change how it informs users about its location-tracking practices and sale of personal data as part of a settlement with the Los Angeles city attorney’s office, officials said Wednesday.

City Attorney Mike Feuer alleged in a 2019 lawsuit that app users were misled when they agreed to share their location information in exchange for personalized forecasts and alerts. Instead, the lawsuit claimed users were unaware they had surrendered personal privacy when the company sold their data to third parties.

Feuer announced the settlement Wednesday with the app’s operator, TWC Product and Technology LLC, and owner IBM Corp. The app’s disclosure screens were initially revised after the lawsuit was filed and future changes that will be monitored by the city attorney’s office are planned.

Source: The Weather Channel app settles suit over selling location data – 9to5Mac

EU Copyright Companies Want Legal Memes Blocked Too Because They Now Admit Upload Filters Are ‘Practically Unworkable’

The passage of the EU Copyright Directive last year represented one of the most disgraceful examples of successful lobbying and lying by the publishing, music, and film industries. In order to convince MEPs to vote for the highly controversial legislation, copyright companies and their political allies insisted repeatedly that the upload filters needed to implement Article 17 (originally Article 13) were optional, and that user rights would of course be respected online. But as Techdirt and many others warned at the time, this was untrue, as even the law’s supporters admitted once it had been passed. Now that the EU member states are starting to implement the Directive, it is clear that there is no alternative to upload filters, and that freedom of speech will therefore be massively harmed by the new law. France has even gone so far as ignore the requirement for the few user protections that the Copyright Directive graciously provides.

The EU Copyright Directive represents an almost total victory for copyright maximalists, and a huge defeat for ordinary users of the Internet in the EU. But if there is one thing that we can be sure of, it’s that the copyright industries are never satisfied. Despite the massive gains already enshrined in the Directive, a group of industry organizations from the world of publishing, music, cinema and broadcasting have written to the EU Commissioner responsible for the Internal Market, Thierry Breton, expressing their “serious concerns regarding the European Commission’s consultation on its proposed guidance on the application of Article 17 of the Directive on Copyright in the Digital Single Market (“the Directive”).” The industry groups are worried that implementation of the EU Copyright Directive will provide them with too little protection (pdf):

We are very concerned that, in its Consultation Paper, the Commission is going against its original objective of providing a high level of protection for rightsholders and creators and to create a level playing field in the online Digital Single Market. It interprets essential aspects of Article 17 of the Directive in a manner that is incompatible with the wording and the objective of the Article, thus jeopardising the balance of interests achieved by the EU legislature in Article 17.

In an Annex to the letter, the copyright industries raise four “concerns” with the proposed guidance on the implementation of Article 17. The former MEP Julia Reda, who valiantly led the resistance against the worst aspects of the Copyright Directive during its passage through the EU’s legislative system, has answered in detail all of the points in a thread on Twitter. It’s extremely clearly explained, and I urge you to read it to appreciate the full horror of what the copyright companies are claiming and demanding. But there is one “concern” of the copyright maximalists that is so outrageous that it deserves to be singled out here. Reda writes:

#Article17 clearly says that legal content must not be blocked. #Uploadfilters can’t guarantee that, so rightholders claim that this is fulfilled as long as users have the right to complain about wrongful blocking *after* it has already happened.

This completely goes against what users fought for in the negotiations and what #Article17 says, that it “shall in no way affect legitimate uses”. Of course, if all legal parodies, quotes etc. get automatically blocked by #uploadfilters, legitimate uses are affected pretty badly.

The copyright companies and their political friends tricked the European Parliament into voting through Article 17 by claiming repeatedly that it did not require upload filters, which were rightly regarded as unacceptable. Now, the companies are happy to admit that the law’s requirement to assess whether uploads are infringing before they are posted — which can only be done using algorithms to filter out infringing material — is “practically unworkable”. Instead, they want blocking to be the default when there is any doubt, forcing users to go through a process of complaining afterwards if they wish their uploads to appear. Since most people will not know how to do this, or won’t have the time or energy to do so, this will inevitably lead to vast amounts of legal material being blocked by filters.

As Reda rightly summarizes:

The entertainment industry is joining forces to push for the worst possible implementation of #Article17, which would not only require out-of-control #uploadfilters without any safeguards, but also violate fundamental rights AND the very text of Article 17 itself.

The EU Copyright Directive’s Article 17 already promises to be disastrous for user creativity and freedom of speech in the EU; unfortunately, the proposed EU guidance has some additional aspects that are problematic for end users (pdf), as a group of civil society organizations point out in their own letter to the EU Commissioner. What the industry’s demands show once again is that no matter how strong copyright is made, no matter how wide its reach, and no matter how disproportionate the enforcement powers are, publishing, music, film and broadcasting companies always want more. Their motto is clearly: “too much is never enough”.

Source: Copyright Companies Want Memes That Are Legal In The EU Blocked Because They Now Admit Upload Filters Are ‘Practically Unworkable’ | Techdirt

Apple burns developer goodwill with surprise release of iOS 14 – giving them one day to update their apps without any clear instructions

developer relations have hit another sour note. At the company’s hardware event on Tuesday, where it announced new Apple Watch devices and iPads, Apple surprised developers with the news that it would be releasing the updated versions of its major software platforms, iOS 14, iPad OS 14, watchOS 7 and tvOS 14 on September 16, giving them less than a day to prepare.

The unexpected and accelerated timeline left many developers scrambling to ready their apps for App Review and has complicated developers’ plans for the iOS 14 launch day.

 

Some, like popular podcast player, Overcast, simply informed its users that its planned iOS 14 features won’t be ready.

Others are less forgiving, noting that Apple’s decision to release iOS 14 without looping in the developer community has added, as developer Steve Troughton-Smith put it, “a whole lot of unnecessary stress on developers in an otherwise stressful year.”

In addition, Apple’s decision impacts those developers who choose to wait to support iOS 14.

Typically, developers will often leverage an iOS launch day to promote their apps’ new features via press releases, blog posts and social media. News coverage from app review sites may even include roundups of notable updates to favorite apps, or highlight those apps that have taken advantage of new iOS features in interesting ways.

This year, instead, the developer community can’t worry about chasing press and accolades, as they now have to get their app ready for the iOS 14 update ahead of schedule.

Source: Apple burns developer goodwill with surprise release of iOS 14 | TechCrunch

Spotify blasts Apple One service as ‘anti-competitive’, wants regulators to act

In a statement, the streaming service argued Apple One will “deprive consumers by favoring its own services” and urged regulators to take action against what it perceives to be “anti-competitive behavior”.

Announced yesterday at Cupertino’s Time Flies launch event, Apple One bundles the firm’s various subscription services into a single monthly payment. The product is organised into several tiers, with the base Individual subscription retailing at £14.95 ($14.95), and including Apple Music, TV+, Arcade, and 50GB of iCloud storage. For £5 or $5 more, you can share that subscription with up to five people.

There’s also a Premier package, which costs £29.95 ($29.95) per month. In addition to the aforementioned services, this bundles Apple’s new Fitness+ product as well as News+.

In comparison, combining Netflix’s standard plan, which supports HD streaming, as well as Spotify Premium, costs roughly £20. Adding Google Play Pass and 100GB of Google One storage brings that total to £27.

This is not the first time Spotify has called upon the anvil of regulation against Apple. In June, the European Commission commenced investigations against the Apple, following complaints from Spotify about Apple’s in-app payment policies, which it alleged are designed to give an unfair advantage to its own products, like Apple Music.

The previous year, Spotify began a PR blitz called “Time to Play Fair“, again centred on the App Store payment rules and Apple’s 30 per cent cut, which it claims are driving up costs for its customers.

Source: Sounds like Spotify and Epic have been chatting: Music streamer blasts Apple One service as ‘anti-competitive’ • The Register

Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)

Last month, Microsoft patched a very interesting vulnerability that would allow an attacker with a foothold on your internal network to essentially become Domain Admin with one click. All that is required is for a connection to the Domain Controller to be possible from the attacker’s viewpoint.

Secura’s security expert Tom Tervoort previously discovered a less severe Netlogon vulnerability last year that allowed workstations to be taken over, but the attacker required a Person-in-the-Middle (PitM) position for that to work. Now, he discovered this second, much more severe (CVSS score: 10.0) vulnerability in the protocol. By forging an authentication token for specific Netlogon functionality, he was able to call a function to set the computer password of the Domain Controller to a known value. After that, the attacker can use this new password to take control over the domain controller and steal credentials of a domain admin.

The vulnerability stems from a flaw in a cryptographic authentication scheme used by the Netlogon Remote Protocol, which among other things can be used to update computer passwords. This flaw allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls on their behalf.

Secura urges everybody to install the patch on all their domain controllers as fast as possible. Please refer to Microsoft’s advisory. We published a test tool on Github, which you can download here: https://github.com/SecuraBV/CVE-2020-1472 that can tell you whether a domain controller is vulnerable or not.

If you are interested in the technical details behind this pretty unique vulnerability and how it was discovered, download the whitepaper here.

Source: [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)

Gods & Monsters Isn’t The First Time Monster Energy Has Been Annoying About Naming Rights – unbelievable that you can trademark an actual word!

Monster Beverage tried to stop Ubisoft from trademarking the name “Gods & Monsters” earlier this year to prevent confusion between its brand of highly caffeinated sodas and the upcoming action adventure game. It turns out this is the sort of thing Monster does a lot.

Monster routinely challenges “monster”-related trademarks, including, tactical gear, ice cream, and dog treats.

The news about Gods & Monsters, which Ubisoft announced earlier this month had been renamed Immortals: Fenyx Rising, was first reported by TechRaptor based on publicly available filings with the U.S. Patent and Trademark Office. In a 186-page filing dated April 3, Monster argued in part that the Gods & Monsters name would conflict with its own because of the drink company’s involvement in sponsoring esports teams, tournaments, as well as actual video games. Surely you’ve heard of Monster Energy Supercross: The Official Videogame?

“[Monster] has built up, at great expense and effort, valuable goodwill in its MONSTER Marks and has developed strong common law rights in its MONSTER Marks,” the company wrote. Ubisoft responded a month later with a much briefer eight-page filing denying Monster’s claims.

One of Monster Energy’s claims against Ubisoft’s Gods & Monsters trademark.
One of Monster Energy’s claims against Ubisoft’s Gods & Monsters trademark.
Screenshot: Kotaku

The publisher has also claimed that the name change from Gods & Monsters to the inscrutable Immortals: Fenyx Rising was entirely its own idea. “The change of name was entirely because of the vision of the game,” game director Julien Galloudec told VGC in an interview last week. He went on:

The game changed a lot, to the point where we felt we needed a new name to be better aligned with that updated vision, so that’s where we decided to change to Immortals Fenyx Rising, a name that combines the notion of the timeless aspect of the Greek mythology with the immortals. And also I like the new era, Fenyx, and adjoining that epic adventure.

Ubisoft did not respond to a request for comment.

A quick search on the Trademark Office website reveals 25 current pending notices of opposition to other companies using the name “Monster.” The cases range from disputes with other food and beverage companies to seemingly completely unrelated businesses like toy manufacturers.

For example, Monster took issue with Nikko Toys’ line of remote control Mega Monster trucks because it, too, has at one time or another plastered its logo on the sides of toy cars. The company even went after someone trying to sell dog treats called “Monster Bully Sticks,” to which the maker of those dog treats basically responded that it is unlikely anyone would confuse a giant beef tendon for dogs to chew on with a can of Monster Energy.

The brand’s tagline is “Unleash the Beast.” A more appropriate one might be, “Unleash the lawyers.”

Source: Gods & Monsters Isn’t The First Time Monster Energy Has Been Annoying About Naming Rights