About Robin Edgar

Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft

Virgin Galactic: Alignment pin mishap reported to FAA. If only Musk did that too.

Virgin Galactic has reported itself to the US Federal Aviation Administration (FAA) after discovering a detached alignment pin from the mechanism used to keep its suborbital spaceplane attached to the mothership aircraft.

According to the company, the alignment pin is used to ensure the spaceplane (in this case, Unity) is aligned correctly to the mothership (VMS Eve) during the mating of the vehicles on the ground.

In flight, the pin helps to transfer load from drag and other forces from Unity to the shear pin fitting assembly and into the pylon and center wing of the mothership. The alignment pin remained in place during the mated portion of the flight, but detached after Unity was released.

Virgin Galactic said: “While both parts play a role during mated flight, they do not support the spaceship’s weight, nor do they have an active function once the spaceship is released.”

However, having bits of your launch system detach unexpectedly is not great, despite the success of Galactic 06, a suborbital spaceflight launched on January 26, 2024. The mission carried a crew of six, including four private passengers, on a jaunt to just over 55 miles above the Earth before gliding back to a landing at Spaceport America.

The next flight of Unity is planned for the second quarter of 2024, although Virgin Galactic cautioned that this would depend on the review’s outcome.

In November 2023, boss Michael Colglazier announced that flights would be paused from mid-2024 to allow the company to focus on building its upcoming Delta class of spaceplane. Colglazier also announced that approximately 18 percent of the workforce were to be let go.

Virgin Galactic said of the incident: “At no time did the detached alignment pin pose a safety impact to the vehicles or the crew on board.”

VMS Eve completed a lengthy maintenance period just over a year ago, followed by the company commencing commercial operations. Having something fall off, even as minor as a pin that did not affect flight safety is, therefore, a worry.

The company has not elaborated on the cause of the incident or responded to The Register’s queries.

The FAA gave us the following statement: “A mishap occurred during the Virgin Galactic Galactic 06 commercial human spaceflight mission from Spaceport America in New Mexico on Jan. 26. Eight people were on the suborbital mission: two pilots on the WhiteKnightTwo carrier aircraft, and two pilots and four spaceflight participants on the SpaceShipTwo spacecraft. The mishap involved an issue with an alignment pin that provides connection between the carrier aircraft and the spacecraft.

“No public injuries or public property damage have been reported. The FAA is overseeing the Virgin Galactic-led mishap investigation to ensure the company complies with its FAA-approved mishap investigation plan and other regulatory requirements.” ®

Source: Virgin Galactic: Alignment pin mishap wouldn’t affect safety • The Register

Netherlands reveals Chinese attack on defence servers using CoatHanger malware on Fortinet Devices – a real pain to remove

Dutch authorities are lifting the curtain on an attempted cyberattack last year at its Ministry of Defense (MoD), blaming Chinese state-sponsored attackers for the espionage-focused intrusion.

Specialists from the Netherlands’ Military Intelligence and Security Service (MIVD) and the General Intelligence and Security Service (AIVD) were called in to investigate an intrusion at an MOD network last year, uncovering a previously unseen malware they’re calling Coathanger.

The name, authorities said, was conjured up based on the “peculiar phrase” displayed by the malware when encrypting the configuration on disk: “She took his coat and hung it up.”

A deep dive into Coathanger’s code revealed the remote access trojan (RAT) was purpose-built for Fortinet’s FortiGate next-generation firewalls (NGFWs) and the initial access to the MoD’s network was gained through exploiting CVE-2022-42475.

According to the MIVD and AIVD, the RAT operates outside of traditional detection measures and acts as a second-stage malware, mainly to establish persistent access for attackers, surviving reboots and firmware upgrades.

Even fully patched FortiGate devices could still have Coathanger installed if they were compromised before upgrading.

In the cybersecurity advisory published today, authorities said the malware was highly stealthy and difficult to detect using default FortiGate CLI commands, since Coathanger hooks most system calls that could identify it as malicious.

They also made clear that Coathanger is definitely different from BOLDMOVE, another RAT targeting FortiGate appliances.

“For the first time, the MIVD has chosen to make public a technical report on the working methods of Chinese hackers. It is important to attribute such espionage activities by China,” said defense minister Kajsa Ollongren in an automatically translated statement. “In this way, we increase international resilience against this type of cyber espionage.”

The advisory also noted that Dutch authorities had previously spotted Coathanger present on other victims’ networks too, prior to the incident at the MOD.

As for attribution, MIVD and AIVD said they can pin Coathanger to Chinese state-sponsored attackers with “high confidence.”

“MIVD and AIVD emphasize that this incident does not stand on its own, but is part of a wider trend of Chinese political espionage against the Netherlands and its allies,” the advisory reads.

The attackers responsible for the attack were known for conducting “wide and opportunistic” scans for exposed FortiGate appliances vulnerable to CVE-2022-42475 and then exploiting it using an obfuscated connection.

After gaining an initial foothold inside the network, which was used by the MOD’s research and development division, the attackers performed reconnaissance and stole a list of user accounts from the Active Directory server.

Not much else was said about the attacker’s activity, other than the fact that the overall impact of the intrusion was limited thanks to the MOD’s network segmentation.

For those worried about whether Chinese cyberspies are lurking in their firewall, the Joint Signal Cyber Unit of the Netherlands (JCSU-NL) published a full list of indicators of compromise (IOCs) and various detection methods on its GitHub page.

The collection of materials includes YARA rules, a JA3 hash, CLI commands, file checksums, and more. The authorities said each detection method should be seen as independent and used together since some focus on general IOCs and others were developed to spot Coathanger activity specifically.

If there is evidence of compromise, it’s possible other hosts that are reachable by the FortiGate device are also compromised. There is also an increased likelihood that attackers may perform hands-on-keyboard attacks.

Affected users should isolate their device immediately, collect and review logs, and consider calling in third-party digital forensics specialists, the advisory reads. Victims should also inform their country’s cybersecurity authority: NCSC, CISA, etc.

The only way to remove Coathanger from an infected device is to completely reformat the device, before reinstalling and reconfiguring it.

Whiffs of China’s involvement in CVE-2022-42475 exploits have long been suspected, but for the first time they’re confirmed today.

First disclosed in December 2022, a month later Fortinet said it was aware that the vulnerability was tied to the breach of a government or government-related organization that had been infected with custom-made malware.

At the time, no fingers were officially pointed other than the fact that this custom malware was compiled on a machine in the UTC+8 timezone, so realistically it was most likely going to be either China or Russia.

China was also accused of being behind exploits of separate Fortinet bug in March, again using bespoke malware for the purposes of cyber espionage. ®

Source: Netherlands reveals Chinese spies attacked its defense dept • The Register

You should be reading your news through an RSS reader

[…] one of the main roles of RSS is to supply directly to you a steady stream of updates from a website. Every new article published on that site is served up in a list that can be interpreted by an RSS reader.

In earlier, simpler internet times, RSS was the way to keep up to date with what was happening on all of your favorite sites. You would open your RSS reader and tap through newly published articles one by one, in chronological order, in the same way you would check your email. It was an easy way to keep tabs on what was new and what was of interest.

[…]

RSS is essentially a standard for serving up text and images in a feed-like format, and not all that dissimilar to HTML. Typically, the feed includes the headline of an article, some of the text (often just the introduction), and perhaps the main image.

[…]

Even when a site doesn’t explicitly offer RSS feeds, the best RSS readers can now produce their own approximation of them by watching for new activity on a site, so you can direct the app toward the site you want to keep tabs on.

[…]

RSS is clearly useful if you have a selection of favorite websites and you want to skim through everything they publish (or everything they publish in a certain category, if the site has several feeds).

[…]

Using RSS means you can catch up on everything, methodically and chronologically, even if you’ve been offline for a week (you don’t have to catch up on everything, of course—but you can, if you want, as your feed will operate on an infinite scroll). It’s also a cleaner, less cluttered way of using the internet, as you only need click through on the specific articles you want to read.

[…]

The best RSS feed running is arguably Feedly, which offers a bunch of features across free and paid-for plans: It has a clean, clear interface, it can generate RSS feeds for sites that don’t have them, it can sort feeds in a variety of ways, it can incorporate email newsletters, and much more besides.

[…]

Source: Embrace RSS: These Are the Best RSS Reader Apps in 2024 | Lifehacker

This is an amazing way to run through multiple news sources quickly.

Orient at 45o for stronger, better looking 3D Printed Enclosures

When it comes to 3D printing, the orientation of your print can have a significant impact on strength, aesthetics, and functionality or ease of printing. The folks at Slant 3D have found that printing enclosures at a 45° provides an excellent balance of these properties, with some added advantages for high volume printing. The trick is to prevent the part from falling over when balance on a edge, but in the video after the break [Gabe Bentz]  demonstrate Slant 3D’s solution of minimalist custom supports.

The traditional vertical or horizontal orientations come with drawbacks like excessive post-processing and weak layer alignment. Printing at 45° reduces waste and strengthens the end product by aligning the layer lines in a way that resists splitting across common stress points. When scaling up production, this orientation comes with the added advantage of minimal bed contact area, allowing the printer to auto-eject the part by pushing it off the bed with print head.

 

To keep the part stable while printing in this orientation Slant 3D designed a fin-like support structure attached to the back of the enclosure with small sprues. This wastes significantly less time and material than auto-generated supports, and snaps away cleanly, leaving behind minimal imperfections that are easily addressed. To improve aesthetics and hide layer lines, Slant 3D also recommend adding texture to the external surfaces of enclosures. On 3D printed parts this detail costs nothing, while it would have added significant costs to injection molded parts.

We’re intrigued by this creative twist on 3D printing’s capabilities—proving once again that a simple shift in perspective (or in this case, orientation) can unlock new design potentials.

Slant 3D use FDM 3D printing for mass production [Gabe] even hosted a Hack Chat on the subject. They have come up with a number of innovative design tricks which are also useful for the hobbyist. These include improved corner brackets, robust living hinges and better alignment features for 3d printed assemblies.

Source: An Alternative Orientation For 3D Printed Enclosures | Hackaday

Criticism as Dutch domain registry plans move to Amazon cloud

Questions are being asked in parliament about the decision by Dutch domain registration foundation SIDN to transfer the dot nl domain and its “complete ICT services” to Amazon’s cloud services. 

SIDN says the move will make managing the technology easier but some tech entrepreneurs have doubts, and now MPs have asked the government, which supports the idea of keeping .nl on Dutch or European servers, to explain why the move has been sanctioned. 

Tech entrepreneur Bert Hubert told BNR radio he opposes the idea of shifting the domain to cloud operators in the US. “If your servers are on your own continent and under your legal surveillance, then you can also be sure that no one will mess with your data,” he said. 

The added value of keeping .nl domain names under Dutch control also means “we control it ourselves and can innovate with it ourselves… When you outsource, you always lose your knowledge,” he said. 

Simon Besteman, managing director of the Dutch Cloud Community said on social media he was shocked by SIDN’s decision. “We have been inundated with questions from the Dutch internet community and our members… who have questions about the ethical as well as compliance and moral aspects.”

SIDN says that all data will remain on European servers and that users will not notice any difference in practice. It also argues that Amazon has the extremely specialised services it needs, and that these are not available in Europe.  

It was a difficult decision to move the systems to Amazon, SIDN technology chief Loek Bakker said in a reaction to the criticism.

“Although we seek to contribute to the strategic digital autonomy of the Netherlands and Europe in numerous ways, the need to assure the permanent availability of .nl and the protection of our data was decisive in this instance. That is, after all, our primary responsibility as a registry.”

Nevertheless, he said “We will be using generic, open-source technology, so that, as soon as it becomes responsible to migrate the system to a Dutch or European cloud service provider, we can do so relatively easily.”

You can smell the nonsense here very clearly – SIDN was and should be a  highly technical company. Apparently the bean counters have taken over and kicked out all the expertise in the name of… cost cutting? Are they aware that the costs of AWS are often higher than the costs of self maintenance? But the manager gets a nice trip to the US in a private jet or something like it?

And nothing about AWS is open source – they are in fact known for taking open source projects and then forking them and then pricing them through the nose.

MPs from GroenLinks, the PvdA and D66 have now asked the government to explain why the move is being made, Hubert said.

SIDN is a foundation that has the right to exploit the .nl domain name, earning some €21 million a year in the process. More than six million .nl domains have been registered. 

Source: Criticism as Dutch domain registry plans move to Amazon cloud – DutchNews.nl

Cloudflare Hacked

cloudflare bad gateway error page

Web security company Cloudflare on Thursday revealed that a threat actor used stolen credentials to gain access to some of its internal systems.

The incident was discovered on November 23, nine days after the threat actor, believed to be state-sponsored, used credentials compromised in the October 2023 Okta hack to access Cloudflare’s internal wiki and bug database.

The stolen login information, an access token and three service account credentials, were not rotated following the Okta incident, allowing the attackers to probe and perform reconnaissance of Cloudflare systems starting November 14, the security firm explains.

According to Cloudflare, the attackers managed to access an AWS environment, as well as Atlassian Jira and Confluence, but network segmentation prevented them from accessing its Okta instance and the Cloudflare dashboard.

With access to the Atlassian suite, the threat actor started looking for information on the Cloudflare network, searching the wiki for “things like remote access, secret, client-secret, openconnect, cloudflared, and token”. In total, 36 Jira tickets and 202 wiki pages were accessed.

On November 16, the attackers created an Atlassian account to gain persistent access to the environment, and on November 20 returned to verify that they still had access.

On November 22, the threat actor installed the Sliver Adversary Emulation Framework, gaining persistent access to the Atlassian server, which was then used to move laterally. They attempted to access a non-production console server at a São Paulo, Brazil, data center that is not yet operational.

The attackers viewed 120 code repositories and downloaded 76 of them to the Atlassian server, but did not exfiltrate them.

“The 76 source code repositories were almost all related to how backups work, how the global network is configured and managed, how identity works at Cloudflare, remote access, and our use of Terraform and Kubernetes. A small number of the repositories contained encrypted secrets which were rotated immediately even though they were strongly encrypted themselves,” Cloudflare notes.

The attackers used a Smartsheet service account to access Cloudflare’s Atlassian suite, and the account was terminated on November 23, within 35 minutes after the unauthorized access was identified. The user account created by the attacker was found and deactivated 48 minutes later.

Cloudflare says it also put in place firewall rules to block the attackers’ known IP addresses and that the Sliver Adversary Emulation Framework was removed on November 24.

[…]

The goal of the attack, Cloudflare says, was to obtain information on the company’s infrastructure, likely to gain a deeper foothold. CrowdStrike performed a separate investigation into the incident, but discovered no evidence of additional compromise.

“We are confident that between our investigation and CrowdStrike’s, we fully understand the threat actor’s actions and that they were limited to the systems on which we saw their activity,” Cloudflare notes.

Source: Cloudflare Hacked by Suspected State-Sponsored Threat Actor  – SecurityWeek

EU countries give crucial nod to first-of-a-kind Artificial Intelligence law

The ambassadors of the 27 countries of the European Union unanimously approved the world’s first comprehensive rulebook for Artificial Intelligence, rubber-stamping the political agreement reached in December.

In December, EU policymakers reached a political agreement on the main sticking points of the AI Act, a flagship bill to regulate Artificial Intelligence based on its capacity to cause harm. The complexity of the law meant its technical refinement took more than one month.

On 24 January, the Belgian presidency of the Council of EU Ministers presented the final version of the text, leaked in an exclusive by Euractiv, at a technical meeting. Most member states maintained reservations at the time as they did not have enough time to analyse the text comprehensively.

These reservations were finally lifted with the adoption of the AI Act from the Committee of Permanent Representatives on Friday (2 February). However, the green light from EU ambassadors was not guaranteed since some European heavyweights resisted parts of the provisional deal until the very last days.

European Union squares the circle on the world’s first AI rulebook

After a 36-hour negotiating marathon, EU policymakers reached a political agreement on what is set to become the global benchmark for regulating Artificial Intelligence.

Powerful AI models

The primary opponent of the political agreement was France, which, together with Germany and Italy, asked for a lighter regulatory regime for powerful AI models, such as Open AI’s GPT-4, that support General Purpose AI systems like ChatGPT and Bard.

Europe’s three largest economies asked for limiting the rules in this area to codes of conduct, as they did not want to clip the wings to promising European start-ups like Mistral AI and Aleph Alpha that might challenge American companies in this space.

Read: France, Germany and Italy were deeply in the pocket of AI firm lobbyists and created a lot of time wasting opposition to good laws, allowing the big boys to gain further grounds over the little guys whilst they were themselves signing letters asking for moratoriums on dangerous world destroying AI research.

However, the European Parliament was united in asking for hard rules for these models, considering that it was unacceptable to carve out the most potent types of Artificial Intelligence from the regulation while leaving all the regulatory burden on smaller actors.

The compromise was based on a tiered approach, with horizontal transparency rules for all models and additional obligations for compelling models deemed to entail a systemic risk.

[…]

The Belgian presidency put the member states before a ‘take-it-or-leave-it’ scenario and, despite attempts from France to delay the ambassadors’ vote, kept a tight timeline -partially to allow enough time for the legal polishing of the text and partially to limit last-minute lobbying.

French back-room manoeuvring aimed at gathering sufficient opposition to obtain concessions in the text or even reject the provisional agreement.

However, the balance titled decisively against Paris as Berlin decided to support the text earlier this week. The German Digital Minister, the liberal Volker Wissing, found himself isolated in its opposition to the AI rulebook from the coalition partners and had to drop his reservations.

Italy, always the most defiladed country of the sceptical trio as it does not have a leading AI start-up to defend, also decided not to oppose the AI Act. Despite discontent with the agreement, Rome opted to avoid drama as it holds the rotating presidency of the G7, where AI is a crucial topic.

[…]

EU countries still have room to influence how the AI law will be implemented, as the Commission will have to issue around 20 acts of secondary legislation. The AI Office, which will oversee AI models, is also set to be significantly staffed with seconded national experts.

Next steps

The European Parliament’s Internal Market and Civil Liberties Committees will adopt the AI rulebook on 13 February, followed by a plenary vote provisionally scheduled for 10-11 April. The formal adoption will then be complete with endorsement at the ministerial level.

The AI Act will enter into force 20 days after publication in the official journal. The bans on the prohibited practices will start applying after six months, whereas the obligations on AI models will start after one year.

All the rest of the rules will kick in after two years, except for the classification of AI systems that have to undergo third-party conformity assessment under other EU rules as high-risk, which was delayed by one additional year.

Source: EU countries give crucial nod to first-of-a-kind Artificial Intelligence law – Euractiv

Google Search’s cache links are unfortunately being retired

Google has removed links to page caches from its search results page, the company’s search liaison Danny Sullivan has confirmed. “It was meant for helping people access pages when way back, you often couldn’t depend on a page loading,” Sullivan wrote on X. “These days, things have greatly improved. So, it was decided to retire it.”

The cache feature historically let you view a webpage as Google sees it, which is useful for a variety of different reasons beyond just being able to see a page that’s struggling to load. SEO professionals could use it to debug their sites or even keep tabs on competitors, and it can also be an enormously helpful news gathering tool, giving reporters the ability to see exactly what information a company has added (or removed) from a website, and a way to see details that people or companies might be trying to scrub from the web. Or, if a site is blocked in your region, Google’s cache can work as a great alternative to a VPN.

A page’s cache has typically been accessible via a couple of different routes. There was a “Cached” button that would appear at the bottom of the “About this result” panel accessible from the three button menu next to a search result. And, for those in the know, you could also append the prefix “cache:” to a URL before searching for it to hop instantly into Google’s cached version.

[…]

It doesn’t sound like Google has any immediate plans to replace the feature, but Sullivan says he hopes that Google could add links to the Internet Archive that could instead be used to show how a webpage has changed over time. “No promises,” he cautions. “We have to talk to them, see how it all might go — involves people well beyond me. But I think it would be nice all around.”

Source: Google Search’s cache links are officially being retired – The Verge

Read: this useful feature wasn’t making Google any money, so they decided to go cost cutting.

Consumers still pay too much to call another EU country – wait, wasn’t there free roaming?!

The EU single market holds many advantages. To be able to travel, work or purchase goods effortlessly across numerous different countries creates all kinds of opportunities for consumers. But there are still areas where it is not working or has simply not been accomplished, even if it would be the most logical and appropriate thing to do.

International intra-EU calls are one of them. It is often still prohibitively expensive to call someone who lives in a different EU country.

Since the end of roaming charges in 2017, which used to apply when you travelled to another country and called somebody back home, consumers have enjoyed their phones without the risk of a bill shock on a trip inside the EU. But they are confused that, today, calling their friends and family in another country from the comfort of their own home can cost up to €0.19 per minute on top of what they pay for their phone subscription.

Caps in place

At least since 2019, there have been EU price caps on what telecom operators can apply as a surcharge for this call. EU decision-makers then placed limits rather than remove the surcharges altogether to review the caps by 2024.

But that review has not taken place. The price caps will lapse in May this year if no action is taken, threatening to dramatically increase the prices consumers pay for a call to another country.

This could mean consumers end up with less usable alternatives like online messaging apps, with all the data protection and privacy risks they can sometimes entail, or simply stop calling another EU country.

How can we face this situation today, six years after roaming ended?

Good for telecoms, bad for everyone else

Consumers and companies who do business across borders are losing out daily by paying higher prices, while telecom companies pay the difference for their shareholders.

This is despite telecom companies admitting that costs for such calls are decreasing yearly as better, more efficient infrastructure gets rolled out.

Companies like Telefonica or Deutsche Telekom have argued passionately over 2023 for the need to loosen EU competition rules so that they can consolidate across borders because we live in a European single market. But strangely, they do not want to let consumers benefit from a market without borders. It is time for the single market to work for consumers, not just telecom companies.

Intra-EU call surcharges are a gift from a bygone era to a sector asking for all kinds of advantages today. The surcharges should be banned, just as they were for roaming.

[…]

The Gigabit Infrastructure Act and its expected final round of negotiations on Monday, 5 February, is the last chance not only to ‘save the caps’ and continue the status quo, as many want but also the opportunity for the EU to go one step further and finally ban the surcharges altogether.

Source: Call me maybe (not)? Consumers still pay too much to call another EU country – Euractiv

Oddly enough, Dutch telecom providers don’t charge to call another EU country, so for Dutch people, it will be a surprise that other countries telecom providers do charge

The European Space Agency will test 3D metal printer metal on the ISS

The first metal 3D printer that will be used in space is on its way to the International Space Station. The Cygnus NG-20 supply mission, which is carrying the 180kg (397 lbs) printer, launched on Tuesday and is set to arrive at the ISS on Thursday.

Astronaut Andreas Mogensen will install the printer, which Airbus developed for the European Space Agency. The machine will then be controlled and monitored from Earth.

Polymer-based 3D printers have been employed on the ISS in the past, but metal 3D printing in orbit is said to pose a trickier challenge. The machine will use a form of stainless steel that’s often used for water treatment and medical implants because of how well it resists corrosion.

After the stainless steel wire is pushed into the printing area, the printer melts it with a laser said to be a million times more powerful than a typical laser pointer. The printer then adds the melted metal to the print.

The melting point of the metal is around 1,400°C and the printer will run inside a completely sealed box. Before the printer can operate, it needs to vent its oxygen into space and replace its atmosphere with nitrogen. Otherwise, the melted metal would oxidize when it became exposed to oxygen.

Given the higher temperatures that are employed compared with a plastic 3D printer (which heats to around 200°C), “the safety of the crew and the Station itself have to be ensured — while maintenance possibilities are also very limited,” ESA technical officer Rob Postema told the agency’s website. “If successful though, the strength, conductivity and rigidity of metal would take the potential of in-space 3D printing to new heights.”

Four test prints are scheduled. The printer will replicate reference prints that have been created back on Earth. The two versions will be compared to help scientists understand how printing quality and performance differs in space. Even though each print will weigh less than 250g (8.8 ounces) and be smaller than a soda can, it will take the printer between two and four weeks to create each one. The printer will only be in operation for a maximum of four hours each day, since its fans and motor are fairly loud and the ISS has noise regulations.

[…]

Source: The European Space Agency will test 3D printing metal on the ISS

Cory Doctorow’s McLuhan lecture on enshittification (30 Jan 2024)

Last year, I coined the term ‘enshittification,’ to describe the way that platforms decay. That obscene little word did big numbers, it really hit the zeitgeist. I mean, the American Dialect Society made it their Word of the Year for 2023 (which, I suppose, means that now I’m definitely getting a poop emoji on my tombstone).

So what’s enshittification and why did it catch fire? It’s my theory explaining how the internet was colonized by platforms, and why all those platforms are degrading so quickly and thoroughly, and why it matters – and what we can do about it.

We’re all living through the enshittocene, a great enshittening, in which the services that matter to us, that we rely on, are turning into giant piles of shit.

It’s frustrating. It’s demoralizing. It’s even terrifying.

I think that the enshittification framework goes a long way to explaining it, moving us out of the mysterious realm of the ‘great forces of history,’ and into the material world of specific decisions made by named people – decisions we can reverse and people whose addresses and pitchfork sizes we can learn.

Enshittification names the problem and proposes a solution. It’s not just a way to say ‘things are getting worse’ (though of course, it’s fine with me if you want to use it that way. It’s an English word. We don’t have der Rat für Englisch Rechtschreibung. English is a free for all. Go nuts, meine Kerle).

[…]

Source: Pluralistic: My McLuhan lecture on enshittification (30 Jan 2024) – Pluralistic: Daily links from Cory Doctorow

It’s a good essay on what enshittification is, what causes it, why it’s so bad and some ideas on how to get rid of it. Very worth reading.

EASA and IATA start work on aviation GPS interference

flight course of an aircraft being gps spoofed and almost entering dangerous airspace

The European Union Aviation Safety Agency (EASA) and the International Air Transport Association (IATA) held a recent workshop on incidents where people spoofed and jammed satellite navigation systems, and concluded these pose a “significant challenge” to safety.

Mitigating the risks posed by such actions will require measures to be enacted in the short term as well as medium and long term timescales, the two bodies said. They want to start by sharing information about the incidents and any potential remedies.

In Europe, this information sharing will occur through the European Occurrence Reporting scheme and EASA’s Data4Safety program. Given the global nature of the problem, a broader solution would be better, but this would have to be pursued at a later date, EASA said.

Inevitably, another of the measures involves retaining traditional navigation aids to ensure there is a conventional backup for GNSS navigation, while a third calls for guidance from aircraft manufacturers to airlines and other aircraft operators to ensure they know how to manage jamming and spoofing situations.

As a further measure, EASA said it will inform all relevant stakeholders, which includes airlines, air navigation service providers, airports and the air industry, about recorded incidents.

Interference with global navigation systems can take one of two forms: jamming requires nothing more than transmitting a radio signal strong enough to drown out those from GPS satellites, while spoofing is more insidious and involves transmitting fake signals that fool the receiver into calculating its position incorrectly.

According to EASA, jamming and spoofing incidents have increasingly threatened the integrity of location services across Eastern Europe and the Middle East in recent years.

[…]

Source: GPS interference now a major flight safety concern • The Register

Design Secrets Of Fantastic, Hand-made Puzzle Boxes

[Kagen Sound] is a woodworker and artist who gives a great behind-the-scenes look at his amazingly high-quality puzzle boxes (video). Not only do his varied puzzle box designs show his math background, but they are all made entirely of wood. There are no nails or fasteners; just intricately-fitted wood and some glue.

There’s a lot of variety in his designs, and while it’s all fantastic from beginning to end, two things stood out to us as being of particular interest. One is the “Plus Box” which makes a clicking sound when the pieces are moved (at 2:47) thanks to a clever wooden spring. [Kagen] shows an example of the concept, where a flat wood piece with slots cut from the sides acts as a spring and clicks into notches when moved, providing audible and tactile feedback without anything other than wood.

The other is a patterned puzzle box (at 7:10) whose geometric designs change as the user moves the pieces. A reminder that [Kagen]’s devices are made entirely of wood and glue, so the design comes from two different types of wood assembled and cut at an angle to create the patterns seen. [Kagen] shaves thin layers of veneer from this block to attach to the puzzle pieces as needed to create the patterns without resorting to ink, paint, or decals.

[Kagen] has a math degree but is entirely self-taught as a woodworker, so don’t let lack of formal training stop you from experimenting. You can watch him give a tour of his work in the video, embedded below.

Feeling the urge to make your own puzzle boxes? Take a look at some we’ve seen over the years, and we even have a collection of single-line cryptex fonts to make laser-engraving puzzle bits a little easier.

 

Source: Design Secrets Of Fantastic, Hand-made Puzzle Boxes | Hackaday

Music causes similar emotions and bodily sensations across cultures

people of different ethnic backgrounds dancing with music notes floating in the air

“Music that evoked different emotions, such as happiness, sadness or fear, caused different bodily sensations in our study. For example, happy and danceable music was felt in the arms and legs, while tender and sad music was felt in the chest area,” explains Academy Research Fellow Vesa Putkinen.

The emotions and bodily sensations evoked by music were similar across Western and Asian listeners. The bodily sensations were also linked with the music-induced emotions.

“Certain acoustic features of music were associated with similar emotions in both Western and Asian listeners. Music with a clear beat was found happy and danceable while dissonance in music was associated with aggressiveness. Since these sensations are similar across different cultures, music-induced emotions are likely independent of culture and learning and based on inherited biological mechanisms,” says Professor Lauri Nummenmaa.

“Music’s influence on the body is universal. People move to music in all cultures and synchronized postures, movements and vocalizations are a universal sign for affiliation

[…]

Source: Music causes similar emotions and bodily sensations across cultures | ScienceDaily

AI can better retain what it learns by mimicking human sleep

[…]

Concetto Spampinato and his colleagues at the University of Catania, Italy, were looking for ways to avoid a phenomenon known as “catastrophic forgetting”, where an AI model trained to do a new task loses the ability to carry out jobs it previously aced. For instance, a model trained to identify animals could learn to spot different fish species, but then it might inadvertently lose its proficiency at recognising birds.

They developed a new method of training AI called wake-sleep consolidated learning (WSCL), which mimics the way human brains reinforce new information. People shuffle short-term memories of experiences and lessons learned throughout the day into long-term memories while sleeping. The researchers say this method of learning can be applied to any existing AI.

Models using WSCL are trained as usual on a set of data for the “awake” phase. But they are also programmed to have periods of “sleeping”, where they parse through a sample of awake data, as well as a highlight reel from previous lessons.

Take an animal identification model more recently trained on images of marine life: during a sleep period, it would be shown snapshots of fishes, but also a smattering of birds, lions and elephants from older lessons. Spampinato says this is akin to humans mulling over new and old memories while sleeping, spotting connections and patterns and integrating them into our minds. The new data teaches the AI a fresh ability, while the remainder of the old data prevents the recently acquired skill from pushing out existing ones.

Crucially, WSCL also has a period of “dreaming”, when it consumes entirely novel data made from mashing together previous concepts. For instance, the animal model might be fed abstract images showing combinations of giraffes crossed with fish, or lions crossed with elephants. Spampinato says this phase helps to merge previous paths of digital “neurons”, freeing up space for other concepts in the future. It also primes unused neurons with patterns that will help them pick up new lessons more easily.

[…]

Spampinato tested three existing AI models using a traditional training method, followed by WSCL training. Then he and his team compared the performances using three standard benchmarks for image identification. The researchers found their newly developed technique led to a significant accuracy boost – the sleep-trained models were 2 to 12 per cent more likely to correctly identify the contents of an image. They also measured an increase in the WSCL systems’ “forward transfer”, a metric indicating how much old knowledge a model uses to learn a new task. The research indicated AI trained with the sleep method remembered old tasks better than the traditionally trained systems.

[…]

Source: AI can better retain what it learns by mimicking human sleep | New Scientist

Doom running on gut bacteria, proving you really can play the game on anything

An MIT biotech researcher has been able to run the iconic computer game Doom using actual gut bacteria. Lauren Ramlan didn’t get the game going on a digital simulation of bacteria, but turned actual bacteria into pixels to display the 30-year-old FPS, as reported by Rock Paper Shotgun.

Specifically, Ramlan created a display inside of a cell wall made entirely of E. coli bacteria. The 32×48 1-bit display may not win any resolution awards, but who cares, right? It’s Doom running on bacteria. The researcher dosed the bacteria with fluorescent proteins to get them to light up just like digital pixels.

There’s a couple of caveats here. First of all, the bacteria aren’t actually running the game, as we still haven’t cracked that whole “inject biological matter with digital code” thing. Instead, the bacteria combine to act as a teensy-tiny monitor that renders gameplay for the beloved shooter.

Also, there’s the subject of frame rate, which is always an important metric when considering FPS games. To be blunt, the frame rate is atrocious, likely due to the fact that bacteria were never intended to display 3D video games. It takes 70 minutes for the bacteria to illuminate one frame of the game and another eight hours to return to its starting state. This translates to nearly nine hours per frame, which means it would take around 600 years to play the game from start to finish. That’s even worse than Cyberpunk 2077 at launch.

So while this won’t present the smoothest gameplay experience, it’s still a pretty nifty idea. Also, it further proves the theory that Doom can run on just about anything. We’ve seen the game running on pregnancy tests, rat brain neurons and even inside of other titles, like the sequel Doom II and Minecraft. Doom is the great equalizer. May it continue to surprise us for the next 30 years.

Source: Here’s a video of Doom running on gut bacteria, proving you really can play the game on anything

Mercedes-Benz source code exposed by leaving private key online

Mercedes-Benz accidentally exposed a trove of internal data after leaving a private key online that gave “unrestricted access” to the company’s source code, according to the security research firm that discovered it.

Shubham Mittal, co-founder and chief technology officer of RedHunt Labs, alerted TechCrunch to the exposure and asked for help in disclosing to the car maker. The London-based cybersecurity company said it discovered a Mercedes employee’s authentication token in a public GitHub repository during a routine internet scan in January.

[…]

“The GitHub token gave ‘unrestricted’ and ‘unmonitored’ access to the entire source code hosted at the internal GitHub Enterprise Server,” Mittal explained in a report shared by TechCrunch. “The repositories include a large amount of intellectual property… connection strings, cloud access keys, blueprints, design documents, [single sign-on] passwords, API Keys, and other critical internal information.”

[…]

Source: How a mistakenly published password exposed Mercedes-Benz source code | TechCrunch

Let’s hope that others have found this and can use it to jailbreak the cars so that you can get what you paid for when you bought the machine, such as better EV performance and faster acceleration

Japan will no longer require floppy disks for submitting some official documents

Japan is an innovative country that leads the way on many technological fronts. But the wheels of bureaucracy often turn incredibly slowly there. So much so, that the government still requires businesses to provide information on floppy disks and CD-ROMs when they submit certain official documents.

That’s starting to change. Back in 2022, Minister of Digital Affairs Taro Kono urged various branches of the government to stop requiring businesses to submit information on outdated forms of physical media. The Ministry of Economy, Trade and Industry (METI) is one of the first to make the switch. “Under the current law, there are many provisions stipulating the use of specific recording media such as floppy disks regarding application and notification methods,” METI said last week, according to The Register.

After this calendar year, METI will no longer require businesses to submit data on floppy disks under 34 ordinances. The same goes for CD-ROMs when it comes to an unspecified number of procedures. There’s still quite some way to go before businesses can stop using either format entirely, however.

Kono’s staff identified some 1,900 protocols across several government departments that still require the likes of floppy disks, CD-ROMs and even MiniDiscs. The physical media requirements even applied to key industries such as utility suppliers, mining operations and aircraft and weapons manufacturers.

There are a couple of main reasons why there’s a push to stop using floppy disks, as SoraNews24 points out. One major factor is that floppy disks can be hard to come by. Sony, the last major manufacturer, stopped selling them in 2011. Another is that some data types just won’t fit on a floppy disk. A single photo can easily be larger than the format’s 1.4MB storage capacity.

There are some other industries that still rely on floppy disks. Some older planes need them for avionics, as do and some aging medical devices. It also took the US government until 2019 to stop using floppy disks to coordinate nuclear weapon launches.

Source: Japan will no longer require floppy disks for submitting some official documents

Turning glass into a ‘transparent’ light-energy harvester

What happens when you expose tellurite glass to femtosecond laser light? That’s the question that Gözden Torun at the Galatea Lab at Ecole Polytechnique Federale de Lausanne, in collaboration with Tokyo Tech scientists, aimed to answer in her thesis work when she made the discovery that may one day turn windows into single material light-harvesting and sensing devices. The results are published in Physical Review Applied.

Interested in how the atoms in the tellurite would reorganize when exposed to fast pulses of high energy femtosecond laser light, the scientists stumbled upon the formation of nanoscale tellurium and tellurium oxide crystals, both etched into the glass, precisely where the glass had been exposed. That was the eureka moment for the scientists, since a semiconducting material exposed to daylight may lead to the generation of electricity.

“Tellurium being semiconducting, based on this finding we wondered if it would be possible to write durable patterns on the tellurite glass surface that could reliably induce electricity when exposed to light, and the answer is yes,” explains Yves Bellouard who runs EPFL’s Galatea Laboratory. “An interesting twist to the technique is that no additional materials are needed in the process. All you need is tellurite glass and a femtosecond laser to make an active photoconductive material.”

Using tellurite glass produced by colleagues at Tokyo Tech, the EPFL team brought their expertise in technology to modify the glass and analyze the effect of the laser. After exposing a simple line pattern on the surface of a tellurite glass 1 cm in diameter, Torun found that it could generate a current when exposing it to UV light and the , and this, reliably for months.

“It’s fantastic, we’re locally turning glass into a semiconductor using light,” says Yves Bellouard. “We’re essentially transforming materials into something else, perhaps approaching the dream of the alchemist.”

More information: Gözden Torun et al, Femtosecond-laser direct-write photoconductive patterns on tellurite glass, Physical Review Applied (2024). DOI: 10.1103/PhysRevApplied.21.014008

Source: Turning glass into a ‘transparent’ light-energy harvester

US states had 65,000 rape-related pregnancies after banning abortion

Since the US Supreme Court overturned the right to an abortion, estimates suggest that there have been tens of thousands of pregnancies as a result of rape in states with near-total abortion bans. Very few, if any, of those pregnancies were ended by a legal in-state abortion, even if states had exceptions for rape

[…]

To understand how this affects survivors of rape, Samuel Dickman at reproductive health non-profit Planned Parenthood of Montana and his colleagues estimated rape-related pregnancies in these states between July 2022 and January 2024.

The researchers first looked at the most recent data from the US Centers for Disease Control and Prevention on rape incidents, which was collected between 2016 and 2017. From that, they could approximate the proportion of rapes that resulted in pregnancy nationwide each year.

They then used data from law enforcement to estimate the number of rape-related pregnancies in each state since abortion bans were enacted. The result suggests that almost 65,000 people became pregnant as a result of rape in the 14 states. More than 90 per cent of those individuals lived in states where there weren’t exceptions that allow for an abortion in the case of rape.

Even in states with exceptions, fewer than a dozen legal abortions are being performed each month. One reason for this is that these states no longer have abortion providers, says Dickman. Plus, “most of the states with rape exceptions require some amount of reporting to law enforcement”, he says. “That’s a decision many survivors of rape choose not to do.”

Most sexual assaults go unreported due to stigma and fear of retaliation. That is also why these findings are most likely to be an underestimate, says Dickman.

[…]

 

Source: US states had 65,000 rape-related pregnancies after banning abortion | New Scientist

ICANN proposes creating .INTERNAL domain which will never be used in root zone DNS

The Internet Corporation for Assigned Names and Numbers (ICANN) has proposed creating a new top-level domain (TLD) and never allowing it to be delegated in the global domain name system (DNS) root.

The proposed TLD is .INTERNAL and, as the name implies, it’s intended for internal use only. The idea is that .INTERNAL could take on the same role as the 192.168.x.x IPv4 bloc – available for internal use but never plumbed into DNS or other infrastructure that would enable it to be accessed from the open internet.

[…]

A consultation process produced 35 candidate strings, each of which was checked to ensure it wasn’t already a TLD, and for “potential for confusing similarity, for length, and for its capacity to be memorable and meaningful.” Assessments were conducted for all six United Nations languages: Arabic, Chinese, English, French, Russian and Spanish. That process saw many candidates “deemed unsuitable due to their lack of meaningfulness.”

For example, .DOMAIN was binned because it was felt not to “convey that its purpose is specifically for private-use applications.”

After years of debate, ICANN and other internet governance orgs were left with two viable candidates: .PRIVATE and .INTERNAL.

Last Thursday, ICANN announced [PDF] that .INTERNAL was its choice.

.PRIVATE lost out because assessors felt it “may carry the unintended imputation of privacy to a higher degree, and more potential was seen for conflicting meanings across the gamut of assessed languages.”

ICANN’s board still has to sign off the creation of .INTERNAL.

[…]

Source: ICANN proposes creating .INTERNAL domain • The Register

Well, this is a tld I know a lot of businesses have been using for decades, so it’s nice that ICANN is finally on to it. Good thing those people there are earning their money!

Hundreds of thousands of EU citizens ‘wrongly fined for driving in London Ulez’ in one of EUs largest privacy breaches

Hundreds of thousands of EU citizens were wrongly fined for driving in London’s Ulez clean air zone, according to European governments, in what has been described as “possibly one of the largest data breaches in EU history”.

The Guardian can reveal Transport for London (TfL) has been accused by five EU countries of illegally obtaining the names and addresses of their citizens in order to issue the fines, with more than 320,000 penalties, some totalling thousands of euros, sent out since 2021.

[…]

Since Brexit, the UK has been banned from automatic access to personal details of EU residents. Transport authorities in Belgium, Spain, Germany and the Netherlands have confirmed to the Guardian that driver data cannot be shared with the UK for enforcement of London’s ultra-low emission zone (Ulez), and claim registered keeper details were obtained illegally by agents acting for TfL’s contractor Euro Parking Collection.

In France, more than 100 drivers have launched a lawsuit claiming their details were obtained fraudulently, while Dutch lorry drivers are taking legal action against TfL over £6.5m of fines they claim were issued unlawfully.

According to the Belgian MP Michael Freilich, who has investigated the issue on behalf of his constituents, TfL is treating European drivers as a “cash cow” by using data obtained illegitimately to issue unjustifiable fines.

Many of the penalties have been issued to drivers who visited London in Ulez-compliant vehicles and were not aware they had to be registered with TfL’s collections agent Euro Parking at least 10 days before their visit.

Failure to register does not count as a contravention, according to Ulez rules, but some drivers have nonetheless received penalties of up to five-figure sums.

[…]

Some low-emission cars have been misclassed as heavy goods diesel vehicles and fined under the separate low-emission zone (Lez) scheme, which incurs penalties of up to £2,000 a day. Hundreds of drivers have complained that the fines arrived weeks after the early payment discount and appeals deadlines had passed.

One French driver was fined £25,000 for allegedly contravening Lez and Ulez rules, despite the fact his minibus was exempt.

[…]

EU countries say national laws allow the UK to access personal data only for criminal offences, not civil ones. Breaching Ulez rules is a civil offence, while more risky behaviour such as speeding or driving under the influence of drink or drugs can be a criminal offence. This raises the question of whether Euro Parking can legally carry out its contract with TfL.

Euro Parking was awarded a five-year contract by TfL in 2020 to recover debts from foreign drivers who had breached congestion or emission zone rules.

The company, which is paid according to its performance, is estimated to have earned between £5m and £10m. It has the option to renew for a further five years.

The firm is owned by the US transport technology group Verra Mobility, which is listed on the Nasdaq stock exchange and headed by the former Bank of America Merrill Lynch executive David Roberts. The company’s net revenue was $205m (£161m) in the second quarter of 2023.

In October, the Belgian government ordered a criminal investigation after a court bailiff was accused of illegally passing the details of 20,000 drivers to Euro Parking for Ulez enforcement. The bailiff was suspended in 2022 and TfL initially claimed that no Belgian data had been shared with Euro Parking since then. However, a freedom of information request by the Guardian found that more than 17,400 fines had been issued to Belgians in the intervening 19 months.

[…]

Campaigners accuse Euro Parking of circumventing data protection rules by using EU-based agents to request driver data without disclosing that it is for UK enforcement.

Last year, an investigation by the Dutch vehicle licensing authority RDW found that the personal details of 55,000 citizens had been obtained via an NCP in Italy. “The NCP informed us that the authorised users have used the data in an unlawful way and stopped their access,” a spokesperson said.

The German transport authority KBA claimed that an Italian NCP was used to obtain information from its database. “Euro Parking obtained the data through unlawful use of an EU directive to facilitate the cross-border exchange of information about traffic offences that endanger road safety,” a KBA spokesperson said. “The directive does not include breaches of environmental rules.”

Spain’s transport department told the Guardian that UK authorities were not allowed access to driver details for Ulez enforcement. Euro Parking has sent more than 25,600 fines to Spanish drivers since 2021.

In France, 102 drivers have launched a lawsuit claiming that their details were fraudulently obtained

[…]

Source: Hundreds of thousands of EU citizens ‘wrongly fined for driving in London Ulez’ | TfL | The Guardian

I guess Brexit has panned out economically much worse than we thought

Investigative Report Proves What Most People Already Suspected: The ‘War On Woke & DEI’ Mostly Pushed By A Bunch Of Censorial, Racist Shitheads

One of the dumber things we’ve seen over the last couple of years is the supposed “war on woke” and (more recently) attacks on “diversity, equity, and inclusion” efforts (often shortened to the acronym DEI). In almost every case, these attacks misrepresent reality to generate culture war bullshit, and make a bunch of false claims about how pretty fundamental and basic efforts to make sure that organizations are cognizant of historical and systematic biases, and seek to push back against them.

Of course, one thing I’ve noticed is how many of the people who are the most vocal against such things are also (simultaneously) claiming to be free speech supporters, even as they bend over backwards to attack and silence anyone pushing ideas, content, or culture that they consider “woke.” They are not free speech supporters. They’re not simply seeking to counter views they disagree with. They’re looking to suppress speech they disagree with.

This weekend, the NY Times had an article by Nicholas Confessore, detailing how the whole “war on woke” and the “anti-DEI crusade” is almost entirely manufactured by a group of censorial, racist shitheads. (The NY Times article, unfortunately, does not admit that the NY Times itself has played a fairly major role in platforming people pushing these ideas as if they were simply honest opinions, or its willingness to suggest that the people pushing them have legitimate, intellectually honest points to make).

Centered at the Claremont Institute, a California-based think tank with close ties to the Trump movement and to Gov. Ron DeSantis of Florida, the group coalesced roughly three years ago around a sweeping ambition: to strike a killing blow against “the leftist social justice revolution” by eliminating “social justice education” from American schools.

The documents — grant proposals, budgets, draft reports and correspondence, obtained through public-records requests — show how the activists formed a loose network of think tanks, political groups and Republican operatives in at least a dozen states. They sought funding from a range of right-leaning philanthropies and family foundations, and from one of the largest individual donors to Republican campaigns in the country. They exchanged model legislation, published a slew of public reports and coordinated with other conservative advocacy groups in states like Alabama, Maine, Tennessee and Texas.

As the Times’ report notes, one of the cornerstones of this effort (including pushing to get laws passed to suppress such content) is to claim it’s about “diversity of thought” and “intellectual freedom,” even though it’s literally the opposite. The entire purpose is to shut down diversity of thought and to stifle intellectual freedom… that these shitheads don’t like.

Yet even as they or their allies publicly advocated more academic freedom, some of those involved privately expressed their hope of purging liberal ideas, professors and programming wherever they could. They debated how carefully or quickly to reveal some of their true views — the belief that “a healthy society requires patriarchy,” for example, and their broader opposition to anti-discrimination laws — in essays and articles written for public consumption.

In candid private conversations, some wrote favorably of laws criminalizing homosexuality, mocked the appearance of a female college student as overly masculine and criticized Peter Thiel, the prominent gay conservative donor, over his sex life. In email exchanges with the Claremont organizers, the writer Heather Mac Donald derided working mothers who employed people from “the low IQ 3rd world” to care for their children and lamented that some Republicans still celebrated the idea of racially diverse political appointments.

What’s hilarious is that, in the article, they note that the folks working on this debated over how to demonize the phrase “diversity and inclusion,” saying maybe they should just focus on the last made-up bogeyman from a few years ago: “social justice.”

The documents the Times’ obtained show that there was no actual known problem with DEI efforts. It’s just that these are a bunch of censorial, racist, shitheads who wanted to attack anything that looked to make people aware of racism, and to silence them. And so, turning “woke” and “DEI” into slurs would effectively promote their racist viewpoints, while made up concerns about “harms” from these programs would push lawmakers to pass censorial laws that silenced people this crew disliked.

And, of course, they also knew that there was money in creating a new bogeyman:

“Woke” politics was not just a threat to American life. It was also a fund-raising opportunity. By spring 2021, as parents grew impatient with Covid school closures, or skeptical of “anti-racist” curriculums in the wake of the Floyd protests, Claremont officials had begun circulating urgent grant requests to right-leaning foundations.

“America is under attack by a leftist revolution disguised as a plea for justice” reminiscent of “Mao Zedong’s Cultural Revolution,” Claremont’s president, Ryan P. Williams, wrote in a draft proposal to the Jack Miller Family Foundation.

Basically, if you’ve ever gone around using “woke” as a pejorative, it means you’re a sucker for a grift. Congrats.

And, contrary to the claims of “academic freedom” and not pushing “ideological” content in schools, that’s exactly what these shitheads want to do:

In one exchange, some of those involved discussed how to marshal political power to replace left-wing orthodoxies with more “patriotic,” traditionalist curriculums.

“In support of ridding schools of C.R.T., the Right argues that we want nonpolitical education,” Mr. Klingenstein wrote in August 2021. “No we don’t. We want our politics. All education is political.”

Dr. Yenor appeared to agree, responding with some ideas for reshaping K-12 education. “An alternative vision of education must replace the current vision of education,” he wrote back.

I mean, I get it., These shitheads are dumb as rocks, and the grifters have been falsely claiming that public schools are indoctrinating kids with “woke” views (which is not at all what’s happening) so they publicly claim they want to take ideology out, when in reality, they want to put in their own ideology, believing it is the counter to what is actually happening. Of course, the reality is mostly that education is already non-ideological, and they’re just trying to make it so.

But the only way to justify that is to falsely claim the reverse is happening.

And, at the same time, they seek to couch all of these arguments in the framing of “academic freedom,” even when they clearly want the reverse. The Times’ piece details a conversation about how to defend a racist rant by a law professor, and so the plotters detailed how to frame the discussion around academic freedom, even if they actually hate academic freedom:

Now, Dr. Yenor advised his friend Dr. Azerrad to aim his statement at a liberal audience — to defend Dr. Wax on the grounds that if she were fired, it would only embolden red-state lawmakers to fire controversial left-wing professors.

“But don’t we want this to happen?” Dr. Azerrad asked.

“Yes,” replied Dr. Yenor. “But your audience doesn’t want it to happen.”

Basically: shithead censorial grifters.

Also making a big appearance in this mess, the American Principles Project, another group of censorial racist shitheads, which we wrote about for their strong support for “anti-big tech” laws like KOSA. Apparently, they did some polling to see if they could make “woke” and “DEI” seem bad (again, note that this has nothing to do with anything real — just what the polls say they can work), and found that most people didn’t actually give a shit:

In June, the American Principles Project circulated a memo detailing the results of several focus groups held to test different culture-war messages.

For all the conservative attacks on diversity programs, the group found, “the idea of woke or DEI received generally positive scores.

Of course, rather than move on to a real issue, these culture war chuds decided to just see what they could do to make people hate those terms, even if there was no legitimate reason to do so.

And, as the article details, the latest attack on DEI was also planned out, trying to leverage the recent rise in antisemitism following the Oct. 7 Hamas attacks and hostage-taking in Israel. It wasn’t because any of these shitheads actually cared about antisemitism. They just saw it as a huge opportunity to drive a culture war wedge into things, and push forward their censorial regime.

So, the next time you see this happening, know that it’s just a bunch of shitheads grifting. It’s not about freedom. It’s inherently anti-freedom. They’re literally trying to do exactly what they falsely accuse their opponents of doing. And they’re raising tons of money to keep it going.

I recognize that the many gullible suckers they’ve played with this nonsense will insist there’s something legitimate in these complaints. But it’s all manufactured bullshit.

Source: Investigative Report Proves What Most People Already Suspected: The ‘War On Woke & DEI’ Mostly Pushed By A Bunch Of Censorial, Racist Shitheads | Techdirt

OpenAI-New York Times Copyright Fight Further Illustrates Autonomy-Automaton Dichotomy

The latest dispute between the New York Times and OpenAI reinforces the distinction in understanding artificial intelligence (AI) between autonomy and automatons, which we have previously examined.

The Gray Lady turned heads late this past year when it filed suit against OpenAI, alleging that the artificial intelligence giant’s ChatGPT software infringed its copyrights. Broadly speaking, the Times alleged that the famous chatbot gobbled up enormous portions of the newspaper’s text and regurgitated it

Earlier this month, OpenAI struck back, arguing that the Times’ suit lacked merit and that the Gray Lady wasn’t “telling the full story.” So who’s right?

Via Adobe

To help understand the dispute, the autonomy-automaton dichotomy goes a long way. Recall that many AI enthusiasts contend that the new technology has achieved, or is approaching, independent activity, whether it can be described as what I previously labeled “a genuinely autonomous entity capable (now or soon) of cognition.” Into this school of thought fall many if not most OpenAI programmers and executives, techno-optimists like Marc Andreesen, and inventors and advocates for true AI autonomy like Stephen Thaler.

Arrayed against these AI exponents are the automaton-ers, a doughty bunch of computer scientists, intellectuals, and corporate types who consider artificial intelligence a mere reflection of its creators, or what I’ve called “a representation or avatar of its programmers.”

As we’ve seen, this distinction permeates the legal and policy debates over whether robots can be considered inventors for the purposes of awarding patents, whether they possess enough independence to warrant copyright protection as creators, and what rights and responsibilities should be attributed to them.

The same dichotomy applies to the TimesOpenAI battle. In its complaint, the newspaper alleged that ChatGPT and other generative AI products “were built by copying and using millions of The Times’s copyrighted news articles, in-depth investigations, opinion pieces, reviews, how-to guides, and more.” The complaint also claimed that OpenAI’s software “can generate output that recites Times content verbatim, closely summarizes it, and mimics its expressive style.” In short, the Times contended that ChatGPT and its ilk, far from creating works independently, copies, mimics, and generates content verbatim—like an automaton.

Finally, the Gray Lady argued in its complaint that OpenAI cannot shelter behind the fair use doctrine—which protects alleged copyright infringers who copy small portions of text, do not profit by them, or transform them into something new—because “there is nothing ‘transformative’ about” its use of the Times’s content. Denying that AI can genuinely create something new is a hallmark of the automaton mindset.

In contrast, in strenuously denying the NYT’s allegations, OpenAI expressly embraced autonomous themes. “Just as humans obtain a broad education to learn how to solve new problems,” the company said in its statement, “we want our AI models to observe the range of the world’s information, including from every language, culture, and industry.” Robots, like people, perceive and analyze data in order to resolve novel challenges independently.

In addition, OpenAI contended that “training AI models using publicly available internet materials is fair use, as supported by long-standing and widely accepted precedents.” From this perspective, exposing ChatGPT to a wide variety of publicly available content, far from enabling the chatbot to slavishly copy it, represents a step in training AI so that it can generate something new.

Finally, the AI giant downplayed the role of mimicry and verbatim copying trumpeted by the Times, asserting that “‘regurgitation’ is a rare bug that we are working to drive to zero” and characterizing “memorization [as] a rare failure of the learning process that we are continually making progress on.” In other words, even when acknowledging that, in certain limited circumstances, the Times may be correct, OpenAI reinforced the notion that AIs, like humans, learn and fail along the way. And to wrap it all in a bow, the company emphasized the “transformative potential of AI.”

Resolution of the battle between the automaton perspective exhibited by the Times and the autonomy paradigm exemplified by Open AI will go a long way to determining who will prevail in the parties’ legal fight.

Source: OpenAI-New York Times Copyright Fight Further Illustrates Autonomy-Automaton Dichotomy | American Enterprise Institute – AEI

A really balanced an informative piece showing the two different points of view. It’s nice to see something explain the situation without taking sides and pointing fingers in this issue.