The Linkielist

Linking ideas with the world

The Linkielist

Android Apps Are Transmitting what other apps you have ever installed to marketing peole

At this point we’re all familiar with apps of all sorts tracking our every move and sharing that info with pretty much every third party imaginable. But it actually may not be as simple as tracking where you go and what you do in an app: It turns out that these apps might be dropping details about the other programs you’ve installed on your phone, too.

This news comes courtesy of a new paper out from a team of European researchers who found that some of the most popular apps in the Google Play store were bundled with certain bits of software that pull details of any apps that were ever downloaded onto a person’s phone.

Before you immediately chuck your Android device out the window in some combination of fear and disgust, we need to clarify a few things. First, these bits of software—called IAMs, or “installed application methods”—have some decent uses. A photography app might need to check the surrounding environment to make sure you have a camera installed somewhere on your phone. If another app immediately glitches out in the presence of an on-phone camera, knowing the environment—and the reason for that glitch—can help a developer know which part of his app to tinker with to keep that from happening in the future.

Because these IAM-specific calls are technically for debugging purposes, they generally don’t need to secure permissions the same way an app usually would when, say, asking for your location. Android devices have actually gotten better about clamping down on that form of invasive tracking after struggling with it for years, recently announcing that the Android 11 formally requiring that devs apply for location permissions access before Google grants it.

But at the same time, surveying the apps on a given phone can go the invasive route very easily: The apps we download can tip developers off about our incomes, our sexualities, and some of our deepest fears.

The research team found that, of the roughly 4,200 commercial apps it surveyed making these IAM calls, almost half were strictly grabbing details on the surrounding apps. For context, most other calls—which were for monitoring details about the app like available updates, or the current app version—together made up less than one percent of all calls they observed.

There are a few reasons for the prevalence of this errant app-sniffing behavior, but for the most part it boils down to one thing: money. A lot of these IAMs come from apps that are on-boarding software from adtech companies offering developers an easy way to make quick cash off their free product. That’s probably why the lion’s share—more than 83%—of these calls were being made on behalf of third-party code that the dev onboarded for their commercially available app, rather than code that was baked into that app by design.

And for the most part, these third parties are—as you might have suspected—companies that specialize in targeted advertising. Looking over the top 20 libraries that pull some kind of data via IAMs, some of the top contenders, like ironSource or AppNext, are in the business of getting the right ads in front of the right player at the right time, offering the developer the right price for their effort.

And because app developers—like most people in the publishing space—are often hard-up for cash, they’ll onboard these money-making tools without asking how they make that money in the first place. This kind of daisy-chaining is the same reason we see trackers of every shape and size running across every site in the modern ecosystem, at times without the people actually behind the site having any idea.

Source: Android Apps May Be Snooping on You More Than You Realize

cheap High-frequency, high-power and nanoscale semiconductors that can see through walls

Scientists have crafted a tiny flexible electrical device capable of generating terahertz waves that can penetrate walls and microscopic cells, potentially paving the way for new imaging techniques – and fast switching in chips.

Terahertz radiation lies in the electromagnetic spectrum where microwaves and infrared meet. These so-called T-waves, ranging from 0.3 to 3THz according to the ITU, have interesting properties: they can travel through clothing, wood, walls, and even human skin, for one thing.

However, they can be tricky to produce, depending on the application, as you often need expensive and clunky equipment. Now, a team of researchers led by the École polytechnique fédérale de Lausanne (EPFL) in Switzerland believe they’ve created something that not only emits high-power terahertz radiation but is both compact and cheap. Which is useful for miniaturization and productization.

The gizmo detailed in a paper published in Nature this week works by producing so-called nanoplasma.

Here’s how it works: two tiny metal plates are placed 20 nanometres apart and a voltage is applied. Electrons migrate towards one of the plates to create a nanoplasma. When enough negative charge has accumulated and the voltage across the plates reaches a critical threshold, the electrons instantly flock to the other plate.

“The very high electric field in the small volume of the nanoplasma leads to ultrafast electron transfer, resulting in extremely short time responses,” the paper explained. This back and forth motion of the electrons on each plate continues, and the device emits a high-intensity pulse of terahertz waves.

“We achieved an ultrafast switching speed, higher than 10 volts per picosecond (10-12 s), which is about two orders of magnitude larger than that of field-effect transistors and more than ten times faster than that of conventional electronic switches,” the academics said.

The tiny nanoplasma devices were fabricated on bits of Kapton tape pasted onto a sapphire substrate, where a thin layer of gold or tungsten was stacked on top of titanium.

“High-frequency semiconductor devices are nanoscale in size,” said Elison Matioli, co-author of the study and an electrical engineering professor at EPFL.

“They can only cope with a few volts before breaking out. High-power devices, meanwhile, are too big and slow to generate terahertz waves. Our solution was to revisit the old field of plasma with state-of-the-art nanoscale fabrication techniques to propose a new device to get around those constraints.”

“High-frequency, high-power and nanoscale aren’t terms you’d normally hear in the same sentence,” he added.

The fast switching speeds could help deliver ultrafast chips that could be used in wireless communication, sensors, or even biomedical imaging.

Source: Want to see through walls? Electroboffins build tiny chip in the lab that vibrates at just the right frequency to do it • The Register

LA Teen Who Died of Covid-19 Was Denied Treatment Because He Didn’t Have Health Insurance. The US looks like a banana republic.

A 17-year-old boy in Los Angeles County who became the first teen believed to have died from complications with covid-19 in the U.S. was denied treatment at an urgent care clinic because he didn’t have health insurance, according to R. Rex Parris, the mayor of Lancaster, California. Roughly 27.5 million Americans—8.5 percent of the population—don’t have health insurance based on the latest government figures.

“He didn’t have insurance, so they did not treat him,” Parris said in a video posted to YouTube. The staff at the urgent care facility told the teen to try the emergency room at Antelope Valley (AV) Hospital, a public hospital in the area, according to the mayor.

“En route to AV Hospital, he went into cardiac arrest, when he got to AV hospital they were able to revive him and keep him alive for about six hours,” Parris said. “But by the time he got there, it was too late.”

The name of the urgent care clinic that refused to treat the teen has not been released. Mayor Parris explained in his YouTube video that the 17-year-old is believed to have had no underlying conditions that may have contributed to his death.

“He had been sick for a few days, he had no previous health conditions. On the Friday before he died, he was healthy, he was socializing with his friends,” the mayor explained.

Source: Teen Who Died of Covid-19 Was Denied Treatment Because He Didn’t Have Health Insurance

Singapore Government to make its contact-tracing app freely available to developers worldwide

SINGAPORE – In a move to help the international community combat the coronavirus pandemic, the Government will be making the software for its contact-tracing application TraceTogether, which has already been installed by more than 620,000 people, freely available to developers around the world.

In a Facebook post on Monday (March 23), Minister-in-charge of the Smart Nation Initiative Vivian Balakrishnan said that the app, developed by the Government Technology Agency (GovTech) and the Ministry of Health, will be open-sourced.

This means that the software’s source code will be made freely available and may be redistributed and modified.

“We believe that making our code available to the world will enhance trust and collaboration in dealing with a global threat that does not respect boundaries, political systems or economies,” said Dr Balakrishnan, who is also Foreign Minister.

“Together, we can make our world safer for everyone.”

Launched last Friday, the TraceTogether app can identify people who have been within 2m of coronavirus patients for at least 30 minutes, using wireless Bluetooth technology. Its developers say the app is useful when those infected cannot recall whom they had been in close proximity with for an extended duration.

For the app to start tracing, the Bluetooth setting on mobile phones has to be turned on.

If a user gets infected, the authorities will be able to quickly find out the other users he has been in close contact with, allowing for easier identification of potential cases and helping curb the spread of the virus.

Official contact tracers will provide a code that users can match with a corresponding verification code on their app. Once authenticated, users will get a PIN that allows data to be submitted.

Contact tracers will not ask for any personal financial details or request that money be transferred over the phone.

In his post on Monday, Dr Balakrishnan said that the GovTech team was working “around the clock” to finalise documents to allow others to use the BlueTrace protocol – the building blocks of the TraceTogether app. He added that TraceTogether has been installed by more than 620,000 users so far.

Dr Janil Puthucheary, Minister-in-charge of GovTech, also weighed in on the app in a radio show on Monday, saying that a team of about 40 engineers spent more than 10,000 man-hours developing TraceTogether.

Dr Janil also encouraged more people to download TraceTogether as added protection.

TraceTogether’s developers uploaded a manifesto for BlueTrace on the app’s website on Monday, calling for international adoption of contact-tracing solutions in today’s globalised world as weapons to turn the tide against the Covid-19 outbreak.

“Covid-19 and other novel viruses do not respect national boundaries. Neither should humanity’s response. In a globalised world, with high volumes of international travel, any decentralised contact-tracing solution will need mass adoption to maximise network effects,” stated the app developers’ manifesto.

Interested parties can contact the TraceTogether team via e-mail or check this website for more information.

Source: Coronavirus: S’pore Government to make its contact-tracing app freely available to developers worldwide, Singapore News & Top Stories – The Straits Times

WPA Cracking from Kismet sensors

During a recent event I decided to setup a passive monitoring station to check for any attempts to impersonate, hi-jack, or deny service to our WiFi . For this task I decided to use an Alpha card, and Kismet (which comes already installed on Kali linux). To deploy for wireless intrusion detection (WIDS)

Kismet worked as advertised and I was able to monitor channel utilization and for wireless anomalies (think pwnagotchi or hak5 pineapple)

Channel Utilization Monitoring

Kismet WIDS alerting

This worked great, but I soon noticed that Kismet also was logging WPA handshakes for client connections. Which made me wonder, could kismet be used as an attack platform?

Captured WPA key exchange

After some quick googling I found indeed its very possible using this 3 step process.

  1. Export PCAP data out of the kismet session database (by default stored at the root of a user home dir) by issuing the command kismet_log_to_pcap — in foo.kismet — out foo.pcap
  2. Convert that PCAP into something consumable by hashcat by issuing the command cap2hccapx.bin foo.pcap foo.hccapx
  3. Setup hashcat to crack the stored key exchanges by using the command hashcat64.exe -m 2500 foo.hccapx rockyou.txt -r rules/rockyou-30000.rule

What was surprising was that it took seconds or less to crack many of the captured sessions. Whats more interesting is that its possible to deploy kismet on extremely cheap hardware such as a Raspberry Pi and form fleets of sensors that all log to a central point, and that are all cracked and monitored.

hashcat output

Today’s key take away? If you use a portable access point such as your phone as a hotspot you still need to use an extremely long and complex password. It used to take an exorbitant amount of time to crack WPA2 but that is no longer true. Modern techniques for cracking the pairwise master key have been developed which combined with GPU based password cracking means weak passwords can often be instantly cracked.

To read more about this check out Ins1gn1a’s article titled Understanding WPA/WPA2 Pre-Shared-Key Cracking

Source: WPA Cracking from Kismet sensors – William Reyor – Medium

Ring corporate surveillance doorbells Continues To Insist Its Cameras Reduce Crime, But Crime Data Doesn’t Back Those Claims Up

Despite evidence to the contrary, Amazon’s Ring is still insisting its the best thing people can put on their front doors — an IoT camera with PD hookups that will magically reduce crime in their neighborhoods simply by being a mute witness of criminal acts.

Boasting over 1,000 law enforcement partnerships, Ring talks a good game about crime reduction, but its products haven’t proven to be any better than those offered by competitors — cameras that don’t come with law enforcement strings attached.

Last month, Cyrus Farivar undid a bit of Ring’s PR song-and-dance by using public records requests and conversations with law enforcement agencies to show any claim Ring makes about crime reduction probably (and in some cases definitely) can’t be linked to the presence of Ring’s doorbell cameras.

CNET has done the same thing and come to the same conclusion: the deployment of Ring cameras rarely results in any notable change in property crime rates. That runs contrary to the talking points deployed by Dave Limp — Amazon’s hardware chief — who “believes” adding Rings to neighborhoods makes neighborhoods safer. Limp needs to keep hedging.

CNET obtained property-crime statistics from three of Ring’s earliest police partners, examining the monthly theft rates from the 12 months before those partners signed up to work with the company, and the 12 months after the relationships began, and found minimal impact from the technology.

The data shows that crime continued to fluctuate, and analysts said that while many factors affect crime rates, such as demographics, median income and weather, Ring’s technology likely wasn’t one of them.

Worse for Ring — which has used its partnerships with law enforcement agencies to corner the market for doorbell cameras — law enforcement agencies are saying the same thing: Ring isn’t having any measurable impact on crime.

“In 2019, we saw a 6% decrease in property crime,” said Kevin Warych, police patrol commander in Green Bay, Wisconsin, but he noted, “there’s no causation with the Ring partnership.”

[…]

“I can’t put numbers on it specifically, if it works or if it doesn’t reduce crime,” [Aurora PD public information officer Paris] Lewbel said.

But maybe it doesn’t really matter to Ring if law enforcement agencies believe the crime reduction sales pitch. What ultimately matters is that end users might. After all, these cameras are installed on homes, not police departments. As long as potential customers believe crime in their area (or at least their front doorstep) will be reduced by the presence of camera, Ring can continue to increase market share.

But the spin is, at best, inaccurate. Crime rates in cities where Ring has partnered with law enforcement agencies continue to fluctuate. Meanwhile, Ring has fortuitously begun its mass deployment during a time of historically-low crime rates which have dropped steadily for more than 20 years. Hitting the market when things are good and keep getting better makes for pretty good PR, especially when company reps are willing to convert correlation to causation to sell devices.

Source: Ring Continues To Insist Its Cameras Reduce Crime, But Crime Data Doesn’t Back Those Claims Up | Techdirt

Comet ATLAS is Brightening Faster than Expected might be awesome to look at mid May

Comet ATLAS (C2019 Y4) is plunging toward the sun, and if it doesn’t fly apart it could soon become one of the brightest comets in years.

“Comet ATLAS continues to brighten much faster than expected,” says Karl Battams of the Naval Research Lab in Washington DC. “Some predictions for its peak brightness now border on the absurd.”

atlas3_crop

Above: Comet ATLAS (C/2019 Y4) photographed on March 6, 2020, by Austrian astrophotographer Michael Jäger. The comet’s diffuse green atmosphere is about twice as wide as the planet Jupiter.

The comet was discovered in December 2019 by the Asteroid Terrestrial-impact Last Alert System (ATLAS) in Hawaii. Astronomers quickly realized it might be special. On May 31, 2020, Comet ATLAS will pass deep inside the orbit of Mercury only 0.25 AU from the sun. If it can survive the blast furnace of solar heating, it could put on a good show.

However, no one expected the show to start this soon. More than 2 months before perihelion (closest approach to the sun), Comet ATLAS is already “heating up.” The worldwide Comet Observation Database shows it jumping from magnitude +17 in early February to +8 in mid-March–a 4000-fold increase in brightness. It could become visible to the naked eye in early April.

“Right now the comet is releasing huge amounts of its frozen volatiles (gases),” says Battams. “That’s why it’s brightening so fast.”

lightcurve

Can ATLAS sustain this crazy pace? If it has a big nucleus with large stores of frozen gas, then yes; we could get a very bright comet. Otherwise, Comet ATLAS might “run out of gas”, crumbling and fading as it approaches the sun.

Current best estimates of the comet’s peak brightness in May range from magnitude +1 to -5. If Comet ATLAS hits the high end of that range, a bit brighter than Venus, it could become visible in broad daylight.

Source: Comet ATLAS is Brightening Faster than Expected | Spaceweather.com

Ancestor of all animals identified in Australian fossils

A team led by UC Riverside geologists has discovered the first ancestor on the family tree that contains most familiar animals today, including humans.

The tiny, wormlike creature, named Ikaria wariootia, is the earliest bilaterian, or organism with a front and back, two symmetrical sides, and openings at either end connected by a gut. The paper is published today in Proceedings of the National Academy of Sciences.

The earliest multicellular organisms, such as sponges and algal mats, had variable shapes. Collectively known as the Ediacaran Biota, this group contains the oldest fossils of complex, multicellular organisms. However, most of these are not directly related to animals around today, including lily pad-shaped creatures known as Dickinsonia that lack basic features of most animals, such as a mouth or gut.

The development of bilateral symmetry was a critical step in the evolution of animal life, giving organisms the ability to move purposefully and a common, yet successful way to organize their bodies. A multitude of animals, from worms to insects to dinosaurs to humans, are organized around this same basic bilaterian body plan.

Evolutionary biologists studying the genetics of modern animals predicted the oldest ancestor of all bilaterians would have been simple and small, with rudimentary sensory organs. Preserving and identifying the fossilized remains of such an animal was thought to be difficult, if not impossible.

A 3D laser scan that showing the regular, consistent shape of a cylindrical body with a distinct head and tail and faintly grooved musculature. Credit: Droser Lab/UCR

For 15 years, scientists agreed that fossilized burrows found in 555 million-year-old Ediacaran Period deposits in Nilpena, South Australia, were made by bilaterians. But there was no sign of the creature that made the burrows, leaving scientists with nothing but speculation.

Scott Evans, a recent doctoral graduate from UC Riverside; and Mary Droser, a professor of geology, noticed miniscule, oval impressions near some of these burrows. With funding from a NASA exobiology grant, they used a three-dimensional laser scanner that revealed the regular, consistent shape of a cylindrical body with a distinct head and tail and faintly grooved musculature. The animal ranged between 2-7 millimeters long and about 1-2.5 millimeters wide, with the largest the size and shape of a grain of rice—just the right size to have made the burrows.

“We thought these should have existed during this interval, but always understood they would be difficult to recognize,” Evans said. “Once we had the 3-D scans, we knew that we had made an important discovery.”

The researchers, who include Ian Hughes of UC San Diego and James Gehling of the South Australia Museum, describe Ikaria wariootia, named to acknowledge the original custodians of the land. The genus name comes from Ikara, which means “meeting place” in the Adnyamathanha language. It’s the Adnyamathanha name for a grouping of mountains known in English as Wilpena Pound. The species name comes from Warioota Creek, which runs from the Flinders Ranges to Nilpena Station.

Ikaria wariootia impressions in stone. Credit: Droser Lab/UCR

“Burrows of Ikaria occur lower than anything else. It’s the oldest fossil we get with this type of complexity,” Droser said. “Dickinsonia and other big things were probably evolutionary dead ends. We knew that we also had lots of little things and thought these might have been the early bilaterians that we were looking for.”

In spite of its relatively simple shape, Ikaria was complex compared to other fossils from this period. It burrowed in thin layers of well-oxygenated sand on the ocean floor in search of organic matter, indicating rudimentary sensory abilities. The depth and curvature of Ikaria represent clearly distinct front and rear ends, supporting the directed movement found in the burrows.

The burrows also preserve crosswise, “V”-shaped ridges, suggesting Ikaria moved by contracting muscles across its body like a worm, known as peristaltic locomotion. Evidence of sediment displacement in the burrows and signs the organism fed on buried organic matter reveal Ikaria probably had a mouth, anus, and gut.

“This is what evolutionary biologists predicted,” Droser said. “It’s really exciting that what we have found lines up so neatly with their prediction.”

Source: Ancestor of all animals identified in Australian fossils

Hackers target WHO as cyberattacks double

WHO Chief Information Security Officer Flavio Aggio said the identity of the hackers was unclear and the effort was unsuccessful. But he warned that hacking attempts against the agency and its partners have soared as they battle to contain the coronavirus, which has killed more than 15,000 worldwide.

The attempted break-in at the WHO was first flagged to Reuters by Alexander Urbelis, a cybersecurity expert and attorney with the New York-based Blackstone Law Group, which tracks suspicious internet domain registration activity.

Urbelis said he picked up on the activity around March 13, when a group of hackers he’d been following activated a malicious site mimicking the WHO’s internal email system.

“I realized quite quickly that this was a live attack on the World Health Organization in the midst of a pandemic,” he said.

Urbelis said he didn’t know who was responsible, but two other sources briefed on the matter said they suspected an advanced group of hackers known as DarkHotel, which has been conducting cyber-espionage operations since at least 2007.

Messages sent to email addresses maintained by the hackers went unreturned.

When asked by Reuters about the incident, the WHO’s Aggio confirmed that the site spotted by Urbelis had been used in an attempt to steal passwords from multiple agency staffers.

“There has been a big increase in targeting of the WHO and other cybersecurity incidents,” Aggio said in a telephone interview. “There are no hard numbers, but such compromise attempts against us and the use of (WHO) impersonations to target others have more than doubled.”

The WHO published an alert last month – available here here – warning that hackers are posing as the agency to steal money and sensitive information from the public.

And government officials in the United States, Britain and elsewhere have issued cybersecurity warnings about the dangers of a newly remote workforce as people disperse to their homes to work and study because of the coronavirus pandemic.

The motives in the case identified by Reuters aren’t clear. United Nations agencies, the WHO among them, are regularly targeted by digital espionage campaigns and Aggio said he did not know who precisely at the organization the hackers had in their sights.

Cybersecurity firms including Romania’s Bitdefender and Moscow-based Kaspersky said they have traced many of DarkHotel’s operations to East Asia – an area that has been particularly affected by the coronavirus. Specific targets have included government employees and business executives in places such as China, North Korea, Japan, and the United States.

Source: Exclusive: Elite hackers target WHO as coronavirus cyberattacks spike – Reuters

New York Stock Exchange Chairman Sold Millions in Stock Before Crash and after wife had been briefed about Covid-19 secretly

Jeffrey Sprecher, the chairman of the New York Stock Exchange, sold $3.5 million in stock on February 26, a month after his wife, Senator Kelly Loeffler of Georgia, received a closed-door briefing about the covid-19 threat. According to SEC filings, Sprecher sold $15.3 million more in stock on March 11, at the beginning of the crash that has seen trillions of dollars wiped from the financial markets. Both stock sales were of Intercontinental Exchange (known as ICE), the company that owns the NYSE, and of which Sprecher just happens to be CEO.

The revelations about Sprecher come from a new report by CBS News, which examined filings with the Securities and Exchange Commission (SEC). Loeffler’s own stock sales recently made headlines after it was revealed that she sold millions in stock the same day she received a closed-door January 26 briefing on the potential impact of the covid-19 pandemic. Loeffler denies having any knowledge of the sales done in her name.

What makes Sprecher’s stock sales a scandal? For one, they should have been reported as part of Loeffler’s financial disclosures, but were not. Senators have been required to give periodic financial disclosures since 2012 and those filings include any sales and purchases made by the politician’s spouse.

[…]

his wife had secret information about a global pandemic and both of them unloaded while she kept publicly saying everything was fine and dandy.

In fact, this was the video Loeffler posted to Twitter on March 10, the day before her husband unloaded $15.3 million worth of stock in his own company.

Sprecher and Loeffler are reportedly worth at least $500 million. Capitalism may be on its last legs during the covid-19 pandemic, but you can bet that millionaires and billionaires will do everything they can to keep it afloat. Even if a few million people have to die.

Source: New York Stock Exchange Chairman Sold Millions in Stock Before Crash

Hacker selling data of 538 million Weibo users

The personal details of more than 538 million users of Chinese social network Weibo are currently available for sale online, according to ads seen by ZDNet and corroborating reports from Chinese media.

In ads posted on the dark web and other places, a hacker claims to have breached Weibo in mid-2019 and obtained a dump of the company’s user database.

The database allegedly contains the details for 538 million Weibo users. Personal details include the likes of real names, site usernames, gender, location, and — for 172 million users — phone numbers.

Passwords were not included, which explains why the hacker is selling the Weibo data for only ¥1,799 ($250).

Source: Hacker selling data of 538 million Weibo users | ZDNet

After 450 years, the tiny feudal Channel island of Sark will finally earn the right to exist on the internet with a domain

The island of Sark, a United Kingdom royal fiefdom located in the Channel Islands and measuring just two square miles (517 hectares), has succeeded in its 20-year quest to be officially recognized by the International Standards Organization (ISO).

The decision will lead to creation of a new two-letter code for the island and an addition to the internet’s country codes: the .sk code is already taken by Slovakia so Sark may end up with .cq form in reference to the original Norman dialect spelling of the island – Sercq.

That’s something that Sark has been desperate to achieve thanks to the ever-growing impact of the internet on modern life. “In today’s connected world, business and personal matters are increasingly transacted online,” reads a quote at the start of the 54-page submission [PDF] to the ISO, written by the secretary of the group that has spent 21 years trying to make recognition a reality.

“In such a world, it makes it even more important for a small island like ours to have the ability to promote and protect its identity,” Conseiller Nicolas Moloney states.

Even though Sark controls its own budget, taxation, waters, medical register, vehicle registration, licensing, legislature and fishing rights, it doesn’t exist online. Instead everything is currently routed through nearby island of Guernsey, since Sark is officially part of the Bailiwick of Guernsey and has been since 1204 (it’s historically complicated). Guernsey is a 45-minute boat ride away, with its own .gg notation.

With every online form in the world using the ISO’s 3166 list to populate its dropdown list of territories, if you aren’t on that list, you effectively don’t exist on the internet. For an island strongly dependent on tourism, that is a major problem. “Our future depends on this and we therefore request support for our identity so we can be recognised correctly by the world,” its petition reads.

Banking, shipping addresses of goods bought on the internet and geographical identity for trade, tourism and travel are all largely dependent these days on having a unique online identifier. Without it, Sark faced an existential threat.

A determined no

But despite the full backing the UK government, reams of evidence of its autonomy, the European Court of Human Rights specifically recognizing Sark as a dependent territory, and Sark’s application fulfilling every criteria necessary to get on to the official ISO-3166 list, it has gone back and forth with the committee that decides the list for 21 years. At one point the committee even changed its own rules to prevent Sark from being recognized.

In the end, the man behind the push, Register reader Mike Locke, realized that they were never going to get anywhere by going to the same committee over and over again and went above their heads. A meeting of the ISO’s Technical Management Board, in Oslo, Norway, at the end of February heard Sark’s appeal [PDF], presented by the UK government’s British Standards Institution (BSI). Its decision was only announced late on Thursday last week. It reads [PDF, resolution 15]:

Noting the appeal received by BSI on 12 August 2018 against the ISO 3166/MA decision on the Sark request for an alpha code, and having reviewed the process and criteria for assignment of codes, and
Noting that there are islands that are not member states of the UN but have been assigned a code,
Supports the request from Sark, and
Requests the ISO3166/MA to assign Sark the requested code.

On Sark itself, the committee that has spent innumerable hours since 1999 trying to get approval proudly told the Chief Pleas (the parliament of Sark), that: “After much hard work both on and off island the Special Committee for the Top Level Domain is very pleased to announce that the ISO Technical Board has accepted the application and recommended approval of a Country Code for Sark and inclusion on the ISO 3166 Standard.”

Shortly after, the island went into a lockdown over the novel coronavirus.

Source: After 450 years, the tiny feudal Channel island of Sark will finally earn the right to exist on the internet with a domain • The Register

The rest of the story is a bizarre tale of the ISO committee refusing to change an inane decision again and again and again.

Finally! Two colour e-readers about to hit the market!

Ireader C6 is a full color e-reader and will be released soon

the company has just announced they are working on a new color e-reader that is capable of displaying 4,096 colors and will be released on March 26th.

The iReader C6 will feature a six inch capacitive touchscreen display with 300 PPI and it is employing the new E INk Print-Color e Paper technology. It has a front-lit display system with 24 LED lights, so you will be able to read in the dark.

Underneath the hood is a quad-core high-speed processor, 1GB of RAM and 16GB of internal storage.  It has integrated speakers and weighs 150 grams, is 6.9 millimeters thick, is light and comfortable, and  can be held with one hand.

iReader disclosed that they have completed mass production on this device and it will be available on JD.com on March 26th.

Source: Goodreader.com

iFlytek is working on a color e-reader

Details are light, but the company has developed a color e-reader that will be available soon.

The color e-reader is currently called the iFlytek Ebook and it features a 6 inch display with 300 PPI for black and white mode and 212 PPI for color. You will be able to read in the dark via their front-lit display system with 24 LED lights. It has 4,096 colors, which will make manga, comics and other materials shine, it is employing the E INK Just Print tech.

It has integrated speakers and 4 voices for their TTS engine, so it can read aloud ebooks to you. The other hardware specs like processor, RAM and internal storage is currently unknown. There is also no word on what operating system it is running, but it looks like it will be sold on JD.com and other Chinese e-commerce sites.

Source: Goodreader.com

Two Senators Dumped Stock After Being Briefed About COVID-19; While Telling The World Things Were Going To Be Fine

Senator Richard Burr is a real piece of work. In 2012 he was one of only three Senators to vote against the STOCK Act. This was a law put in place following a 60 Minutes expose about how Congress was getting filthy stinkin’ rich off of insider trading, since Congress was exempt from insider trading laws. The bill did pass — Burr’s vote against notwithstanding — and President Obama signed into law. Unfortunately, the next year, Congress passed (and Obama signed) an amendment that rolled the rules back for staffers, though it still does apply to elected officials themselves.

So, it’s quite interesting to see the news that Senator Burr just sold off a “significant percentage” of his stock holdings, according to a ProPublica article detailing the sale. A big chunk of that stock sale? In the hospitality industry that has been so hard hit. He had a big chunk of stock in Wyndam Hotels and Extended Stay America, but sold those off just before everything went bad. The timing is interesting:

Soon after he offered public assurances that the government was ready to battle the coronavirus, the powerful chairman of the Senate Intelligence Committee, Richard Burr, sold off a significant percentage of his stocks, unloading between $628,000 and $1.72 million of his holdings on Feb. 13 in 33 separate transactions.

As the head of the intelligence committee, Burr, a North Carolina Republican, has access to the government’s most highly classified information about threats to America’s security. His committee was receiving daily coronavirus briefings around this time, according to a Reuters story.

Now, you might say that there might be another reason why he sold stuff off, but it certainly appears that Burr knew full well what was coming. And that’s because in another news bombshell from just a few hours earlier, a recording was leaked of Burr telling a private luncheon gathering that things were going to be bad — all at the same time he was insisting that the US was totally prepared for COVID-19. A month after he sold all that stock, and a few weeks after he told the private luncheon that the coronavirus was “much more aggressive in its transmission than anything that we have seen in recent history” and compared it “to the 1918 pandemic” he publicly was claiming that we had everything under control:

“Luckily, we have a framework in place that has put us in a better position than any other country to respond to a public health threat, like the coronavirus.”

He also said the same thing just days before selling all that stock:

Thankfully, the United States today is better prepared than ever before to face emerging public health threats, like the coronavirus, in large part due to the work of the Senate Health Committee, Congress, and the Trump Administration.

That op-ed also said:

The public health preparedness and response framework that Congress has put in place and that the Trump Administration is actively implementing today is helping to protect Americans. Over the years, this framework has been designed to be flexible and innovative so that we are not only ready to face the coronavirus today but new public health threats in the future.

And then he sold most of his stock earning somewhere between half a million and a million and a half dollars — most of which would have plunged in value if he’d kept it invested. And, the fact that such a large chunk was in the hospitality industry is telling: he would have likely realized were going to be hit hard by any form of lock down and the expected decline in travel due to the pandemic.

Hours after the Burr story broke, The Daily Beast highlighted how another Senator, the new Senator from Georgia, Kelly Loefler, sold off millions of dollars of stock the very day she was briefed about the COVID-19 threat. She literally tweeted that day:

And then she dumped tons of stock:

Loeffler assumed office on Jan. 6 after having been appointed to the seat vacated by retiring Sen. Johnny Isakson. Between then and Jan. 23 she did not report a single stock transaction from accounts owned by her individually or by her and her husband jointly.

Between Jan. 24 and Feb. 14, by contrast, Loeffler reported selling stock jointly owned with her husband worth between $1,275,000 and $3,100,000, according to transaction reports filed with Senate ethics officials.

For what it’s worth, it’s probably worth noting that Loeffler’s husband, Jeffrey Sprecher, is the chairman and CEO of the New York Stock Exchange. The stock sales included a bunch of retailers: Ross Stores, TJX (owners of TJ Maxx, Marshalls and a bunch of similar brands), and Autozone. All of those are struggling — TJX just announced it’s closing all its stores for at least two weeks.

Like Burr, Loeffler toed the Trumpian line that the country was all set to handle this pandemic that (spoiler alert!) it’s still not ready to handle:

Some might argue that while she didn’t have any transactions in the weeks leading up to that coronavirus briefing, and then sold a bunch of stock, she did make two purchases of stock in that period. But those really don’t help her case:

One of Loeffler’s two purchases was stock worth between $100,000 and $250,000 in Citrix, a technology company that offers teleworking software…

Yes, sold a bunch of other stock, but purchased stock in a company that enables telework, just weeks before practically the whole country moved to telework. The other purchase? Oracle. While Oracle stock has declined along with most of the rest of the market, given how much Oracle pushes itself as a “cloud” provider, you could see someone thinking it might get a boost as well.

Given all, a little other spelunking through the newly released financial disclosures for stocks sales in this period from three other Senators as well: Ron Johnson, Dianne Feinstein, and Jim Inhofe. The details of those sales don’t look quite as suspicious as the other two, but still might raise some eyebrows. Inhofe sold a bunch of Paypal, Intuit, and Apple stock. Feinstein sold a bunch of Allogene Therapeutics stock, a biotech firm doing cancer research — so it’s not clear that that’s related to pandemic info. Johnson made a bundle: between $5 million and $25 million in selling all of his share of a plastic extrusion company, Pacur, but that’s a private family company that he ran before becoming a Senator (his brother now runs the firm), and the sale was made to a private equity firm, and shows no evidence of being connected in any way to the pandemic (indeed, the company does plastic extrusion for medical devices, and you can see why that might suddenly be in more demand these days).

In a just world, someone would be looking into the Burr and Loeffler sales as insider trading. I’m not convinced that we’re in that world right now, though. In the meantime, as many of us are isolated at home, we can rest safe, knowing that Senator Burr and Senator Loeffler socked away a bunch of money while the rest of us suffer. The only surprising thing I will note, is that Burr, at least, is now receiving heavy criticism from both Democrats and Republicans, and even Tucker Carlson — usually a trusty voice repeating Trumpian talking points, has called for Burr to resign.

Of course, it’s worth highlighting one more point: profiting off the coming disaster is horrible and disgusting and awful. But it’s much, much worse to have spent weeks or even months knowing what disaster was about to befall the country and lying to the public about it.

Source: Two Senators Sold A Bunch Of Stock After Being Briefed About COVID-19; While Telling The World Things Were Going To Be Fine | Techdirt

NASA to launch 247 petabytes of data into AWS – but forgot about eye-watering cloudy egress costs before lift-off

NASA needs 215 more petabytes of storage by the year 2025, and expects Amazon Web Services to provide the bulk of that capacity. However, the space agency didn’t realize this would cost it plenty in cloud egress charges. As in, it will have to pay as scientists download its data.

That omission alone has left NASA’s cloud strategy pointing at the ground rather than at the heavens.

The data in question will come from NASA’s Earth Science Data and Information System (ESDIS) program, which collects information from the many missions that observe our planet. NASA makes those readings available through the Earth Observing System Data and Information System (EOSDIS).

To store all the data and run EOSDIS, NASA operates a dozen Distributed Active Archive Centers (DAACs) that provide pleasing redundancy. But NASA is tired of managing all that infrastructure, so in 2019, it picked AWS to host it all, and started migrating its records to the Amazon cloud as part of a project dubbed Earthdata Cloud. The first cut-over from on-premises storage to the cloud was planned for Q1 2020, with more to follow. The agency expects to transfer data off-premises for years to come.

NASA also knows that a torrent of petabytes is on the way. Some 15 imminent missions, such as the NASA-ISRO Synthetic Aperture Radar (NISAR) and the Surface Water and Ocean Topography (SWOT) satellites, are predicted to deliver more than 100 terabytes a day of data. We mention SWOT and NISAR because they’ll be the first missions to dump data directly into Earthdata Cloud.

The agency therefore projects that by 2025 it will have 247 petabytes to handle, rather more than the 32 it currently wrangles.

NASA thinks this is all a great idea: in its documentation for the migration, it said:

Researchers and commercial users of NASA Earth Science data will have increased opportunity to access and process large quantities of data quickly, allowing new types of research and analysis. Data that was previously geographically dispersed will now be accessible via the cloud, saving time and resources.

And it will – if NASA can afford to operate it.

And that’s a live question because a March audit report [PDF] from NASA’s Inspector General noticed EOSDIS hadn’t properly modeled what data egress charges would do to its cloudy plan.

“Specifically, the agency faces the possibility of substantial cost increases for data egress from the cloud,” the Inspector General’s Office wrote, explaining that today NASA doesn’t incur extra costs when users access data from its DAACs. “However, when end users download data from Earthdata Cloud, the agency, not the user, will be charged every time data is egressed.

“That means EDSIS wearing cloud egress costs. Ultimately, ESDIS will be responsible for both cloud costs, including egress charges, and the costs to operate the 12 DAACS.”

And to make matters worse, NASA “has not yet determined which data sets will transition to Earthdata Cloud nor has it developed cost models based on operational experience and metrics for usage and egress.

Scientific data may become less available to end users if NASA imposes limitations on the amount of data egress for cost control reasons

“As a result, current cost projections may be lower than what will actually be necessary to cover future expenses and cloud adoption may become more expensive and difficult to manage.”

There’s more. The watchdog concluded: “Collectively, this presents potential risks that scientific data may become less available to end users if NASA imposes limitations on the amount of data egress for cost control reasons.”

And to put a cherry on top, the report found the project’s organizers didn’t consult widely enough, didn’t follow NIST data integrity standards, and didn’t look for savings properly during internal reviews, in part because half of the review team worked on the project itself.

The result is three recommendations from the auditors:

  1. Once NISAR and SWOT are operational and providing sufficient data, complete an independent analysis to determine the long-term financial sustainability of supporting the cloud migration and operation while also maintaining the current DAAC footprint.
  2. Incorporate in appropriate agency guidance language specifying coordination with ESDIS and OCIO early in a mission’s life cycle during data management plan development.
  3. Ensure all applicable information types are considered during DAAC categorization, that appropriate premises are used when determining impact levels, and that the appropriate categorization procedures are standardized.

At least NASA seems to have bagged a good deal from AWS: The Register used Amazon’s cloudy cost calculator to tot up the cost of storing 247PB in the cloud giant’s S3 service. The promised pay-as-you-go price for us on the street was a staggering $5,439,526.92 per month, not taking into account the free tier discount of 12 cents. The audit, meanwhile, suggests an increased cloud spend of around $30m a year by 2025, on top of NASA’s $65m-per-year deal with AWS.

You don’t need to be a rocket scientist to learn about and understand data egress costs. Which left The Register wondering how an agency capable of sending stuff into orbit or making marvelously long-lived Mars rovers could also make such a dumb mistake.

It turns out NASA makes plenty: your humble vulture found this story after looking into Tuesday’s audit of the agency’s development work on its mobile launchers – the colossal vehicles designed to assemble, transport, and launch SLS and Orion rockets and capsules.

That audit found the project “has greatly exceeded its cost and schedule targets in developing ML-1. As of January 2020, modification of ML-1 to accommodate the SLS has cost $693 million — $308 million more than the agency’s March 2014 budget estimate — and is running more than 3 years behind schedule.” ®

Source: NASA to launch 247 petabytes of data into AWS – but forgot about eye-watering cloudy egress costs before lift-off

no Intel Management Engine: Purism lifts lid on the Librem Mini, a privacy-focused micro PC

Purism has dropped the veil on the latest computer in its privacy-focused lineup – a small form-factor PC designed for space-conscious free software enthusiasts.

Available to pre-order now, the Librem Mini packs an eighth-generation, quad-core Whiskey Lake i7-8565U processor, modified with Purism’s Pureboot technology. At its heart, this aims to minimise any potential third-party interference with the operation of the computer – particularly during the boot phase, where it is potentially vulnerable.

It accomplishes this by thoroughly excising the Intel Management Engine, which Purism regards as an untrustworthy black-box baked into the heart of the processor, along with other software-level approaches. These include the use of the free software Coreboot BIOS, as well as the Purism-developed Heads, which aims to identify potential tampering within the BIOS, Kernel, and GRUB config.

In terms of expansibility, the machine packs a SATA and M.2 slot, and comes with two SODIMM slots, which can be filled with up to 64GB of RAM. There’s no dedicated graphics to speak of, but it does include Intel’s UHD 640 integrated graphics. Aside from a smattering of USB-A and USB-C slots, the Librem Mini also includes both Display and HDMI slots.

There’s also a standard RJ45 Ethernet slot – although you can add WiFi and Bluetooth via an optional Atheros ATH9k jack.

The Librem Mini has a small footprint, measuring just 5 inches across and weighing just 1kg – which is lighter than many laptops.

This machine is the latest in a growing lineup of machines that cater to the privacy-centric punter, including the Librem 13 and 15 laptops. Purism is also in the process of developing a smartphone platform to run on its own Linux-based PureOS operating system, and a baseband fully separate from the CPU. The firm has raised $2 million via crowdfunding for this effort and is expected to ship the first units later this year.

Pre-orders for the Librem Mini are open now. Retailing at $699, the base model packs 8GB of RAM and 256GB of NVMe storage. Units will ship one month after the firm has reached its (relatively modest) $50,000 pre-order goal.

Purism touts the Librem Mini as a potential mini-desktop or media server, although El Reg feels the use-case isn’t really as relevant as the potential customer. Greater awareness of privacy – and the way it’s gradually being eroded – has created an appetite for such devices, as demonstrated by Purism’s previous crowdfunding accomplishments. And if you want to excise a greater control over how you use your computer, this machine will undoubtedly appeal to you. ®

Source: Look ma, no Intel Management Engine: Purism lifts lid on the Librem Mini, a privacy-focused micro PC • The Register

What good is investing in space? NASA Spinoff magazine shows you which technologies have trickled down to everyday life

Since 1976, Spinoff has annually profiled an average of 50 commercial technologies with origins in NASA missions and research. Issues of Spinoff published since 1996 can be read online in HTML or downloaded in PDF. Scanned copies of Spinoff are available in PDF for issues published between 1976 and 1995.

Spinoff 2020

Click here to read online (HTML)

Download a copy of Spinoff 2020 (PDF)

Spinoff 2020 Summary Brochure (PDF)

Spinoff 2020 PowerPoint Presentation (PPT)

Source: NASA Spinoff 2020

On the shoulders of giants: recent changes in Internet traffic

As the COVID-19 emergency continues and an increasing number of cities and countries are establishing quarantines or cordons sanitaire, the Internet has become, for many, the primary method to keep in touch with their friends and families. And it’s a vital motor of the global economy as many companies have employees who are now working from home.

Traffic towards video conferencing, streaming services and news, e-commerce websites has surged. We’ve seen growth in traffic from residential broadband networks, and a slowing of traffic from businesses and universities.

The Cloudflare team is fully operational and the Network Operating Center (NOC) is watching the changing traffic patterns in the more than 200 cities in which we operate hardware.

Big changes in Internet traffic aren’t unusual. They often occur around large sporting events like the Olympics or World Cup, cultural events like the Eurovision Song Contest and even during Ramadan at the breaking of the fast each day.

The Internet was built to cope with an ever changing environment. In fact, it was literally created, tested, debugged and designed to deal with changing load patterns.

Over the last few weeks, the Cloudflare Network team has noticed some new patterns and we wanted to share a few of them with you.

Entire countries are watching their leaders

Last Friday evening, the US President announced a State of Emergency in the United States. Not so long after, our US data centers served 20% more traffic than usual. The red line shows Friday, the grey lines the preceding days for comparison.

On the Sunday, March 15, the Dutch government announced on the radio at 1730 local time closures of the non-essential business (1630 UTC). A sharp dip in the regular Sunday traffic followed:

The French president made two national announcements, on March 12 (pink curve) and March 16 (red curve) at 2000 local time (1900 UTC). The lockdown announcement on March 16 caused French traffic to dip by half followed by a spike:

Evolution of traffic in quarantine

Italy has seen a 20-40% increase in daily traffic since the lockdown:

With universities closing, some national research networks are remaining (almost) as quiet as a weekend (in purple). Current day in red and previous days in grey (overlaps with previous week):

The Internet Exchange Points, a key part of the Internet infrastructure, where Internet service providers and content providers can exchange data directly (rather than via a third party) have also seen spikes in traffic. Many provide public traffic graphs.

In Amsterdam (AMS-IX), London (LINX) and Frankfurt (DE-CIX), around 10-20% increase is seen around March 9th:

In Milan (MXP-IX), the Exchange point shows a 40% increase on Wednesday, 9th of March 2020, the day of the quarantine:

In Asia, in Hong Kong (HKIX), we can observe a faster increase since the end of January which likely corresponds to the Hubei lockdown on the January 23:

The emergency has a non-negligible impact on Internet services and our lives. Although it is difficult to quantify exactly the increase, we observe numbers from 10% to 40% depending on the region and the state of government action in those regions.

Even though from time to time individual services, such as a web site or an app, have outages the core of the Internet is robust. Traffic is shifting from corporate and university networks to residential broadband, but the Internet was designed for change.

Check back on the Cloudflare blog for further updates and insights.

Source: On the shoulders of giants: recent changes in Internet traffic

Tesla Told Employees to Show Up for Work on Wednesday Despite Shelter-in-Place Order

Electric car company Tesla asked employees to show up to work on Wednesday despite the ongoing coronavirus pandemic, including at its sprawling Fremont, California, production facility, according to emails obtained by CNBC.

[…]

According to CNBC, in an email to workers on Wednesday, Tesla North America HR leader Valerie Workman wrote the company had received “conflicting guidance from different levels of government.” But she suggested that many Tesla jobs are “essential,” mirroring the language of the shelter-in-place order and ignoring a clear directive from the Alameda County Sheriff’s Office that only “minimum basic operations” can continue.

“There are no changes in your normal assignment and you should continue to report to work if you are in an essential function: production, service, deliveries, testing and supporting groups as discussed with your manager,” Workman wrote. She added that Tesla workers would not be penalized for using paid time off if they do not feel well or are “reluctant to come to work.”

According to the Los Angeles Times, Tesla CEO Elon Musk—who is not a doctor or public health expert, but has fought claims of unsafe conditions at Tesla facilities for years—downplayed concerns about the virus in a Monday email to staff. Musk wrote “My frank opinion is that the harm from the coronavirus panic far exceeds that of the virus itself” and stated his belief that covid-19 cases “will not exceed 0.1% of the population.”

“I will personally be at work, but that’s just me,” Musk wrote. “I’d rather you were at home and not stressed, than at work and worried.”

Sgt. Ray Kelly, a spokesman for the Alamedia sheriff, told CNBC that “Our directive was clear” and trying to prevent a slump in production does not constitute an essential service. Many other automakers including General Motors, Ford, and Fiat Chrysler have temporarily suspended U.S. car production on a rotating basis.

According to Bloomberg, an Alameda County spokesperson said that Tesla is preparing to reduce staffing at the facility by 75 percent, though the company didn’t reply to their request for comment.

Update: 3/18/2010 at 9:25 p.m. ET: Per the LA Times, Tesla said it had 2,500 workers on site on Wednesday, about 25 percent of the factory’s normal workforce.

Kelly told the Times that the county “had a good conversation with Tesla today. They understand our position. The county explained they cannot continue their business as usual. They have to go on a minimum operations basis.”

Kelly added that as of Wednesday “it sounds like they’re still making cars,” but that “Tesla is not going to decide what the law is.” If the company continues production despite the workforce reduction the Fremont Police Department may get involved, he added.

Source: Tesla Told Employees to Show Up for Work on Wednesday Despite Shelter-in-Place Order

7.5-Inch E-Ink Display Is Powered Completely By NFC

NFC is usually only used to for quick text transfers, like a tap-and-pay transaction at a register or a quick data transfer from an NFC sticker. A company called “Waveshare” is really pushing the limits of NFC, though, with a 7.5-inch e-ink display that gets its data, and its power, from an NFC transfer. The $70 display doesn’t have a battery and doesn’t need a wired power connection. E-paper (or e-ink) displays have the unique property of not needing power to maintain an image. Once a charge blasts across the display and correctly aligns pixels full of black and white balls, everything will stay where it is when the power turns off, so the image will stick around. You might not have thought about it before, but in addition to data, NFC comes with a tiny wireless power transfer. This display is designed so that NFC provides just enough power to refresh the display during a data transfer, and the e-ink display will hold onto the image afterward.

NFC data transfers max out at a whopping 424 kbit/s. While that’s enough for an instant transfer of credit card data or a URL, the 800×400 image the display needs will take several seconds. Waveshare says the display takes five seconds just to refresh, and that doesn’t count the data transfer, which will vary depending on how complex your image is. The video shows a start-to-finish refresh that takes 10 seconds. If you want to use a phone, an Android app will convert your image into several different black-and-white styles and beam it to the display. Sadly, there’s no iOS app yet. iOS apps didn’t have the ability to write to NFC devices for the longest time. Writing to NFC was added with the launch of iOS 13, which only happened a few months ago.

Source: 7.5-Inch E-Ink Display Is Powered Completely By NFC – Slashdot

HP printers try to send loads of data back to HP about your devices and what you print

NB you can disable outgoing communication in the public network using windows defender by using the instructions here (HP).

They come down to opening windows defender firewall, allowing an app or feature through windows defender firewall, searching for HP and then deselecting the public zone.

At first the setup process was so simple that even a computer programmer could do it. But then, after I had finished removing pieces of cardboard and blue tape from the various drawers of the machine, I noticed that the final step required the downloading of an app of some sort onto a phone or computer. This set off my crapware detector.

It’s possible that I was being too cynical. I suppose that it was theoretically possible that the app could have been a thoughtfully-constructed wizard, which did nothing more than gently guide non-technical users through the sometimes-harrowing process of installing and testing printer drivers. It was at least conceivable that it could then quietly uninstall itself, satisfied with a simple job well done.

Of course, in reality it was a way to try and get people to sign up for expensive ink subscriptions and/or hand over their email addresses, plus something even more nefarious that we’ll talk about shortly (there were also some instructions for how to download a printer driver tacked onto the end). This was a shame, but not unexpected. I’m sure that the HP ink department is saddled with aggressive sales quotas, and no doubt the only way to hit them is to ruthlessly exploit people who don’t know that third-party cartridges are just as good as HP’s and are much cheaper. Fortunately, the careful user can still emerge unscathed from this phase of the setup process by gingerly navigating the UI patterns that presumably do fool some people who aren’t paying attention.

But it is only then, once the user has found the combination of “Next” and “Cancel” buttons that lead out of the swamp of hard sells and bad deals, that they are confronted with their biggest test: the “Data Collection Notice & Settings”.

In summary, HP wants its printer to collect all kinds of data that a reasonable person would never expect it to. This includes metadata about your devices, as well as information about all the documents that you print, including timestamps, number of pages, and the application doing the printing (HP state that they do stop short of looking at the contents of your documents). From the HP privacy policy, linked to from the setup program:

Product Usage Data – We collect product usage data such as pages printed, print mode, media used, ink or toner brand, file type printed (.pdf, .jpg, etc.), application used for printing (Word, Excel, Adobe Photoshop, etc.), file size, time stamp, and usage and status of other printer supplies. We do not scan or collect the content of any file or information that might be displayed by an application.

Device Data – We collect information about your computer, printer and/or device such as operating system, firmware, amount of memory, region, language, time zone, model number, first start date, age of device, device manufacture date, browser version, device manufacturer, connection port, warranty status, unique device identifiers, advertising identifiers and additional technical information that varies by product.

HP wants to use the data they collect for a wide range of purposes, the most eyebrow-raising of which is for serving advertising. Note the last column in this “Privacy Matrix”, which states that “Product Usage Data” and “Device Data” (amongst many other types of data) are collected and shared with “service providers” for purposes of advertising.

HP delicately balances short-term profits with reasonable-man-ethics by only half-obscuring the checkboxes and language in this part of the setup.

At this point everything has become clear – the job of this setup app is not only to sell expensive ink subscriptions; it’s also to collect what apparently passes for informed consent in a court of law. I clicked the boxes to indicate “Jesus Christ no, obviously not, why would anyone ever knowingly consent to that”, and then spent 5 minutes Googling how to make sure that this setting was disabled. My research suggests that it’s controlled by an item in the settings menu of the printer itself labelled “Store anonymous usage information”. However, I don’t think any reasonable person would think that the meaning of “Store anonymous usage information” includes “send analytics data back to HP’s servers so that it can be used for targeted advertising”, so either HP is being deliberately coy or there’s another option that disables sending your data that I haven’t found yet.

I bet there’s also a vigorous debate to be had over whether HP’s definition of “anonymous” is the same as mine.


I imagine that a user’s data is exfiltrated back to HP by the printer itself, rather than any client-side software. Once HP has a user’s data then I don’t know what they do with it. Maybe if they can see that you are printing documents from Photoshop then they can send you spam for photo paper? I also don’t know anything about how much a user’s data is worth. My guess is that it’s depressingly little. I’d almost prefer it if HP was snatching highly valuable information that was worth making a high-risk, high-reward play for. But I can’t help but feel like they’re just grabbing whatever data is lying around because they might as well, it might be worth a few cents, and they (correctly) don’t anticipate any real risk to their reputation and bottom line from doing so.

Recommended for who?

Source: HP printers try to send data back to HP about your devices and what you print | Robert Heaton

NASA makes their entire media library publicly accessible and copyright free

No matter if you enjoy taking or just watching images of space, NASA has a treat for you. They have made their entire collection of images, sounds, and video available and publicly searchable online. It’s 140,000 photos and other resources available for you to see, or even download and use it any way you like.

You can type in the term you want to search for and browse through the database of stunning images of outer space. Additionally, there are also images of astronauts, rocket launches, events at NASA and other interesting stuff. What’s also interesting is that almost every image comes with the EXIF data, which could be useful for astrophotography enthusiasts.

When you browse through the gallery, you can choose to see images, videos or audio. Another cool feature I noticed is that you can narrow down the results by the year. Of course, I used some of my time today to browse through the gallery, and here are some of the space photos you can find:

What I love about NASA is that they make interesting content for average Internet users. They make us feel closer and more familiar with their work and with the secrets of the outer space. For instance, they recently launched a GIPHY account full of awesome animated gifs. It’s also great that photography is an important part of their missions, and so it was even before “pics or it didn’t happen” became the rule. The vast media library they have now published is available to everyone, free of charge and free of copyright. Therefore, you can take a peek at the fascinating mysteries of space, check out what it’s like inside NASA’s premises, or download the images to make something awesome from them. Either way, you’ll enjoy it.

[NASA Image and Video Gallery via SLR Lounge; Credit: NASA/JPL-Caltech]

Source: NASA makes their entire media library publicly accessible and copyright free – DIY Photography

Private By Design: Free and Private Voice Assistants

Science fiction has whetted our imagination for helpful voice assistants. Whether it’s JARVIS from Iron Man, KITT from Knight Rider, or Computer from Star Trek, many of us harbor a desire for a voice assistant to manage the minutiae of our daily lives. Speech recognition and voice technologies have advanced rapidly in recent years, particularly with the adoption of Siri, Alexa, and Google Home.

However, many in the maker community are concerned — rightly — about the privacy implications of using commercial solutions. Just how much data do you give away every time you speak with a proprietary voice assistant? Just what are they storing in the cloud? What free, private, and open source options are available? Is it possible to have a voice stack that doesn’t share data across the internet?

Yes, it is. In this article, I’ll walk you through the options.

WHAT’S IN A VOICE STACK?

Some voice assistants offer a whole stack of software, but you may prefer to pick and choose which layers to use.

» WAKE WORD SPOTTER — This layer is constantly listening until it hears the wake word or hot word, at which point it will activate the speech-to-text layer. “Alexa,” “Jarvis,” and “OK Google” are wake words you may know.

» SPEECH TO TEXT (STT) — Also called automatic speech recognition (ASR). Once activated by the wake word, the job of the STT layer is just that: to recognize what you’re saying and turn it into written form. Your spoken phrase is called an utterance.

» INTENT PARSER — Also called natural language processing (NLP) or natural language understanding (NLU). The job of this layer is to take the text from STT and determine what action you would like to take. It often does this by recognizing entities — such as a time, date, or object — in the utterance.

» SKILL — Once the intent parser has determined what you’d like to do, an application or handler is triggered. This is usually called a skill or application. The computer may also create a reply in human-readable language, using natural language generation (NLG).

» TEXT TO SPEECH — Once the skill has completed its task, the voice assistant may acknowledge or respond using a synthesized voice.

Some layers work on device, meaning they don’t need an internet connection. These are a good option for those concerned about privacy, because they don’t share your data across the internet. Others do require an internet connection because they offload processing to cloud servers; these can be more of a privacy risk.

Before you pick a voice stack for your project you’ll need to ask key questions such as:

• What’s the interface of the software like — how easy is it to install and configure, and what support is available?

• What sort of assurances do you have around the software? How accurate is it? Does it recognize your accent well? Is it well tested? Does it make the right decisions about your intended actions?

• What sort of context, or use case, do you have? Do you want your data going across the internet or being stored on cloud servers? Is your hardware constrained in terms of memory or CPU? Do you need to support languages other than English?

ALL-IN-ONE VOICE SOLUTIONS

If you’re looking for an easy option to start with, you might want to try an all-in-one voice solution. These products often package other software together in a way that’s easy to install. They’ll get your DIY voice project up and running the fastest.

Jasper  is designed from the ground up for makers, and is intended to run on a Raspberry Pi. It’s a great first step for integrating voice into your projects. With Jasper, you choose which software components you want to use, and write your own skills, and it’s possible to configure it so that it doesn’t need an internet connection to function.

Rhasspy also uses a modular framework and can be run without an internet connection. It’s designed to run under Docker and has integrations for NodeRED and for Home Assistant, a popular open source home automation software.

Mycroft is modular too, but by default it requires an internet connection. Skills in Mycroft are easy to develop and are written in Python 3; existing skills include integrations with Home Assistant and Mozilla WebThings. Mycroft also builds open-source hardware voice assistants similar to Amazon Echo and Google Home. And it has a distribution called Picroft specifically for the Raspberry Pi 3B and above.

Almond is a privacy-preserving voice assistant from Stanford that’s available as a web app, for Android, or for the GNOME Linux desktop. Almond is very new on the scene, but already has an integration with Home Assistant. It also has options that allow it to run on the command line, so it could be installed on a Raspberry Pi (with some effort).

The languages supported by all-in-one voice solutions are dependent on what software options are selected, but by default they use English. Other languages require additional configuration.

WAKE WORD SPOTTERS

PocketSphinx is a great option for wake word spotting. It’s available for Linux, Mac, Windows platforms, as well as Android and iOS; however, installation can be involved. PocketSphinx works on-device, by recognizing phonemes, which are the smallest units of sound that make up a word.

For example, hello and world each have four phonemes:

hello H EH L OW

world W ER L D

The downside of PocketSphinx is that its core developers appear to have moved on to a for-profit company, so it’s not clear how long PocketSphinx or its parent CMU Sphinx will be around.

Precise by Mycroft.AI uses a recurrent neural network to learn what are and are not wake words. You can train your own wake words with Precise, but it does take a lot of training to get accurate results.

Snowboy is free for makers to train your own wake word, using Kitt.AI’s (proprietary) training, but also comes with several pre-trained models, and wrappers for several programming languages including Python and Go. Once you’ve got your trained wake word, you no longer need an internet connection. It’s an easier option for beginners than Precise or PocketSphinx, and has a very small CPU footprint, which makes it ideal for embedded electronics. Kitt.AI was acquired by Chinese giant Baidu in 2017, although to date it appears to remain as its own entity.

Porcupine from Picovoice is designed specifically for embedded applications. It comes in two variants: a complete model with higher accuracy, and a compressed model with slightly lower accuracy but a much smaller CPU and memory footprint. It provides examples for integration with several common programming languages. Ada, the voice assistant recently released by Home Assistant, uses Porcupine under the hood.

SPEECH TO TEXT

Kaldi has for years been the go-to open source speech-to-text engine. Models are available for several languages, including Mandarin. It works on-device but is notoriously difficult to set up, not recommended for beginners. You can use Kaldi to train your own speech-to-text model, if you have spoken phrases and recordings, for example in another language. Researchers in the Australian Centre for the Dynamics of Language have recently developed Elpis , a wrapper for Kaldi that makes transcription to text a lot easier. It’s aimed at linguists who need to transcribe lots of recordings.

CMU Sphinx , like its child PocketSphinx, is based on phoneme recognition, works on-device, and is complex for beginners.

DeepSpeech, part of Mozilla’s Common Voice project , is another major player in the open source space that’s been gaining momentum. DeepSpeech comes with a pre-trained English model but can be trained on other data sets — this requires a compatible GPU. Trained models can be exported using TensorFlow Lite for inference, and it’s been tested on an RasPi 4, where it comfortably performs real-time transcriptions. Again, it’s complex for beginners.

INTENT PARSING AND ENTITY RECOGNITION

There are two general approaches to intent parsing and entity recognition: neural networks and slot matching. The neural network is trained on a set of phrases, and can usually match an utterance that “sounds like” an intent that should trigger an action. In the slot matching approach, your utterance needs to closely match a set of predefined “slots,” such as “play the song [songname] using [streaming service].” If you say “play Blur,” the utterance won’t match the intent.

Padatious is Mycroft’s new intent parser, which uses a neural network. They also developed Adapt which uses the slot matching approach.

For those who use Python and want to dig a little deeper into the structure of language, the Natural Language Toolkit is a powerful tool, and can do “parts of speech” tagging — for example recognizing the names of places.

Rasa  is a set of tools for conversational applications, such as chatbots, and includes a robust intent parser. Rasa makes predictions about intent based on the entire context of a conversation. Rasa also has a training tool called Rasa X, which helps you train the conversational agent to your particular context. Rasa X comes in both an open source community edition and a licensed enterprise edition.

Picovoice also has Rhino, which comes with pre-trained intent parsing models for free. However, customization of models — for specific contexts like medical or industrial applications — requires a commercial license.

TEXT TO SPEECH

Just like speech-to-text models need to be “trained” for a particular language or dialect, so too do text-to-speech models. However, text to speech is usually trained on a single voice, such as “British Male” or “American Female.”

eSpeak  is perhaps the best-known open source text-to-speech engine. It supports over 100 languages and accents, although the quality of the voice varies between languages. eSpeak supports the Speech Synthesis Markup Language format, which can be used to add inflection and emphasis to spoken language. It is available for Linux, Windows, Mac, and Android systems, and it works on-device, so it can be used without an internet connection, making it ideal for maker projects.

Festival is now quite dated, and needs to be compiled from source for Linux, but does have around 15 American English voices available. It works on-device. It’s mentioned here out of respect; for over a decade it was considered the premier open source text-to-speech engine.

Mimic2 is a Tacotron fork from Mycroft AI, who have also released the to allow you to build your own text-to-speech voices. To get a high-quality voice requires up to 100 hours of “clean” speech, and Mimic2 is too large to work on-device, so you need to host it on your own server or connect your device to the Mycroft Mimic2 server. Currently it only has a pre-trained voice for American English.

Mycroft’s earlier Mimic TTS can work on-device, even on a Raspberry Pi, and is another good candidate for maker projects. It’s a fork of CMU Flite.

Mary Text to Speech supports several, mainly European languages, and has tools for synthesizing new voices. It runs on Java, so can be complex to install.

So, that’s a map of the current landscape in open source voice assistants and software layers. You can compare all these layers in the chart at the end of this article. Whatever your voice project, you’re likely to find something here that will do the job well — and will keep your voice and your data private from Big Tech.

WHAT’S NEXT FOR OPEN SOURCE VOICE?

As machine learning and natural language processing continue to advance rapidly, we’ve seen the decline of the major open source voice tools. CMU Sphinx, Festival, and eSpeak have become outdated as their supporters have adopted other tools, or maintainers have gone into private industry and startups.

We’re going to see more software that’s free for personal use but requires a commercial license for enterprise, as Rasa and Picovoice do today. And it’s understandable; dealing with voice in an era of machine learning is data intensive, a poor fit for the open source model of volunteer development. Instead, companies are driven to commercialize by monetizing a centralized “platform as a service.”

Another trajectory this might take is some form of value exchange. Training all those neural networks and machine learning models — for STT, intent parsing, and TTS — takes vast volumes of data. More companies may provide software on an open source basis and in return ask users to donate voice samples to improve the data sets.Mozilla’s Common Voice follows this model.

Another trend is voice moving on-device. The newer, machine-learning-driven speech tools originally were too computationally intensive to run on low-end hardware like the Raspberry Pi. But with DeepSpeech now running on a RasPi 4, it’s only a matter of time before the newer TTS tools can too.

We’re also seeing a stronger focus on personalization, with the ability to customize both speech-to-text and text-to-speech software.

WHAT WE STILL NEED

What’s lacking across all these open source tools are user-friendly interfaces to capture recordings and train models. Open source products must continue to improve their UIs to attract both developer and user communities; failure to do so will see more widespread adoption of proprietary and “freemium” tools.

As always in emerging technologies, standards remain elusive. For example, skills have to be rewritten for different voice assistants. Device manufacturers, particularly for smart home appliances, won’t want to develop and maintain integrations for multiple assistants; much of this will fall to an already-stretched open source community until mechanisms for interoperability are found. Mozilla’s WebThings ecosystem (see page 50) may plug the interoperability gap if it can garner enough developer support.

Regardless, the burden rests with the open source community to find ways to connect to proprietary systems (see page 46 for a fun example) because there’s no incentive for manufacturers to do the converse.

The future of open source rests in your hands! Experiment and provide feedback, issues, pull requests, data, ideas, and bugs. With your help, open source can continue to have a strong voice.

click the image to view full size. Alternatively, you can download this data as a spreadsheet by clicking here.

Source: Private By Design: Free and Private Voice Assistants

Avoid taking ibuprofen for COVID-19 symptoms: WHO

The World Health Organization recommended Tuesday that people suffering COVID-19 symptoms avoid taking ibuprofen, after French officials warned that anti-inflammatory drugs could worsen effects of the virus.

The warning by French Health Minister Olivier Veran followed a recent study in The Lancet medical journal that hypothesised that an enzyme boosted by anti-inflammatory drugs such as ibuprofen could facilitate and worsen COVID-19 infections.

Asked about the study, WHO spokesman Christian Lindmeier told reporters in Geneva the UN health agency’s experts were “looking into this to give further guidance.”

“In the meantime, we recommend using rather paracetamol, and do not use ibuprofen as a self-medication. That’s important,” he said.

Source: Avoid taking ibuprofen for COVID-19 symptoms: WHO

Virus Travel Bans Threaten Labor for Global Food Harvests

Across the globe, governments are imposing travel limits in a bid to stem the spread of coronavirus. The unintended consequence is a squeeze on migrant labor that’s a cornerstone of food production.

American produce growers preparing to harvest crops are warning of a devastating impact on fruit and vegetables after the U.S. Embassy in Mexico announced a halt to visa interviews for seasonal farm workers. Slaughterhouses also may face labor shortages.

In Australia, growers say the country may face shortages of some fruits and vegetables because of travel curbs, with the nation traditionally using overseas workers for one third of seasonal farming jobs. Kiwifruit pickers are in short supply in New Zealand. And in Canada, travel limits threaten meat processors that rely on temporary foreign workers to fill chronic labor shortages.

“There won’t be anyone to harvest the crops,” said Robert Guenther, senior vice president for public policy for the United Fresh Produce Association, which represents U.S. growers, distributors, wholesalers and retailers. “It will be devastating to growers and ultimately to the supply chain and consumers. They won’t have the food.”

Vulnerable supply chains

Expectations for a labor crunch reveal how interconnected the world of global agriculture has become, and expose the strains of production and areas of vulnerability to the supply chain. In many key food-making nations, the industry relies heavily on migrant and immigrant workers to fill jobs that middle-class citizens shun. Think of the back-breaking work of tomato pickers, the dangerous conditions at slaughter houses and what many would consider the unpalatable environment of large livestock-feed operations.

The timing for the disruptions in some ways couldn’t be worse. In the Northern Hemisphere, farmers are gearing up for their peak spring and summer growing seasons. Ranchers also tend to sell more animals to slaughter at this time of year.

Source: Virus Travel Bans Threaten Labor for Global Food Harvests | Time