The Linkielist

Linking ideas with the world

The Linkielist

About Robin Edgar

Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft

Google offers refunds after North smart glasses stop working or why cloud sucks and you want things running locally

Smart glasses company North has told customers that their $600 (£460) purchases will stop working in a few days’ time.

The Canadian company, recently purchased by Google, says its Focals glasses will cease functioning on Friday.

From then, owners will not be able to use “any features” of the glasses, or connect to the companion app.

But the company has also said it will automatically refund all customers.

It promised to send the purchase price back to the original payment method, and to contact those customers whose refunds it could not process.

At the end of June, North announced it was being acquired by Google, and would not release a planned second-generation device.

It also said it would “wind down” its first generation smart glasses, released last year.

Customers found out that meant the smart glasses would be rendered “dumb” through a statement published on the company’s website and by email.

The Focals glasses, however, come with prescription lenses as an option, meaning they can function as everyday prescription eyewear. The bulky frames, housing a laser, battery, and other kit will no longer do anything that regular spectacles cannot do.

Ben Wood, chief analyst at CCS Insight, said the pulling of features from cloud-powered hardware is not uncommon – and something that has happened to him before.

“If you want to be an early adopter and have some fun new tech that an ambitious start-up has created, there’s always a risk that they won’t be able to make the business plan stack up,” he warned.

“That could either mean the service stops working or you end up finding you have to pay additional charges to maintain service continuity.”

Source: Google offers refunds after smart glasses stop working – BBC News

When a Customer Gets Refunded For a Paid App, Apple Doesn’t Refund the 30% Cut They Took From The Developer

When a customer gets refunded for an app they purchased, Apple doesn’t refund the 30% cut they took from the developer, says developer Simeon Saens of Two Lives Left. While [online] payment processors generally don’t refund fees on refunded payments, “the App Store doesn’t position itself as a payments processor the way Stripe does, so it sounds really weird that they would act like one,” writes HN user chadlavi. Epic Games CEO Tim Sweeney says in a tweet: This is a critical consideration in these 30% store fees. They come off the top, before funding any developer costs. As a result, Apple and Google make more profit from most developers’ games than the developers themselves. That is terribly unfair and exploitative. “If the app store took a 3% chunk and never refunded it regardless of the ongoing status of the transaction, that would put them right in line with other payment processors,” adds chadlavi. “It would also still net them billions of dollars, I think!”

Source: When a Customer Gets Refunded For a Paid App, Apple Doesn’t Refund the 30% Cut They Took From The Developer – Slashdot

Aside from that, 30% is an insane amount of cut to steal off someone with no other option but to use your marketplace.

Hackers Broke Into Real News Sites to Plant Fake Stories

On Wednesday, security firm FireEye released a report on a disinformation-focused group it’s calling Ghostwriter. The propagandists have created and disseminated disinformation since at least March 2017, with a focus on undermining NATO and the US troops in Poland and the Baltics; they’ve posted fake content on everything from social media to pro-Russian news websites. In some cases, FireEye says, Ghostwriter has deployed a bolder tactic: hacking the content management systems of news websites to post their own stories. They then disseminate their literal fake news with spoofed emails, social media, and even op-eds the propagandists write on other sites that accept user-generated content.

That hacking campaign, targeting media sites from Poland to Lithuania, has spread false stories about US military aggression, NATO soldiers spreading coronavirus, NATO planning a full-on invasion of Belarus, and more. “They’re spreading these stories that NATO is a danger, that they resent the locals, that they’re infected, that they’re car thieves,” says John Hultquist, director of intelligence at FireEye. “And they’re pushing these stories out with a variety of means, the most interesting of which is hacking local media websites and planting them. These fictional stories are suddenly bona fide by the sites that they’re on, and then they go in and spread the link to the story.”

[…]

the company’s analysts have found that the news site compromises and the online accounts used to spread links to those fabricated stories, as well as the more traditional creation of fake news on social media, blogs, and websites with an anti-US and anti-NATO bent, all tie back to a distinct set of personas, indicating one unified disinformation effort. FireEye’s Hultquist points out that the campaign doesn’t seem financially motivated, indicating a political or state backer, and notes that the focus on driving a wedge between NATO and citizens of Eastern Europe hints at possible Russian involvement.

Nor would it be the first time that Russian hackers planted fake news stories; in 2017, US intelligence agencies concluded that Russian hackers breached Qatar’s state news agency and planted a fake news story designed to embarrass the country’s leader and cause a rift with the US, though US intelligence never confirmed the Kremlin’s involvement.

“We can’t concretely tie it to Russia at this time, but it’s certainly in line with their interests,” Hultquist says of the Ghostwriter campaign. “It wouldn’t be a surprise to me if this is where the evidence leads us.”

Source: Hackers Broke Into Real News Sites to Plant Fake Stories | WIRED

If you own one of these 45 Netgear devices, replace it: Firm won’t patch vulnerable gear despite live proof-of-concept code

Netgear has quietly decided not to patch more than 40 home routers to plug a remote code execution vulnerability – despite security researchers having published proof-of-concept exploit code.

The vuln was revealed publicly in June by Trend Micro’s Zero Day Initiative (ZDI) following six months spent chivvying Netgear behind the scenes to take it seriously.

Keen-eyed Reg readers, however, noticed that Netgear quietly declared 45 of the affected products as “outside the security support period” – meaning those items won’t be updated to protect them against the vuln.

America’s Carnegie-Mellon University summarised the vuln in a note from its Software Engineering Institute: “Multiple Netgear devices contain a stack buffer overflow in the httpd web server’s handling of upgrade_check.cgi, which may allow for unauthenticated remote code execution with root privileges.”

Stung by pressure from infosec researchers that came to a head in June when ZDI went public, Netgear began issuing patches. It had sorted out 28 of the 79 vulnerable product lines by the end of that month.

Infosec biz Grimm pitched in after independently discovering the vuln itself by publishing proof-of-concept exploits for the SOHO (Small Office/Home Office) devices.

With today’s revelation that 45 largely consumer and SME-grade items will never be patched, Netgear faces questions over its commitment to older product lines. Such questions have begun to be addressed in Britain by calls from government agencies for new laws forcing manufacturers to reveal devices’ design lifespans at the point of purchase.

[…]

Today Netgear’s advisory page for the patches shows 45 devices’ fix status as “none; outside security support period”. We have collected those devices’ model numbers in the list below:

  • AC1450
  • D6300
  • DGN2200v1
  • DGN2200M
  • DGND3700v1
  • LG2200D
  • MBM621
  • MBR1200
  • MBR1515
  • MBR1516
  • MBR624GU
  • MBRN3000
  • MVBR1210C
  • R4500
  • R6200
  • R6200v2
  • R6300v1
  • R7300DST
  • WGR614v10
  • WGR614v8
  • WGR614v9
  • WGT624v4
  • WN2500RP
  • WN2500RPv2
  • WN3000RP
  • WN3000RPv2
  • WN3000RPv3
  • WN3100RP
  • WN3100RPv2
  • WN3500RP
  • WNCE3001
  • WNCE3001v2
  • WNDR3300v1
  • WNDR3300v2
  • WNDR3400v1
  • WNDR3400v2
  • WNDR3400v3
  • WNDR3700v3
  • WNDR4000
  • WNDR4500
  • WNDR4500v2
  • WNR3500v1
  • WNR3500Lv1
  • WNR3500v2
  • WNR834Bv2

Source: If you own one of these 45 Netgear devices, replace it: Firm won’t patch vulnerable gear despite live proof-of-concept code • The Register

See When Other Apps Use Your Microphone or Camera With This Android App

you can get this functionality by downloading and installing a simple app from the Google Play Store: Access Dots. It’s free, it’s easy, and it helps you up your Android’s security game. I would almost call it a must-install for anyone, because it’s as unobtrusive as it is helpful.

Download and launch the app, and you’ll see one simple setting you have to enable. That’s all you have to do to fire up Access Dots’ basic functionality.

Illustration for article titled See When Other Apps Use Your Microphone or Camera With This Android App
Screenshot: David Murphy

Well, that and tapping on the new “Access Dots” listing in your Accessibility settings, and then enabling the service there, too.

Illustration for article titled See When Other Apps Use Your Microphone or Camera With This Android App
Screenshot: David Murphy

Head back to your Android’s Home screen and…you won’t see anything. Zilch. That’s the point. Pull up your Camera app, however, and you’ll see a big green icon appear in the upper-right corner of your device. Tap on your Google Assistant’s microphone icon, and you’ll see an orange dot; the same as what iOS 14 users see.

Illustration for article titled See When Other Apps Use Your Microphone or Camera With This Android App
Screenshot: David Murphy

If you don’t like these colors, you can change them to whatever you want in Access Dots’ settings. You can even change the location of said dot, as well as its size. Tap on the little “History” icon in Access Dots’ main UI—you can’t miss it—and you’ll even be able to browse a log of which apps requested camera of microphone access and for how long they used it:

Though I’m not a huge fan of how many ads litter the Access Dots app, I respect someone’s need to make a little cash. You only see them when you launch the app. Otherwise, all you’ll see on your phone are those dots. That’s not a terrible trade-off, I’d say, given how much this simple security app can do.

Source: See When Other Apps Use Your Microphone or Camera With This Android App

Hackers stole GitHub and GitLab OAuth tokens from Git analytics firm Waydev – this is why you don’t give cloud access to your crown jewels

Waydev, a San Francisco-based company, runs a platform that can be used to track software engineers’ work output by analyzing Git-based codebases. To do this, Waydev runs a special app listed on the GitHub and GitLab app stores.

When users install the app, Waydev receives an OAuth token that it can use to access its customers’ GitHub or GitLab projects. Waydev stores this token in its database and uses it on a daily basis to generate analytical reports for its customers.

Waydev CEO and co-founder Alex Circei told ZDNet today in a phone call that hackers used a blind SQL injection vulnerability to gain access to its database, from where they stole GitHub and GitLab OAuth tokens.

The hackers then used some of these tokens to pivot to other companies’ codebases and gain access to their source code projects.

Source: Hackers stole GitHub and GitLab OAuth tokens from Git analytics firm Waydev | ZDNet

GRUB2, you’re getting too bug for your boots: Config file buffer overflow is a boon for malware seeking to drill deeper into a system

An annoying vulnerability in the widely used GRUB2 bootloader can be potentially exploited by malware or a rogue insider already on a machine to thoroughly compromise the operating system or hypervisor while evading detection by users and security tools.

[…]

Designated CVE-2020-10713, the vulnerability allows a miscreant to achieve code execution within the open-source bootloader, and effectively control the device at a level above the firmware and below any system software. Bug hunters at Eclypsium, who found the flaw and dubbed it BootHole, said patching the programming blunder will be a priority and a headache for admins.

To be clear, malware or a rogue user must already have administrator privileges on the device to exploit the flaw, which for the vast majority of victims is a game-over situation anyway. You’ve likely lost all your data and network integrity at that point. What this bootloader bug opens up is the ability for a determined miscreant to burrow deeper, run code at a low level below other defenses, and compromise the foundation of a system to the point where they cannot be easily detected by administrators nor antivirus.

Source: GRUB2, you’re getting too bug for your boots: Config file buffer overflow is a boon for malware seeking to drill deeper into a system • The Register

Origins of the sarsen megaliths at Stonehenge

The sources of the stone used to construct Stonehenge around 2500 BCE have been debated for over four centuries. The smaller “bluestones” near the center of the monument have been traced to Wales, but the origins of the sarsen (silcrete) megaliths that form the primary architecture of Stonehenge remain unknown. Here, we use geochemical data to show that 50 of the 52 sarsens at the monument share a consistent chemistry and, by inference, originated from a common source area. We then compare the geochemical signature of a core extracted from Stone 58 at Stonehenge with equivalent data for sarsens from across southern Britain. From this, we identify West Woods, Wiltshire, 25 km north of Stonehenge, as the most probable source area for the majority of sarsens at the monument.

Source: Origins of the sarsen megaliths at Stonehenge | Science Advances

We’re suing Google for harvesting our personal info even though we opted out of Chrome sync – netizens

A handful of Chrome users have sued Google, accusing the browser maker of collecting personal information despite their decision not to sync data stored in Chrome with a Google Account.

The lawsuit [PDF], filed on Monday in a US federal district court in San Jose, California, claimed Google promises not to collect personal information from Chrome users who choose not to sync their browser data with a Google Account but does so anyway.

“Google intentionally and unlawfully causes Chrome to record and send users’ personal information to Google regardless of whether a user elects to Sync or even has a Google account,” the complaint stated.

Filed on behalf of “unsynced” plaintiffs Patrick Calhoun, Elaine Crespo, Hadiyah Jackson and Claudia Kindler – all said to have stopped using Chrome and to wish to return to it, rather than use a different browser, once Google stops tracking unsynced users – the lawsuit cited the Chrome Privacy Notice.

Since 2016, that notice has promised, “You don’t need to provide any personal information to use Chrome.” And since 2019, it has said, “the personal information that Chrome stores won’t be sent to Google unless you choose to store that data in your Google Account by turning on sync,” with earlier versions offering variants on that wording.

Nonetheless, whether or not account synchronization has been enabled, it’s claimed, Google uses Chrome to collect IP addresses linked to user agent data, identifying cookies, unique browser identifiers called X-Client Data Headers, and browsing history. And it does so supposedly in violation of federal wiretap laws and state statutes.

Google then links that information with individuals and their devices, it’s claimed, through practices like cookie syncing, where cookies set in a third-party context get associated with cookies set in a first-party context.

“Cookie synching allows cooperating websites to learn each other’s cookie identification numbers for the same user,” the complaint says. “Once the cookie synching operation is complete, the two websites exchange information that they have collected and hold about a user, further making these cookies ‘Personal Information.'”

The litigants pointed to Google’s plan to phase out third-party cookies, and noted Google doesn’t need cookies due to the ability of its X-Client-Data Header to uniquely identify people.

Source: We’re suing Google for harvesting our personal info even though we opted out of Chrome sync – netizens • The Register

Scientists are 3-D printing miniature human organs to test coronavirus drugs

Whether the goal is to find a treatment for COVID-19 or another disease, scientists often have to conduct preliminary tests on animals to determine whether the drug is safe or effective in people. It’s not always a one-for-one comparison, but The New York Times reports there may be a new way around that step going forward: 3-D printing.

For example, Anthony Atala, the director of the Wake Forest Institute for Regenerative Medicine, and his team are using 3-D printers to create tiny replicas of human organs, including miniature lungs and colons, which are particularly affected by the coronavirus. They send them overnight for testing at a biosafety lab at George Mason University.

The idea predated the coronavirus — Atala said he never thought “we’d be considering this for a pandemic” — but it could come in handy and help expedite the experimental drug process, especially since Atala said his Winston-Salem, North Carolina-based lab can churn out thousands of printed organs per hour. “The 3-D models can circumvent animal testing and make the pathway stronger from the lab to the clinic,” said Akhilesh Gaharwar, who directs a lab in the biomedical engineering at Texas A&M University. Read more at The New York Times. Tim O’Donnell

Source: Scientists are 3-D printing miniature human organs to test coronavirus drugs

Twitter Contractors Abused Access to Beyoncé’s Account: Report

Twitter contractors with high-level administrative access to accounts regularly abused their privileges to spy on celebrities including Beyoncé, including approximating their movements via internet protocol addresses, according to a report by Bloomberg.

Over 1,500 workers and contractors at Twitter who handle internal support requests and manage user accounts have high-level privileges that enable them to override user security settings and reset their accounts via Twitter’s backend, as well as view certain details of accounts like IP addresses, phone numbers, and email addresses.

[…]

Two of the former Twitter employees told Bloomberg that projects such as enhancing security of “the system that houses Twitter’s backup files or enhancing oversight of the system used to monitor contractor activity were, at times, shelved for engineering products designed to enhance revenue.” In the meantime, some of those with access (some of whom were contractors with Cognizant at up to six separate work sites) abused it to view details including IP addresses of users. Executives didn’t prioritize policing the internal support team, two of the former employees told Bloomberg, and at times Twitter security allegedly had trouble tracking misconduct due to sheer volume.

A system was in place to create access logs, but it could be fooled by simply creating bullshit support tickets that made the spying appear legitimate; two of the former employees told Bloomberg that from 2017 to 2018 members of the internal support team “made a kind of game out of” the workaround. The security risks inherent to granting access to so many people were reportedly brought up to the company’s board repeatedly from 2015-2019, but little changed.

This had consequences beyond the most recent hack. Last year, the Department of Justice announced charges against two former employees (a U.S. national and a Saudi citizen) that it accused of espionage on behalf of an individual close to Saudi Crown Prince Mohammed bin Salman. The DOJ alleged that the intent of the operation was to gain access to private information on political dissidents.

Source: Twitter Contractors Abused Access to Beyoncé’s Account: Report

Microsoft raised Apple’s app store with US house antitrust group

A US House antitrust committee is getting set to grill tech’s biggest CEOs, but Microsoft wants them to focus on one in particular: Apple’s Tim Cook. Microsoft President Brad Smith met with the committee several weeks ago and relayed concerns about how Apple manages its App Store, according to the The Information (via Bloomberg).

Smith complained specifically about Apple’s arbitrary App Store approval policy which recently caused a ruckus over the rejection of Basecamp’s Hey email app. He also railed against Apple’s payment requirement that allows it to take as much as a 30 percent cut of developers’ revenue. That policy is currently the subject of an EU antitrust investigation launched at the behest of Spotify.

The antitrust committee originally called Smith to get Microsoft’s take on the current antitrust climate, given that the company was the subject of US investigations in the 2000s. Smith said that Apple’s App Store rules impede competition to a much higher degree than Microsoft did with Windows when it was found guilty of antitrust violations two decades ago. Smith didn’t criticize other tech companies during the interview.

Apple has largely avoided the privacy-related investigations faced by Google and Facebook, but now finds itself in the middle of antitrust probes on both sides of the Atlantic. With its old frenemy Microsoft adding to the complaints, Apple could face a lot of heat when the House Judiciary Antitrust hearings kick off next Monday on July 27th.

Source: Microsoft raised Apple’s app store with US house antitrust group | Engadget

After talking about this since early 2019 it’s nice to see stuff actually happening

Epic Games CEO speaks out against Apple, Google app store monopoly

Tim Sweeney, CEO of Fortnite developer Epic Games, criticized Apple and Google for having an “absolute monopoly” on app stores in a Friday interview with CNBC. There aren’t many viable options for distributing mobile software outside the Apple App Store and the Google Play Store, and Sweeney chides both for taking a 30 percent fee from in-app purchases.

Epic Games launched the Epic Games Store in late 2018 for Windows and Mac computers, and only charges other publishers a 12 percent fee on in-app purchases. The Epic Games Store hasn’t made it to the App Store because of Apple’s strict guidelines against competing software stores.

“They [Apple] are preventing an entire category of businesses and applications from being engulfed in their ecosystem by virtue of excluding competitors from each aspect of their business that they’re protecting,” Sweeney said.

Epic previously made Fortnite available to Android devices not by offering it on the Google Play Store, but instead through a launcher on the Fortnite website that downloaded the game. This allowed Epic to sidestep the 30 percent fee from Google. But the download process was too involved for many users, so Fortnite eventually launched on Google Play earlier this year. Sweeney said the company still plans to bring the Epic Games Store to Android. “Google essentially intentionally stifles competing stores by having user interface barriers and obstruction,” Sweeney said.

Epic isn’t the first company to speak out against Apple and Google’s 30 percent fee. In March of last year, Spotify CEO Daniel Ek filed an unfair competition complaint against Apple with the European Commission, citing the fee as forcing them to artificially inflate the price of its Spotify Premium membership. Last July, Tinder introduced a default payment process into its Android app meant to bypass the Google Play Store fee.

Source: Epic Games CEO speaks out against Apple, Google app store ‘monopoly’ | Engadget

I have been talking about the growing monopoly of the tech giants since beginning of 2019

Will Garmin Pay $10 Million Ransom To End Two-Day Outage?

Garmin is reportedly being asked to pay a $10 million ransom to free its systems from a cyberattack that has taken down many of its services for two days.

The navigation company was hit by a ransomware attack on Thursday, leaving customers unable to log fitness sessions in Garmin apps and pilots unable to download flight plans for aircraft navigation systems, among other problems. The company’s communication systems have also been taken offline, leaving it unable to respond to disgruntled customers.

Garmin employees have told BleepingComputer that the company was struck down by the WastedLocker ransomware. Screenshots sent to BleepingComputer show long lists of the company’s files encrypted by the malware, with a ransom note attached to each file.

MORE FROM FORBESSpotify Security Hole Lets Strangers Into Your Family Account

The ransom note tells the recipient to email one of two email addresses to “get a price for your data”. That price, Garmin’s sources have told BleepingComputer, is $10 million.

Crippled Garmin

The ransomware attack has crippled many of the company’s systems. Reports claim that Garmin’s IT department shut down all of the company’s computers, including those of employees working from home who were connected by VPN, to halt the spread of the ransomware across its network.

Garmin’s Taiwan factories have reportedly closed production lines yesterday and today while the company attempts to unpick the ransomware.

The shutdown is having a big effect on Garmin’s customers. DownDetector reveals a huge spike today in people having trouble accessing Garmin Connect, the app that logs fitness routines for the company’s devices. More people are likely to be using such devices at the weekend.

The problem is even more serious for Garmin’s aviation device customers. Pilots have told ZDNet that they are unable to download a version of Garmin’s aviation database onto their airplane navigation systems, which is an FAA requirement.

Garmin has issued very little public comment about the problem. On Thursday, the company issued a tweet saying “we are currently experiencing an outage that affects Garmin Connect,” adding that the outage “also affects our call centers and we are currently unable to receive any calls, emails or online chats”.

Garmin has been approached for comment, but as you can appreciate from the statement above, that’s somewhat complicated…

Source: Will Garmin Pay $10 Million Ransom To End Two-Day Outage?

Cognitive Radios Will Go Where No Deep-Space Mission Has Gone Before

Space seems empty and therefore the perfect environment for radio communications. Don’t let that fool you: There’s still plenty that can disrupt radio communications. Earth’s fluctuating ionosphere can impair a link between a satellite and a ground station. The materials of the antenna can be distorted as it heats and cools. And the near-vacuum of space is filled with low-level ambient radio emanations, known as cosmic noise, which come from distant quasars, the sun, and the center of our Milky Way galaxy. This noise also includes the cosmic microwave background radiation, a ghost of the big bang. Although faint, these cosmic sources can overwhelm a wireless signal over interplanetary distances.

Depending on a spacecraft’s mission, or even the particular phase of the mission, different link qualities may be desirable, such as maximizing data throughput, minimizing power usage, or ensuring that certain critical data gets through. To maintain connectivity, the communications system constantly needs to tailor its operations to the surrounding environment.

Imagine a group of astronauts on Mars. To connect to a ground station on Earth, they’ll rely on a relay satellite orbiting Mars. As the space environment changes and the planets move relative to one another, the radio settings on the ground station, the satellite orbiting Mars, and the Martian lander will need continual adjustments. The astronauts could wait 8 to 40 minutes—the duration of a round trip—for instructions from mission control on how to adjust the settings. A better alternative is to have the radios use neural networks to adjust their settings in real time. Neural networks maintain and optimize a radio’s ability to keep in contact, even under extreme conditions such as Martian orbit. Rather than waiting for a human on Earth to tell the radio how to adapt its systems—during which the commands may have already become outdated—a radio with a neural network can do it on the fly.

Such a device is called a cognitive radio. Its neural network autonomously senses the changes in its environment, adjusts its settings accordingly—and then, most important of all, learns from the experience. That means a cognitive radio can try out new configurations in new situations, which makes it more robust in unknown environments than a traditional radio would be. Cognitive radios are thus ideal for space communications, especially far beyond Earth orbit, where the environments are relatively unknown, human intervention is impossible, and maintaining connectivity is vital.

Worcester Polytechnic Institute and Penn State University, in cooperation with NASA, recently tested the first cognitive radios designed to operate in space and keep missions in contact with Earth. In our tests, even the most basic cognitive radios maintained a clear signal between the International Space Station (ISS) and the ground. We believe that with further research, more advanced, more capable cognitive radios can play an integral part in successful deep-space missions in the future, where there will be no margin for error.

Future crews to the moon and Mars will have more than enough to do collecting field samples, performing scientific experiments, conducting land surveys, and keeping their equipment in working order. Cognitive radios will free those crews from the onus of maintaining the communications link. Even more important is that cognitive radios will help ensure that an unexpected occurrence in deep space doesn’t sever the link, cutting the crew’s last tether to Earth, millions of kilometers away.

Cognitive radio as an idea was first proposed by Joseph Mitola III at the KTH Royal Institute of Technology, in Stockholm, in 1998. Since then, many cognitive radio projects have been undertaken, but most were limited in scope or tested just a part of a system. The most robust cognitive radios tested to date have been built by the U.S. Department of Defense.

When designing a traditional wireless communications system, engineers generally use mathematical models to represent the radio and the environment in which it will operate. The models try to describe how signals might reflect off buildings or propagate in humid air. But not even the best models can capture the complexity of a real environment.

A cognitive radio—and the neural network that makes it work—learns from the environment itself, rather than from a mathematical model. A neural network takes in data about the environment, such as what signal modulations are working best or what frequencies are propagating farthest, and processes that data to determine what the radio’s settings should be for an optimal link. The key feature of a neural network is that it can, over time, optimize the relationships between the inputs and the result. This process is known as training.

[…]

Source: Cognitive Radios Will Go Where No Deep-Space Mission Has Gone Before – IEEE Spectrum

EU demands strange concessions from Google over Fitbit deal – wants to share movement data to third parties

The EU has demanded that Google make major concessions relating to its $2.1 billion acquisition of fitness-tracking company Fitbit if the deal is to be allowed to proceed imminently, according to people with direct knowledge of the discussions.

Since it was announced last November, the acquisition has faced steep opposition from consumer groups and regulators, who have raised concerns over the effect of Google’s access to Fitbit’s health data on competition.

EU regulators now want the company to pledge that it will not use that information to “further enhance its search advantage” and that it will grant third parties equal access to it, these people said.

The move comes days after the EU regulators suffered a major blow in Luxembourg, losing a landmark case that would have forced Apple to pay back €14.3 billion in taxes to Ireland.

Brussels insiders said that a refusal by Google to comply with the new demands would probably result in a protracted investigation, adding that such a scenario could ultimately leave the EU at a disadvantage.

“It is like a poker game,” said a person following the case closely. “In a lengthy probe, the commission risks having fewer or no pledges and still having to clear the deal.”

They added that the discussions over the acquisition were “intense,” and there was no guarantee that any agreement between Brussels and Google would be reached.

Google had previously promised it would not use Fitbit’s health data to improve its own advertising, but according to Brussels insiders, the commitment was not sufficient to assuage the EU’s concerns nor those of US regulators also examining the deal.

Source: EU demands major concessions from Google over Fitbit deal | Ars Technica

Uhmmm so they want everybody to have access to this extremely private data?

More than 1,000 people at Twitter had ability to aid hack of accounts

Twitter said on Saturday that the perpetrators “manipulated a small number of employees and used their credentials” to log into tools and turn over access to 45 accounts. here On Wednesday, it said that the hackers could have read direct messages to and from 36 accounts but did not identify the affected users.

The former employees familiar with Twitter security practices said that too many people could have done the same thing, more than 1,000 as of earlier in 2020, including some at contractors like Cognizant.

Twitter declined to comment on that figure and would not say whether the number declined before the hack or since. The company was looking for a new security head, working to better secure its systems and training employees on resisting tricks from outsiders, Twitter said. Cognizant did not respond to a request for comment.

“That sounds like there are too many people with access,” said Edward Amoroso, former chief security officer at AT&T. Responsibilities among the staff should have been split up, with access rights limited to those responsibilities and more than one person required to agree to make the most sensitive account changes. “In order to do cyber security right, you can’t forget the boring stuff.”

Threats from insiders, especially lower-paid outside support staff, are a constant worry for companies serving large numbers of users, cyber security experts said. They said that the greater the number of people who can change key settings, the stronger oversight must be.

[…]

On a call to discuss company earnings on Thursday, Twitter Chief Executive Jack Dorsey acknowledged past missteps.

“We fell behind, both in our protections against social engineering of our employees and restrictions on our internal tools,” Dorsey told investors.

Source: Exclusive: More than 1,000 people at Twitter had ability to aid hack of accounts – Reuters

Giant waves of sand are moving on Mars

Researchers have spotted large waves of martian sand migrating for the first time. The discovery dispels the long-held belief that these “megaripples” haven’t moved since they formed hundreds of thousands of years ago. They’re also evidence of stronger-than-expected winds on the Red Planet.

It’s pretty staggering that humans can detect these changes on Mars, says Ralph Lorenz, a planetary scientist at the Johns Hopkins University Applied Physics Laboratory who was not involved in the research. “We can now measure processes on the surface of another planet that are just a couple times faster than our hair grows.”

Megaripples are found in deserts on Earth, often between dunes. Waves in the sand spaced up to tens of meters apart, they’re a larger version of ripples that undulate every 10 centimeters or so on many sand dunes.

But unlike dunes, megaripples are made up of two sizes of sand grains. Coarser, heavier grains cap the crests of megaripples, making it harder for wind to move these features around, says Simone Silvestro, a planetary scientist at Italy’s National Institute of Astrophysics in Naples.

Since the early 2000s, Mars rovers and orbiters have repeatedly spotted megaripples on the Red Planet. But they didn’t seem to change in any measurable way, which led some scientists to think they were relics from Mars’s past, when its thicker atmosphere permitted stronger winds.

Now, using images captured by NASA’s Mars Reconnaissance Orbiter, Silvestro and his colleagues have shown that some megaripples do creep along—just very slowly.

The researchers focused on two sites near the equator of Mars. They analyzed roughly 1100 megaripples in McLaughlin crater and 300 in the Nili Fossae region. They looked for signs of movement by comparing time-lapse images of each site—taken 7.6 and 9.4 years apart, respectively. Megaripples in both regions advanced by about 10 centimeters per year, the team reports in the Journal of Geophysical Research: Planets. That’s about how fast megaripples move in the Lut Desert of Iran.

It’s a surprise that megaripples move at all on Mars, says Jim Zimbelman, a planetary geologist at the Smithsonian Institution’s Air and Space Museum. Just a few decades ago, there was no evidence that sands on Mars were mobile, he says. “None of us thought that the winds were strong enough.”

[…]

Source: Giant waves of sand are moving on Mars | Science | AAAS

Ongoing Meow attack has nuked >4,000 MongoDB and Elastic databases with default settings left on

More than 1,000 unsecured databases so far have been permanently deleted in an ongoing attack that leaves the word “meow” as its only calling card, according to Internet searches over the past day.

The attack first came to the attention of researcher Bob Diachenko on Tuesday, when he discovered a database that stored user details of the UFO VPN had been destroyed. UFO VPN had already been in the news that day because the world-readable database exposed a wealth of sensitive user information, including:

  • Account passwords in plain text
  • VPN session secrets and tokens
  • IP addresses of both user devices and the VPN servers they connected to
  • Connection timestamps
  • Geo-tags
  • Device and OS characteristics
  • Apparent domains from which advertisements are injected into free users’ Web browsers

Besides amounting to a serious privacy breach, the database was at odds with the Hong Kong-based UFO’s promise to keep no logs. The VPN provider responded by moving the database to a different location but once again failed to secure it properly. Shortly after, the Meow attack wiped it out.

Representatives of UFO didn’t immediately respond to an email seeking comment.

Since then, Meow and a similar attack have destroyed more than 1,000 other databases. At the time this post went live, the Shodan computer search site showed that 987 ElasticSearch and 70 MongoDB instances had been nuked by Meow. A separate, less-malicious attack tagged an additional 616 ElasticSearch, MongoDB, and Cassandra files with the string “university_cybersec_experiment.” The attackers in this case seem to be demonstrating to the database maintainers that the files are vulnerable to being viewed or deleted.

Just for fun

It’s not the first time attackers have targeted unsecured databases, which have become increasingly common with the growing use of cloud computing services from Amazon, Microsoft, and other providers. In some cases, the motivation is to make money through ransomware rackets. In other cases—including the current Meow attacks—the data is simply wiped out with no ransomware note or any other explanation. The only thing left behind in the current attacks is the word “meow.”

One database affected by the Meow attack.
One database affected by the Meow attack.

“I think that in most [of the latter] cases, malicious actors behind the attacks do it just for fun, because they can, and because it is really simple to do,” Diachenko told me. “Thus, it is another wake-up call for the industry and companies which ignore cyber hygiene and lose their data and data of their customers in a blink of an eye.”

Source: Ongoing Meow attack has nuked >1,000 databases without telling anyone why | Ars Technica

SpaceX’s Starlink Satellites ‘Photo-Bombing’ Shots of Comet Neowise

“Comet Neowise has been the brightest and most visible space snowball in a generation, but it’s also the first naked-eye comet to visit us in the new era of satellite mega-constellations like SpaceX’s Starlink,” writes CNET.

Image

“In just the latest episode of Starlink ‘trains’ irritating astronomers, a number of images have been circulating of the satellites photo-bombing Comet Neowise glamour shots…”

Live Science explains: Visible just above the horizon right now, the comet appears faint and small to the naked eye, but can be seen clearly through cameras with long, telephoto lenses. Usually, when photographers capture objects like this in the night sky they use long exposure times, leaving the camera aperture open to collect light over the course of several seconds. But now comet-chasers report that a new fleet of SpaceX’s Starlink satellites is leaving bright smears across their NEOWISE snaps, as the shiny orbiters streak through their frames during long exposures.

Source: SpaceX’s Starlink Satellites Accused of ‘Photo-Bombing’ Shots of Comet Neowise – Slashdot

Historic Moon Landing Footage Enhanced By AI, and the Results Are Incredible

“A photo and film restoration specialist, who goes by the name of DutchSteamMachine, has worked some AI magic to enhance original Apollo film, creating strikingly clear and vivid video clips and images,” reports Universe Today: Take a look at this enhanced footage from an Apollo 16 lunar rover traverse with Charlie Duke and John Young, where the footage that was originally shot with 12 frames per second (FPS) has been increased to 60 FPS… And I was blown away by the crisp view of the Moon’s surface in this enhanced view of Apollo 15’s landing site at Hadley Rille… Or take a look at how clearly Neil Armstrong is visible in this enhanced version of the often-seen “first step” video from Apollo 11 taken by a 16mm video camera inside the Lunar Module…

The AI that DutchSteamMachine uses is called Depth-Aware video frame INterpolation, or DAIN for short. This AI is open source, free and constantly being developed and improved upon… “People have used the same AI programs to bring old film recordings from the 1900s back to life, in high definition and colour,” he said. “This technique seemed like a great thing to apply to much newer footage….”

DutchSteamMachine does this work in his spare time, and posts it for free on his YouTube page. His tagline is “Preserving the past for the future…” And he’s planning to keep it all coming. “I plan to improve tons of Apollo footage like this,” he said. “A lot more space and history-related footage is going to be published on my YT channel continuously.” He also has a Flickr page with more enhanced imagery. [And a Patreon page…]
Long-time Slashdot reader schwit1 calls it “similar to what Peter Jackson did with old World War I footage for They Shall Not Grow Old .”

Source: Historic Moon Landing Footage Enhanced By AI, and the Results Are Incredible – Slashdot

Instagram and 50 other apps found that quietly access iOS device’s camera

Apple’s iOS 14 beta has proven surprisingly handy at sussing out what apps are snooping on your phone’s data. It ratted out LinkedIn, Reddit, and TikTok for secretly copying clipboard content earlier this month, and now Instagram’s in hot water after several users reported that their camera’s “in use” indicator stays on even when they’re just scrolling through their Instagram feed.

According to reports shared on social media by users with the iOS 14 beta installed, the green “camera on” indicator would pop up when they used the app even when they weren’t taking photos or recording videos. If this sounds like deja vu, that’s because Instagram’s parent company, Facebook, had to fix a similar issue with its iOS app last year when users found their device’s camera would quietly activate in the background without their permission while using Facebook.

In an interview with the Verge, an Instagram spokesperson called this issue a bug that the company’s currently working to patch.

[…]

Even though iOS 14 is still in beta mode and its privacy features aren’t yet available to the general public, it’s already raised plenty of red flags about apps snooping on your data. Though TikTok, LinkedIn, and Reddit may have been the most high-profile examples, researchers Talal Haj Bakry and Tommy Mysk found more than 50 iOS apps quietly accessing users’ clipboards as well. And while there are certainly more malicious breaches of privacy, these kinds of discoveries are a worrying reminder about how much we risk every time we go online.

Source: Instagram to fix bug that quietly accesses iOS device’s camera

Video Game HUDs Used To Be Cool

Video games look really good these days. I boot up almost any PS4 game released in the last few years and I’m impressed. But while games might look nicer than ever before, we lost cool looking “heads-up displays”, HUDs, in the process. Was it worth it?

I’ve been playing a lot of Assassin’s Creed: Odyssey lately. A lot. And it got me interested in the past games, most of which I played long ago when they first released. In going back and looking at these games, I immediately noticed something. Their HUDs were so much cooler than what’s in Odyssey.

Here’s a screenshot of Odyssey via Stephen’s wonderful post about an annoying bow that he kept finding.

Illustration for article titled Video Game HUDs Used To Be Cool
Screenshot: Ubisoft

Now here’s a screenshot of the first Assassin’s Creed via WSGF.com.

Illustration for article titled Video Game HUDs Used To Be Cool
Screenshot: Ubisoft (Fair Use)

Look at the weird map! And the cool looking DNA-inspired life bar. I also like how high contrast it feels. Odyssey’s HUD is clean and efficient. It gets the job done, for sure, but it lacks personality. And if we go back even further, to the PS2 era of gaming, we can find even more wild HUDs, as pointed about by Twitter user @BlacWeird a few months back.

Here’s what the HUD looked like in SkyGunner. It’s got a steampunk vibe to it.

Illustration for article titled Video Game HUDs Used To Be Cool
Screenshot: Atlus (Fair Use)

Or how about Project Snowblind. What is happening in that mini-map in the top right? I have no idea.

Illustration for article titled Video Game HUDs Used To Be Cool
Screenshot: Edios / Square Enix

And even a less obscure PS2 game, the original God of War, had a giant sword for its health meter.

Illustration for article titled Video Game HUDs Used To Be Cool
Screenshot: Sony

Compared that last screen to this screenshot from the newest entry in the God of War series, confusingly named God of War, released on PS4 back in 2018.

Illustration for article titled Video Game HUDs Used To Be Cool
Screenshot: Sony

Again, like Odyssey, it works great. But it also has almost no personality. It’s boring. And yet, for the most part, this is what all video game HUDs have become. Clean, slightly transparent boxes and white lines that often fade away when not needed. I understand, and even agree, that these new HUDS are more effective at translating information and data to players. But there has to be a middle ground?

An example of a game that has HUD graphics that aren’t boring, but not too weird or big is last year’s Devil May Cry 5.

Illustration for article titled Video Game HUDs Used To Be Cool
Screenshot: Capcom

The text is sharp and clean and the icons are small, but there’s also a variety of colors, a weird devil face, and some broken glass on the corners. It has style. It doesn’t look like a console from a JJ Abrams Star Trek film. It looks exciting but also I can clearly understand what information the game is sharing with me, which is always vital.

Source: Video Game HUDs Used To Be Cool

 

US govt says Chinese duo hacked, stole blueprints from just about everyone and then extorted cash.

On Tuesday, the US Department of Justice charged two Chinese nationals with allegedly hacking hundreds of organizations and individuals in America and elsewhere to steal confidential corporate secrets on behalf of Beijing for more than a decade.

The pilfered files are said to be worth hundreds of millions of dollars, and in some cases, it is claimed, the pair tried to extort money out of their victims: pay up, or the trade secrets leak.

The targeted organizations are said to include a British AI and cancer research biz, an Australian defense contractor, a South Korean shipbuilder and engineering giant, German software makers, American pharmaceutical, software, and defense corporations, and the US Dept of Energy’s Hanford site.

Assistant Attorney General John Demers and other US officials held a press conference on Tuesday to unseal the 11-count indictment [PDF], returned by a grand jury on July 7, against Li Xiaoyu, 34, and Dong Jiazhi, 33.

“The campaign targeted intellectual property and confidential business information held by the private sector, including COVID-19-related treatment, testing, and vaccines,” said Demers in prepared remarks.

“The hackers also targeted the online accounts of non-governmental organizations and individual dissidents, clergy, and democratic and human rights activists in the United States, China, Hong Kong, and abroad.”

According to the indictment, Li and Dong, former classmates at an electrical engineering college in Chengdu, China, have been hacking into high tech manufacturing, civil, industrial, and medical engineering firms, software companies of all sorts, solar companies, and pharmaceuticals, among others, since 2009.

The US claims that the two accused worked both for themselves and with the backing of the Chinese government’s Ministry of State Security. This assistance included being supplied with zero-day vulnerabilities exploits to facilitate their intrusion.

But often their hacking sprees, it’s alleged, involved the exploitation of publicly known vulnerabilities. The accused hackers are said to have used a program called China Chopper to install web shells to execute commands on victims’ networks and exfiltrate documents. The duo also uploaded password-stealing malware, it is claimed.

The pilfered data, it’s claimed, was often packed up on the RAR archive files that were concealed through the use of innocuous file names and common file extensions like .jpg. The hackers are said to have frequently used the recycle bin on Windows machines to store and move files because administrators are less likely to look there.

Adding insult to injury

“The defendants stole hundreds of millions of dollars’ worth of trade secrets, intellectual property, and other valuable business information,” the indictment says.

“At least once, they returned to a victim from which they had stolen valuable source code to attempt an extortion – threatening to publish on the internet, and thereby destroy the value of, the victim’s intellectual property unless a ransom was paid.”

The indictment also accuses the pair of providing Chinese authorities with the passwords of email accounts belonging to Chinese dissidents and to academics in the US and other countries.

Recently, Li and Dong are said to have been researching vulnerabilities in the networks of biotech firms involved in COVID-19 vaccine research. It’s claimed they have gone after organizations and individuals in the United States, Australia, Belgium, Germany, Japan, Lithuania, the Netherlands, Spain, South Korea, Sweden, and the United Kingdom.

“China’s anti-competitive behavior and flagrant disregard for their promises not to engage in cyber-enabled intellectual property theft is not just a domestic issue; it is a global issue,” said Demers.

The defendants have each been charged with one count of conspiracy to commit computer fraud, theft of trade secrets, wire fraud, and unauthorized access of a computer, and with seven counts of aggravated identity theft.

China has no extradition treaty with the US, and relations between two countries are not particularly cordial at the moment, which makes it highly unlikely either of the two defendants will ever appear in a US courtroom unless they get really stupid crossing borders. That seems unlikely now.

Source: Bad: US govt says Chinese duo hacked, stole blueprints from just about everyone. Also bad: They extorted cash • The Register

Sick of AI engines scraping your pics for facial recognition? Fawkes breaks the AI for you

Researchers at the University of Chicago’s Sand Lab have developed a technique for tweaking photos of people so that they sabotage facial-recognition systems.

The project, named Fawkes in reference to the mask in the V for Vendetta graphic novel and film depicting 16th century failed assassin Guy Fawkes, is described in a paper scheduled for presentation in August at the USENIX Security Symposium 2020.

Fawkes consists of software that runs an algorithm designed to “cloak” photos so they mistrain facial recognition systems, rendering them ineffective at identifying the depicted person. These “cloaks,” which AI researchers refer to as perturbations, are claimed to be robust enough to survive subsequent blurring and image compression.

The paper [PDF], titled, “Fawkes: Protecting Privacy against Unauthorized Deep Learning Models,” is co-authored by Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, and Ben Zhao, all with the University of Chicago.

“Our distortion or ‘cloaking’ algorithm takes the user’s photos and computes minimal perturbations that shift them significantly in the feature space of a facial recognition model (using real or synthetic images of a third party as a landmark),” the researchers explain in their paper. “Any facial recognition model trained using these images of the user learns an altered set of ‘features’ of what makes them look like them.”

Figure 16 from the Fawkes: Protecting Privacy against Unauthorized Deep Learning Models paper

Two examples from the paper showing how different levels of perturbation applied to original photos can derail a facial-recognition system so that future matches are unlikely or impossible … Click to enlarge. Credit: Shan et al.

The boffins claim their pixel scrambling scheme provides greater than 95 per cent protection, regardless of whether facial recognition systems get trained via transfer learning or from scratch. They also say it provides about 80 per cent protection when clean, “uncloaked” images leak and get added to the training mix alongside altered snapshots.

They claim 100 per cent success at avoiding facial recognition matches using Microsoft’s Azure Face API, Amazon Rekognition, and Face++. Their tests involve cloaking a set of face photos and providing them as training data, then running uncloaked test images of the same person against the mistrained model.

Fawkes differs from adversarial image attacks in that it tries to poison the AI model itself, so it can’t match people or their images to their cloaked depictions. Adversarial image attacks try to confuse a properly trained model with specific visual patterns.

The researchers have posted their Python code on GitHub, with instructions for users of Linux, macOS, and Windows. Interested individuals may wish to try cloaking publicly posted pictures of themselves so that if the snaps get scraped and used to train to a facial recognition system – as Clearview AI is said to have done – the pictures won’t be useful for identifying the people they depict.

Fawkes is similar in some respects to the recent Camera Adversaria project by Kieran Browne, Ben Swift, and Terhi Nurmikko-Fuller at Australian National University in Canberra.

Camera Adversia adds a pattern known as Perlin Noise to images that disrupts the ability of deep learning systems to classify images. Available as an Android app, a user could take a picture of, say, a pipe and it would not be a pipe to the classifier.

The researchers behind Fawkes say they’re working on macOS and Windows tools that make their system easier to use.

Source: Sick of AI engines scraping your pics for facial recognition? Here’s a way to Fawkes them right up • The Register